This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

spacing=nonfrench

Oracle separation of QMA and QCMA with bounded adaptivity

Shalev Ben-David
University of Waterloo
[email protected]
   Srijita Kundu
University of Waterloo
[email protected]
Abstract

We give an oracle separation between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} for quantum algorithms that have bounded adaptivity in their oracle queries; that is, the number of rounds of oracle calls is small, though each round may involve polynomially many queries in parallel. Our oracle construction is a simplified version of the construction used recently by Li, Liu, Pelecanos, and Yamakawa (2023), who showed an oracle separation between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} when the quantum algorithms are only allowed to access the oracle classically. To prove our results, we introduce a property of relations called slipperiness, which may be useful for getting a fully general classical oracle separation between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA}.

1 Introduction

It is a long-standing open problem in quantum complexity theory whether the two possible quantum analogs of the complexity class 𝖭𝖯\mathsf{NP} are equivalent. 𝖰𝖬𝖠\mathsf{QMA} is defined as the class of decision problems that are solvable by a polynomial-time quantum algorithm that has access to a polynomial-sized quantum witness, whereas 𝖰𝖢𝖬𝖠\mathsf{QCMA} is the class of decision problems that are solvable by a polynomial-time quantum algorithm that only has access to the polynomial-sized classical witness. In other words, the question asks: are quantum proofs more powerful than classical proofs?

While the inclusion 𝖰𝖢𝖬𝖠𝖰𝖬𝖠\mathsf{QCMA}\subseteq\mathsf{QMA} is easy to see, the question of whether these two classes are actually equal, which was first posed by Aharonov and Naveh [AN02], remains unanswered. Indeed, an unconditional separation between these classes is beyond currently known techniques.

An easier, but still unsolved, problem is to show an oracle separation between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA}. This is because oracle separations in the Turing machine model can be shown by means of separations in the much simpler model of query complexity, where similar separations between complexity classes are routinely shown (for example, a recent oracle separation between 𝖡𝖰𝖯\mathsf{BQP} and 𝖯𝖧\mathsf{PH} was provided in [RT19]). The problem of finding an oracle separation between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} has been a longstanding focus of the quantum computing community; it boils down to asking whether quantum proofs are more powerful than classical proofs in the query model.

1.1 Previous work

The first progress on the question of an oracle separation of 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} was made by Aaronson and Kuperberg [AK07], who showed that there is a quantum oracle, i.e., a blackbox unitary, relative to which 𝖰𝖬𝖠𝖰𝖢𝖬𝖠\mathsf{QMA}\neq\mathsf{QCMA}. Later, Fefferman and Kimmel [FK18] showed that the separation also holds under what they called an “in-place permutation oracle”, which is still inherently quantum. Ideally, we would like to get these separations in the standard model of classical oracles: classical functions that a quantum algorithm may query in superposition. [BFM23] showed separations between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} in other non-standard oracle models.

Very recently, there has been some progress on this question, with two different variations of the standard classical oracle model. Natarajan and Nirkhe [NN23] showed an oracle separation relative to a “distributional oracle”. This essentially means that the classical oracle is drawn from a distribution, which the prover knows, but the specific instance drawn is not known to the prover. Therefore, the witness only depends on the distribution over the oracles, which makes it easier to show 𝖰𝖢𝖬𝖠\mathsf{QCMA} lower bounds. Following this, [LLPY23] showed a separation with a classical oracle that is fully known to the prover, but assuming the verifier is only allowed to access this classical oracle classically, i.e., the verifier is not allowed to make superposition queries (this makes the class similar to 𝖬𝖠\mathsf{MA} in terms of its query power and witness type). This model is also simpler to analyze because whatever information the verifier gets from the oracle by classically querying it, could also have been provided as the classical 𝖰𝖢𝖬𝖠\mathsf{QCMA} witness. [LLPY23] also gave an alternate construction of a distributional oracle separation, with a simpler proof than [NN23]. Their constructions are based on the relational problem used by Yamakawa and Zhandry [YZ22], in their result on quantum advantage without structure.

Closely related to the 𝖰𝖬𝖠\mathsf{QMA} vs 𝖰𝖢𝖬𝖠\mathsf{QCMA} question is the 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} vs 𝖡𝖰𝖯/poly\mathsf{BQP}_{/\mathrm{poly}} question. 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} is the class of decision problems that are solvable by a polynomial-time quantum algorithm with access to polynomial-sized quantum advice, which depends non-uniformly on the length of inputs, but nothing else. 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} is the class of decision problems solvable by a polynomial-time quantum algorithm with access to polynomial-sized classical advice. Most works which have found oracle separations for 𝖰𝖬𝖠\mathsf{QMA} vs 𝖰𝖢𝖬𝖠\mathsf{QCMA} in various oracle models, such as [AK07, NN23, LLPY23], have also found oracle separations between 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} and 𝖡𝖰𝖯/poly\mathsf{BQP}_{/\mathrm{poly}} with related constructions in the same oracle models.

The question of the relative power of classical vs quantum advice was recently resolved unconditionally (without oracles) for relational problems by Aaronson, Buhrman and Kretschmer [ABK23], who showed an unconditional separation between 𝖥𝖡𝖰𝖯/qpoly\mathsf{FBQP}_{/\mathrm{qpoly}} and 𝖥𝖡𝖰𝖯/poly\mathsf{FBQP}_{/\mathrm{poly}}. 𝖥𝖡𝖰𝖯/qpoly\mathsf{FBQP}_{/\mathrm{qpoly}} and 𝖥𝖡𝖰𝖯/poly\mathsf{FBQP}_{/\mathrm{poly}} are the classes of relational problems analogous to 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} and 𝖡𝖰𝖯/poly\mathsf{BQP}_{/\mathrm{poly}} respectively. Their result was based on observing that separations between quantum and classical one-way communication complexity can be used to show separations between classical and quantum advice. The reason their result only works for the relation classes is that a separation in one-way communication complexity which satisfies the necessary conditions can only hold for relational problems. The specific relational problem used in [ABK23] is known as the Hidden Matching problem. But as was observed in [LLPY23], the Yamakawa-Zhandry problem [YZ22] also achieves the required communication separation, and could have been used instead. In light of this, the constructions in [YZ22] can viewed as a way to convert relational separations in one-way communication complexity, which correspond to relational separations for quantum vs classical advice, to separations for decision 𝖰𝖬𝖠\mathsf{QMA} vs 𝖰𝖢𝖬𝖠\mathsf{QCMA}, and 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} vs 𝖡𝖰𝖯/poly\mathsf{BQP}_{/\mathrm{poly}}, relative to classically accessible oracles. The construction is not blackbox — it does not work if the Hidden Matching Problem is used instead of the Yamakawa-Zhandry problem, though it plausibly might work with a parallel repetition of the former.

1.2 Our results

Unlike previous work, prove an oracle separation between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} relative to a bona fide regular oracle with regular (quantum) queries. Our catch is, instead, that we only allow the algorithms bounded adaptivity.

Bounded adaptivity means that the number of rounds of queries made by the algorithms is small, although there can be polynomially many queries in each round. Although our result is not formally stronger than those of [NN23] and [LLPY23], we feel our result is intuitively closer to a full 𝖰𝖬𝖠\mathsf{QMA}-𝖰𝖢𝖬𝖠\mathsf{QCMA} separation, as it allows the full power of classical proofs and some of the power of quantum queries. Our main result is formally stated below.

Theorem 1.

There is an oracle 𝒪:{0,1}{0,1}\mathcal{O}\colon\{0,1\}^{*}\to\{0,1\} such that 𝖰𝖢𝖬𝖠𝒪,r𝖰𝖬𝖠𝒪,r\mathsf{QCMA}^{\mathcal{O},r}\neq\mathsf{QMA}^{\mathcal{O},r}, for r=o(logn/loglogn)r=o(\log n/\log\log n).

In the above statement, 𝖰𝖬𝖠𝒪,r\mathsf{QMA}^{\mathcal{O},r} is the class of decision problems solvable by QMA algorithms that have oracle access to 𝒪\mathcal{O}, and make at most rr batches of parallel queries to 𝒪\mathcal{O}; 𝖰𝖢𝖬𝖠𝒪,r\mathsf{QCMA}^{\mathcal{O},r} is defined analogously. The parameter nn is the efficiency parameter (so the number of queries is poly(n)\operatorname{poly}(n)).

Theorem 2.

There is a function family F={FN}NIF=\{F_{N}\}_{N\in I} which is efficiently computable in 1-round query 𝖰𝖬𝖠\mathsf{QMA}, but for which the growth rate of QCMAr(FN)\mathrm{QCMA}^{r}(F_{N}) for r=o(loglogN/logloglogN)r=o(\log\log N/\log\log\log N) as NN\to\infty is not in O(polylog(N))O(\operatorname{polylog}(N)).

We shall formally define the query versions of QMA and QCMA, and the rr-round QCMA query complexity QCMAr\mathrm{QCMA}^{r} later.

Our construction for the query complexity separation is a somewhat simplified version of the construction in [LLPY23], which is based on the Yamakawa-Zhandry problem. [YZ22] and [Liu23] showed that there exists a relational problem RfR_{f}, indexed by functions f:[n]×{0,1}m{0,1}f:[n]\times\{0,1\}^{m}\to\{0,1\}, for m=Θ(n)m=\Theta(n), such that given oracle access to a quantum advice |zf\ket{z_{f}}, a quantum algorithm on any input x{0,1}nx\in\{0,1\}^{n}, and on average over ff, can find a uu such that (x,u)Rf(x,u)\in R_{f}111The Yamakawa-Zhandry relation is a 𝖳𝖥𝖭𝖯\mathsf{TFNP} relation, which means that the uu-s are of poly(n)\operatorname{poly}(n) length, and a uu such that (x,u)Rf(x,u)\in R_{f} exists for every xx.. On the other hand, no quantum algorithm can find such an uu for most xx, when given only a classical advice zfz_{f}, and classical query access to ff. Using this relation RfR_{f}, for a subset E{0,1}nE\subseteq\{0,1\}^{n}, we construct the following oracle:

O[f,E](x,u)={1 if (x,u)RfxE0 otherwise.O[f,E](x,u)=\begin{cases}1&\text{ if }(x,u)\in R_{f}\land x\notin E\\ 0&\text{ otherwise}.\end{cases}

The 1-instances of the problem FNF_{N} that will separate 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} in the query complexity model will be O[f,]O[f,\emptyset], and the 0-instances will be O[f,E]O[f,E] for |E|232n|E|\geq\frac{2}{3}\cdot 2^{n}, for a large subset of all functions ff. This is essentially the same construction that is used in [LLPY23], except they also use an additional oracle GG for a random function from {0,1}n\{0,1\}^{n} to {0,1}n\{0,1\}^{n}, which OO also depends on.

Note that the query complexity lower bound we obtain for QCMA is of a different nature than the one obtained in [LLPY23]: we need to lower bound (bounded-round) quantum query algorithms instead of only classical query algorithms, and we focus on the worst-case rather than average-case setting. In order to get an oracle separation for Turing machines from a separation in query complexity, one needs to use a diagonalization argument; because our result is set up a bit differently than in previous work, we reprove the diagonalization argument for our setting in Appendix A.

Finally, we emphasize that the bounded adaptivity limitation of our result is because we allow the full power of classical proofs and also quantum queries. If one were to drop the power of classical proofs (resulting in the class 𝖡𝖰𝖯\mathsf{BQP}), or if one were to drop the power of quantum queries (resulting in, essentially, 𝖬𝖠\mathsf{MA}), it would follow from [LLPY23] that close variants of FNF_{N} cannot be solved even without the bounded-round restriction. We conjecture their lower bounds apply to FNF_{N} as well.

1.3 Our techniques

We briefly describe the techniques used to obtain the query complexity result. We start by observing that the oracle O[f,]O[f,\emptyset] is essentially just a verification oracle for the Yamakawa-Zhandry relation. Therefore, there is a quantum witness and a quantum algorithm that can distinguish O[f,]O[f,\emptyset] and O[f,E]O[f,E] by using this witness, with only one query, with probability 12Ω(n)1-2^{-\Omega(n)} over ff. The witness for the yes instance O[f,]O[f,\emptyset] is simply the quantum advice for the Yamakawa-Zhandry problem, which finds a uu for any xx with probability 12Ω(n)1-2^{-\Omega(n)} over ff. The quantum algorithm finds a uu for a random xx using the witness, and queries the oracle. Since the no instances return 0 on any (x,u)(x,u) for most xx, this algorithm can distinguish O[f,]O[f,\emptyset] and O[f,E]O[f,E] for 12Ω(n)1-2^{-\Omega(n)} fraction of the ff-s.

We now consider the uniform distribution over these good ff-s, which has Ω(2n)\Omega(2^{n}) min-entropy. If there was a classical witness function depending on ff, of size kk, that made a quantum algorithm accept O[f,]O[f,\emptyset] for these ff-s, then there would exist a fixed witness string ww that would make O[f,]O[f,\emptyset] accept for 2k2^{-k} fraction of ff-s. The quantum algorithm depends on the witness, but if we fix the witness string ww, the algorithm is fixed, and we can then ignore the dependence of the algorithm on the witness.

We now attempt to remove rounds of the quantum query algorithm, starting with the first round, while keeping the behavior of the algorithm the same on as many oracles as possible. Every time we remove a round, we restrict our attention to a smaller set of oracles, all of which are consistent with a growing partial assignment we assume is given to us. At the end, the quantum algorithm will have no rounds left, and hence will make no queries; we want the set of oracles O[f,]O[f,\emptyset] on which the behavior is preserved to be non-empty, because then we can conclude that the algorithm cannot distinguish O[f,]O[f,\emptyset] and O[f,E]O[f,E] for some large erased set EE (since it now makes no queries).

To remove the first round of the query algorithm, we start by considering the the uniform distribution over the 2k2^{-k} fraction of good ff-s such that O[f,]O[f,\emptyset] is accepted by ww. This distribution has Ω(2n)k\Omega(2^{n})-k min-entropy, and therefore, by a result of [GPW17, CDGS18], it can be written as a convex combination of finitely many (l,1δ)(l,1-\delta)-dense distributions, for some small ll and δ\delta. (l,1δ)(l,1-\delta)-dense distributions are a concept that was first introduced in the context of communication complexity; an (l,1δ)(l,1-\delta)-dense distribution over NN coordinates in which ll coordinates are fixed, and the rest of the coordinates have high min-entropy in every subset. (Here we are using the same terminology from [GPW17, CDGS18] for dense distributions; the terminology we use in our actual proof will be slightly different — see Section 4.2.) We restrict our attention to such a distribution, and try to preserve the behavior of the quantum algorithm only within a subset of its support.

Some coordinates are fixed in the (l,1δ)(l,1-\delta) distribution, which make the probability over this distribution of the event (x,u)Rf(x,u)\in R_{f} non-negligible, for some (x,u)(x,u) pairs. The quantum algorithm can potentially learn a lot about ff by querying the oracle O[f,]O[f,\emptyset] for these pairs. Therefore, we shall fix the coordinates of ff that are fixed by (x,u)(x,u) being in RfR_{f}. Here is where we use the fact that the Yamakawa-Zhandry relation is what we shall call slippery. This essentially means that given a small number of fixed coordinates for ff, the number (x,u)(x,u) pairs that have non-negligible probability is not too high, and the number of extra coordinates fixed by these (x,u)(x,u) pairs being in RfR_{f} is also not too high. The Yamakawa-Zhandry relation being slippery essentially follows from it using a code that has good list recoverability properties. (The Hidden Matching relation, or its parallel repetition, are not slippery by this definition, and so our construction does not work with these.)

Using the slippery property, we can increase the size of the partial assignment by not too much, and via a hybrid-like argument [BBBV97], we can ensure that the first round of the quantum algorithm does not learn much from queries outside this partial assignment. We then restrict our attention to oracles consistent with this partial assignment; on those, we can simulate the first round of the algorithm without making real queries (we simply use the known partial assignment and guess “0” on the rest of the oracle positions, which are highly unlikely to be 1). This way, we get a quantum algorithm with one fewer round, which mimics the original algorithm on a small (but not too small) set of oracles.

Continuing this way, we eliminate all rounds of the algorithm while still maintaining a non-empty set of oracles on which the behavior is preserved. Each such oracle can be “erased”, turning a 11-input into a 0-input, so we only need the final 0-round algorithm to preserve the behavior of the original algorithm on at least one input. Using this technique, we can handle up to o(logn/loglogn)o(\log n/\log\log n) rounds of O(polyn)O(\operatorname{poly}n) non-adaptive quantum queries each.

1.4 Discussion and further work

We expect our techniques for the 𝖰𝖬𝖠\mathsf{QMA} vs 𝖰𝖢𝖬𝖠\mathsf{QCMA} separation may also work for a 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} vs 𝖡𝖰𝖯/poly\mathsf{BQP}_{/\mathrm{poly}} separation with boundedly adaptive oracle queries, using the same problem that is described in [LLPY23]. Their oracle in the query complexity setting is given by a random function GG, which the 𝖡𝖰𝖯\mathsf{BQP} algorithm has to compute given oracle access to

O[f,G](x,u)={G(x) if (x,u)Rf otherwise,O[f,G](x,u)=\begin{cases}G(x)&\text{ if }(x,u)\in R^{\prime}_{f}\\ \bot&\text{ otherwise,}\end{cases}

and a quantum or classical advice. Here RfR^{\prime}_{f} is a modified 11-out-of-nn version of the Yamakawa-Zhandry problem, which has better completeness properties, but is similar to the original problem otherwise. Clearly this problem can be solved in 𝖡𝖰𝖯/qpoly\mathsf{BQP}_{/\mathrm{qpoly}} by using the quantum advice for the Yamakawa-Zhandry problem. It cannot be solved on input xx with any classical advice and with access to an oracle that outputs \bot for every (x,u)(x,u). In order to show a 𝖡𝖰𝖯/poly\mathsf{BQP}_{/\mathrm{poly}} lower bound for this problem, one needs that there exist many xx-s such that a quantum algorithm with classical advice cannot distinguish O[f,G]O[f,G] from a version of O[f,G]O[f,G] that is erased on those xx-s. Since O[f,G]O[f,G] essentially serves as a verification oracle for RfR^{\prime}_{f}, we expect that when the quantum algorithm has bounded rounds, a proof very similar to our 𝖰𝖢𝖬𝖠\mathsf{QCMA} lower bound will work.

The final goal is, of course, to be able to show both these results without a bound on the number of rounds of oracle queries the quantum algorithm makes. As mentioned earlier, we fail to do this because the slipperiness parameters of the relation we picked are not good enough, and our methods would work to separate 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} with an analogous problem definition where the Yamakawa-Zhandry relation is replaced by a different relation RfR_{f} that has the appropriate slipperiness property.

We now expand more on the required strong slipperiness property. Let RfR_{f} be a family of 𝖳𝖥𝖭𝖯\mathsf{TFNP} relations on {0,1}n×{0,1}m\{0,1\}^{n}\times\{0,1\}^{m} indexed by f{0,1}Nf\in\{0,1\}^{N}, where m=poly(n)m=\operatorname{poly}(n) and N=Ω(2n)N=\Omega(2^{n}). We further assume RfR_{f} satisfies the property that if (x,u)Rf(x,u)\in R_{f}, then there is a polynomial-sized partial assignment pp for ff which certifies this, i.e., (x,u)Rf(x,u)\in R_{f} fp\forall f\supseteq p. Let 𝒫{0,1,}N\mathcal{P}\subseteq\{0,1,*\}^{N} denote the set of polynomial-sized partial assignments for ff. We define the extended version R~\widetilde{R} of the family of relations RfR_{f} as follows:

R~={(p,x,u):p is the minimal partial assignment s.t. (x,u)Rffp}.\widetilde{R}=\{(p,x,u):p\text{ is the minimal partial assignment s.t. }(x,u)\in R_{f}\,\forall f\supseteq p\}.

Since pp is polynomial-sized, if we consider the uniform distribution over {0,1}N\{0,1\}^{N}, Pr[pf]\Pr[p\subseteq f] is exponentially small. Now consider a partial assignment qq for ff with size at most s(n)s(n); we fix the bits in qq and generate the other bits of ff uniformly at random, which can make the probability of some other partial assignments pp non-negligible. The slipperiness property is concerned with the total support of all partial assignments pp such that Pr[pf|qf]\Pr[p\subseteq f|q\subseteq f] is non-negligible, and (p,x,u)R~(p,x,u)\in\widetilde{R}. We say R~\widetilde{R} is (η,s(n),t(n))(\eta,s(n),t(n))-slippery if for all s(n)s(n)-sized qq, the total support of all pp-s such that Pr[pf|qf]η\Pr[p\subseteq f|q\subseteq f]\geq\eta and (p,x,u)R~(p,x,u)\in\widetilde{R} is at most t(n)t(n). See Definition 13 for a more formal definition.

Our techniques show that the following conjecture implies an oracle separation between 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA}.

Conjecture 3.

There exists a family of 𝖳𝖥𝖭𝖯\mathsf{TFNP} relations RfR_{f} such that

  1. 1.

    There exists a polynomial-time algorithm 𝒜\mathcal{A}, and for each ff, a poly(n)\operatorname{poly}(n)-sized quantum state |zf\ket{z_{f}} such that, given access to xx and |zf\ket{z_{f}}, 𝒜\mathcal{A} can find uu such that (x,u)Rf(x,u)\in R_{f}, with probability at least 12Ω(n)1-2^{-\Omega(n)} over uniform x,fx,f.

  2. 2.

    There exists a function s(n)=2o(n)s(n)=2^{o(n)} such that for all polynomial functions p(n)p(n), the extended relation R~\widetilde{R} is (1/p(n),s(n),t(n))\left(1/p(n),s(n),t(n)\right)-slippery for some t(n)t(n) such that log(t(n))=o(log(s(n)))\log(t(n))=o(\log(s(n))).

Assuming Conjecture 3 is true, the oracle function separating 𝖰𝖬𝖠\mathsf{QMA} and 𝖰𝖢𝖬𝖠\mathsf{QCMA} would be distinguishing O[f,]O[f,\emptyset] and O[f,E]O[f,E], for |E|232n|E|\geq\frac{2}{3}\cdot 2^{n}, which we have defined earlier, using a relation RfR_{f} that satisfies the conjecture. (The Yamakawa-Zhandry relation does not seem to satisfy the conjecture; we can only prove it is (η,s(n),t(n))(\eta,s(n),t(n))-slippery, with t(n)t(n) bigger than s(n)s(n).)

We further note that any family of relations RfR_{f} that satisfies Conjecture 3 must give an exponential separation between quantum and randomized one-way communication complexity, with the communication setting being that Alice gets input ff, Bob gets input xx, and Bob has to output uu such that (x,u)Rf(x,u)\in R_{f}.222Strictly speaking, condition 1 of the conjecture only implies that there exists a one-way communication protocol, in which Alice sends the state |zf\ket{z_{f}}, which works on average over xx and ff, whereas we usually require worst-case success in communication complexity. However, we can restrict to the set of xx and ff for which the algorithm 𝒜\mathcal{A} works, in order to get the communication problem. This is because, if there was a polynomial-sized classical message wfw_{f} that Alice could send to Bob in the communication setting, then wfw_{f} could also serve as a QCMA proof. Therefore, it seems that the slipperiness condition could also be used for lower-bounding one-way randomized communication complexity (although weaker slipperiness parameters than in the conjecture would also suffice for this).

2 Preliminaries

2.1 QMA and QCMA in query complexity

In this section, we review the formal definitions of QMA, QCMA, computationally-efficient QMA, and bounded-round QCMA in the context of query complexity.

Definition 4 (Bounded-round quantum query algorithm).

For r,T,nr,T,n\in\operatorname{\mathbb{N}}, give the following definition of a quantum query algorithm QQ acting on nn bits, using rr rounds, with TT queries in each round. The algorithm will be a tuple of r+1r+1 unitary matrices, Q=(U0,U1,,Ur)Q=(U_{0},U_{1},\dots,U_{r}). These unitary matrices will each act on TT “query-input” registers of dimension nn, TT “query-output” registers of dimension 22, an “output” register of dimension 22, and a work register of arbitrary dimension.

For each x{0,1}nx\in\{0,1\}^{n}, let UxU^{x} be the oracle unitary, which acts on the query-input and query-output registers by mapping

|i1|b1|i2|b2|iT|bT|i1|b1xi1|i2|b2xi2|iT|bTxiT\ket{i_{1}}\ket{b_{1}}\ket{i_{2}}\ket{b_{2}}\dots\ket{i_{T}}\ket{b_{T}}\to\ket{i_{1}}\ket{b_{1}\oplus x_{i_{1}}}\ket{i_{2}}\ket{b_{2}\oplus x_{i_{2}}}\dots\ket{i_{T}}\ket{b_{T}\oplus x_{i_{T}}}

for all i1,,iT[n]i_{1},\dots,i_{T}\in[n] and all b1,,bT{0,1}b_{1},\dots,b_{T}\in\{0,1\}. We extend UxU^{x} to other registers via a Kronecker product with identity, so that UxU^{x} ignores the other registers.

The action of the algorithm QQ on input x{0,1}nx\in\{0,1\}^{n}, denoted by the Bernoulli random variable Q(x)Q(x), will be the result of measuring the output register of the state

UrUxUr1UxUxU1UxU0|ψinit,U_{r}U^{x}U_{r-1}U^{x}\dots U^{x}U_{1}U^{x}U_{0}\ket{\psi_{init}},

where |ψinit\ket{\psi_{init}} is a fixed initial state.

We will use the term “TT-query quantum algorithm” without referring to the number of rounds to indicate TT rounds with 11 query in each.

Definition 5 (Query algorithm with witness).

Let QQ be a rr-query quantum algorithm on nn bits with TT queries in each round. For any quantum state |ϕ\ket{\phi} and any x{0,1}nx\in\{0,1\}^{n}, let Q(x,|ϕ)Q(x,\ket{\phi}) be the random variable corresponding to the measured output register after the algorithm terminates, assuming the initial state contained |ϕ\ket{\phi} in the work register (with ancilla padding) instead of being |ψinit\ket{\psi_{init}}. That is, Q(x,|ϕ)Q(x,\ket{\phi}) is a Bernoulli random variable corresponding to the measurement outcome of the output register of the final state

UrUxUr1UxU1UxU0|ϕ|pad.U_{r}U^{x}U_{r-1}U^{x}\dots U_{1}U^{x}U_{0}\ket{\phi}\ket{pad}.
Definition 6 (Query QMA and QCMA).

Let ff be a possibly partial Boolean function on nn bits, and let QQ be a quantum query algorithm on nn bits with TT total queries. We say that QQ is a QMA algorithm for ff with witness size kk if the following holds:

  1. 1.

    (Soundness.) For every xf1(0)x\in f^{-1}(0) and every kk-qubit state |ϕ\ket{\phi}, we have Pr[Q(x,|ϕ)=1]ϵ\Pr[Q(x,\ket{\phi})=1]\leq\epsilon.

  2. 2.

    (Completeness.) For every xf1(1)x\in f^{-1}(1), there exists a kk-qubit state |ϕ\ket{\phi} such that Pr[Q(x,|ϕ)=1]1δ\Pr[Q(x,\ket{\phi})=1]\geq 1-\delta.

Here, ϵ\epsilon and δ\delta govern the soundness and completeness of QQ; by default, we take them both to be 1/31/3. We denote the QMA query complexity of ff by QMAϵ,δ(f)\mathrm{QMA}_{\epsilon,\delta}(f), which is the minimum possible value of T+kT+k over any QMA algorithm for ff with the specified soundness and completeness.

We say that QQ is a QCMA algorithm for ff if the same conditions hold, except with the witness state |ϕ\ket{\phi} quantifying over only classical kk-bit strings in both the soundness and completeness conditions. We define QCMAϵ,δ(f)\mathrm{QCMA}_{\epsilon,\delta}(f) analogously to QMAϵ,δ(f)\mathrm{QMA}_{\epsilon,\delta}(f), and we omit the subscripts when they are both 1/31/3.

Definition 7 (Bounded round query QMA and QCMA).

We define rr-round QMA and QCMA in exactly the same way as the above definition, except the query algorithms are required to have at most rr rounds. We use QMAε,δr(f)\mathrm{QMA}^{r}_{\varepsilon,\delta}(f) and QCMAε,δr(f)\mathrm{QCMA}^{r}_{\varepsilon,\delta}(f) to denote the rr-round QMA and QCMA query complexities of ff respectively.

Definition 8 (Function family).

A function family is an indexed set F={fn}nIF=\{f_{n}\}_{n\in I} where II\subseteq\operatorname{\mathbb{N}} is an infinite set and where each fnf_{n} is a partial Boolean function fn:Dom(fn){0,1}f_{n}\colon\operatorname{Dom}(f_{n})\to\{0,1\} with Dom(fn){0,1}n\operatorname{Dom}(f_{n})\subseteq\{0,1\}^{n}.

Definition 9 (Efficiently computable QMA).

Let F={fn}nIF=\{f_{n}\}_{n\in I} be a function family. We say that FF is in efficiently computable query 𝖰𝖬𝖠\mathsf{QMA} if there is a polynomial-time Turing machine which takes in the binary encoding n\langle n\rangle of a number nIn\in I and outputs a QMA verifier QQ by explicitly writing out the unitaries of QQ as quantum circuits (with a fixed universal gate set). The verifier QQ must be sound and complete for fnf_{n}. Efficiently computable bounded-round QMA is defined analogously.

In other words, QMA(fn)\mathrm{QMA}(f_{n}) must be O(polylog(n))O(\operatorname{polylog}(n)), and moreover, the different algorithms for fnf_{n} must be uniformly generated by a single polynomial-time Turing machine.

With these definitions, we show in Appendix A that Theorem Theorem 2 implies Theorem Theorem 1.

2.2 Error-correcting codes

A Reed-Solomon error-correcting code RSq,γ,k\operatorname{RS}_{q,\gamma,k} over 𝔽q\operatorname{\mathbb{F}}_{q}, with degree parameter 0<k<q10<k<q-1 and generator γ𝔽q\gamma\in\operatorname{\mathbb{F}}^{*}_{q}, is defined as

RSq,γ,k={(f(γ),f(γq)):f𝔽q[x]degk},\operatorname{RS}_{q,\gamma,k}=\{(f(\gamma),\ldots f(\gamma^{q})):f\in\operatorname{\mathbb{F}}_{q}[x]_{\deg\leq k}\},

where 𝔽q[x]degk\operatorname{\mathbb{F}}_{q}[x]_{\deg\leq k} is the set of polynomials over 𝔽q\operatorname{\mathbb{F}}_{q} of degree at most kk.

Let q1=mnq-1=mn, for some integers mm and nn. The mm-folded version RSq,γ,k(m)\operatorname{RS}^{(m)}_{q,\gamma,k} of RSq,γ,k\operatorname{RS}_{q,\gamma,k} is a mapping of the code to the larger alphabet 𝔽qm\operatorname{\mathbb{F}}_{q}^{m} as follows:

RSq,γ,k(m)={((x1,,xm),,(xqm,,xq)):(x1,,xq)RSq,γ,k}.\operatorname{RS}^{(m)}_{q,\gamma,k}=\{((x_{1},\ldots,x_{m}),\ldots,(x_{q-m},\ldots,x_{q})):(x_{1},\ldots,x_{q})\in\operatorname{RS}_{q,\gamma,k}\}.

Note that the alphabet of RSq,γ,k(m)\operatorname{RS}^{(m)}_{q,\gamma,k} is 𝔽qm\operatorname{\mathbb{F}}_{q}^{m}.

Definition 10.

We say that a code CΣnC\subseteq\Sigma^{n} is combinatorially (ζ,,L)(\zeta,\ell,L)-list recoverable if for any subsets SiΣS_{i}\subseteq\Sigma such that |Si||S_{i}|\leq\ell, we have,

|{(x1,,xn)C:|{i:xiSi}|(1ζ)n}|L.\left|\{(x_{1},\ldots,x_{n})\in C:|\{i:x_{i}\in S_{i}\}|\geq(1-\zeta)n\}\right|\leq L.
Lemma 11 ([Rud07, YZ22]).

For a prime power qq such that mn=q1mn=q-1, any generator γ𝔽q\gamma\in\operatorname{\mathbb{F}}_{q}^{*}, and degree k<q1k<q-1, RSq,γ,k(m)\operatorname{RS}^{(m)}_{q,\gamma,k} is (ζ,,qs)(\zeta,\ell,q^{s})-list recoverable for some sms\leq m if there exists an integer rr such that the following inequalities hold:

(1ζ)n(ms+1)\displaystyle(1-\zeta)n(m-s+1) (1+sr)(mnks)1/(s+1)\displaystyle\geq\left(1+\frac{s}{r}\right)(mn\ell k^{s})^{1/(s+1)} (1)
(r+s)(mnk)1/(s+1)\displaystyle(r+s)\left(\frac{mn\ell}{k}\right)^{1/(s+1)} <q.\displaystyle<q. (2)
Corollary 12.

Let mm be Θ(n)\Theta(n) integer such that nm+1=qnm+1=q is a prime power. Let k=56mnk=\frac{5}{6}mn and let c,dc,d be constants. Then RSq,γ,k\operatorname{RS}_{q,\gamma,k} is (clogn/n,2(logn)d,2(logn)d+1)(c\log n/n,2^{(\log n)^{d}},2^{(\log n)^{d+1}})-list recoverable.

This corollary is proved simply by checking that the equations (1)–(2) are satisfied with this choice of parameters. The choice of parameters is in fact the same as those as [YZ22]. Therefore, the above code satisfies the other conditions required for the [YZ22] quantum algorithm to succeed in evaluating the relation RC,fR_{C,f} defined in the next section.

3 The Yamakawa-Zhandry Problem

For a function f:[n]×{0,1}m{0,1}f:[n]\times\{0,1\}^{m}\to\{0,1\} and a linear code C{0,1}nmC\subseteq\{0,1\}^{nm}, define the relation RC,f{0,1}n×{0,1}nmR_{C,f}\subseteq\{0,1\}^{n}\times\{0,1\}^{nm}

RC,f={(x,u)=(x1xn,u1un):(u1unC)(if(i,ui)=xi)}.R_{C,f}=\{(x,u)=(x_{1}\ldots x_{n},u_{1}\ldots u_{n}):(u_{1}\ldots u_{n}\in C)\land(\forall i\,f(i,u_{i})=x_{i})\}.

We shall typically work with m=Θ(n)m=\Theta(n). We shall usually work with a fixed code CC, in which case we shall omit the subscript CC from RC,fR_{C,f}.

Let 𝒫{0,1,}n2m\mathcal{P}\subseteq\{0,1,*\}^{n2^{m}} denote the set of polynomial-sized partial assignments for functions f:[n]×{0,1}m{0,1}f:[n]\times\{0,1\}^{m}\to\{0,1\}. We define the extended version R~C\widetilde{R}_{C} of {RC,f}f\{R_{C,f}\}_{f} over 𝒫×{0,1}n×{0,1}nm\mathcal{P}\times\{0,1\}^{n}\times\{0,1\}^{nm} as follows:

R~C={(p,x,u):p is the minimal partial assignment s.t. (x,u)RC,ffp}.\widetilde{R}_{C}=\{(p,x,u):p\text{ is the minimal partial assignment s.t. }(x,u)\in R_{C,f}\,\forall f\supseteq p\}.

In particular, (p,x,u)(p,x,u) is in R~C\widetilde{R}_{C} when pp is the partial assignment (f(i,ui)=xi)i(f(i,u_{i})=x_{i})_{i}, which is nn bits.

Definition 13.

Let R~n\widetilde{R}_{n} be a sequence of relations on 𝒫n×{0,1}n×{0,1}poly(n)\mathcal{P}_{n}\times\{0,1\}^{n}\times\{0,1\}^{\operatorname{poly}(n)}, where 𝒫n\mathcal{P}_{n} consists of fixed polynomial-sized partial assignments for N=2Ω(n)N=2^{\Omega(n)}-bit strings, and poly(n)\operatorname{poly}(n) is some fixed polynomial. We say R~n\widetilde{R}_{n} is (η,s(n),t(n))(\eta,s(n),t(n))-slippery w.r.t. distribution μ\mu on ff if for any partial assignment qq on NN bits with size at most s(n)s(n), if we fix the bits of qq in ff and generate the other bits of ff according to μ\mu (conditioned on qq), we will have

|(p,x,u)R~n,Prfμ[pf|qf]ηsupp(p)|t(n).\left|\bigcup_{\begin{subarray}{c}(p,x,u)\in\widetilde{R}_{n},\\ \Pr_{f\sim\mu}[p\subseteq f|q\subseteq f]\geq\eta\end{subarray}}\operatorname{supp}(p)\right|\leq t(n).

We omit mentioning the distribution μ\mu explicitly if it is the uniform distribution.

Lemma 14.

When CC is a code with parameters from Corollary 12, then for any constants c,dc,d, R~C\widetilde{R}_{C} is (1nc,2(logn)d,2(c+2)(logn)d+1)(\frac{1}{n^{c}},2^{(\log n)^{d}},2^{(c+2)(\log n)^{d+1}})-slippery.

Proof.

Let qq be a partial assignment of size 2(logn)d2^{(\log n)^{d}}. For each i[n]i\in[n], let Si={v:(i,v) is fixed in q}S_{i}=\{v:(i,v)\text{ is fixed in }q\}. Clearly for each ii, |Si|2(logn)d|S_{i}|\leq 2^{(\log n)^{d}}. By Corollary 12,

Cq=|{u1unC:|{i:uiSi}|nclogn}|2(logn)d+1.C_{q}=\left|\{u_{1}\ldots u_{n}\in C:|\{i:u_{i}\in S_{i}\}|\geq n-c\log n\}\right|\leq 2^{(\log n)^{d+1}}.

Let us count the number of (p,x,u)(p,x,u) tuples that could be in R~C\widetilde{R}_{C} conditioned on qq, for which uu is in CqC_{q}. In fact we only need to count the number of (x,u)(x,u) pairs that could be in RC,fR_{C,f}, since pp is completely fixed by xx and uu. Each uu has at most clognc\log n many locations that are not fixed by qq, and xx can take any value in those clognc\log n locations, which means there are 2clogn2^{c\log n} many possible xx-s for each uu. Therefore, the number of (x,u)(x,u) pairs is 2(logn)d+12clogn2^{(\log n)^{d+1}}\cdot 2^{c\log n}. Consider the (p,x,u)(p,x,u) corresponding to each such (x,u)(x,u). Since xx has clognc\log n many locations unfixed by qq, and pp only fixes those locations, we have for each such pp, Pr[pf|qf]1nc\Pr[p\subseteq f|q\subseteq f]\geq\frac{1}{n^{c}}. In fact the (p,x,u)(p,x,u) tuples we have counted with uCqu\in C_{q} are the only ones that satisfy (p,x,u)R~C(p,x,u)\in\widetilde{R}_{C} conditioned on qq, and Pr[pf|qf]1nc\Pr[p\subseteq f|q\subseteq f]\geq\frac{1}{n^{c}}. Since the total support of each pp is nn, we have,

|(p,x,u)R~n,Prf[pf|qf]1ncsupp(p)|2(logn)d+12clognn2(c+2)(logn)d+1.\left|\bigcup_{\begin{subarray}{c}(p,x,u)\in\widetilde{R}_{n},\\ \Pr_{f}[p\subseteq f|q\subseteq f]\geq\frac{1}{n^{c}}\end{subarray}}\operatorname{supp}(p)\right|\leq 2^{(\log n)^{d+1}}\cdot 2^{c\log n}\cdot n\leq 2^{(c+2)(\log n)^{d+1}}.

Corollary 15.

If μ\mu is a distribution such that for all partial assignments pp with |p|=n|p|=n, we have μ[p]k2n\mu[p]\leq\frac{k}{2^{n}} (where μ[p]\mu[p] is the probability mass of strings consistent with pp), then R~C\widetilde{R}_{C} from Lemma 14 is also (knc,2(logn)d,2(c+2)(logn)d+1)(\frac{k}{n^{c}},2^{(\log n)^{d}},2^{(c+2)(\log n)^{d+1}})-slippery w.r.t. μ\mu.

Proof.

Since μ[p]k2n\mu[p]\leq\frac{k}{2^{n}} for all pp, partial assignments that have probability at least knc\frac{k}{n^{c}} against μ\mu conditioned on qq have probability at least 1nc\frac{1}{n^{c}} against the uniform distribution conditioned on qq. Now we can apply Lemma 14. ∎

Theorem 16.

There exists a code CC such that

  1. 1.

    R~C\widetilde{R}_{C} is (1nc,2(logn)d,2(c+2)(logn)d+1)(\frac{1}{n^{c}},2^{(\log n)^{d}},2^{(c+2)(\log n)^{d+1}})-slippery for any constant dd.

  2. 2.

    There exists a quantum advice |zf\ket{z_{f}} with polynomially many qubits, and a polynomial-time quantum algorithm 𝒜\mathcal{A} that has access to |zf,x\ket{z_{f}},x, and makes no queries to any oracle, such that for any x{0,1}nx\in\{0,1\}^{n},

    PrfU[(u𝒜(|zf,x))((x,u)RC,f)]12Ω(n),\Pr_{f\sim U}[(u\leftarrow\mathcal{A}(\ket{z_{f}},x))\land((x,u)\in R_{C,f})]\geq 1-2^{-\Omega(n)},

    where the probability is over uniformly random functions f:[n]×{0,1}m{0,1}f:[n]\times\{0,1\}^{m}\to\{0,1\}, and the internal randomness of 𝒜\mathcal{A}.

Proof.

Item 1 is due to Lemma 14. As stated before, the problem R~C\widetilde{R}_{C}, and the choice of parameters for the code CC in Lemma 14, is the same as [YZ22]. Therefore, item 2 is due to [YZ22, Liu23].333The quantum algorithm in [YZ22] makes some non-adaptive quantum queries (not depending on xx), and does not take an advice state. The modified algorithm, which instead takes an advice state (which is essentially the state of the algorithm in [YZ22] after its non-adaptive queries) and makes no queries, was described in [Liu23].

4 QMA vs QCMA

In this section, we prove Theorem 2. Theorem 17 will define the function FNF_{N} and show that it is in QMA, and Theorem 21 will show that it is not in QCMA.

4.1 Construction and QMA protocol

Fix a code CC for which Theorem 16 holds, with c=lognc=\log n. We shall henceforth refer to RC,fR_{C,f} as only RfR_{f} for this CC. For a subset E{0,1}nE\subseteq\{0,1\}^{n}, define the oracle O[f,E]:{0,1}n×{0,1}nm{0,1}O[f,E]\colon\{0,1\}^{n}\times\{0,1\}^{nm}\to\{0,1\} as

O[f,E](x,u)={1 if (x,u)RfxE0 otherwise.O[f,E](x,u)=\begin{cases}1&\text{ if }(x,u)\in R_{f}\land x\notin E\\ 0&\text{ otherwise}.\end{cases}
Theorem 17.

There exists an efficient uniform collection of query QMA protocols (generated uniformly by a polynomial time Turing machine) which uses 11 query and polynomial witness size, and which outputs 0 on all oracles O[f,E]O[f,E] with |E|(2/3)2n|E|\geq(2/3)\cdot 2^{n}, and outputs 1 on O[f,]O[f,\emptyset] for 12Ω(n)1-2^{-\Omega(n)} fraction of ff-s.

Proof.

The quantum witness for the algorithm will be quantum advice state for RfR_{f} from Theorem 16. The quantum algorithm works as follows: it samples a uniformly random x{0,1}nx\in\{0,1\}^{n}, and runs the procedure from Theorem 16 to find a uu such that (x,u)Rf(x,u)\in R_{f}. Note that this requires no queries to the oracle. Then it queries the oracle at (x,u)(x,u) and returns the query output. If the oracle is O[f,]O[f,\emptyset] and the actual state |zf\ket{z_{f}} from Theorem 16 is provided as witness, then due to Theorem 16 we have,

PrfU[𝒜O[f,](|zf)=1]12Ω(n).\Pr_{f\sim U}[\mathcal{A}^{O[f,\emptyset]}(\ket{z_{f}})=1]\geq 1-2^{-\Omega(n)}.

On the other hand, if the oracle is O[f,E]O[f,E] for |E|232n|E|\geq\frac{2}{3}\cdot 2^{n}, no matter what witness is provided, and what uu is obtained from this witness, the oracle outputs 0 on (x,u)(x,u) for 23\frac{2}{3} of the xx-s. Since the algorithm samples a uniformly random xx and queries it with some uu for every ff, we have for every ff,

Pr[𝒜O[f,E](|zf)=1]13.\Pr[\mathcal{A}^{O[f,E]}(\ket{z_{f}})=1]\leq\frac{1}{3}.\qed

Defining the function FNF_{N}.

We now define the following partial query function with input size 2n×2mn2^{n}\times 2^{mn}: its 11-inputs are all the oracles O[f,]O[f,\emptyset] for which the algorithm from Theorem Theorem 17 accepts with probability at least 2/32/3, and its 0-inputs are O[f,E]O[f,E] for which O[f,]O[f,\emptyset] is a 11-input and |E|(2/3)2n|E|\geq(2/3)\cdot 2^{n}. Note that these oracles correspond to the inputs “xx” of the query problem. This defines a family FNF_{N} of query tasks with N=2n×2mnN=2^{n}\times 2^{mn}, and Theorem 17 showed that this family is in efficiently-computable QMA.

4.2 Useful notation and lemmas

Recall that a non-adaptive quantum algorithm works on TT query-input registers and TT query-output registers plus an additional work register WW, so that its basis states look like

|i1|b1|i2|b2|iT|bT|W.\ket{i_{1}}\ket{b_{1}}\ket{i_{2}}\ket{b_{2}}\dots\ket{i_{T}}\ket{b_{T}}\ket{W}.

To clear up notational clutter, we will use i[N]T\vec{i}\in[N]^{T} to represent a tuple of TT indices in [N][N]. Moreover, for a string x{0,1}Nx\in\{0,1\}^{N} and for i[N]T\vec{i}\in[N]^{T}, we will define xi(xi1,xi2,,xiT)x_{\vec{i}}\coloneqq(x_{\vec{i}_{1}},x_{\vec{i}_{2}},\dots,x_{\vec{i}_{T}}). The basis states can then be written |i|b|W\ket{\vec{i}}\ket{\vec{b}}\ket{W}, and the action of the query unitary UxU^{x} to the string xx is to map |i|b|W|i|bxi|W\ket{\vec{i}}\ket{\vec{b}}\ket{W}\to\ket{\vec{i}}\ket{\vec{b}\oplus x_{\vec{i}}}\ket{W}, extended linearly to the rest of the space. (Here \oplus denotes the bitwise XOR of the two strings of length TT.)

Define Πi|ii|Ib,W\Pi_{\vec{i}}\coloneqq\ket{\vec{i}}\bra{\vec{i}}\otimes I_{\vec{b},W} to be the projection onto basis states with i\vec{i} in the query-input registers. For i[N]i\in[N], define ΠiiiΠi\Pi_{i}\coloneqq\sum_{\vec{i}\ni i}\Pi_{\vec{i}} to be the projection onto basis states with ii occurring in one of the query-input registers. The projections Πi\Pi_{\vec{i}} are onto orthogonal spaces, though the projections Πi\Pi_{i} are not. Observe that iΠi=I\sum_{\vec{i}}\Pi_{\vec{i}}=I, and that iΠi=iiiΠi=iiiΠi=TI\sum_{i}\Pi_{i}=\sum_{i}\sum_{\vec{i}\ni i}\Pi_{\vec{i}}=\sum_{\vec{i}}\sum_{i\in\vec{i}}\Pi_{\vec{i}}=T\cdot I. Moreover, since the oracle unitary UxU^{x} does not change the query-input registers, UxU^{x} commutes with both Πi\Pi_{\vec{i}} and Πi\Pi_{i}. Another convenient property is that if xi=yix_{\vec{i}}=y_{\vec{i}} for two strings x,y{0,1}Nx,y\in\{0,1\}^{N}, then Πi(UxUy)=0\Pi_{\vec{i}}(U^{x}-U^{y})=0; this holds because both UxU^{x} and UyU^{y} map |i|b|W\ket{\vec{i}}\ket{\vec{b}}\ket{W} to the same vector when xi=yix_{\vec{i}}=y_{\vec{i}}. Using these properties, we have the following lemma.

Lemma 18 (Hybrid argument for nonadaptive queries).

For any strings x,y{0,1}Nx,y\in\{0,1\}^{N} and any quantum state |ψ=i,b,Wαi,b,W|i|b|W\ket{\psi}=\sum_{\vec{i},\vec{b},W}\alpha_{\vec{i},\vec{b},W}\ket{\vec{i}}\ket{\vec{b}}\ket{W}, we have

Ux|ψUy|ψ224i:xiyiΠi|ψ22.\|U^{x}\ket{\psi}-U^{y}\ket{\psi}\|_{2}^{2}\leq 4\sum_{i:x_{i}\neq y_{i}}\|\Pi_{i}\ket{\psi}\|_{2}^{2}.
Proof.

We write the following, with justification afterwards.

Ux|ψUy|ψ22\displaystyle\|U^{x}\ket{\psi}-U^{y}\ket{\psi}\|_{2}^{2} =iΠi(UxUy)|ψ22\displaystyle=\left\|\sum_{\vec{i}}\Pi_{\vec{i}}(U^{x}-U^{y})\ket{\psi}\right\|_{2}^{2}
=iΠi(UxUy)|ψ22\displaystyle=\sum_{\vec{i}}\|\Pi_{\vec{i}}(U^{x}-U^{y})\ket{\psi}\|_{2}^{2}
=i:xiyiΠi(UxUy)|ψ22\displaystyle=\sum_{\vec{i}:x_{\vec{i}}\neq y_{\vec{i}}}\|\Pi_{\vec{i}}(U^{x}-U^{y})\ket{\psi}\|_{2}^{2}
iii:xiyiΠi(UxUy)|ψ22\displaystyle\leq\sum_{\vec{i}}\sum_{i\in\vec{i}:x_{i}\neq y_{i}}\|\Pi_{\vec{i}}(U^{x}-U^{y})\ket{\psi}\|_{2}^{2}
=i:xiyiiiΠi(UxUy)|ψ22\displaystyle=\sum_{i:x_{i}\neq y_{i}}\sum_{\vec{i}\ni i}\|\Pi_{\vec{i}}(U^{x}-U^{y})\ket{\psi}\|_{2}^{2}
=i:xiyiiiΠi(UxUy)|ψ22\displaystyle=\sum_{i:x_{i}\neq y_{i}}\left\|\sum_{\vec{i}\ni i}\Pi_{\vec{i}}(U^{x}-U^{y})\ket{\psi}\right\|_{2}^{2}
=i:xiyiΠi(UxUy)|ψ22\displaystyle=\sum_{i:x_{i}\neq y_{i}}\|\Pi_{i}(U^{x}-U^{y})\ket{\psi}\|_{2}^{2}
=i:xiyi(UxUy)Πi|ψ22\displaystyle=\sum_{i:x_{i}\neq y_{i}}\|(U^{x}-U^{y})\Pi_{i}\ket{\psi}\|_{2}^{2}
4i:xiyiΠi|ψ22.\displaystyle\leq 4\sum_{i:x_{i}\neq y_{i}}\|\Pi_{i}\ket{\psi}\|_{2}^{2}.

In the first line, we used iΠi=I\sum_{\vec{i}}\Pi_{\vec{i}}=I. In the second, we used the orthogonality of the images of the projections Πi\Pi_{\vec{i}}. In the third, we used Πi(UxUy)=0\Pi_{\vec{i}}(U^{x}-U^{y})=0 when xi=yix_{\vec{i}}=y_{\vec{i}}.

In the fourth line, we replaced the sum over i\vec{i} containing at least one ii with xiyix_{i}\neq y_{i} with a weighted sum, where the weight of i\vec{i} is the number of iii\in\vec{i} such that xiyix_{i}\neq y_{i}; this weight is 0 when xi=yix_{\vec{i}}=y_{\vec{i}} and at least 11 when xiyix_{\vec{i}}\neq y_{\vec{i}}. This weight can be represented as a sum over iii\in\vec{i} with xiyix_{i}\neq y_{i}, since we are counting i\vec{i} once for each such ii in the tuple.

The fifth line flips the order of the sums, and the sixth uses orthogonality of the images of Πi\Pi_{\vec{i}} to put the sum back inside the squared norm. The seventh line is the definition of Πi\Pi_{i}, and the eighth holds since Πi\Pi_{i} commutes with UxU^{x} and UyU^{y}. Finally, the last line follows either from the triangle inequality, or from the fact that the spectral norm of (UxUy)(U^{x}-U^{y}) is at most 22 (since UxU^{x} and UyU^{y} are unitary). ∎

For an oracle x{0,1}nx\in\{0,1\}^{n} and a block B[N]B\subseteq[N], use x[B]x[B] to denote the string xx with queries in BB erased; that is, x[B]i=xix[B]_{i}=x_{i} if iBi\notin B, and x[B]i=0x[B]_{i}=0 for iBi\in B. Next, we use this hybrid argument in combination with a Markov inequality to show that if a distribution μ\mu over {0,1}n\{0,1\}^{n} has a set of queries B[N]B\in[N] that nearly always return zero for oracles sampled from μ\mu, then for any non-adaptive quantum algorithm, there exists a large set of oracles (measured against μ\mu) such that the algorithm does not detect whether any subset of BB is erased.

Lemma 19 (Nonadaptive algorithms don’t detect oracle erasures).

Fix |ψ\ket{\psi} representing the state of a quantum algorithm before a batch of non-adaptive queries. Let μ\mu be a distribution over {0,1}N\{0,1\}^{N}, and let ϵ>0\epsilon>0. Let B={i[N]:Prxμ[xi=1]ϵ}B=\{i\in[N]:\Pr_{x\sim\mu}[x_{i}=1]\leq\epsilon\}. Then there exists a set S{0,1}NS\subseteq\{0,1\}^{N} such that μ[S]1/2\mu[S]\geq 1/2 and for all xSx\in S and all subsets B1,B2BB_{1},B_{2}\subseteq B, we have

Ux[B1]|ψUx[B2]|ψ28ϵT.\|U^{x[B_{1}]}\ket{\psi}-U^{x[B_{2}]}\ket{\psi}\|_{2}\leq\sqrt{8\epsilon T}.
Proof.

We write the following, with justification afterwards.

𝔼xμ[i:xix[B]iΠi|ψ22]\displaystyle\operatorname*{\mathbb{E}}_{x\sim\mu}\left[\sum_{i:x_{i}\neq x[B]_{i}}\|\Pi_{i}\ket{\psi}\|_{2}^{2}\right] =𝔼xμ[iBxiΠi|ψ22]\displaystyle=\operatorname*{\mathbb{E}}_{x\sim\mu}\left[\sum_{i\in B}x_{i}\|\Pi_{i}\ket{\psi}\|_{2}^{2}\right]
=iBΠi|ψ22𝔼xμ[xi]\displaystyle=\sum_{i\in B}\|\Pi_{i}\ket{\psi}\|_{2}^{2}\operatorname*{\mathbb{E}}_{x\sim\mu}[x_{i}]
ϵiBΠi|ψ22\displaystyle\leq\epsilon\sum_{i\in B}\|\Pi_{i}\ket{\psi}\|_{2}^{2}
ϵi[N]Πi|ψ22\displaystyle\leq\epsilon\sum_{i\in[N]}\|\Pi_{i}\ket{\psi}\|_{2}^{2}
=ϵi[N]iiΠi|ψ22\displaystyle=\epsilon\sum_{i\in[N]}\sum_{\vec{i}\ni i}\|\Pi_{\vec{i}}\ket{\psi}\|_{2}^{2}
=ϵTiΠi|ψ22\displaystyle=\epsilon T\sum_{\vec{i}}\|\Pi_{\vec{i}}\ket{\psi}\|_{2}^{2}
=ϵT.\displaystyle=\epsilon T.

The first line follows by noting that xix[B]ix_{i}\neq x[B]_{i} can only happen if both iBi\in B and xi=1x_{i}=1; we replace the sum over i:xix[B]ii:x_{i}\neq x[B]_{i} with the sum over iBi\in B, and multiply the summand by the indicator for xi=1x_{i}=1, which is xix_{i} itself.

The second line is the result of pushing the expectation inside the sum, and observing that the norm does not depend on xx and can be factored out of the expectation. The third line follows from the definition of BB: we know that for all iBi\in B, the probability of xi=1x_{i}=1 is at most ϵ\epsilon. The fourth replaces the sum over BB with that over [N][N]. The fifth uses the definition of Πi\Pi_{i}, and exchanges the sum over i\vec{i} with the squared norm using orthogonality. The sixth line follows by noting that each i\vec{i} appears exactly TT times in this double sum. Finally, the last line follows by pushing the sum inside the squared norm (using orthogonality), and recalling that iΠi=I\sum_{\vec{i}}\Pi_{\vec{i}}=I, together with the fact that |ψ\ket{\psi} is a unit vector.

Given this bound on the expectation, we can apply Markov’s inequality to conclude that at least half the strings xx (weighted by μ\mu) must satisfy i:xix[B]iΠi|ψ222ϵT\sum_{i:x_{i}\neq x[B]_{i}}\|\Pi_{i}\ket{\psi}\|_{2}^{2}\leq 2\epsilon T. Let SS be the set of such strings xx; then μ[S]1/2\mu[S]\geq 1/2. Observe that for any xSx\in S and any B1,B2BB_{1},B_{2}\subseteq B, the set {i:x[B1]ix[B2]i}\{i:x[B_{1}]_{i}\neq x[B_{2}]_{i}\} is a subset of {i:xix[B]i}\{i:x_{i}\neq x[B]_{i}\}. We now apply Lemma 18 to get

Ux[B1]|ψUx[B2]|ψ224i:x[B1]ix[B2]iΠi|ψ224i:xix[B]iΠi|ψ228ϵT.\|U^{x[B_{1}]}\ket{\psi}-U^{x[B_{2}]}\ket{\psi}\|_{2}^{2}\leq 4\sum_{i:x[B_{1}]_{i}\neq x[B_{2}]_{i}}\|\Pi_{i}\ket{\psi}\|_{2}^{2}\leq 4\sum_{i:x_{i}\neq x[B]_{i}}\|\Pi_{i}\ket{\psi}\|_{2}^{2}\leq 8\epsilon T.

The desired result follows by taking square roots. ∎

We will need some properties of distributions on {0,1}N\{0,1\}^{N}. For such a distribution μ\mu, let RU(μ)maxx{0,1}Nlog2(2Nμ[x])\operatorname{RU}(\mu)\coloneqq\max_{x\in\{0,1\}^{N}}\log_{2}(2^{N}\mu[x]) be the max relative entropy of μ\mu relative to the uniform distribution. We will generally be interested in distributions μ\mu such that RU(μ)\operatorname{RU}(\mu) is small (say, polylogN\operatorname{polylog}N), which means that no input x{0,1}Nx\in\{0,1\}^{N} has probability μ[x]\mu[x] much larger than 2N2^{-N}.

For a partial assignment pp, let μ[p]\mu[p] be the probability mass of strings in {0,1}N\{0,1\}^{N} which are consistent with pp. Let |p||p| be the size of pp (the number of revealed bits in pp). We define the density of μ\mu to be density(μ)1maxplog2(2|p|μ[p])|p|\operatorname{density}(\mu)\coloneqq 1-\max_{p}\frac{\log_{2}(2^{|p|}\mu[p])}{|p|}, with the maximum taken over partial assignments pp. The density of the uniform distribution is 11.

For a partial assignment pp, we let μ|p\mu|_{p} denote the distribution μ\mu conditioned on the sampled input being consistent with pp.

Lemma 20 (Densification).

Let μ\mu be a distribution over {0,1}N\{0,1\}^{N}, and let δ(0,1)\delta\in(0,1). Then there exists a partial assignment pp such that

  1. 1.

    |p|RU(μ)/δ|p|\leq\operatorname{RU}(\mu)/\delta

  2. 2.

    RU(μ|p)RU(μ)/δ\operatorname{RU}(\mu|_{p})\leq\operatorname{RU}(\mu)/\delta

  3. 3.

    density(μ|p)>1δ\operatorname{density}(\mu|_{p})>1-\delta, where the density is measured on the bits not fixed by pp.

Proof.

Let pp be the largest partial assignment for which μ[p]2(1δ)|p|\mu[p]\geq 2^{-(1-\delta)|p|}. Then

2(1δ)|p|μ[p]=xpμ[x]2N|p|2(NRU(μ))=2RU(μ)|p|,2^{-(1-\delta)|p|}\leq\mu[p]=\sum_{x\supseteq p}\mu[x]\leq 2^{N-|p|}\cdot 2^{-(N-\operatorname{RU}(\mu))}=2^{\operatorname{RU}(\mu)-|p|},

so δ|p|RU(μ)\delta|p|\leq\operatorname{RU}(\mu), from which the first item follows. Next,

RU(μ|p)=maxxlog2(2Nμ|p[x])=maxxplog2(2Nμ[x]/μ[p])RU(μ)+log2(1/μ[p])\operatorname{RU}(\mu|_{p})=\max_{x}\log_{2}(2^{N}\mu|_{p}[x])=\max_{x\supseteq p}\log_{2}(2^{N}\mu[x]/\mu[p])\leq\operatorname{RU}(\mu)+\log_{2}(1/\mu[p])
RU(μ)+log2(2(1δ)|p|)=RU(μ)+(1δ)|p|RU(μ)+(1δ)RU(μ)/δ=RU(μ)/δ,\leq\operatorname{RU}(\mu)+\log_{2}(2^{(1-\delta)|p|})=\operatorname{RU}(\mu)+(1-\delta)|p|\leq\operatorname{RU}(\mu)+(1-\delta)\operatorname{RU}(\mu)/\delta=\operatorname{RU}(\mu)/\delta,

which gives the second item. Finally, to upper bound the density of μ|p\mu|_{p}, let qq be a partial assignment on a set of indices disjoint from that of pp. By the maximality of pp, we must have μ[pq]<2(1δ)(|p|+|q|)\mu[p\cup q]<2^{-(1-\delta)(|p|+|q|)}. Now,

log2(2|q|μ|p[q])=log2(2|q|μ[qp]/μ[p])<log2(2|q|2(1δ)(|p|+|q|)/2(1δ)|p|)=δ|q|.\log_{2}(2^{|q|}\mu|_{p}[q])=\log_{2}(2^{|q|}\mu[q\cup p]/\mu[p])<\log_{2}(2^{|q|}2^{-(1-\delta)(|p|+|q|)}/2^{-(1-\delta)|p|})=\delta|q|.

From this it follows that density(μ|p)>1δ\operatorname{density}(\mu|_{p})>1-\delta, as desired. ∎

4.3 QCMA lower bound

Theorem 21.

There is no bounded-round, polynomial-cost QCMA protocol for the family FNF_{N} defined in Section 4.1. More formally, consider any family of QCMA protocols for the query problems FNF_{N}. If the number of rounds for these QCMA protocols grows slower than o(loglogN/logloglogN)o(\log\log N/\log\log\log N), then either the number of queries or the witness size must grow like logω(1)N\log^{\omega(1)}N.

Proof.

Consider a QCMA verifier for the query task FNF_{N}. Let k=k(N)k=k(N) denote the witness size for this verifier; we can assume for contradiction that k(N)=O(polylog(N))=O(polyn)k(N)=O(\operatorname{polylog}(N))=O(\operatorname{poly}n). Since the witness is a classical string, there are only 2k2^{k} witnesses over which we quantify. Since each 11-input O[f,]O[f,\emptyset] has some witness accepting it, we conclude that at least one witness ww of size kk is a valid witness for at least a 2k2^{-k} fraction of the 11-inputs, and hence also for at least a 2k(12Ω(n))2^{-k}(1-2^{-\Omega(n)}) fraction of all oracles O[f,]O[f,\emptyset] (including those not in the domain of FNF_{N}). This is because the fraction of ffs for which the quantum algorithm does not succeed with probability at least 2/32/3 is at most 2Ω(n)2^{-\Omega(n)}. We can assume 2k(12Ω(n))22k2^{-k}(1-2^{-\Omega(n)})\geq 2^{-2k}.

Let SS be the set of ff such that O[f,]O[f,\emptyset] is accepted by the algorithm given witness ww. Let μ\mu be the uniform distribution over SS, and observe that RU(μ)2k\operatorname{RU}(\mu)\leq 2k. Let QQ be the quantum algorithm which hard-codes the witness ww into the verifier; then QQ accepts all oracles O[f,]O[f,\emptyset] for fsupp(μ)f\in\operatorname{supp}(\mu) and rejects all oracles O[f,E]O[f,E] if |E|(2/3)2n|E|\geq(2/3)2^{n}.

We now proceed by iteratively removing rounds of QQ. We define a sequence of quantum algorithms Q=Q0,Q1,,Qr1,QrQ=Q_{0},Q_{1},\dots,Q_{r-1},Q_{r}, where QQ_{\ell} has rr-\ell rounds of TT queries each; at the beginning, Q0=QQ_{0}=Q has rr rounds, and at the end, QrQ_{r} makes no queries. We also define a corresponding sequence of distributions μ=μ0,μ1,,μr1,μr\mu=\mu_{0},\mu_{1},\dots,\mu_{r-1},\mu_{r}, each of which will be uniform over a set of functions ff; this set will grow smaller with each round.

To define (Q+1,μ+1)(Q_{\ell+1},\mu_{\ell+1}) given (Q,μ)(Q_{\ell},\mu_{\ell}), we proceed in several steps.

  1. 1.

    First, use Lemma 20 with δ=1/n\delta=1/n to find a partial assignment qq with |q|nRU(μ)|q|\leq n\operatorname{RU}(\mu_{\ell}), RU(μ|q)nRU(μ)\operatorname{RU}(\mu_{\ell}|_{q})\leq n\operatorname{RU}(\mu_{\ell}), and with μ|q\mu_{\ell}|_{q} being (1δ)(1-\delta)-dense on the bits not used by qq.

  2. 2.

    Second, use Lemma 19 with ϵ=1/3200r2T\epsilon=1/3200r^{2}T on the distributions of oracles O[f,]O[f,\emptyset] when ff is sampled from μ|q\mu_{\ell}|_{q}. The state |ψ\ket{\psi} in the lemma will be the state of the algorithm QQ just before the first batch of TT queries. The lemma gives a set Ssupp(μ|q)S\subseteq\operatorname{supp}(\mu_{\ell}|_{q}) with μ|q[S]1/2\mu_{\ell}|_{q}[S]\geq 1/2. It has the property that for all fSf\in S and all sets B1,B2B_{1},B_{2} containing pairs (x,u)(x,u) with Prfμ|q[O[f,](x,u)=1]ϵ\Pr_{f\sim\mu_{\ell}|_{q}}[O[f,\emptyset](x,u)=1]\leq\epsilon, we have UO[f,B1]|ψUO[f,B2]|ψ21/20r\|U^{O[f,B_{1}]}\ket{\psi}-U^{O[f,B_{2}]}\ket{\psi}\|_{2}\leq 1/20r. Condition μ|q\mu_{\ell}|_{q} on the set SS to get a distribution μ\mu^{\prime}_{\ell}.

    Note that O[f,B1]O[f,B_{1}] is an abuse of notation, since normally we erase inputs xx to ff from the oracle, yet B1B_{1} is a set of pairs (x,u)(x,u). We will use this abuse of notation throughout; if we write O[f,B]O[f,B] where BB is a set of pairs, we mean to erase those pairs from the oracle, while if BB is a subset of Dom(f)\operatorname{Dom}(f), we mean to erase the pairs (x,u)(x,u) for xBx\in B and all uu from the oracle.

  3. 3.

    Third, use the slippery property from Corollary 15 on qq to conclude that the number of bits used by partial assignments pp for which (p,x,u)R~C(p,x,u)\in\tilde{R}_{C} and Prfμ[pf|qf]ϵ/4\Pr_{f\sim\mu^{\prime}_{\ell}}[p\subseteq f|q\subseteq f]\geq\epsilon/4 is small. Recall that (p,x,u)R~C(p,x,u)\in\tilde{R}_{C} means that the condition O[f,](x,u)=1O[f,\emptyset](x,u)=1 is equivalent to pfp\subseteq f for all ff; such certifying pp have |p|=n|p|=n. Corollary 15 can be applied because ϵ/4\epsilon/4 is larger than 1/nc1/n^{c} for c=lognc=\log n, since we are choosing r=o(logn/loglogn)r=o(\log n/\log\log n) and TO(2log2n/logn)T\leq O(2^{\log^{2}n}/\log n). Now, since μ|q\mu_{\ell}|_{q} is (1δ)(1-\delta)-dense outside of qq, the probability of a partial assignment pp against μ|q\mu_{\ell}|_{q} is at most 2δ|p|2^{\delta|p|} times the probability against the uniform distribution conditioned on qq. Here |p|=n|p|=n and δ=1/n\delta=1/n, so the probability against μ|q\mu_{\ell}|_{q} is at most twice that against the uniform distribution conditioned on qq. Moving from μ|q\mu_{\ell}|_{q} to μ\mu_{\ell}^{\prime} conditions on a set SS of probability at least 1/21/2, so it can increase the probability of pp by at most a factor of 22. Hence the probability of pp against μ\mu^{\prime}_{\ell} is overall at most 4 times its probability against the uniform distribution. By Corollary 15, we conclude the total number of bits used by partial assignments pp for which Prfμ[O[f,](x,u)=1]ϵ\Pr_{f\sim\mu_{\ell}^{\prime}}[O[f,\emptyset](x,u)=1]\geq\epsilon is small. Let ZZ be the set of all such bits.

    Our next modification to μ\mu_{\ell}^{\prime} will be to fix the bits in ZZ to the highest-probability partial assignment (measured against μ\mu_{\ell}^{\prime}), and let μ′′\mu_{\ell}^{\prime\prime} be μ\mu_{\ell}^{\prime} conditioned on that partial assignment being consistent with the sampled function ff.

  4. 4.

    Finally, set μ+1=μ′′\mu_{\ell+1}=\mu_{\ell}^{\prime\prime}. Also set Q+1Q_{\ell+1} to be the quantum algorithm which is the same as QQ_{\ell}, except that the first batch of queries is made to a fake oracle instead of a real one. The fake oracle is defined as follows: on queries (x,u)(x,u) for which O[f,](x,u)O[f,\emptyset](x,u) is fixed for all fsupp(μ+1)f\in\operatorname{supp}(\mu_{\ell+1}), return this value O[f,](x,u)O[f,\emptyset](x,u); on queries (x,u)(x,u) for which this value is not fixed for fsupp(μ+1)f\in\operatorname{supp}(\mu_{\ell+1}), return 0. Note that the fake oracle does not depend on the true input oracle O[f,E]O[f,E], so queries to it can be implemented by Q+1Q_{\ell+1} with making queries to the real oracle. This replaces the first round of QQ_{\ell}, so Q+1Q_{\ell+1} has one less round.

Our approach will work as follows: we start with a function fsupp(μr)f\in\operatorname{supp}(\mu_{r}), and find a large set EE of inputs xx for which (x,u)(x,u) were not fixed by supp(μr)\operatorname{supp}(\mu_{r}). We will then argue that the quantum algorithms in the sequence cannot distinguish the oracles O[f,]O[f,\emptyset] and O[f,E]O[f,E]. This is clear for the last algorithm QrQ_{r}, since it makes no queries. We work backwards to show that each algorithm Qr1Q_{r-1}, Qr2Q_{r-2}, up to Q0Q_{0} also cannot substantially distinguish between these two oracles. This gives a contradiction, since we know QQ accepts the oracle O[f,]O[f,\emptyset], yet O[f,E]O[f,E] is a 0-input.

In order to find ff and EE, we first show that RU(μr)\operatorname{RU}(\mu_{r}) is not too large. Recall that RU(μ0)2k\operatorname{RU}(\mu_{0})\leq 2k. We will show that RU()\operatorname{RU}(\cdot) did not increase too much in each of the rr iterations that got us from μ0\mu_{0} to μr\mu_{r}. In one iteration, we defined μ+1\mu_{\ell+1} from μ\mu_{\ell} in 33 steps. The first step moved from μ\mu_{\ell} to μ|q\mu_{\ell}|_{q} with RU(μ|q)nRU(μ)\operatorname{RU}(\mu_{\ell}|_{q})\leq n\operatorname{RU}(\mu_{\ell}). The second step conditioned the latter distribution on a set SS of probability mass at least 1/21/2, which can only increase RU()\operatorname{RU}(\cdot) by 11, so RU(μ)nRU(μ)+1\operatorname{RU}(\mu_{\ell}^{\prime})\leq n\operatorname{RU}(\mu_{\ell})+1.

The third step found the set of all bits fixed in partial assignments pp which certify some (x,u)(x,u) as evaluating to 11, and picked the highest-probability partial assignment on those bits. The maximum increase in RU()\operatorname{RU}(\cdot) is the number of bits that were fixed in this way. This number comes from Theorem 16, and depends on the number of bits fixed in qq; when |q|=2(logn)d|q|=2^{(\log n)^{d}}, the number we are looking for is 2(c+2)(logn)d+12^{(c+2)(\log n)^{d+1}}, so we can express this as 2(c+2)(logn)(log|q|)2^{(c+2)(\log n)(\log|q|)}. We had |q|nRU(μ)|q|\leq n\operatorname{RU}(\mu_{\ell}) and c=lognc=\log n. It is not hard to see that this additive increase dominates nRU(μ)+1n\operatorname{RU}(\mu_{\ell})+1; assuming everything is large enough (e.g. logn\log n is sufficiently large, and RU(μ)\operatorname{RU}(\mu_{\ell}) is at least n2n^{2}, which is without loss of generality by restricting the original μ0\mu_{0} to a smaller set if necessary), we can get the final upper bound RU(μ+1)2(3+logn)2logRU(μ)\operatorname{RU}(\mu_{\ell+1})\leq 2^{(3+\log n)^{2}\log\operatorname{RU}(\mu_{\ell})}.

In other words, logRU(μ)\log\operatorname{RU}(\mu_{\ell}) increases by a factor of at most (3+logn)2(3+\log n)^{2} in each iteration, starting at logmax{2k,n2}(3+logn)logk\log\max\{2k,n^{2}\}\leq(3+\log n)\log k (assuming k2k\geq 2). We therefore have logRU(μr)(3+logn)2r+1logk\log\operatorname{RU}(\mu_{r})\leq(3+\log n)^{2r+1}\log k.

We next essentially apply another iteration (without the second step) to μr\mu_{r}. Using Lemma 20, we find a partial assignment qq^{\prime} such that μr|q\mu_{r}|_{q^{\prime}} is (1δ)(1-\delta)-dense outside of qq^{\prime}, with δ=1/n\delta=1/n. We then apply Theorem 16 to conclude there are few pairs (x,u)(x,u) with Prf[O[f,](x,u)=1]1/2\Pr_{f}[O[f,\emptyset](x,u)=1]\geq 1/2, and hence few pairs (x,u)(x,u) with Prf[O[f,](x,u)=1]=1\Pr_{f}[O[f,\emptyset](x,u)=1]=1 when ff is sampled from μr|q\mu_{r}|_{q^{\prime}}; the number of such pairs is at most 2(3+logn)2r+3logk2^{(3+\log n)^{2r+3}\log k}. Using k=O(poly(n))k=O(\operatorname{poly}(n)) and r=o(logn/loglogn)r=o(\log n/\log\log n), this means that there are at most 2o(n)2^{o(n)} pairs (x,u)(x,u) that are fixed to 11 for all the oracles O[f,]O[f,\emptyset] for fsupp(μr|q)f\in\operatorname{supp}(\mu_{r}|_{q^{\prime}}). Therefore, there are 2no(n)2^{n-o(n)} many inputs xx such that for all uu, the pair (x,u)(x,u) is not fixed to 11 by supp(μr|q)\operatorname{supp}(\mu_{r}|_{q^{\prime}}). Let EE be the set of such xx; then |E|(2/3)2n|E|\geq(2/3)2^{n}. Let f^supp(μr|q)\hat{f}\in\operatorname{supp}(\mu_{r}|_{q^{\prime}}) be arbitrary.

We now know that QQ accepts O[f^,]O[\hat{f},\emptyset] and that O[f^,E]O[\hat{f},E] is a 0-input. We also know that QrQ_{r} cannot distinguish O[f^,]O[\hat{f},\emptyset] and O[f^,E]O[\hat{f},E], since it makes no queries. Now, let B={(x,u):xE,O[f^,](x,u)=1}B=\{(x,u):x\in E,O[\hat{f},\emptyset](x,u)=1\}. Moreover, let BB_{\ell} be the set of pairs (x,u)(x,u) which had Prfμ1|q[O[f,](x,u)=1]ϵ\Pr_{f\sim\mu_{\ell-1}|_{q}}[O[f,\emptyset](x,u)=1]\leq\epsilon in iteration \ell (where qq is the partial assignment from step 1 of iteration \ell). Note that the pairs not in BB_{\ell} are all fixed in all the oracles in the support of μ\mu_{\ell}, because we choose values for the bits used by their proving partial assignments pp. This means that BBB\subseteq B_{\ell} for all \ell. Also, let OO_{\ell} be the oracle used by QQ_{\ell} to simulate the first query batch of Q1Q_{\ell-1}. Recall that O(x,u)O_{\ell}(x,u) returns 0 unless (x,u)(x,u) is fixed to 11 in all O[f,]O[f,\emptyset] for fsupp(μ)f\in\operatorname{supp}(\mu_{\ell}). Since the support of μ\mu_{\ell} decreases as a subset in each iteration, the bits fixed in μ\mu_{\ell} are also fixed in μr\mu_{r}, and hence also agree with f^\hat{f}. This means that OO_{\ell} can be written as an erased oracle O[f^,A]O[\hat{f},A_{\ell}] for some set AA_{\ell} of pairs (x,u)(x,u) that were not fixed in μ\mu_{\ell}; in other words, ABA_{\ell}\subseteq B_{\ell}.

We now note the oracle O[f^,E]O[\hat{f},E] is the same as O[f^,B]O[\hat{f},B]. Additionally, since B,ABB,A_{\ell}\subseteq B_{\ell}, we have by Lemma 19,

UO[f^,B]|ψUO[f^,A]|ψ21/20r\|U^{O[\hat{f},B]}\ket{\psi}-U^{O[\hat{f},A_{\ell}]}\ket{\psi}\|_{2}\leq 1/20r

where |ψ\ket{\psi} is the state right before the first query of the algorithm Q1Q_{\ell-1}. This can also be written

UO[f^,E]|ψUO|ψ21/20r.\|U^{O[\hat{f},E]}\ket{\psi}-U^{O_{\ell}}\ket{\psi}\|_{2}\leq 1/20r.

Now, applying additional unitary matrices does not change the 22-norm, and QQ_{\ell} replaces only the first query of Q1Q_{\ell-1} with OO_{\ell} and applies the same unitaries as Q1Q_{\ell-1} in all other rounds. If we use Q(O)Q_{\ell}(O) to denote the final state of QQ_{\ell} on the oracle OO, we therefore get

Q(O[f^,E])Q1(O[f^,E])21/20r.\|Q_{\ell}(O[\hat{f},E])-Q_{\ell-1}(O[\hat{f},E])\|_{2}\leq 1/20r.

By triangle inequality, we then get

Q(O[f^,E])Qr(O[f^,E])21/20.\|Q(O[\hat{f},E])-Q_{r}(O[\hat{f},E])\|_{2}\leq 1/20.

Since B\emptyset\subseteq B_{\ell} for all \ell, the same argument also works to show that

Q(O[f^,])Qr(O[f^,])21/20,\|Q(O[\hat{f},\emptyset])-Q_{r}(O[\hat{f},\emptyset])\|_{2}\leq 1/20,

and of course we also have Qr(O[f^,])=Qr(O[f^,E])Q_{r}(O[\hat{f},\emptyset])=Q_{r}(O[\hat{f},E]) since QrQ_{r} makes no queries. A final application of the triangle inequality gives us

Q(O[f^,E])Q(O[f^,])21/10.\|Q(O[\hat{f},E])-Q(O[\hat{f},\emptyset])\|_{2}\leq 1/10.

Since measuring the output qubit of Q(O[f^,])Q(O[\hat{f},\emptyset]) gives 11 with probability at least 2/32/3, it is not hard to show that this implies measuring the output qubit of Q(O[f^,E])Q(O[\hat{f},E]) gives 11 with probability above 1/21/2. This gives the desired contradiction, since the latter is a 0-input. ∎

References

  • [ABK23] Scott Aaronson, Harry Buhrman and William Kretschmer “A Qubit, a Coin, and an Advice String Walk Into a Relational Problem”, 2023 DOI: 10.48550/arXiv.2302.10332
  • [AK07] Scott Aaronson and Greg Kuperberg “Quantum versus Classical Proofs and Advice” In Twenty-Second Annual IEEE Conference on Computational Complexity (CCC’07), 2007, pp. 115–128 DOI: 10.1109/CCC.2007.27
  • [AN02] Dorit Aharonov and Tomer Naveh “Quantum NP - A Survey”, 2002 DOI: 10.48550/arXiv.quant-ph/0210077
  • [BBBV97] Charles H. Bennett, Ethan Bernstein, Gilles Brassard and Umesh Vazirani “Strengths and Weaknesses of Quantum Computing” In SIAM Journal on Computing 26, 1997, pp. 1510–1523 DOI: 10.1137/S0097539796300933
  • [BFM23] Roozbeh Bassirian, Bill Fefferman and Kunal Marwaha “On the Power of Nonstandard Quantum Oracles” In 18th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2023) 266, Leibniz International Proceedings in Informatics (LIPIcs) Dagstuhl, Germany: Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023, pp. 11:1–11:25 DOI: 10.4230/LIPIcs.TQC.2023.11
  • [CDGS18] Sandro Coretti, Yevgeniy Dodis, Siyao Guo and John Steinberger “Random Oracles and Non-uniformity” In Advances in Cryptology – EUROCRYPT 2018 Cham: Springer International Publishing, 2018, pp. 227–258
  • [FK18] Bill Fefferman and Shelby Kimmel “Quantum vs. Classical Proofs and Subset Verification” In 43rd International Symposium on Mathematical Foundations of Computer Science (MFCS 2018) 117, Leibniz International Proceedings in Informatics (LIPIcs) Dagstuhl, Germany: Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2018, pp. 22:1–22:23 DOI: 10.4230/LIPIcs.MFCS.2018.22
  • [GPW17] Mika Göös, Toniann Pitassi and Thomas Watson “Query-to-communication lifting for BPP” In Proceedings of the 58th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2017 DOI: 10.1109/FOCS.2017.21
  • [Liu23] Qipeng Liu “Non-uniformity and Quantum Advice in the Quantum Random Oracle Model” In Advances in Cryptology – EUROCRYPT 2023 Cham: Springer Nature Switzerland, 2023, pp. 117–143
  • [LLPY23] Xingjian Li, Qipeng Liu, Angelos Pelecanos and Takashi Yamakawa “Classical vs Quantum Advice and Proofs under Classically-Accessible Oracle”, 2023 DOI: 10.48550/arXiv.2303.04298
  • [NN23] Anand Natarajan and Chinmay Nirkhe “A Distribution Testing Oracle Separating QMA and QCMA” In 38th Computational Complexity Conference (CCC 2023) 264, Leibniz International Proceedings in Informatics (LIPIcs) Dagstuhl, Germany: Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023, pp. 22:1–22:27 DOI: 10.4230/LIPIcs.CCC.2023.22
  • [RT19] Ran Raz and Avishay Tal “Oracle Separation of BQP and PH” In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC 2019 Phoenix, AZ, USA: Association for Computing Machinery, 2019, pp. 13–23 DOI: 10.1145/3313276.3316315
  • [Rud07] Atri Rudra “List Decoding and Property Testing of Error Correcting Codes”, 2007 URL: https://cse.buffalo.edu/faculty/atri/papers/coding/thesis.html
  • [YZ22] Takashi Yamakawa and Mark Zhandry “Verifiable Quantum Advantage without Structure” In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), 2022, pp. 69–74 DOI: 10.1109/FOCS54457.2022.00014

Appendix A Diagonalization argument

A.1 QMA and QCMA for Turing machines

In this section, we formally define 𝖰𝖬𝖠,𝖰𝖢𝖬𝖠\mathsf{QMA},\mathsf{QCMA}, the oracle classes and bounded-round oracle classes corresponding to these.

Definition 22 (Oracle-querying quantum verifier circuit).

An oracle-querying quantum verifier circuit (OQQV is the following type of quantum circuit. It takes in three types of input sets of qubits: one set of qubits representing the input string xx; a second set of qubits representing a witness state; and a third set of ancilla qubits. It has gates from a universal gate set, but it can additionally use a special oracle gate. The oracle gate can take in any number kk of qubits, and gives kk qubits as output.

For any oracle 𝒪:{0,1}{0,1}\mathcal{O}\colon\{0,1\}^{*}\to\{0,1\}, the behavior of the oracle gates in a quantum verifier circuit that is instantiated with oracle 𝒪\mathcal{O} is as follows: each kk-qubit basis state is mapped |y(1)𝒪(y)|y\ket{y}\to(-1)^{\mathcal{O}(y)}\ket{y} by the kk-qubit oracle gate.

If CC is an OQQV, xx is an input, |ϕ\ket{\phi} is a witness, and 𝒪\mathcal{O} is an oracle, then let C𝒪(x,ϕ)C^{\mathcal{O}}(x,\phi) denote the Bernoulli random variable which is the measurement outcome of the first output qubit of the circuit CC when run on input xx, witness ϕ\phi, and zeroes for the ancilla qubits, assuming the oracle gates of CC apply the oracle 𝒪\mathcal{O}.

Definition 23 (Soundness and Completeness).

Let 𝒪:{0,1}{0,1}\mathcal{O}\colon\{0,1\}^{*}\to\{0,1\} be an oracle, let nn\in\operatorname{\mathbb{N}}, let CC be an OQQV with nn input qubits, and let ff be a partial function from {0,1}n\{0,1\}^{n} to {0,1}\{0,1\}.

  1. 1.

    We say that CC is 𝖰𝖬𝖠\mathsf{QMA}-sense sound for ff relative to 𝒪\mathcal{O} if for every input xf1(0)x\in f^{-1}(0) and every state |ϕ\ket{\phi} (on a number of qubits equal to the witness size of CC), we have Pr[C𝒪(x,ϕ)=1]1/3\Pr[C^{\mathcal{O}}(x,\phi)=1]\leq 1/3. The constant 1/31/3 is called the 𝖰𝖬𝖠\mathsf{QMA}-sense soundness of CC.

  2. 2.

    We say that CC is 𝖰𝖢𝖬𝖠\mathsf{QCMA}-sense sound for ff relative to 𝒪\mathcal{O} if the same condition holds, but only for all classical strings |ϕ\ket{\phi} instead of all pure states. Note that 𝖰𝖬𝖠\mathsf{QMA}-soundness implies 𝖰𝖢𝖬𝖠\mathsf{QCMA}-soundness.

  3. 3.

    We say that CC is 𝖰𝖬𝖠\mathsf{QMA}-sense complete for ff relative to 𝒪\mathcal{O} if for every input f1(1)f^{-1}(1), there exists a state |ϕ\ket{\phi} (on the right number of qubits) such that Pr[C𝒪(x,ϕ)=1]2/3\Pr[C^{\mathcal{O}}(x,\phi)=1]\geq 2/3. The constant 12/31-2/3 is called the 𝖰𝖬𝖠\mathsf{QMA}-sense completeness of CC.

  4. 4.

    We say that CC is 𝖰𝖢𝖬𝖠\mathsf{QCMA}-sense complete for ff relative to 𝒪\mathcal{O} if the same condition holds with a classical witness: for every xf1(1)x\in f^{-1}(1), there exists a classical string |ϕ\ket{\phi} that the circuit accepts. Note that 𝖰𝖢𝖬𝖠\mathsf{QCMA}-sense completeness implies 𝖰𝖬𝖠\mathsf{QMA}-sense completeness.

Definition 24 (Oracle QMA and QCMA).

A 𝖰𝖬𝖠\mathsf{QMA} protocol for a language L{0,1}L\subseteq\{0,1\}^{*} relative to an oracle 𝒪\mathcal{O} is a polynomial-time Turing machine MM which, on input 0n0^{n}, outputs an OQQV CC which is 𝖰𝖬𝖠\mathsf{QMA}-sense sound and complete for the indicator function of L{0,1}nL\cap\{0,1\}^{n}. A 𝖰𝖢𝖬𝖠\mathsf{QCMA} protocol for LL relative to 𝒪\mathcal{O} is the same but with 𝖰𝖢𝖬𝖠\mathsf{QCMA}-sense soundness and completeness.

The class 𝖰𝖬𝖠𝒪𝒫({0,1})\mathsf{QMA}^{\mathcal{O}}\subseteq\mathcal{P}(\{0,1\}^{*}) is the set of all languages LL for which there is a 𝖰𝖬𝖠\mathsf{QMA} protocol relative to 𝒪\mathcal{O}. Similarly, the class 𝖰𝖢𝖬𝖠𝒪\mathsf{QCMA}^{\mathcal{O}} is the set of all languages for which there is a 𝖰𝖢𝖬𝖠\mathsf{QCMA} protocol relative to 𝒪\mathcal{O}.

Observe that 𝖰𝖢𝖬𝖠𝒪𝖰𝖬𝖠𝒪\mathsf{QCMA}^{\mathcal{O}}\subseteq\mathsf{QMA}^{\mathcal{O}}. This is because if we had a 𝖰𝖢𝖬𝖠\mathsf{QCMA} protocol for LL relative to 𝒪\mathcal{O}, we could modify each OQQV it outputs to make the circuit “measure” the witness before proceeding (by making an untouched copy of each qubit of the witness). After this modification, the 𝖰𝖢𝖬𝖠\mathsf{QCMA}-sense soundness will imply 𝖰𝖬𝖠\mathsf{QMA}-sense soundness, so the resulting OQQV will be 𝖰𝖬𝖠\mathsf{QMA}-sense sound and complete. A Turing machine can implement this modification, and such a TM will be a 𝖰𝖬𝖠\mathsf{QMA} protocol for LL relative to 𝒪\mathcal{O}.

Definition 25 (Bounded round QMA and QCMA).

We define a bounded-round OQQV circuit in the natural way (a quantum circuit that has polynomially many oracle gates in parallel in each ”round”, and a bounded number of such rounds).

For a function r:r\colon\operatorname{\mathbb{N}}\to\operatorname{\mathbb{N}}, we define 𝖰𝖬𝖠O,r\mathsf{QMA}^{O,r} to be the rr-bounded-round version of 𝖰𝖬𝖠\mathsf{QMA} relative to the oracle OO; this measure allows 𝖰𝖬𝖠\mathsf{QMA} protocols which, on input 0n0^{n}, generate an OQQV circuit which uses at most r(n)r(n) rounds of queries to the oracle and is otherwise a valid 𝖰𝖬𝖠\mathsf{QMA} oracle. We define 𝖰𝖢𝖬𝖠O,r\mathsf{QCMA}^{O,r} similarly.

A.2 From query separation to oracle separation

Theorem 26.
Proof.

Let F={fn}nIF=\{f_{n}\}_{n\in I} be a funcion family which is efficiently computable in 𝖰𝖬𝖠1\mathsf{QMA}^{1} but for which the growth rate of 𝖰𝖢𝖬𝖠r(fn)\mathsf{QCMA}^{r}(f_{n}) as nn\to\infty is not in O(polylog(n))O(\operatorname{polylog}(n)), for r=o(loglogn/logloglogn)r=o(\log\log n/\log\log\log n). Let R(n)R(n) be some o(logn/loglogn)o(\log n/\log\log n) function. We need to construct an oracle 𝒪:{0,1}{0,1}\mathcal{O}\colon\{0,1\}^{*}\to\{0,1\} and a language L{0,1}L\subseteq\{0,1\}^{*} such that L𝖰𝖬𝖠𝒪,RL\in\mathsf{QMA}^{\mathcal{O},R} but L𝖰𝖢𝖬𝖠𝒪,RL\notin\mathsf{QCMA}^{\mathcal{O},R}.

We interpret the oracle 𝒪\mathcal{O} as taking as input either a pair of positive integers (n,i)(n,i), or else a single integer nn (the encoding will specify the formatting unambiguously). On inputs nn, the oracle 𝒪(n)\mathcal{O}(n) behaves like an indicator for the set II, returning 11 if nIn\in I and 0 if nIn\notin I. On input (n,i)(n,i), if nIn\in I, the oracle will return xinx^{n}_{i}, where xnx^{n} is a specific string in Dom(fn)\operatorname{Dom}(f_{n}) that we will choose later. If nIn\notin I, the oracle returns arbitrarily (its behavior won’t matter). The oracle’s behavior on inputs that are incorrectly formatted is also arbitrary. This completes the specification of the oracle 𝒪\mathcal{O}, except for the choice of strings xnx^{n} for nIn\in I (one string from the domain of each fnf_{n} function).

The language LL will contain the encodings n\langle n\rangle of all nIn\in I for which fn(xn)=1f_{n}(x^{n})=1. We’ve now specified both the language LL and the oracle 𝒪\mathcal{O} except for the choice of strings xnx^{n}.

We note that regardless of the choice of strings xnx^{n}, we will have L𝖰𝖬𝖠𝒪,RL\in\mathsf{QMA}^{\mathcal{O},R}. To see this, observe that using Definition 9 we can get a polynomial-time Turing machine MM which takes in n\langle n\rangle and returns a polylog(n)\operatorname{polylog}(n)-sized RR-round OQQV CnC_{n} which, assuming it runs on an oracle 𝒪\mathcal{O} that encodes the string xx, will accept some witness if f(x)=1f(x)=1 and reject all witnesses if f(x)=0f(x)=0. This Turing machine maps n\langle n\rangle to an OQQV circuit, but we can convert it to a classical circuit which maps n\langle n\rangle to an OQQV circuit for all n\langle n\rangle of a fixed size – that is, for all nn in an interval [2k,2k+1)[2^{k},2^{k+1}). We could then collapse this circuit-outputting-a-circuit into a single OQQV circuit, which takes in n\langle n\rangle and a witness (and ancillas) and, after making queries to 𝒪\mathcal{O}in RR rounds, decides whether to accept or reject the witness. Moreover, these OQQV circuits can be generated uniformly by a Turing machine that takes a size 0k0^{k} as input and generates in polynomial time the circuit which handles all n[2k,2k+1)n\in[2^{k},2^{k+1}). We can also easily modify these OQQV circuits to have them query 𝒪(n)\mathcal{O}(n) to ensure that nIn\in I before proceeding (rejecting otherwise). The resulting Turing machine is an RR-round 𝖰𝖬𝖠\mathsf{QMA} protocol for LL relative to 𝒪\mathcal{O}, so L𝖰𝖬𝖠𝒪,RL\in\mathsf{QMA}^{\mathcal{O},R}.

It remains to select the inputs xnx^{n}, one per function fnf_{n}, in a way that ensures L𝖰𝖢𝖬𝖠𝒪,RL\notin\mathsf{QCMA}^{\mathcal{O},R}. We do so by diagonalization. Enumerate all pairs (M,α)(M,\alpha) where MM is a candidate 𝖰𝖢𝖬𝖠R\mathsf{QCMA}^{R} protocol (i.e. a Turing machine that outputs RR-round OQQV circuits) and α\alpha is a growth rate in O(poly(n))O(\operatorname{poly}(n)) (we can assume the function α(n)\alpha(n) is always nc+cn^{c}+c for some positive integer cc, to ensure that α(n)\alpha(n) can be efficiently computable and that there are countably many such growth rates).

We fix choices xnx^{n} using an iterative procedure. At each step of the iteration, there will be some cutoff NN\in\operatorname{\mathbb{N}} such that xnx^{n} has been fixed for all n<Nn<N, but xnx^{n} has not yet been fixed for all nNn\geq N. Each step tt of the procedure will eliminate the possibility that for the tt-th pair (M,α)(M,\alpha) in our enumeration, MM is a 𝖰𝖢𝖬𝖠R\mathsf{QCMA}^{R} protocol for LL relative to 𝒪\mathcal{O} which runs in α(k)\alpha(k) steps on inputs of size kk and produces an OQQV CkC_{k} which takes in a witness of size at most α(k)\alpha(k) and makes at most α(k)\alpha(k) queries to the oracle.

To handle the pair (M,α)(M,\alpha), we find the first fnf_{n} such that nNn\geq N and 𝖰𝖢𝖬𝖠r(fn)>2α(|n|)\mathsf{QCMA}^{r}(f_{n})>2\alpha(|\langle n\rangle|). Note that |n|=O(logn)|\langle n\rangle|=O(\log n), so 2α(|n|)2\alpha(|\langle n\rangle|) is a growth rate in O(polylog(n))O(\operatorname{polylog}(n)); therefore, there must be infinitely many fnf_{n} for which 𝖰𝖢𝖬𝖠r(fn)\mathsf{QCMA}^{r}(f_{n}) satisfies this condition.

Run M(0k)M(0^{k}) for α(k)\alpha(k) steps, where k=|n|k=|\langle n\rangle|; if it does not terminate, we consider the pair (M,α)(M,\alpha) handled, and move to the next pair. We can thus assume it terminates, so let CkC_{k} be the OQQV it outputs. If CkC_{k} takes in witnesses of size more than α(k)\alpha(k) or if it makes more than α(k)\alpha(k) queries or r(k)r(k) many rounds of queries to the oracle, we again consider the pair (M,α)(M,\alpha) handled. We can thus assume CkC_{k} uses witnesses of size at most α(k)\alpha(k) and makes at most α(k)\alpha(k) queries to the oracle in r(k)r(k) rounds.

The circuit CkC_{k}, when given input n\langle n\rangle, defines a query 𝖰𝖢𝖬𝖠r\mathsf{QCMA}^{r} protocol of cost at most 2α(k)2\alpha(k): it takes in a witness of size at most α(k)\alpha(k) and makes at most α(k)\alpha(k) queries in rr rounds to the oracle. We note that the behavior of this query algorithm might depend on the values of 𝒪\mathcal{O} that are outside of the input to fnf_{n}; that is, on the values of 𝒪\mathcal{O} on oracle queries 𝒪(m,i)\mathcal{O}(m,i) for mnm\neq n. To ensure that the query algorithm is well-defined, we fix all values of 𝒪\mathcal{O} that CkC_{k} might query, except for the values at 𝒪(n,i)\mathcal{O}(n,i) (which will still encode an input xDom(fn)x\in\operatorname{Dom}(f_{n})). Note that CkC_{k} has finite size and can therefore only call 𝒪\mathcal{O} with finitely many input wires; we can thus fix only finitely many positions of 𝒪\mathcal{O} when ensuring CkC_{k} gives rise to a well-defined query QCMA algorithm for fnf_{n}.

Since we’ve chosen nn so that 𝖰𝖢𝖬𝖠r(fn)>2α(k)\mathsf{QCMA}^{r}(f_{n})>2\alpha(k), and since the cost of this rr-round QCMA protocol is only 2α(k)2\alpha(k), it follows that this rr-round QCMA query protocol is either not sound or not complete: there is an input xDom(fn)x\in\operatorname{Dom}(f_{n}) on which this query protocol misbehaves. We will pick this input as our choice for xnx^{n}. This will ensure that CkC_{k} either does not satisfy soundness for L{0,1}kL\cap\{0,1\}^{k} or does not satisfy completeness, so MM is not a valid 𝖰𝖢𝖬𝖠r\mathsf{QCMA}^{r} protocol for LL relative to 𝒪\mathcal{O}. We can then set NN to be the new minimum number such that the oracle 𝒪\mathcal{O} is unfixed for all nNn\geq N, and then move on to the next pair (M,α)(M,\alpha).

This procedure iteratively defines the sequence xnx^{n}. Each element in the sequence is eventually defined, and they never change once defined. Therefore, we get a well-defined infinite sequence {xn}nI\{x^{n}\}_{n\in I}, and we conclude that the corresponding oracle 𝒪\mathcal{O} and language LL must satisfy L𝖰𝖢𝖬𝖠𝒪,RL\notin\mathsf{QCMA}^{\mathcal{O},R}. ∎