This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Graduate School of Engineering, Mie University, Japan and https://sites.google.com/site/akinorikawachi/ [email protected]://orcid.org/0000-0001-9218-9944JSPS Grant-in-Aid for Scientific Research (A) Nos. 16H01705, 21H04879, (B) No. 17H01695, JSPS Grant-in-Aid for Young Scientists (B) No. 17K12640, and MEXT Quantum Leap Flagship Program (MEXT Q-LEAP) Grant Number JPMXS0120319794.Graduate School of Informatics/Institute for Advanced Study, Nagoya University, [email protected]://orcid.org/0000-0002-2219-3320JSPS Grant-in-Aid for Scientific Research (A) Nos. 16H01705, 21H04879, (B) No. 19H04066, Grant-in-Aid for Transformative Research Areas No. 20H05966 and MEXT Quantum Leap Flagship Program (MEXT Q-LEAP) Grant Number JPMXS0120319794. \CopyrightAkinori Kawachi and Harumichi Nishimura \ccsdesc[500]Theory of computation Quantum computation theory \ccsdesc[500]Theory of computation Computational complexity and cryptography

Acknowledgements.
We thank the anonymous reviewers of ITC 2021 for helpful comments. \hideLIPIcs\EventEditorsStefano Tessaro \EventNoEds1 \EventLongTitle2nd Conference on Information-Theoretic Cryptography (ITC 2021) \EventShortTitleITC 2021 \EventAcronymITC \EventYear2021 \EventDateJuly 23–26, 2021 \EventLocationBertinoro, Italy (Virtual Conference) \EventLogo \SeriesVolume199 \ArticleNo20

Communication Complexity of Private Simultaneous Quantum Messages Protocols

Akinori Kawachi    Harumichi Nishimura
Abstract

The private simultaneous messages (PSM) model is a non-interactive version of the multiparty secure computation (MPC), which has been intensively studied to examine the communication cost of the secure computation. We consider its quantum counterpart, the private simultaneous quantum messages (PSQM) model, and examine the advantages of quantum communication and prior entanglement of this model.

In the PSQM model, kk parties P1,,PkP_{1},\ldots,P_{k} initially share a common random string (or entangled states in a stronger setting), and they have private classical inputs x1,,xkx_{1},\ldots,x_{k}. Every PiP_{i} generates a quantum message from the private input xix_{i} and the shared random string (entangled states), and then sends it to the referee RR. Receiving the messages from the kk parties, RR computes F(x1,,xk)F(x_{1},\ldots,x_{k}) from the messages. Then, RR learns nothing except for F(x1,,xk)F(x_{1},\ldots,x_{k}) as the privacy condition.

We obtain the following results for this PSQM model. (ii) We demonstrate that the privacy condition inevitably increases the communication cost in the two-party PSQM model as well as in the classical case presented by Applebaum, Holenstein, Mishra, and Shayevitz [Journal of Cryptology 33(3), 916–953 (2020)]. In particular, we prove a lower bound (3o(1))n(3-o(1))n of the communication complexity in PSQM protocols with a shared random string for random Boolean functions of 2n2n-bit input, which is larger than the trivial upper bound 2n2n of the communication complexity without the privacy condition. (iiii) We demonstrate a factor two gap between the communication complexity of PSQM protocols with shared entangled states and with shared random strings by designing a multiparty PSQM protocol with shared entangled states for a total function that extends the two-party equality function. (iiiiii) We demonstrate an exponential gap between the communication complexity of PSQM protocols with shared entangled states and with shared random strings for a two-party partial function.

keywords:
Communication complexity, private simultaneous messages, quantum protocols, secure multi-party computation
category:
\relatedversion

1 Introduction

Background. Communication complexity has been an important research area in theoretical computer science for more than four decades, aiming to understand the communication cost of computing functions in a distributed manner [31, 25]. Since the advent of quantum information science, quantum communication complexity has also been studied intensively to determine the advantage of quantum information processing over its classical counterparts. A number of studies have succeeded in demonstrating the quantum advantages from the early days of quantum complexity theory [7, 28, 8].

Recently, much attention has been given to studying the amount of communication overhead required to preserve privacy in the field of cryptography, particularly, multi-party secure computation (MPC), to explore the optimal communication cost for privacy from the viewpoint of communication complexity [13, 12]. MPC is commonly based on a general network model that has complex communication patterns (e.g., in which each of many parties can freely interact with the other parties bidirectionally) unlike standard models in communication complexity (e.g., in which two parties can exchange messages only with each other). Therefore, many studies have focused on a special class of MPC that has simpler communication patterns, such as private simultaneous messages (PSM) protocols [14, 21, 9, 2, 1].

The two-party version of the PSM model was first proposed by Feige, Kilian, and Naor [14], and was later extended by Ishai and Kushilevitz [21]. In the general setting of the PSM model, we consider kk parties P1,,PkP_{1},\ldots,P_{k} and a unique referee RR. The party PiP_{i} has its private input xix_{i}, and all parties share a common random string rr. Each PiP_{i} generates message mim_{i} from xix_{i} and rr, and then, sends mim_{i} to the referee RR only once. Note that each party is not allowed to interact with other parties. The referee RR receives the messages m1,,mkm_{1},\ldots,m_{k}, and computes an output value of a predetermined function FF. The protocol generally has two properties correctness and privacy: Correctness signifies that the referee can compute F(x1,,xk)F(x_{1},\ldots,x_{k}) correctly from the messages m1,,mkm_{1},\ldots,m_{k}, while privacy signifies that the referee RR learns nothing except for F(x1,,xk)F(x_{1},\ldots,x_{k}) from the received messages m1,,mkm_{1},\ldots,m_{k} in the information-theoretical sense.

In fact, the communication model of PSM protocols coincides with simultaneous message passing (SMP) protocols, which are known as traditional communication models in communication complexity [31, 25]. In the (number-in-hand) SMP model, kk parties P1,,PkP_{1},\ldots,P_{k} that share a common random string rr (and sometimes entangled states), send their messages m1,,mkm_{1},\ldots,m_{k} computed from individual inputs x1,,xkx_{1},\ldots,x_{k} and the referee computes F(x1,,xk)F(x_{1},\ldots,x_{k}) from m1,,mkm_{1},\ldots,m_{k}, as performed in the PSM model. Note that the SMP model does not require the privacy condition unlike the PSM model. The communication complexity of SMP protocols has been widely studied from the viewpoint of classical/quantum information to demonstrate the power of quantum communication [8, 18, 16].

Two-party quantum SMP models were first studied by Buhrman, Cleve, Watrous, and de Wolf [8] in the setting that the two parties do not share any randomness or entanglement. In this model, they demonstrated that the quantum communication complexity of the equality function is exponentially smaller than in the classical case. This result has been strengthened in the literature [4, 15], and Gavinsky [16] demonstrated that there is a relational problem whose quantum communication complexity is exponentially smaller than that of the two-way classical communication model. However, the power of shared entanglement in the SMP model is unclear. In one of the few related studies, Gavinsky, Kempe, Regev, and de Wolf [18] demonstrated that there is a relational problem that has an exponential gap between quantum SMP models with shared entanglement and without shared entanglement. However, the known maximum gap between them for total functions is only a constant multiplicative factor of 22 [20, 22].

Although various studies have examined quantum versions of MPC so far (e.g., [10, 29, 11]), to the best of the authors’ knowledge, there has been no attempt to analyze quantum communication complexity under the privacy condition in a cryptographic setting, and such analysis is important to understand the advantages of quantum communication in a cryptographic setting.

Contributions. In this paper, we examine the power of quantum communication and shared entanglement under the information-theoretical privacy condition based on a standard communication model, namely, the PSM (or, equivalently, SMP) model. In particular, we propose a quantum counterpart of the classical PSM model called private simultaneous quantum messages (PSQM) model. In the PSQM model, parties P1,,PkP_{1},\ldots,P_{k} which have classical private inputs x1,,xkx_{1},\ldots,x_{k} share a common random string or entangled states in advance, and can send quantum messages to a quantum referee, RR. Then, RR computes a classical output value F(x1,,xk)F(x_{1},\ldots,x_{k}) for a given function FF.

In the PSM (and its related) model, there are few results on lower bounds of communication complexity [1, 13, 3]. As one of such results, Applebaum, Holenstein, Mishra, and Shayevitz [1] proved a lower bound (3o(1))n(3-o(1))n of the communication complexity for random functions Fn:{0,1}n×{0,1}n{0,1}F_{n}:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\} in the PSM model. In contrast, every function has the trivial upper bound 2n2n in the SMP model (i.e., the PSM model without the privacy condition). This result implies that the privacy condition creates communication overhead in the PSM model for some functions. Our first result demonstrates that this communication overhead is inevitable even if the parties can send quantum messages as in the PSQM model.

Theorem 1.1.

For a (1o(1))(1-o(1)) fraction of functions Fn:{0,1}n×{0,1}n{0,1}F_{n}:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, the communication complexity of two-party PSQM protocols with shared randomness for FnF_{n} is at least 3n2lognO(1)3n-2\log{n}-O(1).

We also present a multiparty PSQM protocol for a total function that reduces the amount of quantum communication by half under the condition that the parties share entanglement compared to the case in which they do not share entanglement.

Theorem 1.2.

For any even nn and kk, there is a total function Fn:({0,1}n)k{0,1}F_{n}:(\{0,1\}^{n})^{k}\rightarrow\{0,1\} such that the communication complexity of the kk-party PSQM protocol with shared entanglement is at most kn/2kn/2, while that without shared entanglement is knkn.

Actually, this function matches the equality function for the two-party case. It is known that for the equality function, the two-party quantum SMP model with shared entanglement reduces the amount of quantum communication by half compared to the corresponding model without shared entanglement (e.g. [20]). Our result implies that this reduction still holds even if the privacy condition is required.

Moreover, we present a two-party PSQM protocol with shared entanglement for a partial function that reduces the amount of quantum communication exponentially compared to the case in which the parties do not share entanglement.

Theorem 1.3.

There is a partial function Fn:{0,1}n×{0,1}n{0,1}F_{n}:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\} such that the communication complexity of the PSQM protocol with shared entanglement is O(logn)O(\log n) while that without entanglement is Ω(n)\Omega(n).

Related Work. There have been several studies on quantum communication complexity with privacy conditions (e.g., [23, 17]), although they differed from a cryptographic setting. For example, Gavinsky and Ito [17] considered the SMP model with privacy; however it considered the information leakage of quantum messages when the input was randomly chosen, while in the cryptographic setting, privacy should be retained for any input.

In a study related to the PSQM model, Brakerski and Yuen [6] constructed a quantum version of decomposable randomized encoding schemes. In fact, decomposable randomized encoding is equivalent to the PSM model from a communication-complexity perspective. They demonstrated how to garble a general quantum circuit on quantum inputs in a decomposable manner via a constant-depth quantum circuit. In contrast, our study focuses on the communication complexity of computing several classical functions on classical inputs in the communication model.

More recently, Morimae [27] investigated relationships between quantum randomized encoding and other quantum protocols including quantum computing verification and blind quantum computing. For example, he proved that a randomized encoding scheme of the BB84 state generation implies a two-round verification scheme of quantum computing with a classical verifier that additionally performs the encoding operation, and that a quantum randomized encoding scheme with a classical encoding operation implies violation of the no-cloning theorem. His target of quantum randomized encoding schemes is similar to that of [6], that is, encoding for quantum circuits on quantum inputs rather than classical functions on classical inputs.

2 Preliminaries

Let [n]:={1,2,,n}[n]:=\{1,2,\ldots,n\}. For any two mm-bit strings x=x1xmx=x_{1}\cdots x_{m} and y=y1ymy=y_{1}\cdots y_{m}, the product xyx\cdot y denotes i[m]xiyi(mod 2)\sum_{i\in[m]}x_{i}y_{i}\leavevmode\nobreak\ (\mbox{mod}\leavevmode\nobreak\ 2), and xyx\oplus y denotes the mm-bit string whose iith bit is the XOR of xix_{i} and yiy_{i}.

For any mm-bit string x=x1x2xmx=x_{1}x_{2}\cdots x_{m}, let

𝗉(x)=x1+x2α++xmαm1(mod𝗊m){\sf p}(x)=x_{1}+x_{2}\alpha+\cdots+x_{m}\alpha^{m-1}\leavevmode\nobreak\ (\mbox{mod}\leavevmode\nobreak\ {\sf q}_{m}) (1)

be the corresponding polynomial over 𝔽2\mathbb{F}_{2}, where 𝗊m{\sf q}_{m} is some irreducible polynomial of degree mm over 𝔽2\mathbb{F}_{2}. Note that 𝗉(x){\sf p}(x) is regarded as an element in 𝔽2m\mathbb{F}_{2^{m}}, and 𝗉{\sf p} is a one-to-one correspondence between {0,1}m{0m}\{0,1\}^{m}\setminus\{0^{m}\} and the multiplicative group 𝔽2m\mathbb{F}^{*}_{2^{m}}.

We assume the reader is familiar with the basics of quantum information and computation such as quantum states and quantum operations (see, e.g, [19, 26]). According to the standard notations, Pauli gates XX, ZZ, and the Hadamard gate HH denote

X=(0110),Z=(1001),H=12(1111),X=\left(\begin{matrix}0&1\\ 1&0\end{matrix}\right),\ \ Z=\left(\begin{matrix}1&0\\ 0&-1\end{matrix}\right),\ \ H=\frac{1}{\sqrt{2}}\left(\begin{matrix}1&1\\ 1&-1\end{matrix}\right),

respectively.

2.1 Private simultaneous quantum messages protocols

Private simultaneous quantum messages (PSQM) protocols are formally defined as follows.

Definition 2.1 (private simultaneous quantum messages (PSQM) protocols).

For positive integers n,k>0n,k>0, let nn be the size parameter and kk be the number of parties. Let Fn:i=1k𝒳n,i𝒴nF_{n}:\prod_{i=1}^{k}\mathcal{X}_{n,i}\rightarrow\mathcal{Y}_{n}. We say that a (k+1)(k+1)-tuple Π=(P1,,Pk,R)\Pi=(P_{1},\ldots,P_{k},R) of quantum algorithms is an ε\varepsilon-error kk-party private simultaneous quantum messages (PSQM) protocol if the following holds: given an individual input xi𝒳n,ix_{i}\in\mathcal{X}_{n,i} and shared random string rr among P1,,PkP_{1},\ldots,P_{k}, the iith party PiP_{i} prepares a quantum message, represented as ρi=Pi(xi,r)\rho_{i}=P_{i}(x_{i},r), in a Hilbert space n,i\mathcal{M}_{n,i} called a quantum register, and sends n,i\mathcal{M}_{n,i} (or equivalently ρi\rho_{i}) to the party RR, which is called the referee. Then, the following two properties hold:

  1. 1.

    (Correctness) The referee RR outputs the classical value Fn(x1,,xk)𝒴nF_{n}(x_{1},\ldots,x_{k})\in\mathcal{Y}_{n} using the received joint quantum register n:=i=1kn,i\mathcal{M}_{n}:=\bigotimes_{i=1}^{k}\mathcal{M}_{n,i} with a probability of at least 1ε1-\varepsilon.

  2. 2.

    ((Perfect) Privacy) There exists a quantum algorithm SnS_{n}, which is called the simulator, such that the output quantum state Sn(Fn(x1,,xk))S_{n}(F_{n}(x_{1},\ldots,x_{k})) is identical to the quantum state in n\mathcal{M}_{n} (before RR), namely, i=1kρi\otimes_{i=1}^{k}\rho_{i}.

We say that the protocol is exact when ε=0\varepsilon=0.

If the shared random string rr is replaced by a predetermined multipartite entangled quantum state |Φ|\Phi\rangle among the kk parties, we say that Π\Pi is a PSQM protocol with a shared entangled state |Φ|\Phi\rangle, where the algorithms and the properties are similarly defined except that PiP_{i} prepares the message using its own part of |Φ|\Phi\rangle (instead of rr), and that the quantum state in n\mathcal{M}_{n} is not a product state of the kk local states in n,1,,n,k\mathcal{M}_{n,1},\ldots,\mathcal{M}_{n,k} any more.

The communication complexity of Π\Pi is defined by the total length logdim(n)\log{\dim(\mathcal{M}_{n}}) of the messages.

Let Cεpsm(Fn)C^{psm}_{\varepsilon}(F_{n}) (resp. Qεpsm(Fn)Q^{psm}_{\varepsilon}(F_{n})) be the ε\varepsilon-error classical (quantum) communication complexity of the problem FnF_{n} in the PSM (PSQM) model with a shared random string. Let Cεpsm,(Fn)C^{psm,*}_{\varepsilon}(F_{n}) (resp. Qεpsm,(Fn)Q^{psm,*}_{\varepsilon}(F_{n})) be the ε\varepsilon-error classical (quantum) communication complexity of FnF_{n} in the PSM (PSQM) model with shared entangled states (the PSM model with shared entangled states is defined similarly to the PSQM model with shared entangled states except that the messages sent to the referee are restricted to classical strings).

3 Communication Lower Bounds of Two-Party PSQM Protocols

In this section, we present the communication lower bounds of random functions for two-party PSQM protocols (Theorem 1.1).

The proof strategy is based on that of the classical case presented by Applebaum et al. [1]. The proof for the classical case considers two independent executions of a PSM protocol. It then evaluated the upper bounds of the collision probability, that is, the probability that the message in the first execution coincides with the one in the second execution, between two independent random messages. Because the collision probability is lower-bounded by the inverse of the size of the message domain, we can obtain the communication lower bound from the upper bound of the collision probability. Note that this argument is not available for quantum messages since they vary infinitely even over a finite number of qubits.

In order to extend the above argument to the case of quantum messages, we use the purity, trρ2\mathrm{tr}\rho^{2}, of a quantum message ρ\rho in a PSQM protocol instead of the collision probability. In accordance with its name, the purity is originally a measure of how pure a quantum state is. (For example, any pure state has a purity of 11, and the dd-dimensional maximally mixed state has 1/d1/d.) It is easy to see that the purity of a quantum state ρ\rho is lower-bounded by 1/dim(ρ)1/\dim(\rho), and thus, we can obtain the communication lower bounds for a PSQM protocol by evaluating the upper bound of the purity of the quantum messages, similarly to the collision probability for a PSM protocol.

However, the purity of quantum messages is different from the collision probability between classical messages; thus, we must further adapt the proof technique in [1] to the purity. For example, while the collision probability is analyzed by combinatorial techniques in the proof of [1], we need to analyze the trace trρ2\mathrm{tr}\rho^{2} combinatorially by extending the original proof (Claim 2). Also, the proof technique in [1] uses a unique collision (which is obtained from the property called non-degeneracy that random functions have with high probability) between two messages in two independent executions with any fixed shared random string. Instead of the unique collision, we consider weighted collisions defined from the inner product of two quantum messages and extend the original argument for the weighted collisions (Lemma 3.4).

Before discussing the details of the proof, we provide several technical definitions and notation required for the proof of the lower bounds. In this section, we denote 𝒳n,i{\cal X}_{n,i} by 𝒳i{\cal X}_{i}. We use ρ(x1,x2;r)=ρ1(x1;r)ρ2(x2;r)\rho(x_{1},x_{2};r)=\rho_{1}(x_{1};r)\otimes\rho_{2}(x_{2};r) to the entire quantum message sent from P1P_{1} and P2P_{2} on individual inputs x1𝒳1x_{1}\in{\cal X}_{1} and x2𝒳2x_{2}\in{\cal X}_{2} with a shared random string rr to RR, where ρ1(x1;r)\rho_{1}(x_{1};r) denotes P1P_{1}’s message and ρ2(x2;r)\rho_{2}(x_{2};r) denotes P2P_{2}’s message.

Let μ\mu be a distribution over 𝒳1×𝒳2\mathcal{X}_{1}\times\mathcal{X}_{2} with marginal distributions μ1\mu_{1} and μ2\mu_{2}. We define Supp(μ)\mathrm{Supp}(\mu) for a distribution μ\mu as a set {x:\{x:. We say that function FnF_{n} is non-degenerate under distribution μ\mu if for every distinct x1Supp(μ1)x_{1}\in\mathrm{Supp}(\mu_{1}) and x1Supp(μ1)x^{\prime}_{1}\in\mathrm{Supp}(\mu_{1}), there exists x2Supp(μ2)x_{2}\in\mathrm{Supp}(\mu_{2}) such that Fn(x1,x2)Fn(x1,x2)F_{n}(x_{1},x_{2})\neq F_{n}(x^{\prime}_{1},x_{2}) and for every distinct x2Supp(μ2)x_{2}\in\mathrm{Supp}(\mu_{2}) and x2Supp(μ2)x^{\prime}_{2}\in\mathrm{Supp}(\mu_{2}) there exists x1x_{1} such that Fn(x1,x2)Fn(x1,x2)F_{n}(x_{1},x_{2})\neq F_{n}(x_{1},x^{\prime}_{2}). We say that FnF_{n} is non-degenerate if the above holds when replacing Supp(μ1)\mathrm{Supp}(\mu_{1}) and Supp(μ2)\mathrm{Supp}(\mu_{2}) by 𝒳1\mathcal{X}_{1} and 𝒳2\mathcal{X}_{2}, respectively.

A rectangle \mathcal{R} of size k×k\times\ell over 𝒳1×𝒳2\mathcal{X}_{1}\times\mathcal{X}_{2} is defined as ((x1,1,,x1,k),(x2,1,,x2,))((x_{1,1},\ldots,x_{1,k}),(x_{2,1},\ldots,x_{2,\ell})), where x1,i𝒳1,x2,j𝒳2x_{1,i}\in\mathcal{X}_{1},x_{2,j}\in\mathcal{X}_{2} for every i,ji,j, x1,ix1,ix_{1,i}\neq x_{1,i^{\prime}} for every distinct i,ii,i^{\prime}, and x2,jx2,jx_{2,j}\neq x_{2,j^{\prime}} for every distinct j,jj,j^{\prime}. We say that two rectangles =((x1,1,,x1,k),(x2,1,,x2,))\mathcal{R}=((x_{1,1},\ldots,x_{1,k}),(x_{2,1},\ldots,x_{2,\ell})) and =((x1,1,,x1,k),(x2,1,,x2,))\mathcal{R}^{\prime}=((x^{\prime}_{1,1},\ldots,x^{\prime}_{1,k}),(x^{\prime}_{2,1},\ldots,x^{\prime}_{2,\ell})) are 𝒳1\mathcal{X}_{1}-disjoint (resp. 𝒳2\mathcal{X}_{2}-disjoint) if x1,ix1,ix_{1,i}\neq x^{\prime}_{1,i} for every i[k]i\in[k] (resp. if x2,jx2,jx_{2,j}\neq x^{\prime}_{2,j} for every j[]j\in[\ell]). In particular, we say that \mathcal{R} and \mathcal{R}^{\prime} are disjoint if they are either 𝒳1\mathcal{X}_{1}-disjoint or 𝒳2\mathcal{X}_{2}-disjoint.

For a rectangle =((x1,1,,x1,k),(x2,1,,x2,))\mathcal{R}=((x_{1,1},\ldots,x_{1,k}),(x_{2,1},\ldots,x_{2,\ell})), let Fn[]F_{n}[\mathcal{R}] be a matrix whose (i,j)(i,j)-entry is Fn(x1,i,x2,j)F_{n}(x_{1,i},x_{2,j}), and let μ()=i[k],j[]μ(x1,i,x2,j)\mu(\mathcal{R})=\sum_{i\in[k],j\in[\ell]}\mu(x_{1,i},x_{2,j}). We say that \mathcal{R} is similar to \mathcal{R}^{\prime} if Fn[]=Fn[]F_{n}[\mathcal{R}]=F_{n}[\mathcal{R}^{\prime}]. We define

α(μ):=max(1,2)min{μ(1),μ(2)},\alpha(\mu):=\max_{(\mathcal{R}_{1},\mathcal{R}_{2})}\min\{\mu(\mathcal{R}_{1}),\mu(\mathcal{R}_{2})\},

where the maximum ranges over all pairs of similar disjoint rectangles (1,2)(\mathcal{R}_{1},\mathcal{R}_{2}). In addition,

β(μ):=minyPr(X1,X2),(X1,X2)μ[(X1,X2)(X1,X2)|Fn(X1,X2)=Fn(X1,X2)=y],\beta(\mu):=\min_{y}\Pr_{(X_{1},X_{2}),(X_{1}^{\prime},X_{2}^{\prime})\sim\mu}\left[\,(X_{1},X_{2})\neq(X_{1}^{\prime},X_{2}^{\prime})\,\middle|\,F_{n}(X_{1},X_{2})=F_{n}(X_{1}^{\prime},X_{2}^{\prime})=y\,\right],

where (X1,X2)(X_{1},X_{2}) and (X1,X2)(X_{1}^{\prime},X_{2}^{\prime}) are independent.

We can demonstrate the communication lower bound in Theorem 1.1 from the following main technical lemma combined with an appropriate function FnF_{n}, which is provided in the study by Applebaum et al. [1].

Lemma 3.1.

For every non-degenerate function Fn:𝒳1×𝒳2{0,1}F_{n}:{\cal X}_{1}\times{\cal X}_{2}\rightarrow\{0,1\}, we have

Q0psm(Fn)maxμ(log(α(μ)1)+H(μ)log(β(μ)1))1,Q^{psm}_{0}(F_{n})\geq\max_{\mu}\left(\log(\alpha(\mu)^{-1})+H_{\infty}(\mu)-\log(\beta(\mu)^{-1})\right)-1,

where μ\mu is taken over all distributions over 𝒳1×𝒳2\mathcal{X}_{1}\times\mathcal{X}_{2} under which FnF_{n} is non-degenerate, and H(μ)H_{\infty}(\mu) is the min-entropy of μ\mu.

From the previous study [1], we can obtain the appropriate function by selecting a function at random, as illustrated in the following theorem.

Theorem 3.2 (Applebaum et al. [1]).

For a (1o(1))(1-o(1)) fraction of the functions Fn:{0,1}n×{0,1}n{0,1}F_{n}:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, FnF_{n} is non-degenerate and ||2nn2\lvert{\mathcal{R}}\rvert\leq 2^{n}\cdot n^{2} holds for every pair (,)(\mathcal{R},\mathcal{R}^{\prime}) of similar disjoint rectangles.

Considering the uniform distribution UU over {0,1}n×{0,1}n\{0,1\}^{n}\times\{0,1\}^{n}, the communication lower bound from Lemma 3.1 of PSQM protocols for Fn:{0,1}n×{0,1}n{0,1}F_{n}:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\} is bounded by log(α(U)1)+H(U)log(β(U)1)1\log(\alpha(U)^{-1})+H_{\infty}(U)-\log(\beta(U)^{-1})-1. By Theorem 3.2, we can easily see that this bound is 3n2lognO(1)3n-2\log{n}-O(1) for a (1o(1))(1-o(1)) fraction of the functions {0,1}n×{0,1}n{0,1}\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, as given in Theorem 1.1.

Now, we provide the proof of the main technical lemma.

Proof 3.3 (Proof of Lemma 3.1).

From the correctness, the referee RR outputs Fn(x1,x2)F_{n}(x_{1},x_{2}) for the received quantum message ρ(x1,x2;r)\rho(x_{1},x_{2};r) for every x1,x2x_{1},x_{2} and every rr. Without loss of generality, we can assume that P1P_{1} and P2P_{2} generate pure states |ψ1(x1;r)|\psi_{1}(x_{1};r)\rangle and |ψ2(x2;r)|\psi_{2}(x_{2};r)\rangle with a shared randomness rr, respectively.

This assumption is justified as follows. Suppose that P1P_{1} and P2P_{2} generate mixed states ρ1(x1;r)\rho_{1}(x_{1};r) and ρ2(x2;r)\rho_{2}(x_{2};r) as their messages on inputs x1,x2x_{1},x_{2} and a shared random string rr. By the spectral decomposition, we have ρ1(x1;r)=ipi|ψ1(i)(x1;r)ψ1(i)(x1;r)|\rho_{1}(x_{1};r)=\sum_{i}p_{i}|\psi_{1}^{(i)}(x_{1};r)\rangle\langle\psi_{1}^{(i)}(x_{1};r)| and ρ2(x2;r)=jqj|ψ2(j)(x2;r)ψ2(j)(x2;r)|.\rho_{2}(x_{2};r)=\sum_{j}q_{j}|\psi_{2}^{(j)}(x_{2};r)\rangle\langle\psi_{2}^{(j)}(x_{2};r)|. The joint message state is

ρ(x1,x2;r):=i,jpiqj|ψ1(i)(x1;r),ψ2(j)(x2;r)ψ1(i)(x1;r),ψ2(j)(x2;r)|\rho(x_{1},x_{2};r):=\sum_{i,j}p_{i}q_{j}|\psi_{1}^{(i)}(x_{1};r),\psi_{2}^{(j)}(x_{2};r)\rangle\langle\psi_{1}^{(i)}(x_{1};r),\psi_{2}^{(j)}(x_{2};r)|

and its probabilistic mixture over the shared random string rr is

ρ(x1,x2):=rπ(r)ρ(x1,x2;r)=i,j,rpiqjπ(r)|ψ1(i)(x1;r),ψ2(j)(x2;r)ψ1(i)(x1;r),ψ2(j)(x2;r)|.\rho(x_{1},x_{2}):=\sum_{r}\pi(r)\rho(x_{1},x_{2};r)=\sum_{i,j,r}p_{i}q_{j}\pi(r)|\psi_{1}^{(i)}(x_{1};r),\psi_{2}^{(j)}(x_{2};r)\rangle\langle\psi_{1}^{(i)}(x_{1};r),\psi_{2}^{(j)}(x_{2};r)|.

Rephrasing the probability distribution {π(r)piqj}i,j,r\{\pi(r)p_{i}q_{j}\}_{i,j,r} and the pure message states |ψ1(i)(x1;r)|\psi_{1}^{(i)}(x_{1};r)\rangle, |ψ2(j)(x2;r)|\psi_{2}^{(j)}(x_{2};r)\rangle to {π(r)}r\{\pi(r)\}_{r} and |ψ1(x1;r),|ψ2(x2;r)|\psi_{1}(x_{1};r)\rangle,|\psi_{2}(x_{2};r)\rangle respectively, we can assume that they generate pure states as their messages from the beginning.

We denote by |ψ(x1,x2;r)|\psi(x_{1},x_{2};r)\rangle their joint state |ψ1(x1;r)|ψ2(x2;r)|\psi_{1}(x_{1};r)\rangle\otimes|\psi_{2}(x_{2};r)\rangle. Namely, we set

ρ(x1,x2;r):=|ψ(x1,x2;r)ψ(x1,x2;r)|=|ψ1(x1;r)ψ1(x1;r)||ψ2(x2;r)ψ2(x2;r)|.\rho(x_{1},x_{2};r):=|\psi(x_{1},x_{2};r)\rangle\langle\psi(x_{1},x_{2};r)|=|\psi_{1}(x_{1};r)\rangle\langle\psi_{1}(x_{1};r)|\otimes|\psi_{2}(x_{2};r)\rangle\langle\psi_{2}(x_{2};r)|. (2)

In addition, we set

ρ(x1,x2):=rπ(r)ρ(x1,x2;r),\rho(x_{1},x_{2}):=\sum_{r}\pi(r)\rho(x_{1},x_{2};r), (3)

where π(r)\pi(r) denotes the probability that rr is selected as a shared random string under the uniform distribution.

As mentioned above, we use the purity as a collision measure of quantum messages in order to obtain lower bounds of quantum message length from upper bounds of the purity. We set ρ:=x1,x2μ(x1,x2)ρ(x1,x2)\rho:=\sum_{x_{1},x_{2}}\mu(x_{1},x_{2})\rho(x_{1},x_{2}). We then have

1dim()\displaystyle\frac{1}{\dim(\mathcal{M})} trρ2=tr(x1,x2μ(x1,x2)ρ(x1,x2))2\displaystyle\leq\mathrm{tr}\rho^{2}=\mathrm{tr}\left(\sum_{x_{1},x_{2}}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\right)^{2}
=trx1,x2,x1,x2μ(x1,x2)ρ(x1,x2)μ(x1,x2)ρ(x1,x2).\displaystyle=\mathrm{tr}\sum_{x_{1},x_{2},x^{\prime}_{1},x^{\prime}_{2}}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2}). (4)

Then, the purity of ρ\rho is upper-bounded as follows.

Claim 2.
trρ2β(μ)1tr(x1,x2)(x1,x2)μ(x1,x2)ρ(x1,x2)μ(x1,x2)ρ(x1,x2).\displaystyle\mathrm{tr}\rho^{2}\leq\beta(\mu)^{-1}\mathrm{tr}\sum_{(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2}).

The proof of this claim is done by a combinatorial analysis of the trace as a quantum counterpart of the analysis of the collision probability in [1]. The detailed proof will be given in Appendix A.

Next, we consider an upper bound of

tr(x1,x2)(x1,x2)μ(x1,x2)ρ(x1,x2)μ(x1,x2)ρ(x1,x2).\mathrm{tr}\sum_{(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2}). (5)

Actually, we show that for every rr and rr^{\prime},

tr(x1,x2)(x1,x2)μ(x1,x2)ρ(x1,x2;r)μ(x1,x2)ρ(x1,x2;r)\mathrm{tr}\sum_{(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})}\mu(x_{1},x_{2})\rho(x_{1},x_{2};r)\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2};r^{\prime})

is at most 2α(μ)2H(μ)2\alpha(\mu)2^{-H_{\infty}(\mu)} as this implies that Eq. (5) is also at most 2α(μ)2H(μ)2\alpha(\mu)2^{-H_{\infty}(\mu)} (by Eq. (3)). This completes the proof of Lemma 3.1 by Claim 2 and Eq. (4).

Now we fix any rr and rr^{\prime}. From Eq. (2) and the union bound, we have

tr(x1,x2)(x1,x2)μ(x1,x2)ρ(x1,x2;r)μ(x1,x2)ρ(x1,x2;r)\displaystyle\mathrm{tr}\sum_{(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})}\mu(x_{1},x_{2})\rho(x_{1},x_{2};r)\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2};r^{\prime})
=(x1,x2)(x1,x2)μ(x1,x2)μ(x1,x2)|ψ1(x1;r)|ψ1(x1;r)|2|ψ2(x2;r)|ψ2(x2;r)|2.\displaystyle=\sum_{(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\lvert\langle\psi_{1}(x_{1};r)|\psi_{1}(x^{\prime}_{1};r^{\prime})\rangle\rvert^{2}\cdot\lvert\langle\psi_{2}(x_{2};r)|\psi_{2}(x^{\prime}_{2};r^{\prime})\rangle\rvert^{2}.
x1x1,x2,x2μ(x1,x2)μ(x1,x2)|ψ1(x1;r)|ψ1(x1;r)|2|ψ2(x2;r)|ψ2(x2;r)|2.\displaystyle\leq\sum_{x_{1}\neq x^{\prime}_{1},x_{2},x^{\prime}_{2}}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\lvert\langle\psi_{1}(x_{1};r)|\psi_{1}(x^{\prime}_{1};r^{\prime})\rangle\rvert^{2}\cdot\lvert\langle\psi_{2}(x_{2};r)|\psi_{2}(x^{\prime}_{2};r^{\prime})\rangle\rvert^{2}.
+x1,x1,x2x2μ(x1,x2)μ(x1,x2)|ψ1(x1;r)|ψ1(x1;r)|2|ψ2(x2;r)|ψ2(x2;r)|2.\displaystyle\ \ \ \ +\sum_{x_{1},x^{\prime}_{1},x_{2}\neq x^{\prime}_{2}}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\lvert\langle\psi_{1}(x_{1};r)|\psi_{1}(x^{\prime}_{1};r^{\prime})\rangle\rvert^{2}\cdot\lvert\langle\psi_{2}(x_{2};r)|\psi_{2}(x^{\prime}_{2};r^{\prime})\rangle\rvert^{2}. (6)

It suffices to show that the first term of the right-hand of Eq. (6) is at most α(μ)2H(μ)\alpha(\mu)2^{-H_{\infty}(\mu)} from the symmetry of P1P_{1} and P2P_{2}.

Note that we can regard the referee as a POVM R={Ry}y{0,1}R=\{R_{y}\}_{y\in\{0,1\}}. The following claim demonstrates that the referee is projective in the two-party PSQM setting. (Its proof will be given in Appendix A.)

Claim 3.

The referee R={Ry}y{0,1}R=\{R_{y}\}_{y\in\{0,1\}} is a PVM.

In the classical case of [1], Applebaum et al. used the fact that for every x1x_{1} and every r,rr,r^{\prime} there exists at most one zz such that |ψ1(x1;r)=|ψ1(z;r)|\psi_{1}(x_{1};r)\rangle=|\psi_{1}(z;r^{\prime})\rangle if |ψ1(x1;r),|ψ1(z;r)|\psi_{1}(x_{1};r)\rangle,|\psi_{1}(z;r^{\prime})\rangle are classical; that is, either ψ1(x1;r)|ψ1(z;r)=0\langle\psi_{1}(x_{1};r)|\psi_{1}(z;r^{\prime})\rangle=0 or ψ1(x1;r)|ψ1(z;r)=1\langle\psi_{1}(x_{1};r)|\psi_{1}(z;r^{\prime})\rangle=1, which can be derived from the non-degeneracy of FnF_{n}. However, we cannot demonstrate the same fact for quantum messages. Instead, we can prove the following relaxed version of the fact for quantum messages.

Lemma 3.4.

If FnF_{n} is non-degenerate, we have

zx1|ψ1(x1;r)|ψ1(z;r)|21\sum_{z\neq x_{1}}\lvert\langle\psi_{1}(x_{1};r)|\psi_{1}(z;r^{\prime})\rangle\rvert^{2}\leq 1

for every r,rr,r^{\prime} and every x1x_{1}. Similarly

z|ψ2(x2;r)|ψ2(z;r)|21\sum_{z}\lvert\langle\psi_{2}(x_{2};r)|\psi_{2}(z;r^{\prime})\rangle\rvert^{2}\leq 1

for every r,rr,r^{\prime} and every x2x_{2}.

The proof of this lemma will be given in Appendix A.

Let w1(x1,x1):=|ψ1(x1;r)|ψ1(x1;r)|2w_{1}(x_{1},x^{\prime}_{1}):=\lvert\langle\psi_{1}(x_{1};r)|\psi_{1}(x^{\prime}_{1};r^{\prime})\rangle\rvert^{2} and let w2(x2,x2):=|ψ2(x2;r)|ψ2(x2;r)|2w_{2}(x_{2},x^{\prime}_{2}):=\lvert\langle\psi_{2}(x_{2};r)|\psi_{2}(x^{\prime}_{2};r^{\prime})\rangle\rvert^{2}. We say that x1x_{1} collides with x1x^{\prime}_{1} if w1(x1,x1)>0w_{1}(x_{1},x^{\prime}_{1})>0. Similarly, we say that x2x_{2} collides with x2x^{\prime}_{2} if w2(x2,x2)>0w_{2}(x_{2},x^{\prime}_{2})>0.

Now, our final goal is to upper-bound

x1x1,x2,x2μ(x1,x2)μ(x1,x2)w1(x1,x1)w2(x2,x2).\sum_{x_{1}\neq x^{\prime}_{1},x_{2},x^{\prime}_{2}}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})w_{1}(x_{1},x^{\prime}_{1})w_{2}(x_{2},x^{\prime}_{2}). (7)

Let C(x1)C(x_{1}) be the set of the elements in 𝒳1\mathcal{X}_{1} with which x1x_{1} collides except for x1x_{1} itself. Similarly, let C(x2)C(x_{2}) be the set of the elements in 𝒳2\mathcal{X}_{2} with which x2x_{2} collides (note that C(x2)C(x_{2}) may contain x2x_{2}).

Let 𝐱𝟏:=(x1:C(x1))\mathbf{x_{1}}:=(x_{1}:C(x_{1})\neq\emptyset) with an arbitrary (e.g., lexicographical) order in 𝒳1\mathcal{X}_{1}. We denote 𝐱𝟏=(u1,u2,,uk)\mathbf{x_{1}}=(u_{1},u_{2},\ldots,u_{k}). Then, we select any element 𝐱𝟏=(u1,u2,,uk)\mathbf{x_{1}}^{\prime}=(u^{\prime}_{1},u^{\prime}_{2},\ldots,u^{\prime}_{k}) from C(u1)××C(uk)C(u_{1})\times\cdots\times C(u_{k}). Note that uiu_{i} collides with uiu^{\prime}_{i} and uiuiu_{i}\neq u^{\prime}_{i} for every ii. Similarly, let 𝐱𝟐:=(x2:C(x2))=(v1,v2,,v)\mathbf{x_{2}}:=(x_{2}:C(x_{2})\neq\emptyset)=(v_{1},v_{2},\ldots,v_{\ell}) with an arbitrary order in 𝒳2\mathcal{X}_{2}, and we then select any element 𝐱𝟐=(v1,v2,,v)\mathbf{x_{2}}^{\prime}=(v^{\prime}_{1},v^{\prime}_{2},\ldots,v^{\prime}_{\ell}) from C(v1)××C(v)C(v_{1})\times\cdots\times C(v_{\ell}).

Then, we can show that for every choice of 𝐱𝟏\mathbf{x_{1}}^{\prime} and 𝐱𝟐\mathbf{x_{2}}^{\prime}, we have

i,jμ(ui,vj)μ(ui,vj)α(μ)2H(μ).\sum_{i,j}\mu(u_{i},v_{j})\mu(u^{\prime}_{i},v^{\prime}_{j})\leq\alpha(\mu)2^{-H_{\infty}(\mu)}.

The reason is as follows. We consider two rectangles :=(𝐱𝟏,𝐱𝟐)\mathcal{R}:=(\mathbf{x_{1}},\mathbf{x_{2}}) and :=(𝐱𝟏,𝐱𝟐)\mathcal{R}^{\prime}:=(\mathbf{x^{\prime}_{1}},\mathbf{x^{\prime}_{2}}). We observe that R(|ψ1(x1;r)|ψ2(x2;r))=R(|ψ1(x1;r)|ψ2(x2;r))R(|\psi_{1}(x_{1};r)\rangle|\psi_{2}(x_{2};r)\rangle)=R(|\psi_{1}(x^{\prime}_{1};r^{\prime})\rangle|\psi_{2}(x^{\prime}_{2};r^{\prime})\rangle) (where R(|φ)R(|\varphi\rangle) denotes the classical value that RR outputs on input |φ|\varphi\rangle) if x1x_{1} collides with x1x^{\prime}_{1} and x2x_{2} collides with x2x^{\prime}_{2} from the perfect correctness. Therefore, 𝒳1\mathcal{X}_{1}-disjoint rectangles \mathcal{R} and \mathcal{R}^{\prime} are similar; that is, Fn[]=Fn[]F_{n}[\mathcal{R}]=F_{n}[\mathcal{R}^{\prime}]. Without loss of generality, we can assume that μ()μ()\mu(\mathcal{R})\leq\mu(\mathcal{R}^{\prime}). Hence, we have μ()α(μ)\mu(\mathcal{R})\leq\alpha(\mu). Thus, we can see that for random variables X1,X2,X1,X2X_{1},X_{2},X^{\prime}_{1},X^{\prime}_{2}

i,jμ(ui,vj)μ(ui,vj)\displaystyle\sum_{i,j}\mu(u_{i},v_{j})\mu(u^{\prime}_{i},v^{\prime}_{j}) =i,jPr[(X1,X2)=(ui,vj)(X1,X2)=(ui,vj)]\displaystyle=\sum_{i,j}\Pr\left[\,(X_{1},X_{2})=(u_{i},v_{j})\wedge(X^{\prime}_{1},X^{\prime}_{2})=(u^{\prime}_{i},v^{\prime}_{j})\,\right]
max(x1,x2)μ(x1,x2)i,jPr[(X1,X2)=(ui,vj)]\displaystyle\leq\max_{(x_{1},x_{2})}\mu(x_{1},x_{2})\sum_{i,j}\Pr\left[\,(X_{1},X_{2})=(u_{i},v_{j})\,\right]
2H(μ)α(μ).\displaystyle\leq 2^{-H_{\infty}(\mu)}\alpha(\mu).

Furthermore, it holds for every i,ji,j that

uiC(ui),vjC(vj)w1(ui,ui)w2(vj,vj)\displaystyle\sum_{u^{\prime}_{i}\in C(u_{i}),v^{\prime}_{j}\in C(v_{j})}w_{1}(u_{i},u^{\prime}_{i})w_{2}(v_{j},v^{\prime}_{j}) =uiC(ui)w1(ui,ui)(vjC(vj)w2(vj,vj))\displaystyle=\sum_{u^{\prime}_{i}\in C(u_{i})}w_{1}(u_{i},u^{\prime}_{i})\left(\sum_{v^{\prime}_{j}\in C(v_{j})}w_{2}(v_{j},v^{\prime}_{j})\right)
uiC(ui)w1(ui,ui)1\displaystyle\leq\sum_{u^{\prime}_{i}\in C(u_{i})}w_{1}(u_{i},u^{\prime}_{i})\leq 1

from Lemma 3.4. Thus, we have

x1x1,x2,x2μ(x1,x2)μ(x1,x2)w1(x1,x1)w2(x2,x2)\displaystyle\sum_{x_{1}\neq x^{\prime}_{1},x_{2},x^{\prime}_{2}}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})w_{1}(x_{1},x^{\prime}_{1})w_{2}(x_{2},x^{\prime}_{2})
=i,juiC(ui),vjC(vj)μ(ui,vj)μ(ui,vj)w1(ui,ui)w2(vj,vj)\displaystyle=\sum_{i,j}\sum_{u^{\prime}_{i}\in C(u_{i}),v^{\prime}_{j}\in C(v_{j})}\mu(u_{i},v_{j})\mu(u^{\prime}_{i},v^{\prime}_{j})w_{1}(u_{i},u^{\prime}_{i})w_{2}(v_{j},v^{\prime}_{j})
i,jμ(ui,vj)μ(u^i,v^j)uiC(ui),vjC(vj)w1(ui,ui)w2(vj,vj)\displaystyle\leq\sum_{i,j}\mu(u_{i},v_{j})\mu(\hat{u}_{i},\hat{v}_{j})\sum_{u^{\prime}_{i}\in C(u_{i}),v^{\prime}_{j}\in C(v_{j})}w_{1}(u_{i},u^{\prime}_{i})w_{2}(v_{j},v^{\prime}_{j})
i,jμ(ui,vj)μ(u^i,v^j)\displaystyle\leq\sum_{i,j}\mu(u_{i},v_{j})\mu(\hat{u}_{i},\hat{v}_{j})
α(μ)2H(μ),\displaystyle\leq\alpha(\mu)2^{-H_{\infty}(\mu)},

where μ(u^i,v^j)=maxuiC(ui),vjC(vj)μ(ui,vj)\mu(\hat{u}_{i},\hat{v}_{j})=\max_{u^{\prime}_{i}\in C(u_{i}),v^{\prime}_{j}\in C(v_{j})}\mu(u^{\prime}_{i},v^{\prime}_{j}). Eventually, an upper bound of Eq. (7) is α(μ)2H(μ)\alpha(\mu)2^{-H_{\infty}(\mu)}.

4 Power of Shared Entanglement for Total Functions

In this section, we prove Theorem 1.2, which implies a factor two gap between PSQMs with shared entanglement and without shared entanglement for a total function. The main part of Theorem 1.2 provides a kk-party PSQM protocol for a total function GEQ2l:({0,1}2l)k{0,1}GEQ_{2l}:(\{0,1\}^{2l})^{k}\rightarrow\{0,1\} defined by

GEQ2l(x1,x2,,xk)={1(j=1kxj1=j=1kxj2==j=1kxj2l1=j=1kxj2l=0),0(otherwise),GEQ_{2l}(x_{1},x_{2},\ldots,x_{k})=\left\{\begin{array}[]{ll}1&(\sum_{j=1}^{k}x_{j}^{1}=\sum_{j=1}^{k}x_{j}^{2}=\cdots=\sum_{j=1}^{k}x_{j}^{2l-1}=\sum_{j=1}^{k}x_{j}^{2l}=0),\\ 0&(\mbox{otherwise}),\end{array}\right.

where each xj=xj1xj2xj2l1xj2lx_{j}=x_{j}^{1}x_{j}^{2}\cdots x_{j}^{2l-1}x_{j}^{2l} is an element of {0,1}2l\{0,1\}^{2l}, and the summation is taken over 𝔽2\mathbb{F}_{2}. To reduce the communication complexity from the trivial 2kl2kl qubits to klkl qubits, we encode half of the input bits by bit flipping of the shared state 12(|0k+|1k)\frac{1}{\sqrt{2}}(|0^{k}\rangle+|1^{k}\rangle) (called the kk-qubit GHZ state) among the kk parties, and the other half by phase flipping of the state, by a method similar to superdense coding (e.g., see [26]). More precisely, we exploit an encoding similar to two-party quantum SMP protocols with shared entangled states to compute the equality function [20]. However, this is not sufficient for PSQM protocols. To convert quantum SMP protocols into PSQM protocols, we further use shared randomness among the kk parties, and hide the input strings from the referee except for the output of the function GEQ2lGEQ_{2l}. This hiding can be shown to be possible by multiplying a random element in 𝔽22l\mathbb{F}_{2^{2l}}^{*} by the element in 𝔽22l\mathbb{F}_{2^{2l}}^{*} that corresponds to the input xjx_{j}.

For the proof of Theorem 1.2, we first consider a PSQM protocol for a finite function. Let Sum2:({0,1}2)k{0,1}2Sum_{2}:(\{0,1\}^{2})^{k}\rightarrow\{0,1\}^{2} be

Sum2(x1,x2,,xk)=(j=1kxj1,j=1kxj2),Sum_{2}(x_{1},x_{2},\ldots,x_{k})=\left(\sum_{j=1}^{k}x_{j}^{1},\sum_{j=1}^{k}x_{j}^{2}\right),

where each xj=xj1xj2x_{j}=x_{j}^{1}x_{j}^{2} is an element of {0,1}2\{0,1\}^{2}, and the summation is taken over 𝔽2\mathbb{F}_{2}.

Lemma 4.1.

For any even (resp. odd) kk, Q0psm,(Sum2)kQ^{psm,*}_{0}(Sum_{2})\leq k (resp. k+1\leq k+1).

Proof 4.2.

First, we consider the case in which kk is even. The quantum protocol is as follows.

Protocol 𝒫Sum2{\cal P}_{Sum_{2}}:

0. All the parties share the entangled state

12(j=1k|0Qj+j=1k|1Qj),\frac{1}{\sqrt{2}}\left(\bigotimes_{j=1}^{k}|0\rangle_{Q_{j}}+\bigotimes_{j=1}^{k}|1\rangle_{Q_{j}}\right),

where the single-qubit register QjQ_{j} is owned by party PjP_{j}. Moreover, the parties share a kk-bit string r=r1r2rkr=r_{1}r_{2}\cdots r_{k} such that j=1krj=0\sum_{j=1}^{k}r_{j}=0.

1. Each party PjP_{j} applies ZZ on QjQ_{j} if xj2=1x_{j}^{2}=1. The resulting state is

12(j=1k|0Qj+j=1k(1)j=1kxj2|1Qj).\frac{1}{\sqrt{2}}\left(\bigotimes_{j=1}^{k}|0\rangle_{Q_{j}}+\bigotimes_{j=1}^{k}(-1)^{\sum_{j=1}^{k}x_{j}^{2}}|1\rangle_{Q_{j}}\right).

2. Each party PjP_{j} applies XX on QjQ_{j} if xj1rj=1x_{j}^{1}\oplus r_{j}=1. The resulting state is

12(j=1k|xj1rjQj+(1)j=1kxj2j=1k|xj1rj1Qj).\frac{1}{\sqrt{2}}\left(\bigotimes_{j=1}^{k}|x_{j}^{1}\oplus r_{j}\rangle_{Q_{j}}+(-1)^{\sum_{j=1}^{k}x_{j}^{2}}\bigotimes_{j=1}^{k}|x_{j}^{1}\oplus r_{j}\oplus 1\rangle_{Q_{j}}\right). (8)

3. Each party PjP_{j} sends QjQ_{j} to the referee RR.

4. RR measures quantum registers Q1,Q2,,QkQ_{1},Q_{2},\ldots,Q_{k} in the basis

{|Φ(y1,y2,,yk1,z):=12(|y1,y2,,yk1,0+(1)z|y11,y21,,yk11,1)},\left\{|\Phi(y_{1},y_{2},\ldots,y_{k-1},z)\rangle:=\frac{1}{\sqrt{2}}\left(|y_{1},y_{2},\ldots,y_{k-1},0\rangle+(-1)^{z}|y_{1}\oplus 1,y_{2}\oplus 1,\ldots,y_{k-1}\oplus 1,1\rangle\right)\right\},

and let y1y2yk1zy_{1}y_{2}\cdots y_{k-1}z be the measurement result.

5. RR outputs the two bits j=1k1yj\sum_{j=1}^{k-1}y_{j} and zz.

Correctness: The second bit of the output of RR is z=j=1kxj2z=\sum_{j=1}^{k}x_{j}^{2}, as desired. For the first bit, we consider two cases: (i) xk1rk=0x_{k}^{1}\oplus r_{k}=0 and (ii) xk1rk=1x_{k}^{1}\oplus r_{k}=1. We first consider case (i). Then, yj=xj1rjy_{j}=x_{j}^{1}\oplus r_{j} for j=1,2,,k1j=1,2,\ldots,k-1, and we thus obtain the desired output

j=1k1yj=j=1k1xj1rj=j=1kxj1rj=j=1kxj1,\sum_{j=1}^{k-1}y_{j}=\sum_{j=1}^{k-1}x_{j}^{1}\oplus r_{j}=\sum_{j=1}^{k}x_{j}^{1}\oplus r_{j}=\sum_{j=1}^{k}x_{j}^{1},

where the second inequality originates from xk1rk=0x_{k}^{1}\oplus r_{k}=0, and the last equality originates from j=1krk=0\sum_{j=1}^{k}r_{k}=0. For case (ii), yj=xj1rj1y_{j}=x_{j}^{1}\oplus r_{j}\oplus 1 for j=1,2,,k1j=1,2,\ldots,k-1, and we thus obtain the desired output

j=1k1yj=j=1k1xj1rj1=(j=1k1xj1rj)1=j=1kxj1rj=j=1kxj1,\sum_{j=1}^{k-1}y_{j}=\sum_{j=1}^{k-1}x_{j}^{1}\oplus r_{j}\oplus 1=\left(\sum_{j=1}^{k-1}x_{j}^{1}\oplus r_{j}\right)\oplus 1=\sum_{j=1}^{k}x_{j}^{1}\oplus r_{j}=\sum_{j=1}^{k}x_{j}^{1},

where the second equality originates from the fact that kk is even, the third equality originates from xk1rk=1x_{k}^{1}\oplus r_{k}=1, and the last equality originates from j=1krk=0\sum_{j=1}^{k}r_{k}=0.

Privacy: Let the output of Sum2Sum_{2} be (b1,b2)(b_{1},b_{2}), where b1=j=1kxj1b_{1}=\sum_{j=1}^{k}x_{j}^{1} and b2=j=1kxj2b_{2}=\sum_{j=1}^{k}x_{j}^{2}. As RR has no knowledge about r1,,rkr_{1},\ldots,r_{k} except that the sum is 0, we can observe that the quantum state that RR receives (represented by Eq. (8)) is taken from the set of 2k22^{k-2} orthogonal pure states

{|Φ(y1,,yk1,b2):j=1k1yj=b1}\left\{|\Phi(y_{1},\ldots,y_{k-1},b_{2})\rangle:\leavevmode\nobreak\ \sum_{j=1}^{k-1}y_{j}=b_{1}\right\}

(up to the total phase) uniformly at random. Thus, the simulator can simulate the distribution of the message given the output of Sum2Sum_{2}.

In the case in which kk is odd, the last party PkP_{k} prepares an extra two-bit string xk+1=00x_{k+1}=00, and 𝒫Sum2{\cal P}_{Sum_{2}} is run for the (k+1)(k+1)-party case, where PkP_{k} also plays the role of the party Pk+1P_{k+1}.

Next, we present the main lemma for Theorem 1.2.

Lemma 4.3.

For any even (resp. odd) kk, Q0psm,(GEQ2l)klQ^{psm,*}_{0}(GEQ_{2l})\leq kl (resp. (k+1)l\leq(k+1)l).

Proof 4.4.

We only demonstrate the case in which kk is even (as the odd case is considered similarly to the proof of Lemma 4.1). The quantum protocol is as follows.

Protocol 𝒫GEQ2l{\cal P}_{GEQ_{2l}}:

0. All parties share the entangled state

i=1l(12(j=1k|0Qji+j=1k|1Qji)),\bigotimes_{i=1}^{l}\left(\frac{1}{\sqrt{2}}\left(\bigotimes_{j=1}^{k}|0\rangle_{Q_{j}^{i}}+\bigotimes_{j=1}^{k}|1\rangle_{Q_{j}^{i}}\right)\right),

where the single-qubit registers Qj1,,QjlQ_{j}^{1},\ldots,Q_{j}^{l} are owned by party PjP_{j}. Moreover, they share ll kk-bit strings ri:=r1ir2irkir^{i}:=r_{1}^{i}r_{2}^{i}\cdots r_{k}^{i} such that j=1krji=0\sum_{j=1}^{k}r_{j}^{i}=0 (i=1,2,,li=1,2,\ldots,l), and a non-zero 2l2l-bit string r=r1r2r2l1r2lr^{\prime}=r^{\prime}_{1}r^{\prime}_{2}\cdots r^{\prime}_{2l-1}r^{\prime}_{2l}.

1. Each party PjP_{j} computes the 2l2l-bit string aj=aj1aj2aj2la_{j}=a_{j}^{1}a_{j}^{2}\cdots a_{j}^{2l} defined as 𝗉(aj)=𝗉(r)𝗉(xj){\sf p}(a_{j})={\sf p}(r^{\prime}){\sf p}(x_{j}).

2. Each party PjP_{j} applies ZZ on QjiQ_{j}^{i} if aj2i=1a_{j}^{2i}=1. The resulting state is

i=1l(12(j=1k|0Qji+j=1k(1)j=1kaj2i|1Qji)).\bigotimes_{i=1}^{l}\left(\frac{1}{\sqrt{2}}\left(\bigotimes_{j=1}^{k}|0\rangle_{Q_{j}^{i}}+\bigotimes_{j=1}^{k}(-1)^{\sum_{j=1}^{k}a_{j}^{2i}}|1\rangle_{Q_{j}^{i}}\right)\right).

3. Each party PjP_{j} applies XX on QjiQ_{j}^{i} if aj2i1rji=1a_{j}^{2i-1}\oplus r_{j}^{i}=1. The resulting state is

i=1l(12(j=1k|aj2i1rjiQji+(1)j=1kaj2ij=1k|aj2i1rji1Qji)).\bigotimes_{i=1}^{l}\left(\frac{1}{\sqrt{2}}\left(\bigotimes_{j=1}^{k}|a_{j}^{2i-1}\oplus r_{j}^{i}\rangle_{Q_{j}^{i}}+(-1)^{\sum_{j=1}^{k}a_{j}^{2i}}\bigotimes_{j=1}^{k}|a_{j}^{2i-1}\oplus r_{j}^{i}\oplus 1\rangle_{Q_{j}^{i}}\right)\right). (9)

4. Each party PjP_{j} sends ll quantum registers Qj1,,QjlQ_{j}^{1},\ldots,Q_{j}^{l} to RR.

5. RR measures klkl quantum registers Q11,,Qk1,,Q1l,,QklQ_{1}^{1},\ldots,Q_{k}^{1},\ldots,Q_{1}^{l},\ldots,Q_{k}^{l} in the basis

B:={j=1l|Φ(y1i,,yk1i,zi):y1iyk1izi{0,1}kfor everyi[l]},B:=\left\{\bigotimes_{j=1}^{l}|\Phi(y_{1}^{i},\ldots,y_{k-1}^{i},z^{i})\rangle:\leavevmode\nobreak\ y_{1}^{i}\cdots y_{k-1}^{i}z^{i}\in\{0,1\}^{k}\leavevmode\nobreak\ \mbox{for every}\leavevmode\nobreak\ i\in[l]\right\},

and let y1iy2iyk1iziy_{1}^{i}y_{2}^{i}\cdots y_{k-1}^{i}z^{i} (i=1,,li=1,\cdots,l) be the measurement results.

6. RR accepts if (j=1k1yji)=zi=0\left(\sum_{j=1}^{k-1}y_{j}^{i}\right)=z^{i}=0 for all i=1,,li=1,\cdots,l and rejects otherwise.

Correctness: Note that (j=1kxj1,,j=1kxj2l)=(0,,0)(\sum_{j=1}^{k}x_{j}^{1},\ldots,\sum_{j=1}^{k}x_{j}^{2l})=(0,\ldots,0) if and only if (j=1kaj1,,j=1kaj2l)=(0,,0)(\sum_{j=1}^{k}a_{j}^{1},\ldots,\sum_{j=1}^{k}a_{j}^{2l})=(0,\ldots,0), since

𝗉((j=1kaj1,,j=1kaj2l))=𝗉(r)𝗉((j=1kxj1,,j=1kxj2l)).{\sf p}\left((\sum_{j=1}^{k}a_{j}^{1},\ldots,\sum_{j=1}^{k}a_{j}^{2l})\right)={\sf p}(r^{\prime}){\sf p}\left((\sum_{j=1}^{k}x_{j}^{1},\ldots,\sum_{j=1}^{k}x_{j}^{2l})\right). (10)

Now, the correctness of 𝒫Sum2{\cal P}_{Sum_{2}} in Lemma 4.1 also guarantees the correctness of 𝒫GEQ2l{\cal P}_{GEQ_{2l}}.

Privacy: First, we consider the case in which GEQ2l(x1,x2,,xk)=0GEQ_{2l}(x_{1},x_{2},\ldots,x_{k})=0: that is, (j=1kxj1,,j=1kxj2l)=(0,,0)(\sum_{j=1}^{k}x_{j}^{1},\ldots,\sum_{j=1}^{k}x_{j}^{2l})=(0,\ldots,0). Then, as demonstrated in Eq. (10), (a1,a2,,ak)(a_{1},a_{2},\ldots,a_{k}) satisfies (j=1kaj1,,j=1kaj2l)=(0,,0)(\sum_{j=1}^{k}a_{j}^{1},\ldots,\sum_{j=1}^{k}a_{j}^{2l})=(0,\ldots,0). Moreover, (a12i1,a22i1,,ak2i1)(a_{1}^{2i-1},a_{2}^{2i-1},\ldots,a_{k}^{2i-1}) is uniformly randomized by rir^{i} in Step 3 under the restriction that the sum is 0. Thus, the quantum state that RR receives (represented by Eq. (9)) is taken from the set of 2(k2)l2^{(k-2)l} orthogonal pure states

{i=1l|Φ(y1i,,yk1i,0):j=1k1yji=0for everyi[l]}\left\{\bigotimes_{i=1}^{l}|\Phi(y_{1}^{i},\ldots,y_{k-1}^{i},0)\rangle:\leavevmode\nobreak\ \sum_{j=1}^{k-1}y_{j}^{i}=0\leavevmode\nobreak\ \mbox{for every}\leavevmode\nobreak\ i\in[l]\right\}

(up to the total phase) uniformly at random. Second, we consider the case in which GEQ2l(x1,x2,,xk)=1GEQ_{2l}(x_{1},x_{2},\ldots,x_{k})=1, i.e., (j=1kxj1,,j=1kxj2l)(\sum_{j=1}^{k}x_{j}^{1},\ldots,\sum_{j=1}^{k}x_{j}^{2l}) is in the set

S:={(b1,,b2l):b1b2l{0,1}2l}{(0,,0)}.S:=\{(b_{1},\ldots,b_{2l}):\leavevmode\nobreak\ b_{1}\cdots b_{2l}\in\{0,1\}^{2l}\}\setminus\{(0,\ldots,0)\}.

Then, by Eq. (10), (a1,a2,,ak)(a_{1},a_{2},\ldots,a_{k}) is taken so that (j=1kaj1,,j=1kaj2l)(\sum_{j=1}^{k}a_{j}^{1},\ldots,\sum_{j=1}^{k}a_{j}^{2l}) can be distributed from SS uniformly at random. Moreover, (a12i1,a22i1,,ak2i1)(a_{1}^{2i-1},a_{2}^{2i-1},\ldots,a_{k}^{2i-1}) is uniformly randomized by rir^{i} in Step 3 under the restriction that the sum remains the same (since j=1krji=0\sum_{j=1}^{k}r_{j}^{i}=0). Thus, the quantum state that RR receives (represented by Eq. (9)) is taken from the set of (22l1)2(k2)l(2^{2l}-1)2^{(k-2)l} orthogonal pure states

B{i=1l|Φ(y1i,,yk1i,0):j=1k1yji=0for everyi[l]}B\setminus\left\{\bigotimes_{i=1}^{l}|\Phi(y_{1}^{i},\ldots,y_{k-1}^{i},0)\rangle:\leavevmode\nobreak\ \sum_{j=1}^{k-1}y_{j}^{i}=0\leavevmode\nobreak\ \mbox{for every}\leavevmode\nobreak\ i\in[l]\right\}

(up to the total phase) uniformly at random.

Now Lemma 4.3 provides the upper bound kn/2kn/2 of Theorem 1.2. The lower bound knkn of Theorem 1.2 originates from the lower bound nn of the exact (two-party) one-way quantum communication complexity with no shared entanglement of the nn-bit equality function (see, e.g., [24, Theorem 5.11]) as it implies that for any j[k]j\in[k], the jjth party must send nn qubits (considering the one-way communication setting from the jjth party with input x{0,1}nx\in\{0,1\}^{n} to the group of the referee and the other k1k-1 parties in which one party has input y{0,1}ny\in\{0,1\}^{n} and the k2k-2 remaining parties have input 0n0^{n}, the length of the message of the jjth party must be nn). This completes the proof of Theorem 1.2.

Actually, the upper bound klkl of Lemma 4.3 for GEQ2lGEQ_{2l} is tight when kk is even. The matching lower bound klkl originates from the lower bound ll of the exact one-way quantum communication complexity with shared entanglement of the 2l2l-bit equality function shown by Klauck [24, Theorem 5.12] as it implies that each party must send ll qubits.

5 Power of Shared Entanglement for Partial Functions

In this section, we prove Theorem 1.3. We consider the so-called distributed Deutsch-Jozsa problem DJnDJ_{n} introduced by Brassard, Cleve, and Tapp [5]. First we show that C0psm,(DJn)=O(logn)C_{0}^{psm,*}(DJ_{n})=O(\log n). Our PSM protocol is based on the protocol provided in [5], which we modify so that the privacy condition can be satisfied. Second we show Q0psm(DJn)=Ω(n)Q_{0}^{psm}(DJ_{n})=\Omega(n) by observing that the fact that the exact classical and quantum SMP communication complexities are the same for total functions can be extended to the case of partial functions.

Let nn be any power of 22. The distributed Deutsch-Jozsa problem DJn:{0,1}n×{0,1}n{0,1}DJ_{n}:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, introduced in [5], is defined as

DJn(x,y)={1ifx=y0Δ(x,y)=n/2,DJ_{n}(x,y)=\left\{\begin{array}[]{ll}1&\mbox{if}\leavevmode\nobreak\ \leavevmode\nobreak\ x=y\\ 0&\Delta(x,y)=n/2,\end{array}\right.

where Δ(x,y)\Delta(x,y) denotes the Hamming distance between x=x0x1xn1x=x_{0}x_{1}\cdots x_{n-1} and y=y0y1yn1y=y_{0}y_{1}\cdots y_{n-1}.

Lemma 5.1.

There is a PSM protocol with shared entanglement that solves DJnDJ_{n} with probability 11, and the classical communication complexity is 2logn2\log n.

Proof 5.2.

The PSM protocol is as follows.

Protocol 𝒫DJ{\cal P}_{DJ}: Let n=2mn=2^{m}.

0. P1P_{1} and P2P_{2} share the entangled state

1ni{0,1}m|iA|iB\frac{1}{\sqrt{n}}\sum_{i\in\{0,1\}^{m}}|i\rangle_{A}|i\rangle_{B}

and the two prearranged random mm-bit strings r{0,1}m{0m}r\in\{0,1\}^{m}\setminus\{0^{m}\} and r{0,1}mr^{\prime}\in\{0,1\}^{m}.

1. P1P_{1} (resp. P2P_{2}) adds phase (1)xi(-1)^{x_{i}} ((1)yi(-1)^{y_{i}}) to the mm-qubit register AA (BB) if the content of AA (BB) is ii (where i{0,1}mi\in\{0,1\}^{m} is identified as the corresponding non-negative integer). The resulting state is

1ni{0,1}m(1)xi|iA(1)yi|iB.\frac{1}{\sqrt{n}}\sum_{i\in\{0,1\}^{m}}(-1)^{x_{i}}|i\rangle_{A}(-1)^{y_{i}}|i\rangle_{B}.

2. P1P_{1} and P2P_{2} apply the Hadamard gate HH for each qubit of their registers AA and BB, respectively. The resulting state is

1nni{0,1}m((1)xik{0,1}m(1)ik|kA)((1)yil{0,1}m(1)il|lB).\frac{1}{n\sqrt{n}}\sum_{i\in\{0,1\}^{m}}\left((-1)^{x_{i}}\sum_{k\in\{0,1\}^{m}}(-1)^{i\cdot k}|k\rangle_{A}\right)\left((-1)^{y_{i}}\sum_{l\in\{0,1\}^{m}}(-1)^{i\cdot l}|l\rangle_{B}\right). (11)

3. P1P_{1} and P2P_{2} measure AA and BB in the computational basis, respectively, and let KK and LL be the resulting bit strings in {0,1}m\{0,1\}^{m}.

4. P1P_{1} and P2P_{2} send classical messages mAm_{A} and mBm_{B} defined as 𝗉(mA)=𝗉(r)𝗉(K)+𝗉(r){\sf p}(m_{A})={\sf p}(r){\sf p}(K)+{\sf p}(r^{\prime}) and 𝗉(mB)=𝗉(r)𝗉(L)+𝗉(r){\sf p}(m_{B})={\sf p}(r){\sf p}(L)+{\sf p}(r^{\prime}) to RR, respectively.

5. RR accepts if mA=mBm_{A}=m_{B} and rejects otherwise.

Correctness: Note that the amplitude of |kA|lB|k\rangle_{A}|l\rangle_{B} in Eq. (11) is

1n3/2i{0,1}m(1)xiyi(1)i(kl).\frac{1}{n^{3/2}}\sum_{i\in\{0,1\}^{m}}(-1)^{x_{i}\oplus y_{i}}(-1)^{i\cdot(k\oplus l)}. (12)

When x=yx=y, Eq. (12) is 0 if KLK\neq L. Thus, the event K=LK=L occurs with probability 11; therefore, RR always accepts. When Δ(x,y)=n/2\Delta(x,y)=n/2, Eq. (12) is 0 if K=LK=L. Thus, the event KLK\neq L occurs with probability 11; therefore, RR always rejects.

Privacy: Again, by Eq. (12), if x=yx=y, then K=L=kK=L=k is obtained with 1/n1/n for each k{0,1}mk\in\{0,1\}^{m}. Thus, the simulator can simulate the messages by generating the same mm-bit string chosen uniformly at random as P1P_{1}’s and P2P_{2}’s messages. If Δ(x,y)=n/2\Delta(x,y)=n/2, the element 𝗉(K)𝗉(L){\sf p}(K)-{\sf p}(L) in 𝔽2m\mathbb{F}_{2^{m}} is nonzero; thus, the difference between 𝗉(r)𝗉(K)+𝗉(r){\sf p}(r){\sf p}(K)+{\sf p}(r^{\prime}) and 𝗉(r)𝗉(L)+𝗉(r){\sf p}(r){\sf p}(L)+{\sf p}(r^{\prime}) is distributed uniformly at random in 𝔽2m\mathbb{F}_{2^{m}}^{*}. Moreover, 𝗉(K){\sf p}(K) (and 𝗉(L){\sf p}(L)) is distributed uniformly at random in 𝔽2m\mathbb{F}_{2^{m}} by multiplying 𝗉(r){\sf p}(r) and adding 𝗉(r){\sf p}(r^{\prime}). Thus, the simulator can simulate the messages by choosing two different mm-bit non-zero strings uniformly at random as P1P_{1}’s and P2P_{2}’s messages.

Using the result in [7] that DJnDJ_{n} has the exact classical communication complexity Ω(n)\Omega(n) (even in the two-way communication model), we can show that DJnDJ_{n} provides the following exponential separation between exact PSMs with shared entanglement and exact PSQMs without shared entanglement. (Note that Theorem 5.3 implies Theorem 1.3, namely, an exponential gap between Q0psm,(DJn)Q^{psm,*}_{0}(DJ_{n}) and Q0psm(DJn)Q^{psm}_{0}(DJ_{n}), as well as between C0psm,(DJn)C^{psm,*}_{0}(DJ_{n}) and C0psm(DJn)C^{psm}_{0}(DJ_{n}).)

Theorem 5.3.

C0psm,(DJn)=O(logn)C^{psm,*}_{0}(DJ_{n})=O(\log n) and Q0psm(DJn)=Ω(n)Q^{psm}_{0}(DJ_{n})=\Omega(n).

Proof 5.4.

The upper bound C0psm,(DJn)=O(logn)C^{psm,*}_{0}(DJ_{n})=O(\log n) is shown by Lemma 5.1.

The lower bound comes from the fact that both the exact quantum and classical SMP communication complexities of a total function ff over X×YX\times Y are equal to the sum of the number of the different row vectors of the communication matrix of ff, MfM_{f}, and the number of the different column vectors of MfM_{f} (this fact can be found in [30, p.142]). The proof idea is that any two (classical or quantum) messages mxm_{x} and mxm_{x^{\prime}} corresponding to different row vectors indexed with input xx and xx^{\prime} must be perfectly distinguished since there is some column input yy such that Mf(x,y)Mf(x,y)M_{f}(x,y)\neq M_{f}(x^{\prime},y) (and a similar argument holds for different column vectors), and choosing different messages for such different row vectors or column vectors is sufficient for the referee to compute ff exactly. This proof idea also holds for a partial function by replacing the number of the different row (resp. column) vectors by the size of the maximum clique of the graph G1(Mf)=(X,E1,f)G_{1}(M_{f})=(X,E_{1,f}) (resp. G2(Mf)=(Y,E2,f)G_{2}(M_{f})=(Y,E_{2,f})) defined as follows: two rows xx and xx^{\prime} (resp. columns yy and yy^{\prime}) have an edge in E1,fE_{1,f} (resp. E2,fE_{2,f}) if and only if there is a column yy (resp. row xx) such that (x,y)(x,y) and (x,y)(x^{\prime},y) (resp. (x,y)(x,y) and (x,y)(x,y^{\prime})) are in the domain of the partial function ff and Mf(x,y)Mf(x,y)M_{f}(x,y)\neq M_{f}(x^{\prime},y) (resp. Mf(x,y)Mf(x,y)M_{f}(x,y)\neq M_{f}(x,y^{\prime})).

The above observation implies that the exact quantum and classical SMP communication complexities of the partial function DJnDJ_{n} are the same. By the result in [7], DJnDJ_{n} has the exact classical communication complexity Ω(n)\Omega(n). This concludes the desired lower bound Q0psm(DJn)=Ω(n)Q^{psm}_{0}(DJ_{n})=\Omega(n).

Theorem 5.3 provides an exponential gap between PSMs with shared entanglement and PSQMs without shared entanglement for partial functions; however, it is obtained only in the exact setting, and we do not know whether this exponential gap can be obtained in the bounded-error setting for partial or total functions. However, we can observe that there is a relational problem that has an exponential gap between PSMs with shared entanglement and PSQMs without shared entanglement in the bounded-error setting from the result by Gavinsky et al. [18]. They demonstrated that the problem has an exponentially smaller communication complexity of a classical SMP protocol with shared entanglement than the communication complexity of quantum SMP protocols only with shared randomness, while it is easy to see that their protocol is in fact a PSQM.

6 Conclusion

This paper introduced a quantum analogue of the well-studied PSM model which was called the PSQM model, and provided several initial results in the exact setting. Here we list a number of open problems.

  • Can the lower bound of Theorem 1.1 be extended to the bounded-error setting or to the shared entanglement case?

  • Can any non-trivial communication complexity gap between the PSM model and the PSQM model for some function in the bounded-error setting? How about any non-trivial communication complexity gap between the PSQM model with shared entanglement and the PSQM model without it in the bounded-error setting?

  • The PSQM model in this paper was defined only for perfect privacy. What results are obtained for imperfect privacy? To extend the lower bound of Theorem 1.1 to imperfect privacy, a quantumly tailored modification of [1, Section 5] might be worth considering, while it seems much more complicated than the proof of Theorem 1.1.

References

Appendix A Proofs of Claim 2, Claim 3, and Lemma 3.4

In this appendix, we give the detailed proofs of the technical claims and lemma used in the proof of Lemma 3.1.

Proof A.1 (Proof of Claim 2).

For any two quantum states ρ,σ\rho,\sigma, the condition ρσ=0\rho\sigma=0 is necessary (and sufficient) for perfect discrimination of the two states (see, e.g., Proposition 5.13 in [19]). Since the referee RR perfectly discriminates ρ(x1,x2)\rho(x_{1},x_{2}) and ρ(x1,x2)\rho(x^{\prime}_{1},x^{\prime}_{2}) for which Fn(x1,x2)Fn(x1,x2)F_{n}(x_{1},x_{2})\neq F_{n}(x^{\prime}_{1},x^{\prime}_{2}) from the correctness, it must hold that ρ(x1,x2)ρ(x1,x2)=0\rho(x_{1},x_{2})\rho(x^{\prime}_{1},x^{\prime}_{2})=0. Then, we have

tr(x1,x2)(x1,x2)μ(x1,x2)ρ(x1,x2)μ(x1,x2)ρ(x1,x2)\displaystyle\mathrm{tr}\sum_{(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2})
=ytr(x1,x2)(x1,x2)Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)ρ(x1,x2)μ(x1,x2)ρ(x1,x2).\displaystyle=\sum_{y}\mathrm{tr}\sum_{\begin{subarray}{c}(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})\\ F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y\end{subarray}}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2}).

From the privacy, there exists a quantum state ρy\rho_{y} for each yy such that ρy=ρ(x1,x2)\rho_{y}=\rho(x_{1},x_{2}) for every (x1,x2)(x_{1},x_{2}) for which Fn(x1,x2)=yF_{n}(x_{1},x_{2})=y. Therefore,

ytr(x1,x2)(x1,x2)Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)ρ(x1,x2)μ(x1,x2)ρ(x1,x2)\displaystyle\sum_{y}\mathrm{tr}\sum_{\begin{subarray}{c}(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})\\ F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y\end{subarray}}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2})
=ytrρy2(x1,x2)(x1,x2)Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)μ(x1,x2)\displaystyle=\sum_{y}\mathrm{tr}\rho_{y}^{2}\sum_{\begin{subarray}{c}(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})\\ F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y\end{subarray}}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})
=y(x1,x2)(x1,x2)Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)μ(x1,x2)Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)μ(x1,x2)trρy2Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)μ(x1,x2)\displaystyle=\sum_{y}\frac{\sum_{\begin{subarray}{c}(x_{1},x_{2})\neq(x^{\prime}_{1},x^{\prime}_{2})\\ F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y\end{subarray}}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})}{\sum_{F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})}\mathrm{tr}\rho_{y}^{2}\!\!\sum_{F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y}\!\!\!\!\!\!\!\!\!\!\!\!\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})
=yPr[(X1,X2)(X1,X2)|Fn(X1,X2)=Fn(X1,X2)=y]trρy2\displaystyle=\sum_{y}\Pr\left[\,(X_{1},X_{2})\neq(X^{\prime}_{1},X^{\prime}_{2})\,\middle|\,F_{n}(X_{1},X_{2})=F_{n}(X^{\prime}_{1},X^{\prime}_{2})=y\,\right]\mathrm{tr}\rho_{y}^{2}
×Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)μ(x1,x2)\displaystyle\ \ \ \ \ \ \ \ \times\sum_{F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})
β(μ)ytrρy2Fn(x1,x2)=Fn(x1,x2)=yμ(x1,x2)μ(x1,x2)\displaystyle\geq\beta(\mu)\sum_{y}\mathrm{tr}\rho_{y}^{2}\sum_{F_{n}(x_{1},x_{2})=F_{n}(x^{\prime}_{1},x^{\prime}_{2})=y}\mu(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})
=β(μ)trx1,x2,x1,x2μ(x1,x2)ρ(x1,x2)μ(x1,x2)ρ(x1,x2).\displaystyle=\beta(\mu)\mathrm{tr}\sum_{x_{1},x_{2},x^{\prime}_{1},x^{\prime}_{2}}\mu(x_{1},x_{2})\rho(x_{1},x_{2})\mu(x^{\prime}_{1},x^{\prime}_{2})\rho(x^{\prime}_{1},x^{\prime}_{2}).
Proof A.2 (Proof of Claim 3).

From the privacy, there exists ρy\rho_{y} such that ρy=ρ(x1,x2)\rho_{y}=\rho(x_{1},x_{2}) for every y{0,1}y\in\{0,1\} and every (x1,x2)(x_{1},x_{2}) for which Fn(x1,x2)=yF_{n}(x_{1},x_{2})=y. From the correctness and the necessary condition of the perfect quantum state discrimination, ρ0ρ1=0\rho_{0}\rho_{1}=0 must hold. From the spectral decomposition we have ρy=iλy,i|ϕy,iϕy,i|\rho_{y}=\sum_{i}\lambda_{y,i}|\phi_{y,i}\rangle\langle\phi_{y,i}| for some orthonormal basis {|ϕy,i}i\{|\phi_{y,i}\rangle\}_{i} (λy,i>0\lambda_{y,i}>0). Then, we have ϕ0,i|ϕ1,j=0\langle\phi_{0,i}|\phi_{1,j}\rangle=0 for every i,ji,j since ρ0ρ1=0\rho_{0}\rho_{1}=0. Therefore, we can assume R0=i|ϕ0,iϕ0,i|R_{0}=\sum_{i}|\phi_{0,i}\rangle\langle\phi_{0,i}| and R1=IR0R_{1}=I-R_{0} without loss of generality. This R={Ry}y{0,1}R=\{R_{y}\}_{y\in\{0,1\}} is a PVM.

Proof A.3 (Proof of Lemma 3.4).

We demonstrate that |ψ1(z;r)|ψ1(z;r)|2=0\lvert\langle\psi_{1}(z;r^{\prime})|\psi_{1}(z^{\prime};r^{\prime})\rangle\rvert^{2}=0 for every distinct z,zz,z^{\prime} and every rr^{\prime}. Assuming this, we can decompose

|ψ1(x1;r)=zαz|ψ1(z;r)+α|ψ1|\psi_{1}(x_{1};r)\rangle=\sum_{z^{\prime}}\alpha_{z^{\prime}}|\psi_{1}(z^{\prime};r^{\prime})\rangle+\alpha^{\bot}|\psi_{1}^{\bot}\rangle

with orthonormal vectors {|ψ1(z;r)}z{|ψ1}\{|\psi_{1}(z^{\prime};r^{\prime})\rangle\}_{z^{\prime}}\cup\{|\psi^{\bot}_{1}\rangle\} for some coefficients αz\alpha_{z^{\prime}} and α\alpha^{\bot}. Then, it holds that

zx1|ψ1(x1;r)|ψ1(z;r)|2\displaystyle\sum_{z\neq x_{1}}\lvert\langle\psi_{1}(x_{1};r)|\psi_{1}(z;r^{\prime})\rangle\rvert^{2} =zx1|zαzψ1(z;r)|ψ1(z;r)+αψ1|ψ1(z;r)|2\displaystyle=\sum_{z\neq x_{1}}\left\lvert\sum_{z^{\prime}}\alpha_{z^{\prime}}^{*}\langle\psi_{1}(z^{\prime};r^{\prime})|\psi_{1}(z;r^{\prime})\rangle+\alpha^{\bot*}\langle\psi^{\bot}_{1}|\psi_{1}(z;r^{\prime})\rangle\right\rvert^{2}
=zx1|αz|21.\displaystyle=\sum_{z\neq x_{1}}\lvert\alpha_{z}\rvert^{2}\leq 1.

Therefore, it suffices to demonstrate |ψ1(z;r)|ψ1(z;r)|2=0\lvert\langle\psi_{1}(z;r^{\prime})|\psi_{1}(z^{\prime};r^{\prime})\rangle\rvert^{2}=0 for every distinct z,zz,z^{\prime} and every rr^{\prime}. For contradiction, assume that |ψ1(z;r)|ψ1(z;r)|2>0\lvert\langle\psi_{1}(z;r^{\prime})|\psi_{1}(z^{\prime};r^{\prime})\rangle\rvert^{2}>0 for some z,zz,z^{\prime} and some rr^{\prime}.

From this assumption, we have

|ψ1(z;r)=β|ψ1(z;r)+β|ψ1(z;r),|\psi_{1}(z^{\prime};r^{\prime})\rangle=\beta|\psi_{1}(z;r^{\prime})\rangle+\beta^{\bot}|\psi^{\bot}_{1}(z;r^{\prime})\rangle,

where β0\beta\neq 0 and |ψ1(z;r)|\psi^{\bot}_{1}(z;r^{\prime})\rangle is orthogonal to |ψ1(z;r)|\psi_{1}(z;r^{\prime})\rangle.

We fix x2x_{2} arbitrarily. Then, we have

|ψ1(z;r)|ψ2(x2;r)=β|ψ1(z;r)|ψ2(x2;r)+β|ψ1(z;r)|ψ2(x2;r).|\psi_{1}(z^{\prime};r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle=\beta|\psi_{1}(z;r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle+\beta^{\bot}|\psi^{\bot}_{1}(z;r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle.

Since RR is a PVM, we have

RFn(z,x2)|ψ1(z;r)|ψ2(x2;r)=|ψ1(z;r)|ψ2(x2;r)R_{F_{n}(z,x_{2})}|\psi_{1}(z;r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle=|\psi_{1}(z;r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle

from the correctness. We also have

|ψ1(z;r)=γ|ϕ(z;r)+γ|ϕ(z;r),|\psi^{\bot}_{1}(z;r^{\prime})\rangle=\gamma|\phi(z;r^{\prime})\rangle+\gamma^{\bot}|\phi^{\bot}(z;r^{\prime})\rangle,

where |ψ1(z;r),|ϕ(z;r),|ϕ(z;r)|\psi_{1}(z;r^{\prime})\rangle,|\phi(z;r^{\prime})\rangle,|\phi^{\bot}(z;r^{\prime})\rangle are orthogonal to each other, and RFn(z,x2)|ϕ(z;r)|ψ2(x2;r)=|ϕ(z;r)|ψ2(x2;r)R_{F_{n}(z,x_{2})}|\phi(z;r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle=|\phi(z;r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle, RFn(z,x2)|ϕ(z;r)|ψ2(x2;r)=0R_{F_{n}(z,x_{2})}|\phi^{\bot}(z;r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle=0.

Therefore, it holds that

|ψ1(z;r)|ψ2(x2;r)|RFn(z,x2)|ψ1(z;r)|ψ2(x2;r)|2=|β|2+|γ|2>0.\left\lvert\langle\psi_{1}(z;r^{\prime})|\langle\psi_{2}(x_{2};r^{\prime})|R_{F_{n}(z,x_{2})}|\psi_{1}(z^{\prime};r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle\right\rvert^{2}=\lvert\beta\rvert^{2}+\lvert\gamma\rvert^{2}>0.

The value |β|2+|γ|2>0\lvert\beta\rvert^{2}+\lvert\gamma\rvert^{2}>0 must be 11 from the correctness; therefore, R(|ψ1(z;r)|ψ2(x2;r))R(|\psi_{1}(z^{\prime};r^{\prime})\rangle|\psi_{2}(x_{2};r^{\prime})\rangle) =Fn(z,x2)=F_{n}(z^{\prime},x_{2}) for every x2x_{2} and every rr^{\prime}. This implies that Fn(z,x2)=Fn(z,x2)F_{n}(z,x_{2})=F_{n}(z^{\prime},x_{2}) holds for every x2x_{2}, which contradicts the non-degeneracy of FnF_{n}. The same argument also works for x2x_{2}.