The University of Tokyo, Japan [email protected] University, [email protected] \CopyrightAtsuya Hasegawa and François Le Gall \ccsdesc[100]Theory of computation \fundingJSPS KAKENHI grants Nos. JP16H01705, JP19H04066, JP20H00579, JP20H04139 and by the MEXT Quantum Leap Flagship Program (MEXT Q-LEAP) grant No. JPMXS0120319794.
Acknowledgements.
AH is grateful to Hidefumi Hiraishi and Hiroshi Imai for helpful discussions and continuous supports. FLG would also like to thank Robert König for useful discussions.\hideLIPIcs\EventEditorsHee-Kap Ahn and Kunihiko Sadakane \EventNoEds2 \EventLongTitle32nd International Symposium on Algorithms and Computation (ISAAC 2021) \EventShortTitleISAAC 2021 \EventAcronymISAAC \EventYear2021 \EventDateDecember 6–8, 2021 \EventLocationFukuoka, Japan \EventLogo \SeriesVolume212 \ArticleNo31Quantum Advantage with Shallow Circuits Under Arbitrary Corruption
Abstract
Recent works by Bravyi, Gosset and König (Science 2018), Bene Watts et al. (STOC 2019), Coudron, Stark and Vidick (QIP 2019) and Le Gall (CCC 2019) have shown unconditional separations between the computational powers of shallow (i.e., small-depth) quantum and classical circuits: quantum circuits can solve in constant depth computational problems that require logarithmic depth to solve with classical circuits. Using quantum error correction, Bravyi, Gosset, König and Tomamichel (Nature Physics 2020) further proved that a similar separation still persists even if quantum circuits are subject to local stochastic noise.
In this paper, we consider the case where any constant fraction of the qubits (for instance, huge blocks of qubits) may be arbitrarily corrupted at the end of the computation. We make a first step forward towards establishing a quantum advantage even in this extremely challenging setting: we show that there exists a computational problem that can be solved in constant depth by a quantum circuit but such that even solving any large subproblem of this problem requires logarithmic depth with bounded fan-in classical circuits. This gives another compelling evidence of the computational power of quantum shallow circuits.
In order to show our result, we consider the Graph State Sampling problem (which was also used in prior works) on expander graphs. We exploit the “robustness” of expander graphs against vertex corruption to show that a subproblem hard for small-depth classical circuits can still be extracted from the output of the corrupted quantum circuit.
keywords:
Quantum computing, circuit complexity, constant-depth circuitscategory:
\relatedversion1 Introduction
Background. Quantum computing was introduced in the early 1980s as a quantum mechanical model of the Turing machine that has a potential to simulate things that a classical computer could not [11, 25]. In 1994, Peter Shor developed a polynomial-time quantum algorithm for factoring integers [43], which gave an exponential speedup over the most efficient known classical algorithms for this task.
While initially realizing a physical quantum computer was thought to be extremely challenging, nowadays various types of high-fidelity processors capable of quantum algorithms have been developed [10, 24, 36, 38, 45]. These devices with noie and relatively small scale are called NISQ (Noisy Intermediate-Scale Quantum) devices [41]. For such devices, “quantum supremacy” [40] has been recently reported [6, 46].
While Shor’s algorithm and such quantum supremacy results strongly suggest that quantum computation is more powerful than classical computation, they are not mathematical proofs. While the superiority of quantum computation has been formally shown in constrained models such as query complexity [4] and communication complexity [22, 34] and considering complexity classes relative to an oracle [12, 42], almost no definite answer is known in standard computational models such as Turing machines or general circuits. Since the complexity class BQP (the class of the problems that can be solved efficiently by a quantum computer) satisfies the inclusions P BPP BQP PSPACE, an unconditional separation between BPP and BQP would imply a separation between P and PSPACE, which would be a significant breakthrough. Therefore, unconditional separations between the computational powers of quantum computers and classical computers in a general setting are expected to be very hard to obtain.
However, with several assumptions from computational complexity such as non-collapse of the polynomial hierarchy or some conjectures on the hardness of the permanent, the superiority of quantum computation has been shown in the circuit model: even approximate or noisy probabilistic distributions of small depth quantum circuits are hard to simulate for classical computers [1, 2, 3, 13, 16, 17, 18, 44]. A recent breakthrough by Bravyi, Gosset and König [14] showed an unconditional separation between the computational powers of small-depth quantum and classical circuits: they constructed a computational problem that can be solved by quantum circuits of constant depth composed of one- and two-qubit gates acting locally on a grid and showed that any probabilistic classical circuit with bounded fan-in gates solving this problem on all inputs must have depth , where denotes the input size. The computational problem they use is a relation problem (i.e., for any input there are several possible outputs). Besides its theoretical importance, this separation is also important since shallow quantum circuits are likely to be easy to implement on physical devices experimentally due to their robustness to noise and decoherence.
There are several results related to this separation. Coudron, Stark and Vidick [21] and Le Gall [26] showed a similar separation in the average case setting, instead of the worst case setting considered in the original version of [14]: there exists a relation problem such that constant-depth quantum circuits can solve the relation on all inputs, but any depth randomized bounded fan-in classical circuits cannot solve it on most inputs with high probability. Bene Watts et al. [9] showed that a similar separation holds against classical circuits using unbounded fan-in gates and, considering interactive tasks, Grier and Schaeffer [28] showed even stronger classical lower bounds.
Bravyi et al. [15] additionally proved, using quantum error-correction, that a similar separation holds even if quantum circuits are corrupted by local stochastic noise (see Definition 1.1 below). The computational problem used in [15] is a generalized version, defined on a 3D grid, of the magic square game [35, 39], which is a nonlocal game with two cooperating players Alice and Bob who cannot communicate. The noise model is as follows.
Definition 1.1 (Definition 9 in [15]).
Consider a random -qubit Pauli error and let Supp() denote its support, i.e., the subset of qubits acted on by either or . For any constant p [0,1], E is called p-local stochastic noise if
In this model, an error is given as applying a gate which is or . This definition assumes that when picking an arbitrary subset of qubits, the probability of all qubits are corrupted is an exponentially small function of the size of the subset. This property, which implies that a subset of size contains with probability at least one qubit that is not corrupted, is crucial in [15] to use quantum error correction. Note that, considering interactive tasks, Grier, Ju and Schaeffer [27] showed even stronger classical lower bounds in the same noise setting.
The Graph State Sampling problem. Before presenting our results, let us describe in more details the computational problem introduced in [14], which is called the 2D Hidden Linear Function problem and corresponds to an extension of the Bernstein-Vazirani problem [12].
We actually describe a slightly more general computational problem that we name the “Graph State Sampling problem” and denote . Here is a graph specifying the problem. For any graph , the problem is a relation . Given an input for this relation problem, which we interpret as a pair with and being a subgraph of , we ask to output any bit string that may appear with nonzero probability when measuring the graph state corresponding to the subgraph in a basis determined by the bit string . We refer to Section 5.1 for details of the definition of the problem.
The 2D Hidden Linear Function problem considered in [14] is essentially the problem where is the family of 2D grid graphs. Since the graph states of subgraphs of a 2D grid can be constructed by constant-depth quantum circuits whose gates act locally on the grid graphs, the problem can be solved by a constant-depth quantum circuit. At the same time, Bravyi et al. [14] prove that no small-depth classical circuits can solve this problem using an argument based on the existence of quantum nonlocality in a triangle (first shown by Barrett et al. [7]). The main result in [14] can essentially be restated as follows.111In this paper, for any graph we use the notation to denote the size of the vertex set of .
Theorem 1.2 ([14]).
There exist a constant such that the following holds for all sufficiently large 2D grid graphs :
-
(i)
can be solved on all inputs with certainty by a constant-depth quantum circuit on qubits composed of one- and two-qubit gates;
-
(ii)
no bounded-fanin classical probabilistic circuit whose depth is less than can solve with high probability on all inputs.
Description of our results. In this paper we show the following result.
Theorem 1.3.
There exist constants and , and a family of graphs with such that the following holds for all sufficiently large :
-
(i)
can be solved on all inputs with certainty by a constant-depth quantum circuit on qubits composed of one- and two-qubit gates;
-
(ii)
for any induced subgraph of such that , no bounded-fanin classical probabilistic circuit whose depth is less than can solve with high probability on all inputs.
Item (ii) of Theorem 1.3, which is proved by considering the Graph State Sampling problem over expander graphs, gives a significantly stronger hardness guarantee than in Theorem 1.2 and thus provides us further compelling evidence of the computational power of quantum shallow circuits.
We stress that Theorem 1.3 does not claim a quantum advantage for noisy shallow quantum circuits: Theorem 1.3 simply shows that there exists a problem that can be computed by shallow quantum circuit but such that a shallow classical circuit cannot solve any (large) subproblem of it. We can nevertheless interpret Item (ii) as follows. A quantum circuit solving the relation has output qubits, which are measured at the end of the computation to give the output string that is a solution for the relation. Assume that an adversary chooses up to qubits among these qubits and corrupts them in an arbitrary way (or, essentially equivalently, corrupts the bits of the measurement outcomes corresponding to these positions). Let denote the set of qubits that are not corrupted by the adversary. Since corresponds to a subproblem222This property can immediately be derived from the formal definition of the computational problem given in Section 5.1 of , and since before the corruption solved the problem on all inputs, even after the corruption the part of the output of corresponding to the qubits in gives a correct solution to the problem . On the other hand, Item (ii) of Theorem 1.3 shows that no small-depth classical circuit can solve . (Note that in Item (ii) we even allow the classical circuit to depend on .)
Let us compare this model of corruption of qubits with the model of noise considered in [15]. As already mentioned, in the error model of [15] (Definition 1 above), the probability that all qubits in a given set of size , where denotes the total number of qubits, are corrupted by the noise is polynomially small and thus can be neglected. In comparison, Theorem 1.3 deals with the case where any subset of qubits of size as large as can be corrupted, and shows that the quantum advantage is still preserved in this case. In this sense, our result gives a further compelling evidence of the computational power of quantum shallow circuits.
Brief overview of our techniques and organization of the paper. The family of graph used to prove Theorem 1.3 is a class of expander graphs of constant degree.333For technical reasons, we actually consider a family of graphs of the form , where is an expander graph of constant degree and is the graph consisting of a single edge. Item (i) of Theorem 1.3 essentially follows from the fact the graph state of a bounded-degree graph can be created by a constant-depth quantum circuit composed of one- and two-qubit gates. The proof of Item (ii) of Theorem 1.3 exploits the “robustness” of expander graphs against corruption of vertices. More precisely, we show that even after corrupting a constant fraction of vertices, an expander graph still has a large grid minor (see Lemma 3.3 in Section 3). Finally, exploiting the existence of a large grid minor, we can use arguments based on quantum nonlocality (very similarly to the arguments used in prior works [14, 26]) to conclude that any classical circuit solving the Graph State Sampling problem on the expander graph requires logarithmic depth.
After giving preliminaries in Section 2, in Section 3 we present graph-theoretical results about expander graphs. In particular, we prove Lemma 3.3 about the existence of large grid minors in corrupted expander graphs. In Section 4, we review the result about the nonlocality of a triangle quantum graph state used in prior works. In Section 5, we define our computational problem and prove Theorem 1.3.
2 Preliminaries
Graph theory. All graphs considered in this paper are undirected. We write a graph as where is the vertex set and is the edge set. means the number of vertex of graph G, i.e., . The degree of a vertex is the number of edges that are incident to the vertex. We denote the degree of a vertex . Given a graph and any vertex set , we denote the external neighborhood of in .
Let us describe the definition of graph minors. Graph is a graph minor of graph if it is isomorphic to a graph obtained from by deleting edges and vertices and by contracting edges. Note that if a graph is a minor of a subgraph of a graph , is also a minor of . The definition is equivalent to the following definition, that if graph is a minor of graph , we can decompose to connected subgraphs which connect to each other like . We will use this definition later for explicit explanations.
Definition 2.1 (Minor, Definition 1 in [33]).
A graph is a minor of a graph G if for every vertex u there is a connected subgraph of G such that all subgraphs are vertex disjoint, and G contains an edge between and whenever is an edge of .
Next, we will define the product of graphs of graphs and . The vertex set of is the Cartesian product and an edge is spanned between and if and only if and , or and . There are several ways to define graph products but we will use the definition above. In this paper, we particularly use , which is the complete graph of two vertices. Given a graph , the graph product is with vertices and edges.
Lastly, we refer to the Vizing’s theorem, which is about edge coloring. Edge coloring is to assign colors to edges so that the edges of the same color are not incident.
Lemma 2.2 (Vizing’s theorem [23]).
Every simple undirected graph can be edge colored using a number of colors that is the maximum degree or the maximum degree+1.
Quantum circuits. The textbook [37] is a good reference about notations of quantum computation in our paper. We will use the Pauli , and gates, the Hadamard gate and the and gates as single qubit gates:
where denotes the imaginary unit of complex numbers. (Note the Phase gate differs from the standard one in [37].) We also use the controlled Pauli gate (or ) as two-qubit gate.
Let us explain about quantum circuits. An -qubit quantum circuit is initialized to and then arbitrary gates are applied to the state. We can apply gates at one time if each gate is applied to disjoint sets of qubits. The depth of a quantum circuit is if the whole operation of circuits can be decomposed to where each is a tensor product of one- and two-qubit gates which act on disjoint sets of qubits.
Next, we describe measurements of quantum states. Mathematically, (projective) measurements are projections to some orthogonal bases. In this paper, We will use two kinds of measurements with the basis and the basis. The orthogonal two states of basis are and the ones of basis are . Note that the measurements of and basis are equivalent to the measurements of the computational basis if we apply and gates before the measurements respectively.
Quantum graph states. Quantum graph states are a certain type of entangled states corresponding to graphs first introduced by [30]. Let be a finite simple graph. Define an associated qubit graph state by
(1) |
The graph state is a stabilizer state with stabilizer group generated by the operators for all .
Classical circuits. A classical circuit is specified by a directed acyclic graphs. Vertices with no incoming and outgoing edges are inputs and outputs respectively and all other vertices are called gates. We must specify a function of each gate where is the fan-in. We assume a classical probabilistic circuit receives an arbitrary binary as an input and outputs a binary and it also could input a random string drawn from some arbitrary distribution. We say an input bit and an output bit are correlated iff the value of the output bit depends on the value of the input bit. For each input bit , we denote the lightcone the set of output bits correlated with through a classical circuit . Likewise, the lightcone is the set of input bits correlated with an output bit . In this paper, we are interested in small-depth classical circuits with bounded fan-in. We also say that a classical probabilistic circuit solves the relation on all inputs if and only if the circuit takes any and a random string as input and outputs such that with high probability.
3 Expander graphs and their properties
Expander graphs are highly sparse but well connected graphs. Notable applications of the graphs have been found in mathematics and computer science [8, 19, 29]. Before giving the definition, we define the expansion ratio of graph . There are several ways to define the expansion ratio, for example edge expansion, vertex expansion and spectral expansion, but these are related to each other. The way we use is called vertex expansion.
Definition 3.1 (Expansion ratio).
The definition of expander graphs we use in this paper is as follows.
Definition 3.2 (Expander graphs, Definition 3.1.8 in [31]).
A family of finite non-empty connected graphs is an expander family, if there exist constants and , independent of i, such that:
-
(1)
The number of vertices “tends to infinity”, in the sense that for any N , there are only finitely many such that has at most vertices.
-
(2)
For each , we have , i.e., the maximum degree of the graphs is bounded independently of .
-
(3)
For each , the expansion constant satisfies , i.e., it is bounded away from 0 by a constant independent of i.
and specify the family of expander graphs. The existence of expander graphs is by no means obvious, but it can be shown using probabilistic approaches or concrete constructions of such graphs [31]. In this paper, an expander graph denotes a graph with sufficiently large of an expander family.
We want to prove the robustness of expander graphs to arbitrary vertex removals in terms of the size of grid minor, which is Lemma 3.3. We provide its proof in Appendix A.
Lemma 3.3.
Let be a expander graph. If we take a sufficiently small constant , the graph has a connected component which contains a grid as a minor after up to an fraction of are adversarially removed.
4 Quantum nonlocality of a triangle graph state
In specific circumstances, local classical circuits cannot simulate measurement outcomes of entangled quantum states. This is called . In this section, we explain it occurs in a triangle graph state, as first shown in [7]. We will use this property to show the hardness of classical circuits to solve the relation problem in Section 5.

First, we note about properties of a graph state in a triangle shape. Let be a triangle such that the distance between three vertices are all even and be a graph state for as in Equation (1). We define as the vertices between and , and , and , and as a total number of vertices in . Also define as vertices of which have odd and even distance from respectively. The three bits decide the measurement basis of (the basis if = 0 and the basis if = 1) and the other vertices are measured in the basis. We denote possible measurement outcomes of all qubits of for input , i.e., . We consider a relationship between input and output . Define the following summations:
Claim 1 (Claim 3 in [14]).
Let and suppose . Then . Moreover, if then
The following lemma is about quantum nonlocality in graph states of triangles and similar to Lemma 3 in Section 4.1 of [14]. It shows that when we assume a classical circuit has a kind of locality, the classical circuit cannot satisfy the relation of Claim 1 as inputs and outputs. We will give the proof in Appendix B.
Lemma 4.1 ([7, 14, 26]).
Consider a classical circuit which takes as an input a bit string and a random string , and outputs which are corresponding to vertices of . Let us assume output bits in depend on and at most one geometrically near input bit, which is either or . Similarly, we assume output bits in and depend on and at most one geometrically near input bit. Then, the classical circuit cannot output with high probability.
5 Proof of separation of depth between quantum and classical circuits to solve Graph State Sampling problem
In this section, we define Graph State Sampling problem and prove a separation of depth between quantum circuits and classical circuits. We consider an almost all induced subgraph of a graph such that is an expander graph. Then, we prove can be solved on all inputs by a constant-depth quantum circuit on qubits, but depth is required for any classical probabilistic circuits to solve on all inputs.
5.1 Definition of Graph State Sampling problem
In this subsection, for any graph , we define Graph State Sampling problem .
The relation is defined as a subset of and thus consists of pairs , where represents the input and represents the output. Each bit of corresponds to a vertex or a edge. The string decides the quantum graph state and the measurement bases: a gate corresponding to edge is applied if , and the qubit corresponding to a vertex is measured in the basis if is 0, or in the basis if is 1. The quantum state for each before the measurement in the computational basis is thus:
The output of the relation is any possible outcome of the measurement of this quantum state (note that there are possibly several measurement outcomes for each ). Since the probability of measurement results of each binary string is , the definition of is as follows.
Definition 5.1.
Given a graph G,
5.2 Constant-depth quantum circuits to solve Graph State Sampling problem
The following is easily shown by Lemma 2.2.
Lemma 5.2.
When the maximum degree of graph G = (V,E) is bounded by a constant, on all inputs can be solved with certainty by a constant-depth quantum circuit on qubits composed of one- and two-qubit gates.
Proof 5.3.
The initial state is prepared on qubits. We apply to the last qubits and then controlled- () gates and controlled- () gates that apply if and if . Since is edge colorable with a constant number from Lemma 2.2 and gates corresponding to edges assigned the same color can be applied simultaneously (since they act on disjoint sets of qubits), the total depth of gates can be bounded by a constant. gates can also be applied in constant depth. We finally apply to the last qubits and measure these qubits in the computational basis, which gives a string such that .

5.3 Hardness to solve Graph State Sampling problem with shallow classical circuits
In this subsection, we prove Theorem 1.3, and especially the classical hardness. The impossibility argument in Section 4 assumed classical circuits had a kind of geometrical locality. The lower bounds in this section, however, do not require any geometrical locality of shallow classical circuits. The proofs are similar to the proofs of the results of Section 4.2 in [14], with the notable exception of Claim 3 and the discussion afterwards (in particular, the definition of boxes), which are specifically tailored for the expander graphs we consider.
5.3.1 Good and bad vertices
To begin with, we define “good” and “bad” vertices. In a shallow classical circuit, most input bits are not correlated with many output bits. We call a vertex “bad” if the corresponding input bit are correlated with many output bits. Here is the formal definition.
Definition 5.4.
Given a graph , we consider and a classical probabilistic circuit for it. Then, a vertex is good if and bad if is not good.
The following claim is similar to Claim 5 in [14].
Claim 2.
Let be a graph such that the maximum degree is bounded by a constant and be a classical probabilistic circuit for . Suppose the fan-in is bounded by a constant and the depth is less than , the number of bad vertices is .
Proof 5.5.
Since the number of correlated input bits increases by at most times when the depth increases by 1,
(2) |
Let us consider a bipartite graph whose vertices are respective bits of and , and a edge is spanned if and only if and are correlated. Since the maximum degree of is bounded by a constant, we have . From Equation (2) and considering edges spanned from , the total number of edges is limited by . Since bad vertices are correlated with output bits, the total number of such that is bad is and this means the number of bad vertices is .
5.3.2 Proof of Theorem 1.3
Before the proof, we rewrite Theorem 1.3 using the notations we defined. The reason we consider the graph product is to take a cycle which has even length for using Lemma 4.1.
Theorem 5.6.
There exist constants and such that the following holds for all sufficiently large expander graphs :
-
(i)
can be solved on all inputs with certainty by a constant-depth quantum circuit on qubits composed of one- and two-qubit gates;
-
(ii)
for any induced subgraph such that , no bounded-fanin classical probabilistic circuits whose depth is less than can solve on all inputs.
Proof 5.7 (Proof of Theorem 5.6).
We can take arbitrary large from the property of expander graphs. Then and are also sufficiently large. Let us introduce some convenient notations. Given a vertex , we denote and the two corresponding vertices in (with no special order). Given a vertex , we denote the other vertex in associated to the same vertex in .
First, we prove Theorem 5.6 (i). We consider the Graph State Sampling problem . Since the maximum degree of is bounded by a constant , the maximum degree of is bounded by . From Lemma 5.2, can be solved with a constant-depth quantum circuit.
Next, we will prove Theorem 5.6 (ii), the hardness to solve on all inputs with shallow classical circuits. Let be a classical probabilistic circuit to solve on all inputs and be the bounded fan-in of . In order to reach a contradiction, we assume the depth of is less than . Then the number of bad vertices is small, which enables us to prove the following claim.
Claim 3.
contains an induced subgraph such that all vertices are good and contains a grid as a minor.
Proof 5.8.
From Claim 2, we know that contains bad vertices. Let us remove all these bad vertices, and write the remaining set. We further remove all vertices such that . The remaining set of vertices induces a graph , for an induced subgraph of such that . From Lemma 3.3, when is taken small enough, the graph has a connected component , where is contains a grid as a minor.
Remember the definition of a graph minor (Definition 2 in Section 2.1). Each connected subgraph in forming the grid (except connected subgraphs on the corners of the grid) is adjacent to the four connected subgraphs where , , and are edges of the grid. For each , we arbitrarily select two of these four components. Assume for instance that we selected and . We choose arbitrarily one vertex in adjacent to a vertex of , and one vertex in adjacent to a vertex of . We then arbitrarily choose one path inside that connects and (such a path necessarily exists). We refer to Figure 3 for an illustration.

We denote T the length of one side of the grid (T = ). From each connected subgraph forming the grid of , we choose one vertex such that it is on a path selected in the way above (this condition of the vertices is required when adding missing segments inside boxes for Claim 5). For such a vertex , we define as a 2D grid of connected subgraphs of size centered at the connected subgraph which and belong to. We choose grid-shaped regions as shown in Figure 5. is a upper-left region of the graph product of and a grid of connected subgraphs cut from . is a upper-right region and is a bottom-left region. The following claim is similar to Claim 6 in [14].


Claim 4.
For all large enough , we can choose a triple of vertices such that , , and
(3) | |||
(4) | |||
(5) | |||
(6) |
Proof 5.9.
One connected subgraph in the grid minor can belong to at most boxes. Since the vertices in are good, a given lightcone can intersect with at most boxes. The number of possibilites to choose a box in is . Thus if we pick boxes uniformly at random then
(7) |
for large enough . A similar bound applies to the five others that appear in the three equations (4, 5, 6). By the union bound, there exists at least one choice of that satisfies all the four equations (3, 4, 5, 6).
Below we consider a cycle that is a subgraph of . The following claim is similar to Claim 7 in [14].
Claim 5.
Proof 5.10.
Since the size of connected subgraphs of each box is , we can choose pairwise vertex disjoint paths that connect any pair of boxes Box(), Box(), Box() (in each connected subgraph, we can always find a path which connects adjacent connected subgraphs). We refer to Figure 5 for an illustration. Let be a path connecting and , where . Any triple of paths can be completed to a cycle by adding the missing segments of the cycle inside the boxes Box(), Box(), Box() because are defined to take such a path inside each box. Since all vertices are good in and each connected subgraph belongs to at most one path , we infer that intersects with at most paths . Thus if we pick the path uniformly at random among all possible choices then
(8) |
for enough large . The same bound applies to eight remaining combinations of lightcones and paths , , and . By the union bound, there exists at least one triple of paths that do not intersect with . When we choose and consecutively, any cycle in has an even length. Since we can take the cycle in the way above, the cycle has a even length and is the desired cycle .
Let and be chosen as described in Claim 5. Let be the even number of vertices of . When we choose properly, the distances between are all even. Consider the subset of instances where
There are such instances corresponding to choices of input bits . Let us fix inputs of the circuit except and consider only output bits with . By the way of fixing, we obtain a classical circuit which takes a three-bit string and a random string as input and output . For any input bit we have since any pair of input and output variables which are correlated in are also correlated in , by definition. Our assumption that can solve on all inputs implies that can output . From Lemma 4.1, at least one output bit such that and depends on the two geometrically near inputs from . By , the same is true for the input-output dependency of . From Claim 9, for each , only intersects with such that and there is a contradiction. Therefore, the depth of any classical probabilistic circuit that has bounded fan-in and solves on all inputs is not less than . This concludes the proof of Theorem 3.
References
- [1] Scott Aaronson and Alex Arkhipov. The computational complexity of linear optics. In Proceedings of the 43rd Annual ACM SIGACT Symposium on Theory of Computing (STOC 2011), pages 333–342, 2011.
- [2] Scott Aaronson and Alex Arkhipov. Bosonsampling is far from uniform. Quantum Information & Computation, 14(15–16):1383–1423, 2014.
- [3] Scott Aaronson and Lijie Chen. Complexity-Theoretic Foundations of Quantum Supremacy Experiments. In Proceedings of 32nd Computational Complexity Conference (CCC 2017), volume 79 of LIPIcs, pages 22:1–22:67, 2017.
- [4] Andris Ambainis. Understanding quantum algorithm via query complexity. In Proceedings of the International Congress of Mathematicians (ICM 2018), pages 3265–3285, 2019.
- [5] Matthew Amy, Dmitri Maslov, Michele Mosca, and Martin Roetteler. A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 32(6):818–830, 2013.
- [6] Frank Arute et al. Quantum supremacy using a programmable superconducting processor. Nature, 574(7779):505–510, 2019.
- [7] Jonathan Barrett, Carlton M. Caves, Bryan Eastin, Matthew B. Elliott, and Stefano Pironio. Modeling pauli measurements on graph states with nearest-neighbor classical communication. Physical Review A, 75(1):012103, 2007.
- [8] Ya. M. Barzdin. On the realization of networks in three-dimensional space. In Selected Works of A. N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms, pages 194–202. 1993.
- [9] Adam Bene Watts, Robin Kothari, Luke Schaeffer, and Avishay Tal. Exponential separation between shallow quantum circuits and unbounded fan-in shallow classical circuits. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing (STOC 2019), pages 515–526, 2019.
- [10] Jan Benhelm, Gerhard Kirchmair, Christian F. Roos, and Rainer Blatt. Towards fault-tolerant quantum computing with trapped ions. Nature Physics, 4(6):463–466, 2008.
- [11] Paul Benioff. The computer as a physical system: A microscopic quantum mechanical hamiltonian model of computers as represented by turing machines. Journal of Statistical Physics, 22(5):563–591, 1980.
- [12] Ethan Bernstein and Umesh Vazirani. Quantum complexity theory. SIAM Journal on Computing, 26(5):1411–1473, 1997.
- [13] Adam Bouland, Bill Fefferman, Chinmay Nirkhe, and Umesh Vazirani. "Quantum Supremacy" and the Complexity of Random Circuit Sampling. In Proceedings of 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), volume 124 of LIPIcs, pages 15:1–15:2, 2019.
- [14] Sergey Bravyi, David Gosset, and Robert König. Quantum advantage with shallow circuits. Science, 362(6412):308–311, 2018.
- [15] Sergey Bravyi, David Gosset, Robert König, and Marco Tomamichel. Quantum advantage with noisy shallow circuits. Nature Physics, 16(10):1040–1045, 2020.
- [16] Michael J. Bremner, Richard Jozsa, and Dan J. Shepherd. Classical simulation of commuting quantum computations implies collapse of the polynomial hierarchy. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 467(2126):459–472, 2011.
- [17] Michael J. Bremner, Ashley Montanaro, and Dan J. Shepherd. Average-case complexity versus approximate simulation of commuting quantum computations. Physical Review Letters, 117(8):080501, 2016.
- [18] Michael J. Bremner, Ashley Montanaro, and Dan J. Shepherd. Achieving quantum supremacy with sparse and noisy commuting quantum computations. Quantum, 1:8, 2017.
- [19] Michael Capalbo, Omer Reingold, Salil Vadhan, and Avi Wigderson. Randomness conductors and constant-degree lossless expanders. In Proceedings of the 34th Annual ACM SIGACT Symposium on Theory of Computing (STOC 2002), pages 659–668, 2002.
- [20] Julia Chuzhoy and Rachit Nimavat. Large minors in expanders. arXiv:1901.09349, 2019.
- [21] Matthew Coudron, Jalex Stark, and Thomas Vidick. Trading locality for time: certifiable randomness from low-depth circuits. Communications in Mathematical Physics, 382(1):49–86, 2021. Also presented at QIP 2019.
- [22] Ronald De Wolf. Quantum communication and complexity. Theoretical Computer Science, 287(1):337–353, 2002.
- [23] Reinhard Diestel. Graph theory, volume 173 of Graduate texts in mathematics. Springer, 2000.
- [24] Andreas Wallraff et al. Strong coupling of a single photon to a superconducting qubit using circuit quantum electrodynamics. Nature, 431(7005):162–167, 2004.
- [25] Richard P Feynman. Simulating physics with computers. Int. J. Theor. Phys, 21(6/7):467–488, 1982.
- [26] François Le Gall. Average-Case Quantum Advantage with Shallow Circuits. In Proceedings of 34th Computational Complexity Conference (CCC 2019), volume 137 of LIPIcs, pages 21:1–21:20, 2019.
- [27] Daniel Grier, Nathan Ju, and Luke Schaeffer. Interactive quantum advantage with noisy, shallow clifford circuits. arXiv:2102.06833, 2021.
- [28] Daniel Grier and Luke Schaeffer. Interactive shallow clifford circuits: quantum advantage against NC1 and beyond. In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing (STOC 2020), pages 875–888, 2020.
- [29] Misha Gromov and Larry Guth. Generalizations of the kolmogorov–barzdin embedding estimates. Duke Mathematical Journal, 161(13):2549–2603, 2012.
- [30] Marc Hein, Jens Eisert, and Hans J. Briegel. Multiparty entanglement in graph states. Physical Review A, 69(6):062311, 2004.
- [31] Emmanuel Kowalski. An introduction to expander graphs. Société Mathématique de France, 2019.
- [32] Michael Krivelevich. Expanders — how to find them, and what to find in them. Surveys in Combinatorics, pages 115–142, 2019.
- [33] Michael Krivelevich and Benjamin Sudakov. Minors in expanding graphs. Geometric and Functional Analysis, 19(1):294–331, 2009.
- [34] Hoi-Kwong Lo. Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity. Physical Review A, 62(1):012313, 2000.
- [35] N. David Mermin. Extreme quantum entanglement in a superposition of macroscopically distinct states. Physical Review Letters, 65(15):1838, 1990.
- [36] Yasunobu Nakamura, Chii Dong Chen, and Jaw Shen Tsai. Spectroscopy of energy-level splitting between two macroscopic quantum states of charge coherently superposed by josephson coupling. Physical Review Letters, 79(12):2328, 1997.
- [37] Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 2000.
- [38] Jeremy L O’Brien. Optical quantum computing. Science, 318(5856):1567–1570, 2007.
- [39] Asher Peres. Incompatible results of quantum measurements. Physics Letters A, 151(3-4):107–108, 1990.
- [40] John Preskill. Quantum computing and the entanglement frontier. Bulletin of the American Physical Society, 58, 2013.
- [41] John Preskill. Quantum computing in the NISQ era and beyond. Quantum, 2:79, 2018.
- [42] Ran Raz and Avishay Tal. Oracle separation of BQP and PH. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing (STOC 2019), page 13–23, 2019.
- [43] Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5):1484–1509, 1997.
- [44] Barbara M. Terhal and David P. DiVincenzo. Adptive quantum computation, constant depth quantum circuits and arthur-merlin games. Quantum Information & Computation, 4(2):134–145, 2004.
- [45] Jian-Qiang You and Franco Nori. Atomic physics and quantum optics using superconducting circuits. Nature, 474(7353):589–597, 2011.
- [46] Han-Sen Zhong et al. Quantum computational advantage using photons. Science, 370:1460–1463, 2020.
Appendix A Proof of Lemma 3.3
First, we introduce a notation. The range in Definition 3.1, 1 , may be a little arbitrary. In terms of the range where the expansion ratio is considered, we define more general expander graphs as follows.
Definition A.1 (Definition 2.2 in [32]).
Let be a graph, let be a set of positive integers. The graph G is an - if a positive constant exists such that for every vertex subset satisfying .
Note that this definition does not limit the maximum degree of graphs. When the graph is an expander graph (as defined as Definition 3.2), is also a -expander with bounded degree.
Then, the following claim shows an expander graph still has a large connected component and it can be described using the notation of Definition A.1 when a small fraction of vertices are adversarially removed.
Claim 6.
Let be an expander graph. If we take a sufficiently small constant , the graph has a connected component which has more than vertices and is a -expander after up to an fraction of the vertices are adversarially removed.
Proof A.2.
Let be the expansion ratio and be the maximum degree of the graph . Let be an arbitrary subset of vertices such that . Let be the connected components of the left graph after vertices are adversarially removed.
To reach a contradiction, we assume every connected component is equal to or smaller than half of , i.e., for all . From , . Each connected component has its neighbor such that since . A vertex can be a neighbor of at most connected components at the same time. Therefore, by the summation of neighbors of all connected components ,
In terms of the total number of vertices, . Then,
Thus, and this contradicts is sufficiently small. Therefore we can pick a connected component such that from .
In the graph , we consider an arbitrary subset of vertices , which satisfies . From the expander property of , . Since the number of removed vertices is up to , . If we take smaller than , is a -expander.
The next claim is to show there is a relation between -expanders of Definition 5.
Claim 7 (Lemma 2.4 in [32]).
Let graph be a -expander. Then there is a vertex subset such that and the graph is a -expander.
The most significant result of minors of expander graphs is Claim 8 below. It is known that this bound () is tight especially in terms of the size of grid minors.
Claim 8 (Corollary 8.3 in [32] and Theorem 1.1 in [20]).
Let graph be a -expander. For any graph with vertices and edges, G contains H as a minor.
Finally, using the above claims, we can prove Lemma 3.3.
Proof A.3 (Proof of Lemma 3.3).
From Claim 20, after the removal, the left graph has a connected component which is a -expander. Using Claim 21, contains an induced subgraph such that is a -expander and . When is sufficiently large, . Therefore, from Claim 22, contains a grid as a minor since the maximum degree of grid graphs is 4, which is a constant, and the number of vertices and edges of a grid is .
Appendix B Proof of Lemma 4.1
We note a mathematical claim below.
Claim 9 ([7, 14, 26]).
Consider any affine function and any three affine function such that
holds for any . Then at least one of the four following equalities does not hold:
Proof B.1 (Proof of Lemma 4.1).
Let us write for the function which is computed by the circuit. Below we show for each there exists a such that . Let be fixed and we consider as a function of . Suppose first that for some . Then by Claim 1, and we are done. Next suppose that for all . From the assumption, is an affine function of , and . In the same way, is an affine function and . is an affine function of , and is one of , . Therefore, we can correspond , , and to and in Claim 9 and, from Claim 9, the output cannot meet all the four equation (2)-(5) simultaneously. Therefore, the classical circuit cannot output with high probability.