This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

The University of Tokyo, Japan [email protected] University, [email protected] \CopyrightAtsuya Hasegawa and François Le Gall \ccsdesc[100]Theory of computation \fundingJSPS KAKENHI grants Nos. JP16H01705, JP19H04066, JP20H00579, JP20H04139 and by the MEXT Quantum Leap Flagship Program (MEXT Q-LEAP) grant No. JPMXS0120319794.

Acknowledgements.
AH is grateful to Hidefumi Hiraishi and Hiroshi Imai for helpful discussions and continuous supports. FLG would also like to thank Robert König for useful discussions.\hideLIPIcs\EventEditorsHee-Kap Ahn and Kunihiko Sadakane \EventNoEds2 \EventLongTitle32nd International Symposium on Algorithms and Computation (ISAAC 2021) \EventShortTitleISAAC 2021 \EventAcronymISAAC \EventYear2021 \EventDateDecember 6–8, 2021 \EventLocationFukuoka, Japan \EventLogo \SeriesVolume212 \ArticleNo31

Quantum Advantage with Shallow Circuits Under Arbitrary Corruption

Atsuya Hasegawa    François Le Gall
Abstract

Recent works by Bravyi, Gosset and König (Science 2018), Bene Watts et al. (STOC 2019), Coudron, Stark and Vidick (QIP 2019) and Le Gall (CCC 2019) have shown unconditional separations between the computational powers of shallow (i.e., small-depth) quantum and classical circuits: quantum circuits can solve in constant depth computational problems that require logarithmic depth to solve with classical circuits. Using quantum error correction, Bravyi, Gosset, König and Tomamichel (Nature Physics 2020) further proved that a similar separation still persists even if quantum circuits are subject to local stochastic noise.

In this paper, we consider the case where any constant fraction of the qubits (for instance, huge blocks of qubits) may be arbitrarily corrupted at the end of the computation. We make a first step forward towards establishing a quantum advantage even in this extremely challenging setting: we show that there exists a computational problem that can be solved in constant depth by a quantum circuit but such that even solving any large subproblem of this problem requires logarithmic depth with bounded fan-in classical circuits. This gives another compelling evidence of the computational power of quantum shallow circuits.

In order to show our result, we consider the Graph State Sampling problem (which was also used in prior works) on expander graphs. We exploit the “robustness” of expander graphs against vertex corruption to show that a subproblem hard for small-depth classical circuits can still be extracted from the output of the corrupted quantum circuit.

keywords:
Quantum computing, circuit complexity, constant-depth circuits
category:
\relatedversion

1 Introduction

Background. Quantum computing was introduced in the early 1980s as a quantum mechanical model of the Turing machine that has a potential to simulate things that a classical computer could not [11, 25]. In 1994, Peter Shor developed a polynomial-time quantum algorithm for factoring integers [43], which gave an exponential speedup over the most efficient known classical algorithms for this task.

While initially realizing a physical quantum computer was thought to be extremely challenging, nowadays various types of high-fidelity processors capable of quantum algorithms have been developed [10, 24, 36, 38, 45]. These devices with noie and relatively small scale are called NISQ (Noisy Intermediate-Scale Quantum) devices [41]. For such devices, “quantum supremacy” [40] has been recently reported [6, 46].

While Shor’s algorithm and such quantum supremacy results strongly suggest that quantum computation is more powerful than classical computation, they are not mathematical proofs. While the superiority of quantum computation has been formally shown in constrained models such as query complexity [4] and communication complexity [22, 34] and considering complexity classes relative to an oracle [12, 42], almost no definite answer is known in standard computational models such as Turing machines or general circuits. Since the complexity class BQP (the class of the problems that can be solved efficiently by a quantum computer) satisfies the inclusions P \subseteq BPP \subseteq BQP \subseteq PSPACE, an unconditional separation between BPP and BQP would imply a separation between P and PSPACE, which would be a significant breakthrough. Therefore, unconditional separations between the computational powers of quantum computers and classical computers in a general setting are expected to be very hard to obtain.

However, with several assumptions from computational complexity such as non-collapse of the polynomial hierarchy or some conjectures on the hardness of the permanent, the superiority of quantum computation has been shown in the circuit model: even approximate or noisy probabilistic distributions of small depth quantum circuits are hard to simulate for classical computers [1, 2, 3, 13, 16, 17, 18, 44]. A recent breakthrough by Bravyi, Gosset and König [14] showed an unconditional separation between the computational powers of small-depth quantum and classical circuits: they constructed a computational problem that can be solved by quantum circuits of constant depth composed of one- and two-qubit gates acting locally on a grid and showed that any probabilistic classical circuit with bounded fan-in gates solving this problem on all inputs must have depth Ω(logn)\Omega(\log n), where nn denotes the input size. The computational problem they use is a relation problem (i.e., for any input there are several possible outputs). Besides its theoretical importance, this separation is also important since shallow quantum circuits are likely to be easy to implement on physical devices experimentally due to their robustness to noise and decoherence.

There are several results related to this separation. Coudron, Stark and Vidick [21] and Le Gall [26] showed a similar separation in the average case setting, instead of the worst case setting considered in the original version of [14]: there exists a relation problem such that constant-depth quantum circuits can solve the relation on all inputs, but any O(logn)O(\log n) depth randomized bounded fan-in classical circuits cannot solve it on most inputs with high probability. Bene Watts et al. [9] showed that a similar separation holds against classical circuits using unbounded fan-in gates and, considering interactive tasks, Grier and Schaeffer [28] showed even stronger classical lower bounds.

Bravyi et al. [15] additionally proved, using quantum error-correction, that a similar separation holds even if quantum circuits are corrupted by local stochastic noise (see Definition 1.1 below). The computational problem used in [15] is a generalized version, defined on a 3D grid, of the magic square game [35, 39], which is a nonlocal game with two cooperating players Alice and Bob who cannot communicate. The noise model is as follows.

Definition 1.1 (Definition 9 in [15]).

Consider a random nn-qubit Pauli error E{I,X,Y,Z}nE\in\{I,X,Y,Z\}^{\otimes n} and let Supp(EE) \subseteq [n][n] denote its support, i.e., the subset of qubits acted on by either X,Y,X,Y, or ZZ. For any constant p \in [0,1], E is called p-local stochastic noise if

Pr[FSupp(E)]p|F|forallF[n].\mathrm{Pr}[F\subseteq Supp(E)]\leq p^{|F|}\hskip 10.0pt\ \mathrm{for\ all}\ F\subseteq[n].

In this model, an error is given as applying a gate which is X,YX,Y or ZZ. This definition assumes that when picking an arbitrary subset of qubits, the probability of all qubits are corrupted is an exponentially small function of the size of the subset. This property, which implies that a subset of size Ω(logn)\Omega(\log n) contains with probability 11/poly(n)1-1/\textrm{poly}(n) at least one qubit that is not corrupted, is crucial in [15] to use quantum error correction. Note that, considering interactive tasks, Grier, Ju and Schaeffer [27] showed even stronger classical lower bounds in the same noise setting.

The Graph State Sampling problem. Before presenting our results, let us describe in more details the computational problem introduced in [14], which is called the 2D Hidden Linear Function problem and corresponds to an extension of the Bernstein-Vazirani problem [12].

We actually describe a slightly more general computational problem that we name the “Graph State Sampling problem” and denote ρ(G)\rho(G). Here G=(V,E)G=(V,E) is a graph specifying the problem. For any graph GG, the problem ρ(G)\rho(G) is a relation ρ(G){0,1}|V|+|E|×{0,1}|V|\rho(G)\subseteq\{0,1\}^{|V|+|E|}\times\{0,1\}^{|V|}. Given an input x{0,1}|V|+|E|x\in\{0,1\}^{|V|+|E|} for this relation problem, which we interpret as a pair x=(y,H)x=(y,H) with y{0,1}|V|y\in\{0,1\}^{|V|} and HH being a subgraph of GG, we ask to output any bit string z{0,1}|V|z\in\{0,1\}^{|V|} that may appear with nonzero probability when measuring the graph state corresponding to the subgraph HH in a basis determined by the bit string yy. We refer to Section 5.1 for details of the definition of the problem.

The 2D Hidden Linear Function problem considered in [14] is essentially the problem ρ(G)\rho(G) where GG is the family of 2D grid graphs. Since the graph states of subgraphs of a 2D grid can be constructed by constant-depth quantum circuits whose gates act locally on the grid graphs, the problem ρ(G)\rho(G) can be solved by a constant-depth quantum circuit. At the same time, Bravyi et al. [14] prove that no small-depth classical circuits can solve this problem using an argument based on the existence of quantum nonlocality in a triangle (first shown by Barrett et al. [7]). The main result in [14] can essentially be restated as follows.111In this paper, for any graph GG we use the notation |G||G| to denote the size of the vertex set of GG.

Theorem 1.2 ([14]).

There exist a constant α>0\alpha>0 such that the following holds for all sufficiently large 2D grid graphs GG:

  1. (i)

    ρ(G)\rho(G) can be solved on all inputs with certainty by a constant-depth quantum circuit on Θ(|G|)\Theta(|G|) qubits composed of one- and two-qubit gates;

  2. (ii)

    no bounded-fanin classical probabilistic circuit whose depth is less than αlog(|G|)\alpha\log(|G|) can solve with high probability ρ(G)\rho(G) on all inputs.

Description of our results. In this paper we show the following result.

Theorem 1.3.

There exist constants α>0\alpha>0 and ϵ>0\epsilon>0, and a family of graphs (Gi)i(G_{i})_{i\in\mathbb{N}} with limi|Gi|=\displaystyle\lim_{i\to\infty}|G_{i}|=\infty such that the following holds for all sufficiently large ii:

  1. (i)

    ρ(Gi)\rho(G_{i}) can be solved on all inputs with certainty by a constant-depth quantum circuit on Θ(|Gi|)\Theta(|G_{i}|) qubits composed of one- and two-qubit gates;

  2. (ii)

    for any induced subgraph SiS_{i} of GiG_{i} such that |Si|(1ϵ)|Gi||S_{i}|\geq(1-\epsilon)|G_{i}|, no bounded-fanin classical probabilistic circuit whose depth is less than αlog(|Si|)\alpha\log(|S_{i}|) can solve with high probability ρ(Si)\rho(S_{i}) on all inputs.

Item (ii) of Theorem 1.3, which is proved by considering the Graph State Sampling problem over expander graphs, gives a significantly stronger hardness guarantee than in Theorem 1.2 and thus provides us further compelling evidence of the computational power of quantum shallow circuits.

We stress that Theorem 1.3 does not claim a quantum advantage for noisy shallow quantum circuits: Theorem 1.3 simply shows that there exists a problem that can be computed by shallow quantum circuit but such that a shallow classical circuit cannot solve any (large) subproblem of it. We can nevertheless interpret Item (ii) as follows. A quantum circuit 𝒞\mathcal{C} solving the relation ρ(Gi)\rho(G_{i}) has |Gi||G_{i}| output qubits, which are measured at the end of the computation to give the output string z{0,1}|Gi|z\in\{0,1\}^{|G_{i}|} that is a solution for the relation. Assume that an adversary chooses up to ϵ|Gi|\epsilon|G_{i}| qubits among these |Gi||G_{i}| qubits and corrupts them in an arbitrary way (or, essentially equivalently, corrupts the bits of the measurement outcomes corresponding to these positions). Let SiS_{i} denote the set of qubits that are not corrupted by the adversary. Since ρ(Si)\rho(S_{i}) corresponds to a subproblem222This property can immediately be derived from the formal definition of the computational problem given in Section 5.1 of ρ(Gi)\rho(G_{i}), and since 𝒞\mathcal{C} before the corruption solved the problem ρ(Gi)\rho(G_{i}) on all inputs, even after the corruption the part of the output of 𝒞\mathcal{C} corresponding to the qubits in SiS_{i} gives a correct solution to the problem ρ(Si)\rho(S_{i}). On the other hand, Item (ii) of Theorem 1.3 shows that no small-depth classical circuit can solve ρ(Si)\rho(S_{i}). (Note that in Item (ii) we even allow the classical circuit to depend on SiS_{i}.)

Let us compare this model of corruption of qubits with the model of noise considered in [15]. As already mentioned, in the error model of [15] (Definition 1 above), the probability that all qubits in a given set of size Θ(logn)\Theta(\log n), where nn denotes the total number of qubits, are corrupted by the noise is polynomially small and thus can be neglected. In comparison, Theorem 1.3 deals with the case where any subset of qubits of size as large as Θ(n)\Theta(n) can be corrupted, and shows that the quantum advantage is still preserved in this case. In this sense, our result gives a further compelling evidence of the computational power of quantum shallow circuits.

Brief overview of our techniques and organization of the paper. The family of graph (Gi)i(G_{i})_{i\in\mathbb{N}} used to prove Theorem 1.3 is a class of expander graphs of constant degree.333For technical reasons, we actually consider a family of graphs of the form G×K2G\times K_{2}, where GG is an expander graph of constant degree and K2K_{2} is the graph consisting of a single edge. Item (i) of Theorem 1.3 essentially follows from the fact the graph state of a bounded-degree graph can be created by a constant-depth quantum circuit composed of one- and two-qubit gates. The proof of Item (ii) of Theorem 1.3 exploits the “robustness” of expander graphs against corruption of vertices. More precisely, we show that even after corrupting a constant fraction of vertices, an expander graph still has a large grid minor (see Lemma 3.3 in Section 3). Finally, exploiting the existence of a large grid minor, we can use arguments based on quantum nonlocality (very similarly to the arguments used in prior works [14, 26]) to conclude that any classical circuit solving the Graph State Sampling problem on the expander graph requires logarithmic depth.

After giving preliminaries in Section 2, in Section 3 we present graph-theoretical results about expander graphs. In particular, we prove Lemma 3.3 about the existence of large grid minors in corrupted expander graphs. In Section 4, we review the result about the nonlocality of a triangle quantum graph state used in prior works. In Section 5, we define our computational problem and prove Theorem 1.3.

2 Preliminaries

Graph theory. All graphs considered in this paper are undirected. We write a graph as G=(V,E)G=(V,E) where VV is the vertex set and EE is the edge set. |G||G| means the number of vertex of graph G, i.e., |V||V|. The degree of a vertex is the number of edges that are incident to the vertex. We denote deg(v)deg(v) the degree of a vertex vv. Given a graph G=(V,E)G=(V,E) and any vertex set UVU\subseteq V, we denote NG(U)={vVU:vhasaneighborinU}N_{G}(U)=\{v\in V\setminus U:v\mathrm{\ has\ a\ neighbor\ in\ }U\} the external neighborhood of UU in GG.

Let us describe the definition of graph minors. Graph Γ\Gamma is a graph minor of graph GG if it is isomorphic to a graph obtained from GG by deleting edges and vertices and by contracting edges. Note that if a graph Γ\Gamma is a minor of a subgraph SS of a graph GG, Γ\Gamma is also a minor of GG. The definition is equivalent to the following definition, that if graph Γ\Gamma is a minor of graph GG, we can decompose GG to connected subgraphs which connect to each other like Γ\Gamma. We will use this definition later for explicit explanations.

Definition 2.1 (Minor, Definition 1 in [33]).

A graph Γ\Gamma is a minor of a graph G if for every vertex u \in Γ\Gamma there is a connected subgraph GuG_{u} of G such that all subgraphs GuG_{u} are vertex disjoint, and G contains an edge between GuG_{u} and GuG_{u^{\prime}} whenever {u,u}\{u,u^{\prime}\} is an edge of Γ\Gamma.

Next, we will define the product of graphs G×HG\times H of graphs G=(VG,EG)G=(V_{G},E_{G}) and H=(VH,EH)H=(V_{H},E_{H}). The vertex set of G×HG\times H is the Cartesian product VG×VHV_{G}\times V_{H} and an edge is spanned between (uG,uH)(u_{G},u_{H}) and (vG,vH)(v_{G},v_{H}) if and only if uG=vGu_{G}=v_{G} and {uH,vH}EH\{u_{H},v_{H}\}\in E_{H}, or uH=vHu_{H}=v_{H} and {uG,vG}EG\{u_{G},v_{G}\}\in E_{G}. There are several ways to define graph products but we will use the definition above. In this paper, we particularly use G×K2G\times K_{2}, which K2K_{2} is the complete graph of two vertices. Given a graph G=(V,E)G=(V,E), the graph product G×K2G\times K_{2} is with 2|V|2|V| vertices and 2|E|+|V|2|E|+|V| edges.

Lastly, we refer to the Vizing’s theorem, which is about edge coloring. Edge coloring is to assign colors to edges so that the edges of the same color are not incident.

Lemma 2.2 (Vizing’s theorem [23]).

Every simple undirected graph can be edge colored using a number of colors that is the maximum degree or the maximum degree+1.

Quantum circuits. The textbook [37] is a good reference about notations of quantum computation in our paper. We will use the Pauli XX, YY and ZZ gates, the Hadamard gate and the SS and TT gates as single qubit gates:

X=(0110),Y=(0ii0),Z=(1001),H=12(1111),S=(100i),T=(100eiπ/4),\scriptsize X=\begin{pmatrix}0&1\\ 1&0\\ \end{pmatrix}\!,\ Y=\begin{pmatrix}0&-i\\ i&0\\ \end{pmatrix}\!,\ Z=\begin{pmatrix}1&0\\ 0&-1\\ \end{pmatrix}\!,\ H=\frac{1}{\sqrt{2}}\begin{pmatrix}1&1\\ 1&-1\\ \end{pmatrix}\!,\ S=\begin{pmatrix}1&0\\ 0&-i\\ \end{pmatrix}\!,\ T=\begin{pmatrix}1&0\\ 0&e^{i\pi/4}\\ \end{pmatrix}\!,

where ii denotes the imaginary unit of complex numbers. (Note the Phase gate SS differs from the standard one in [37].) We also use the controlled Pauli ZZ gate (or CZ=|00|I+|11|ZCZ=\ket{0}\bra{0}\otimes I+\ket{1}\bra{1}\otimes Z) as two-qubit gate.

Let us explain about quantum circuits. An nn-qubit quantum circuit is initialized to |0n\ket{0^{n}} and then arbitrary gates are applied to the state. We can apply gates at one time if each gate is applied to disjoint sets of qubits. The depth of a quantum circuit is dd if the whole operation of circuits can be decomposed to UdU2U1U_{d}...U_{2}U_{1} where each UjU_{j} is a tensor product of one- and two-qubit gates which act on disjoint sets of qubits.

Next, we describe measurements of quantum states. Mathematically, (projective) measurements are projections to some orthogonal bases. In this paper, We will use two kinds of measurements with the XX basis and the YY basis. The orthogonal two states of XX basis are {|+,|}\{\ket{+},\ket{-}\} and the ones of YY basis are {|0+i|12,|0i|12}\{\frac{\ket{0}+i\ket{1}}{\sqrt{2}},\frac{\ket{0}-i\ket{1}}{\sqrt{2}}\}. Note that the measurements of XX and YY basis are equivalent to the measurements of the computational basis if we apply HH and HSHS gates before the measurements respectively.

Quantum graph states. Quantum graph states are a certain type of entangled states corresponding to graphs first introduced by [30]. Let G=(V,E)G=(V,E) be a finite simple graph. Define an associated |V||V| qubit graph state |ΦG\ket{\Phi_{G}} by

|ΦG=(eECZe)H|V||0|V|.\ket{\Phi_{G}}=\left(\prod_{e\in E}CZ_{e}\right)H^{\otimes|V|}\ket{0^{|V|}}. (1)

The graph state |ΦG\ket{\Phi_{G}} is a stabilizer state with stabilizer group generated by the operators gv=Xv(w:{w,v}EZw)g_{v}=X_{v}\left(\prod_{w:\{w,v\}\in E}Z_{w}\right) for all vVv\in V.

Classical circuits. A classical circuit is specified by a directed acyclic graphs. Vertices with no incoming and outgoing edges are inputs and outputs respectively and all other vertices are called gates. We must specify a function of each gate {0,1}k{0,1}\{0,1\}^{k}\rightarrow\{0,1\} where kk is the fan-in. We assume a classical probabilistic circuit receives an arbitrary binary xx as an input and outputs a binary zz and it also could input a random string rr drawn from some arbitrary distribution. We say an input bit and an output bit are correlated iff the value of the output bit depends on the value of the input bit. For each input bit xix_{i}, we denote the lightcone LC(xi)L_{C}(x_{i}) the set of output bits correlated with xix_{i} through a classical circuit CC. Likewise, the lightcone LC(zi)L_{C}(z_{i}) is the set of input bits correlated with an output bit ziz_{i}. In this paper, we are interested in small-depth classical circuits with bounded fan-in. We also say that a classical probabilistic circuit solves the relation RR on all inputs if and only if the circuit takes any x{0,1}nx\in\{0,1\}^{n} and a random string rr as input and outputs z{0,1}mz\in\{0,1\}^{m} such that xRzxRz with high probability.

3 Expander graphs and their properties

Expander graphs are highly sparse but well connected graphs. Notable applications of the graphs have been found in mathematics and computer science [8, 19, 29]. Before giving the definition, we define the expansion ratio h(G)h(G) of graph GG. There are several ways to define the expansion ratio, for example edge expansion, vertex expansion and spectral expansion, but these are related to each other. The way we use is called vertex expansion.

Definition 3.1 (Expansion ratio).

h(G)=min{|NG(U)||U||UVsuchthat 1|U|12|V|}h(G)=\mathrm{min}\left\{\frac{|N_{G}(U)|}{|U|}\middle|\>\>U\subset V\mathrm{\ such\ that\ }1\leq|U|\leq\frac{1}{2}|V|\right\}

The definition of expander graphs we use in this paper is as follows.

Definition 3.2 (Expander graphs, Definition 3.1.8 in [31]).

A family (Γi)i(\Gamma_{i})_{i\in\mathbb{N}} of finite non-empty connected graphs Γi=(Vi,Ei)\Gamma_{i}=(V_{i},E_{i}) is an expander family, if there exist constants d1d\geq 1 and h>0h>0, independent of i, such that:

  1. (1)

    The number of vertices |Vi||V_{i}| “tends to infinity”, in the sense that for any N 1\geq 1, there are only finitely many ii\in\mathbb{N} such that Γi\Gamma_{i} has at most NN vertices.

  2. (2)

    For each ii\in\mathbb{N}, we have maxvVideg(v)d\max_{v\in V_{i}}deg(v)\leq d, i.e., the maximum degree of the graphs is bounded independently of ii.

  3. (3)

    For each ii\in\mathbb{N}, the expansion constant satisfies h(Γi)h>0h(\Gamma_{i})\geq h>0, i.e., it is bounded away from 0 by a constant independent of i.

hh and dd specify the family of expander graphs. The existence of expander graphs is by no means obvious, but it can be shown using probabilistic approaches or concrete constructions of such graphs [31]. In this paper, an expander graph denotes a graph with sufficiently large ii of an expander family.

We want to prove the robustness of expander graphs to arbitrary vertex removals in terms of the size of grid minor, which is Lemma 3.3. We provide its proof in Appendix A.

Lemma 3.3.

Let G=(V,E)G=(V,E) be a expander graph. If we take a sufficiently small constant ϵ>0\epsilon>0, the graph has a connected component CC which contains a Ω(|V|14)×Ω(|V|14)\Omega(|V|^{\frac{1}{4}})\times\Omega(|V|^{\frac{1}{4}}) grid as a minor after up to an ϵ\epsilon fraction of VV are adversarially removed.

4 Quantum nonlocality of a triangle graph state

In specific circumstances, local classical circuits cannot simulate measurement outcomes of entangled quantum states. This is called quantumnonlocalityquantum\ nonlocality. In this section, we explain it occurs in a triangle graph state, as first shown in [7]. We will use this property to show the hardness of classical circuits to solve the relation problem in Section 5.

Refer to caption
Figure 1: We consider an even cycle Γ\Gamma and three vertices u,v,wu,v,w such that all pairwise distances are even. L,R,BL,R,B are the region between the three vertices. Each qubit of the corresponding graph state is measured by the XX or YY basis.

First, we note about properties of a graph state in a triangle shape. Let Γ\Gamma be a triangle such that the distance between three vertices u,v,wu,v,w are all even and |ψΓ\ket{\psi_{\Gamma}} be a graph state for Γ\Gamma as in Equation (1). We define L,R,BL,R,B as the vertices between uu and vv, vv and ww, uu and ww, and MM as a total number of vertices in Γ\Gamma. Also define Lodd,Leven,Rodd,Reven,Bodd,BevenL_{odd},L_{even},R_{odd},R_{even},B_{odd},B_{even} as vertices of L,R,BL,R,B which have odd and even distance from u,v,wu,v,w respectively. The three bits x=xuxvxwx=x_{u}x_{v}x_{w} decide the measurement basis of u,v,wu,v,w (the XX basis if xix_{i} = 0 and the YY basis if xix_{i} = 1) and the other vertices are measured in the XX basis. We denote τ(x)\tau(x) possible measurement outcomes of all qubits of |ψΓ\ket{\psi_{\Gamma}} for input xx, i.e., τ(x)={z{0,1}M:z|HMSuxuSvxvSwxw|ψΓ0}\tau(x)=\left\{z\in\{0,1\}^{M}:\braket{z}{H^{\otimes{M}}{S_{u}}^{x_{u}}{S_{v}}^{x_{v}}{S_{w}}^{x_{w}}}{\psi_{\Gamma}}\neq 0\right\}. We consider a relationship between input xx and output zτ(x)z\in\tau(x). Define the following summations:

zL=iLoddzizR=iRoddzB=iBoddzizE=i{u,v,w}RevenLevenBevenzi.z_{L}=\bigoplus_{i\in L_{odd}}z_{i}\hskip 10.0ptz_{R}=\bigoplus_{i\in R_{odd}}\hskip 10.0ptz_{B}=\bigoplus_{i\in B_{odd}}z_{i}\hskip 10.0ptz_{E}=\bigoplus_{i\in\{u,v,w\}\cup R_{even}\cup L_{even}\cup B_{even}}z_{i}.
Claim 1 (Claim 3 in [14]).

Let x=xuxvxw{0,1}3x=x_{u}x_{v}x_{w}\in\{0,1\}^{3} and suppose zτ(x)z\in\tau(x). Then zRzBzL=0z_{R}\oplus z_{B}\oplus z_{L}=0. Moreover, if xuxvxw=0x_{u}\oplus x_{v}\oplus x_{w}=0 then

(xuxvxw=000)\displaystyle(x_{u}x_{v}x_{w}=000) zE=0,(xuxvxw=110)\displaystyle z_{E}=0,\hskip 33.0pt(x_{u}x_{v}x_{w}=110) zEzL=1,\displaystyle z_{E}\oplus z_{L}=1,
(xuxvxw=101)\displaystyle(x_{u}x_{v}x_{w}=101) zEzB=1,(xuxvxw=011)\displaystyle z_{E}\oplus z_{B}=1,\hskip 10.0pt(x_{u}x_{v}x_{w}=011) zEzR=1.\displaystyle z_{E}\oplus z_{R}=1.

The following lemma is about quantum nonlocality in graph states of triangles and similar to Lemma 3 in Section 4.1 of [14]. It shows that when we assume a classical circuit has a kind of locality, the classical circuit cannot satisfy the relation of Claim 1 as inputs and outputs. We will give the proof in Appendix B.

Lemma 4.1 ([7, 14, 26]).

Consider a classical circuit which takes as an input a bit string x=xuxvxw{0,1}3x=x_{u}x_{v}x_{w}\in\{0,1\}^{3} and a random string rr, and outputs z{0,1}Mz\in\{0,1\}^{M} which are corresponding to vertices of Γ\Gamma. Let us assume output bits in LL depend on rr and at most one geometrically near input bit, which is either xux_{u} or xvx_{v}. Similarly, we assume output bits in RR and BB depend on rr and at most one geometrically near input bit. Then, the classical circuit CC cannot output zτ(x)z\in\tau(x) with high probability.

5 Proof of separation of depth between quantum and classical circuits to solve Graph State Sampling problem

In this section, we define Graph State Sampling problem and prove a separation of depth between quantum circuits and classical circuits. We consider an almost all induced subgraph SS of a graph G×K2G\times K_{2} such that GG is an expander graph. Then, we prove ρ(G×K2)\rho(G\times K_{2}) can be solved on all inputs by a constant-depth quantum circuit on Θ(|G×K2|)\Theta(|G\times K_{2}|) qubits, but Ω(log|S|)\Omega(\log|S|) depth is required for any classical probabilistic circuits to solve ρ(S)\rho(S) on all inputs.

5.1 Definition of Graph State Sampling problem ρ(G)\rho(G)

In this subsection, for any graph GG, we define Graph State Sampling problem ρ(G)\rho(G).

The relation is defined as a subset of {0,1}|V|+|E|×{0,1}|V|\{0,1\}^{|V|+|E|}\times\{0,1\}^{|V|} and thus consists of pairs (x,z)(x,z), where x{0,1}|V|+|E|x\in\{0,1\}^{|V|+|E|} represents the input and z{0,1}|V|z\in\{0,1\}^{|V|} represents the output. Each bit of xx corresponds to a vertex or a edge. The string xx decides the quantum graph state and the measurement bases: a CZCZ gate corresponding to edge ee is applied if xe=1x_{e}=1, and the qubit corresponding to a vertex vv is measured in the XX basis if xvx_{v} is 0, or in the YY basis if xvx_{v} is 1. The quantum state |ψx\ket{\psi_{x}} for each xx before the measurement in the computational basis is thus:

|ψx=H|V|xv=1Sv(xe=1CZe)H|V||0|V|.\ket{\psi_{x}}=H^{\otimes|V|}\prod_{x_{v}=1}S_{v}\left(\prod_{x_{e}=1}CZ_{e}\right)H^{\otimes|V|}\ket{0^{|V|}}.

The output z{0,1}|V|z\in\{0,1\}^{|V|} of the relation is any possible outcome of the measurement of this quantum state (note that there are possibly several measurement outcomes zz for each xx). Since the probability of measurement results of each binary string zz is |z|ψx|2|\braket{z}{\psi_{x}}|^{2}, the definition of ρ(G)\rho(G) is as follows.

Definition 5.1.

Given a graph G,

ρ(G)={(x,z)|x{0,1}|V|+|E|andz{0,1}|V|suchthat|z|ψx|2>0}.\rho(G)=\{(x,z)|x\in\{0,1\}^{|V|+|E|}\ \mathrm{and}\ z\in\{0,1\}^{|V|}\mathrm{\ such\ that\ }|\braket{z}{\psi_{x}}|^{2}>0\}.

5.2 Constant-depth quantum circuits to solve Graph State Sampling problem

The following is easily shown by Lemma 2.2.

Lemma 5.2.

When the maximum degree of graph G = (V,E) is bounded by a constant, ρ(G)\rho(G) on all inputs can be solved with certainty by a constant-depth quantum circuit on Θ(|G|)\Theta(|G|) qubits composed of one- and two-qubit gates.

Proof 5.3.

The initial state |x|0|V|\ket{x}\otimes\ket{0^{|V|}} is prepared on |E|+2|V|=Θ(|G|)|E|+2|V|=\Theta(|G|) qubits. We apply H|V|H^{\otimes|V|} to the last |V||V| qubits and then controlled-CZCZ (CCZCCZ) gates and controlled-SS (CSCS) gates that apply CZeCZ_{e} if xe=1x_{e}=1 and SvS_{v} if xv=1x_{v}=1. Since GG is edge colorable with a constant number from Lemma 2.2 and CCZCCZ gates corresponding to edges assigned the same color can be applied simultaneously (since they act on disjoint sets of qubits), the total depth of CCZCCZ gates can be bounded by a constant. CSCS gates can also be applied in constant depth. We finally apply H|V|H^{\otimes|V|} to the last |V||V| qubits and measure these qubits in the computational basis, which gives a string zz such that (x,z)ρ(G)(x,z)\in\rho(G).

The total depth of this circuit can be bounded by a constant. (Note that each CCZCCZ and CSCS gate can be implemented in constant depth using our elementary gates [5].) We refer to Figure 2 for an illustration.

Refer to caption
Figure 2: Constant-depth quantum circuit to solve ρ(G)\rho(G).

5.3 Hardness to solve Graph State Sampling problem with shallow classical circuits

In this subsection, we prove Theorem 1.3, and especially the classical hardness. The impossibility argument in Section 4 assumed classical circuits had a kind of geometrical locality. The lower bounds in this section, however, do not require any geometrical locality of shallow classical circuits. The proofs are similar to the proofs of the results of Section 4.2 in [14], with the notable exception of Claim 3 and the discussion afterwards (in particular, the definition of boxes), which are specifically tailored for the expander graphs we consider.

5.3.1 Good and bad vertices

To begin with, we define “good” and “bad” vertices. In a shallow classical circuit, most input bits are not correlated with many output bits. We call a vertex “bad” if the corresponding input bit are correlated with many output bits. Here is the formal definition.

Definition 5.4.

Given a graph G=(V,E)G=(V,E), we consider ρ(G)\rho(G) and a classical probabilistic circuit CC for it. Then, a vertex vVv\in V is good if LC(xv)=O(|V|116)L_{C}(x_{v})=O(|V|^{\frac{1}{16}}) and bad if vv is not good.

The following claim is similar to Claim 5 in [14].

Claim 2.

Let G=(V,E)G=(V,E) be a graph such that the maximum degree is bounded by a constant and CC be a classical probabilistic circuit for ρ(G)\rho(G). Suppose the fan-in is bounded by a constant KK and the depth dd is less than log|V|32logK\frac{\log|V|}{32\log{K}} , the number of bad vertices is o(|V|)o(|V|).

Proof 5.5.

Since the number of correlated input bits increases by at most KK times when the depth increases by 1,

|LC(zi)|Kd<|V|132forallvV.|L_{C}(z_{i})|\leq K^{d}<|V|^{\frac{1}{32}}\hskip 10.0pt\mathrm{for}\ \mathrm{all}\ v\in V. (2)

Let us consider a bipartite graph whose vertices are respective bits of xx and zz, and a edge is spanned if and only if xix_{i} and zjz_{j} are correlated. Since the maximum degree of GG is bounded by a constant, we have |x|=|V|+|E|=Θ(|V|)|x|=|V|+|E|=\Theta(|V|). From Equation (2) and considering edges spanned from zz, the total number of edges is limited by |V||V|132|V|\cdot|V|^{\frac{1}{32}}. Since bad vertices are correlated with Ω(|V|116)\Omega(|V|^{\frac{1}{16}}) output bits, the total number of xvx_{v} such that vv is bad is O(|V|3132)O(|V|^{\frac{31}{32}}) and this means the number of bad vertices is o(|V|)o(|V|).

5.3.2 Proof of Theorem 1.3

Before the proof, we rewrite Theorem 1.3 using the notations we defined. The reason we consider the graph product G×K2G\times K_{2} is to take a cycle which has even length for using Lemma 4.1.

Theorem 5.6.

There exist constants α>0\alpha>0 and ϵ>0\epsilon>0 such that the following holds for all sufficiently large expander graphs GG:

  1. (i)

    ρ(G×K2)\rho(G\times K_{2}) can be solved on all inputs with certainty by a constant-depth quantum circuit on Θ(|G×K2|)\Theta(|G\times K_{2}|) qubits composed of one- and two-qubit gates;

  2. (ii)

    for any induced subgraph SS such that |S|(1ϵ)|G×K2||S|\geq(1-\epsilon)|G\times K_{2}|, no bounded-fanin classical probabilistic circuits whose depth is less than αlog(|S|)\alpha\log(|S|) can solve ρ(S)\rho(S) on all inputs.

Proof 5.7 (Proof of Theorem 5.6).

We can take |G|=|V||G|=|V| arbitrary large from the property of expander graphs. Then |G×K2|=2|G||G\times K_{2}|=2|G| and |S|(1ϵ)|G×K2||S|\geq(1-\epsilon)|G\times K_{2}| are also sufficiently large. Let us introduce some convenient notations. Given a vertex uGu\in G, we denote uu^{\prime} and u′′u^{\prime\prime} the two corresponding vertices in G×K2G\times K_{2} (with no special order). Given a vertex vG×K2v\in G\times K_{2}, we denote v¯\bar{v} the other vertex in G×K2G\times K_{2} associated to the same vertex in GG.

First, we prove Theorem 5.6 (i). We consider the Graph State Sampling problem ρ(G×K2)\rho(G\times K_{2}). Since the maximum degree of GG is bounded by a constant dd, the maximum degree of G×K2G\times K_{2} is bounded by d+1d+1. From Lemma 5.2, ρ(G×K2)\rho(G\times K_{2}) can be solved with a constant-depth quantum circuit.

Next, we will prove Theorem 5.6 (ii), the hardness to solve ρ(S)\rho(S) on all inputs with shallow classical circuits. Let CC be a classical probabilistic circuit to solve ρ(S)\rho(S) on all inputs and KK be the bounded fan-in of CC. In order to reach a contradiction, we assume the depth of CC is less than log|S|32logK\frac{\log|S|}{32\log{K}}. Then the number of bad vertices is small, which enables us to prove the following claim.

Claim 3.

SS contains an induced subgraph G×K2G^{\prime}\times K_{2} such that all vertices are good and GG^{\prime} contains a Ω(|V|14)×Ω(|V|14)\Omega(|V|^{\frac{1}{4}})\times\Omega(|V|^{\frac{1}{4}}) grid as a minor.

Proof 5.8.

From Claim 2, we know that SS contains o(|S|)o(|S|) bad vertices. Let us remove all these bad vertices, and write SgoodS_{good} the remaining set. We further remove all vertices uSgoodu\in S_{good} such that u¯Sgood\bar{u}\notin S_{good}. The remaining set of vertices induces a graph H×K2H\times K_{2}, for an induced subgraph HH of GG such that |H|(12ϵo(1))|G||H|\geq(1-2\epsilon-o(1))|G|. From Lemma 3.3, when ϵ\epsilon is taken small enough, the graph H×K2H\times K_{2} has a connected component G×K2G^{\prime}\times K_{2}, where GG^{\prime} is contains a Ω(|V|14)×Ω(|V|14)\Omega(|V|^{\frac{1}{4}})\times\Omega(|V|^{\frac{1}{4}}) grid as a minor.

Remember the definition of a graph minor (Definition 2 in Section 2.1). Each connected subgraph GuG_{u} in GG^{\prime} forming the grid (except connected subgraphs on the corners of the grid) is adjacent to the four connected subgraphs Gv1,Gv2,Gv3,Gv4G_{v_{1}},G_{v_{2}},G_{v_{3}},G_{v_{4}} where {u,v1}\{u,v_{1}\}, {u,v2}\{u,v_{2}\}, {u,v3}\{u,v_{3}\} and {u,v4}\{u,v_{4}\} are edges of the grid. For each GuG_{u}, we arbitrarily select two of these four components. Assume for instance that we selected Gv1G_{v_{1}} and Gv2G_{v_{2}}. We choose arbitrarily one vertex vv in GuG_{u} adjacent to a vertex of Gv1G_{v_{1}}, and one vertex ww in GuG_{u} adjacent to a vertex of Gv2G_{v_{2}}. We then arbitrarily choose one path inside GuG_{u} that connects vv and ww (such a path necessarily exists). We refer to Figure 3 for an illustration.

Refer to caption
Figure 3: The path in GuG_{u} described with blue line connects Gv1G_{v_{1}} and Gv2G_{v_{2}}.

We denote T the length of one side of the grid (T = Ω(|V|14)\Omega(|V|^{\frac{1}{4}})). From each connected subgraph forming the T×TT\times T grid of GG^{\prime}, we choose one vertex such that it is on a path selected in the way above (this condition of the vertices is required when adding missing segments inside boxes for Claim 5). For such a vertex jj, we define Box(j)G×K2\mathrm{Box}(j)\subseteq G^{\prime}\times K_{2} as a 2D grid of connected subgraphs of size |V|18×|V|18\lfloor|V|^{\frac{1}{8}}\rfloor\times\lfloor|V|^{\frac{1}{8}}\rfloor centered at the connected subgraph which jj^{\prime} and j′′j^{\prime\prime} belong to. We choose grid-shaped regions P,Q,RG×K2P,Q,R\subseteq G^{\prime}\times K_{2} as shown in Figure 5. PP is a upper-left region of the graph product of K2K_{2} and a T/3×T/3\lfloor T/3\rfloor\times\lfloor T/3\rfloor grid of connected subgraphs cut from G×K2G^{\prime}\times K_{2}. QQ is a upper-right region and RR is a bottom-left region. The following claim is similar to Claim 6 in [14].

Refer to caption
Figure 4: Definition of the regions P,Q,RP,Q,R of G×K2G^{\prime}\times K_{2}.
Refer to caption
Figure 5: Definition of Box(jj) and a possible choice of p,q,rp,q,r.
Claim 4.

For all large enough |V||V|, we can choose a triple of vertices p,q,rVp,q,r\in V such that p,p′′Pp^{\prime},p^{\prime\prime}\in P, q,q′′Qq^{\prime},q^{\prime\prime}\in Q, r,r′′Rr^{\prime},r^{\prime\prime}\in R and

Box(p)P,Box(q)Q,Box(r)R,\displaystyle\mathrm{Box}(p)\subseteq P,\ \mathrm{Box}(q)\subseteq Q,\ \mathrm{Box}(r)\subseteq R,\hskip 40.0pt (3)
LC(xpxp′′)Box(q)=,LC(xpxp′′)Box(r)=,\displaystyle L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}})\cap\mathrm{Box}(q)=\emptyset,\ L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}})\cap\mathrm{Box}(r)=\emptyset, (4)
LC(xqxq′′)Box(p)=,LC(xqxq′′)Box(r)=,\displaystyle L_{C}(x_{q^{\prime}}\cup x_{q^{\prime\prime}})\cap\mathrm{Box}(p)=\emptyset,\ L_{C}(x_{q^{\prime}}\cup x_{q^{\prime\prime}})\cap\mathrm{Box}(r)=\emptyset, (5)
LC(xrxr′′)Box(p)=,LC(xrxr′′)Box(q)=.\displaystyle L_{C}(x_{r^{\prime}}\cup x_{r^{\prime\prime}})\cap\mathrm{Box}(p)=\emptyset,\ L_{C}(x_{r^{\prime}}\cup x_{r^{\prime\prime}})\cap\mathrm{Box}(q)=\emptyset. (6)
Proof 5.9.

One connected subgraph in the grid minor can belong to at most |V|18×|V|18=|V|14|V|^{\frac{1}{8}}\times|V|^{\frac{1}{8}}=|V|^{\frac{1}{4}} boxes. Since the vertices in G×K2G^{\prime}\times K_{2} are good, a given lightcone LC(xuxu′′)L_{C}(x_{u^{\prime}}\cup x_{u^{\prime\prime}}) can intersect with at most |V|14×|LC(xuxu′′)|=|V|14×O(|S|116)=O(|V|516)|V|^{\frac{1}{4}}\times|L_{C}(x_{u^{\prime}}\cup x_{u^{\prime\prime}})|=|V|^{\frac{1}{4}}\times O(|S|^{\frac{1}{16}})=O(|V|^{\frac{5}{16}}) boxes. The number of possibilites to choose a box in QQ is Ω(|V|14)×Ω(|V|14)=Ω(|V|12)\Omega(|V|^{\frac{1}{4}})\times\Omega(|V|^{\frac{1}{4}})=\Omega(|V|^{\frac{1}{2}}). Thus if we pick boxes uniformly at random then

Pr[LC(xpxp′′)Box(q)=]O(|V|516|V|12)<16\mathrm{Pr}[L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}})\cap\mathrm{Box}(q)=\emptyset]\leq O\left(\frac{|V|^{\frac{5}{16}}}{|V|^{\frac{1}{2}}}\right)<\frac{1}{6} (7)

for large enough |V||V|. A similar bound applies to the five others that appear in the three equations (4, 5, 6). By the union bound, there exists at least one choice of p,q,rp,q,r that satisfies all the four equations (3, 4, 5, 6).

Below we consider a cycle Γ\Gamma that is a subgraph of G×K2G^{\prime}\times K_{2}. The following claim is similar to Claim 7 in [14].

Claim 5.

The following holds for all sufficiently large |V||V|. Fix some triple of vertices p,q,rp,q,r satisfying the four equations (3, 4, 5, 6). Then there exists an even length cycle Γ\Gamma containing p,p′′,q,q′′,r,r′′p^{\prime},p^{\prime\prime},q^{\prime},q^{\prime\prime},r^{\prime},r^{\prime\prime} such that the lightcones LC(xpxp′′)L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}}), LC(xqxq′′)L_{C}(x_{q^{\prime}}\cup x_{q^{\prime\prime}}), LC(xrxr′′)L_{C}(x_{r^{\prime}}\cup x_{r^{\prime\prime}}) contain no vertices of Γ\Gamma lying outside of Box(p)Box(q)Box(r)\mathrm{Box}(p)\cup\mathrm{Box}(q)\cup\mathrm{Box}(r).

Proof 5.10.

Since the size of connected subgraphs of each box is |V|18×|V|18\lfloor|V|^{\frac{1}{8}}\rfloor\times\lfloor|V|^{\frac{1}{8}}\rfloor, we can choose |V|18\lfloor|V|^{\frac{1}{8}}\rfloor pairwise vertex disjoint paths γ\gamma that connect any pair of boxes Box(pp), Box(qq), Box(rr) (in each connected subgraph, we can always find a path which connects adjacent connected subgraphs). We refer to Figure 5 for an illustration. Let γ(a,b)\gamma(a,b) be a path connecting Box(a)\mathrm{Box}(a) and Box(b)\mathrm{Box}(b), where ab{p,q,r}a\neq b\in\{p,q,r\}. Any triple of paths γ(p,q),γ(q,r),γ(p,r)\gamma(p,q),\gamma(q,r),\gamma(p,r) can be completed to a cycle Γ\Gamma by adding the missing segments of the cycle inside the boxes Box(pp), Box(qq), Box(rr) because p,q,rp,q,r are defined to take such a path inside each box. Since all vertices are good in G×K2G^{\prime}\times K_{2} and each connected subgraph belongs to at most one path γ\gamma, we infer that LC(xpxp′′)L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}}) intersects with at most 2O(|S|116)=O(|V|116)2\cdot O(|S|^{\frac{1}{16}})=O(|V|^{\frac{1}{16}}) paths γ\gamma. Thus if we pick the path γ(p,q)\gamma(p,q) uniformly at random among all |V|18\lfloor|V|^{\frac{1}{8}}\rfloor possible choices then

Pr[LC(xpxp′′)γ(p,q)]O(|V|116|V|18)<19\mathrm{Pr}[L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}})\cap\gamma(p,q)\neq\emptyset]\leq O\left(\frac{|V|^{\frac{1}{16}}}{|V|^{\frac{1}{8}}}\right)<\frac{1}{9} (8)

for enough large |V||V|. The same bound applies to eight remaining combinations of lightcones LC(xpxp′′),LC(xqxq′′),LC(xrxr′′)L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}}),L_{C}(x_{q^{\prime}}\cup x_{q^{\prime\prime}}),L_{C}(x_{r^{\prime}}\cup x_{r^{\prime\prime}}) and paths γ(p,q)\gamma(p,q), γ(p,r)\gamma(p,r), and γ(q,r)\gamma(q,r). By the union bound, there exists at least one triple of paths γ(p,q),γ(q,r),γ(p,r)\gamma(p,q),\gamma(q,r),\gamma(p,r) that do not intersect with LC(xpxp′′),LC(xqxq′′),LC(xrxr′′)L_{C}(x_{p^{\prime}}\cup x_{p^{\prime\prime}}),L_{C}(x_{q^{\prime}}\cup x_{q^{\prime\prime}}),L_{C}(x_{r^{\prime}}\cup x_{r^{\prime\prime}}). When we choose vv^{\prime} and v′′v^{\prime\prime} consecutively, any cycle in G×K2G^{\prime}\times K_{2} has an even length. Since we can take the cycle in the way above, the cycle has a even length and is the desired cycle Γ\Gamma.

Let p,q,rp,q,r and Γ\Gamma be chosen as described in Claim 5. Let MM be the even number of vertices of Γ\Gamma. When we choose p,p′′,q,q′′,r,r′′p^{\prime},p^{\prime\prime},q^{\prime},q^{\prime\prime},r^{\prime},r^{\prime\prime} properly, the distances between p,q,rp^{\prime},q^{\prime},r^{\prime} are all even. Consider the subset of instances where

xe={1ifeisanedgeofΓ0otherwiseandxv=0if(vV{p,q,r})\displaystyle x_{e}=\left\{\begin{array}[]{l}1\hskip 10.0pt\mathrm{if\ }e\mathrm{\ is\ an\ edge\ of\ }\Gamma\\ 0\hskip 10.0pt\mathrm{otherwise}\end{array}\right.\mathrm{and}\hskip 10.0ptx_{v}=0\ \mathrm{if}\ (v\in V\setminus\{p^{\prime},q^{\prime},r^{\prime}\})

There are 23=82^{3}=8 such instances corresponding to choices of input bits xp,xq,xr{0,1}x_{p^{\prime}},x_{q^{\prime}},x_{r^{\prime}}\in\{0,1\}. Let us fix inputs xx of the circuit CC except {xp,xq,xr}\{x_{p^{\prime}},x_{q^{\prime}},x_{r^{\prime}}\} and consider only output bits zjz_{j} with jΓj\in\Gamma. By the way of fixing, we obtain a classical circuit DD which takes a three-bit string xpxqxr{0,1}3x_{p^{\prime}}x_{q^{\prime}}x_{r^{\prime}}\in\{0,1\}^{3} and a random string rr as input and output zΓ{0,1}Mz_{\Gamma}\in\{0,1\}^{M}. For any input bit xi{xp,xq,xr}x_{i}\in\{x_{p^{\prime}},x_{q^{\prime}},x_{r^{\prime}}\} we have LD(xi)LC(xi)L_{D}(x_{i})\subseteq L_{C}(x_{i}) since any pair of input and output variables which are correlated in DD are also correlated in CC, by definition. Our assumption that CC can solve ρ(S)\rho(S) on all inputs implies that DD can output zΓτ(xpxqxr)z_{\Gamma}\in\tau({x_{p^{\prime}}}{x_{q^{\prime}}}{x_{r^{\prime}}}). From Lemma 4.1, at least one output bit zjz_{j} such that jΓj\in\Gamma and j{p,q,r}j\notin\{p^{\prime},q^{\prime},r^{\prime}\} depends on the two geometrically near inputs from xp,xq,xrx_{p^{\prime}},x_{q^{\prime}},x_{r^{\prime}}. By LD(xi)LC(xi)L_{D}(x_{i})\subseteq L_{C}(x_{i}), the same is true for the input-output dependency of CC. From Claim 9, for each xix_{i}, LC(xi)L_{C}(x_{i}) only intersects with zjz_{j} such that jj Box(i)\in\mathrm{Box}(i) and there is a contradiction. Therefore, the depth of any classical probabilistic circuit that has bounded fan-in KK and solves ρ(S)\rho(S) on all inputs is not less than log|S|32logK\frac{\log|S|}{32\log K}. This concludes the proof of Theorem 3.

References

  • [1] Scott Aaronson and Alex Arkhipov. The computational complexity of linear optics. In Proceedings of the 43rd Annual ACM SIGACT Symposium on Theory of Computing (STOC 2011), pages 333–342, 2011.
  • [2] Scott Aaronson and Alex Arkhipov. Bosonsampling is far from uniform. Quantum Information & Computation, 14(15–16):1383–1423, 2014.
  • [3] Scott Aaronson and Lijie Chen. Complexity-Theoretic Foundations of Quantum Supremacy Experiments. In Proceedings of 32nd Computational Complexity Conference (CCC 2017), volume 79 of LIPIcs, pages 22:1–22:67, 2017.
  • [4] Andris Ambainis. Understanding quantum algorithm via query complexity. In Proceedings of the International Congress of Mathematicians (ICM 2018), pages 3265–3285, 2019.
  • [5] Matthew Amy, Dmitri Maslov, Michele Mosca, and Martin Roetteler. A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 32(6):818–830, 2013.
  • [6] Frank Arute et al. Quantum supremacy using a programmable superconducting processor. Nature, 574(7779):505–510, 2019.
  • [7] Jonathan Barrett, Carlton M. Caves, Bryan Eastin, Matthew B. Elliott, and Stefano Pironio. Modeling pauli measurements on graph states with nearest-neighbor classical communication. Physical Review A, 75(1):012103, 2007.
  • [8] Ya. M. Barzdin. On the realization of networks in three-dimensional space. In Selected Works of A. N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms, pages 194–202. 1993.
  • [9] Adam Bene Watts, Robin Kothari, Luke Schaeffer, and Avishay Tal. Exponential separation between shallow quantum circuits and unbounded fan-in shallow classical circuits. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing (STOC 2019), pages 515–526, 2019.
  • [10] Jan Benhelm, Gerhard Kirchmair, Christian F. Roos, and Rainer Blatt. Towards fault-tolerant quantum computing with trapped ions. Nature Physics, 4(6):463–466, 2008.
  • [11] Paul Benioff. The computer as a physical system: A microscopic quantum mechanical hamiltonian model of computers as represented by turing machines. Journal of Statistical Physics, 22(5):563–591, 1980.
  • [12] Ethan Bernstein and Umesh Vazirani. Quantum complexity theory. SIAM Journal on Computing, 26(5):1411–1473, 1997.
  • [13] Adam Bouland, Bill Fefferman, Chinmay Nirkhe, and Umesh Vazirani. "Quantum Supremacy" and the Complexity of Random Circuit Sampling. In Proceedings of 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), volume 124 of LIPIcs, pages 15:1–15:2, 2019.
  • [14] Sergey Bravyi, David Gosset, and Robert König. Quantum advantage with shallow circuits. Science, 362(6412):308–311, 2018.
  • [15] Sergey Bravyi, David Gosset, Robert König, and Marco Tomamichel. Quantum advantage with noisy shallow circuits. Nature Physics, 16(10):1040–1045, 2020.
  • [16] Michael J. Bremner, Richard Jozsa, and Dan J. Shepherd. Classical simulation of commuting quantum computations implies collapse of the polynomial hierarchy. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 467(2126):459–472, 2011.
  • [17] Michael J. Bremner, Ashley Montanaro, and Dan J. Shepherd. Average-case complexity versus approximate simulation of commuting quantum computations. Physical Review Letters, 117(8):080501, 2016.
  • [18] Michael J. Bremner, Ashley Montanaro, and Dan J. Shepherd. Achieving quantum supremacy with sparse and noisy commuting quantum computations. Quantum, 1:8, 2017.
  • [19] Michael Capalbo, Omer Reingold, Salil Vadhan, and Avi Wigderson. Randomness conductors and constant-degree lossless expanders. In Proceedings of the 34th Annual ACM SIGACT Symposium on Theory of Computing (STOC 2002), pages 659–668, 2002.
  • [20] Julia Chuzhoy and Rachit Nimavat. Large minors in expanders. arXiv:1901.09349, 2019.
  • [21] Matthew Coudron, Jalex Stark, and Thomas Vidick. Trading locality for time: certifiable randomness from low-depth circuits. Communications in Mathematical Physics, 382(1):49–86, 2021. Also presented at QIP 2019.
  • [22] Ronald De Wolf. Quantum communication and complexity. Theoretical Computer Science, 287(1):337–353, 2002.
  • [23] Reinhard Diestel. Graph theory, volume 173 of Graduate texts in mathematics. Springer, 2000.
  • [24] Andreas Wallraff et al. Strong coupling of a single photon to a superconducting qubit using circuit quantum electrodynamics. Nature, 431(7005):162–167, 2004.
  • [25] Richard P Feynman. Simulating physics with computers. Int. J. Theor. Phys, 21(6/7):467–488, 1982.
  • [26] François Le Gall. Average-Case Quantum Advantage with Shallow Circuits. In Proceedings of 34th Computational Complexity Conference (CCC 2019), volume 137 of LIPIcs, pages 21:1–21:20, 2019.
  • [27] Daniel Grier, Nathan Ju, and Luke Schaeffer. Interactive quantum advantage with noisy, shallow clifford circuits. arXiv:2102.06833, 2021.
  • [28] Daniel Grier and Luke Schaeffer. Interactive shallow clifford circuits: quantum advantage against NC1 and beyond. In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing (STOC 2020), pages 875–888, 2020.
  • [29] Misha Gromov and Larry Guth. Generalizations of the kolmogorov–barzdin embedding estimates. Duke Mathematical Journal, 161(13):2549–2603, 2012.
  • [30] Marc Hein, Jens Eisert, and Hans J. Briegel. Multiparty entanglement in graph states. Physical Review A, 69(6):062311, 2004.
  • [31] Emmanuel Kowalski. An introduction to expander graphs. Société Mathématique de France, 2019.
  • [32] Michael Krivelevich. Expanders — how to find them, and what to find in them. Surveys in Combinatorics, pages 115–142, 2019.
  • [33] Michael Krivelevich and Benjamin Sudakov. Minors in expanding graphs. Geometric and Functional Analysis, 19(1):294–331, 2009.
  • [34] Hoi-Kwong Lo. Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity. Physical Review A, 62(1):012313, 2000.
  • [35] N. David Mermin. Extreme quantum entanglement in a superposition of macroscopically distinct states. Physical Review Letters, 65(15):1838, 1990.
  • [36] Yasunobu Nakamura, Chii Dong Chen, and Jaw Shen Tsai. Spectroscopy of energy-level splitting between two macroscopic quantum states of charge coherently superposed by josephson coupling. Physical Review Letters, 79(12):2328, 1997.
  • [37] Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 2000.
  • [38] Jeremy L O’Brien. Optical quantum computing. Science, 318(5856):1567–1570, 2007.
  • [39] Asher Peres. Incompatible results of quantum measurements. Physics Letters A, 151(3-4):107–108, 1990.
  • [40] John Preskill. Quantum computing and the entanglement frontier. Bulletin of the American Physical Society, 58, 2013.
  • [41] John Preskill. Quantum computing in the NISQ era and beyond. Quantum, 2:79, 2018.
  • [42] Ran Raz and Avishay Tal. Oracle separation of BQP and PH. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing (STOC 2019), page 13–23, 2019.
  • [43] Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5):1484–1509, 1997.
  • [44] Barbara M. Terhal and David P. DiVincenzo. Adptive quantum computation, constant depth quantum circuits and arthur-merlin games. Quantum Information & Computation, 4(2):134–145, 2004.
  • [45] Jian-Qiang You and Franco Nori. Atomic physics and quantum optics using superconducting circuits. Nature, 474(7353):589–597, 2011.
  • [46] Han-Sen Zhong et al. Quantum computational advantage using photons. Science, 370:1460–1463, 2020.

Appendix A Proof of Lemma 3.3

First, we introduce a notation. The range in Definition 3.1, 1 |U|12|V|\leq|U|\leq\frac{1}{2}|V|, may be a little arbitrary. In terms of the range where the expansion ratio is considered, we define more general expander graphs as follows.

Definition A.1 (Definition 2.2 in [32]).

Let G=(V,E)G=(V,E) be a graph, let II be a set of positive integers. The graph G is an II-expanderexpander if a positive constant hh exists such that NG(U)h|U|N_{G}(U)\geq h|U| for every vertex subset UVU\subset V satisfying |U|I|U|\in I.

Note that this definition does not limit the maximum degree of graphs. When the graph GG is an expander graph (as defined as Definition 3.2), GG is also a [1,|V|2]\left[1,\frac{|V|}{2}\right]-expander with bounded degree.

Then, the following claim shows an expander graph still has a large connected component and it can be described using the notation of Definition A.1 when a small fraction of vertices are adversarially removed.

Claim 6.

Let G=(V,E)G=(V,E) be an expander graph. If we take a sufficiently small constant ϵ>0\epsilon>0, the graph has a connected component CC which has more than |V|2\frac{|V|}{2} vertices and is a [|C|3,2|C|3]\left[\frac{|C|}{3},\frac{2|C|}{3}\right]-expander after up to an ϵ\epsilon fraction of the vertices are adversarially removed.

Proof A.2.

Let hh be the expansion ratio and dd be the maximum degree of the graph GG. Let VVV^{\prime}\subset V be an arbitrary subset of vertices such that |V|ϵ|V||V^{\prime}|\leq\epsilon|V|. Let C1,,CmC_{1},...,C_{m} be the connected components of the left graph after |V||V^{\prime}| vertices are adversarially removed.

To reach a contradiction, we assume every connected component is equal to or smaller than half of |V||V|, i.e., for all i,|Ci||V|2i,\ |C_{i}|\leq\frac{|V|}{2}. From |VV|+|V|=|V||V\setminus V^{\prime}|+|V^{\prime}|=|V|, |VV|=|V||V|(1ϵ)|V||V\setminus V^{\prime}|=|V|-|V^{\prime}|\geq(1-\epsilon)|V|. Each connected component CiC_{i} has its neighbor NG(Ci)N_{G}(C_{i}) such that |NG(Ci)|h|Ci||N_{G}(C_{i})|\geq h|C_{i}| since |Ci||V|2|C_{i}|\leq\frac{|V|}{2}. A vertex can be a neighbor of at most dd connected components at the same time. Therefore, by the summation of neighbors of all connected components CiC_{i},

|NG(VV)|h|VV|dhd(1ϵ)|V|.|N_{G}(V\setminus V^{\prime})|\geq\frac{h|V\setminus V^{\prime}|}{d}\geq\frac{h}{d}(1-\epsilon)|V|.

In terms of the total number of vertices, |VV|+|NG(VV)||V||V\setminus V^{\prime}|+|N_{G}(V\setminus V^{\prime})|\leq|V|. Then,

ϵ|V||V|=|V||VV||NG(VV)|hd(1ϵ)|V|.\epsilon|V|\geq|V^{\prime}|=|V|-|V\setminus V^{\prime}|\geq|N_{G}(V\setminus V^{\prime})|\geq\frac{h}{d}(1-\epsilon)|V|.

Thus, ϵhd1+hd\epsilon\geq\frac{\frac{h}{d}}{1+\frac{h}{d}} and this contradicts ϵ\epsilon is sufficiently small. Therefore we can pick a connected component CC such that |C|>|V|2|C|>\frac{|V|}{2} from C1,,CmC_{1},...,C_{m}.

In the graph CC, we consider an arbitrary subset of vertices WW, which satisfies |C|3W2|C|3\frac{|C|}{3}\leq W\leq\frac{2|C|}{3}. From the expander property of GG, |NG(W)|h|C|3>h|V|6|N_{G}(W)|\geq\frac{h|C|}{3}>\frac{h|V|}{6}. Since the number of removed vertices is up to ϵ|V|\epsilon|V|, |NC(W)|>(h6ϵ)|V||N_{C}(W)|>\left(\frac{h}{6}-\epsilon\right)|V|. If we take ϵ\epsilon smaller than h6\frac{h}{6}, CC is a [|C|3,2|C|3]\left[\frac{|C|}{3},\frac{2|C|}{3}\right]-expander.

The next claim is to show there is a relation between II-expanders of Definition 5.

Claim 7 (Lemma 2.4 in [32]).

Let graph G=(V,E)G=(V,E) be a [|V|3,2|V|3]\left[\frac{|V|}{3},\frac{2|V|}{3}\right]-expander. Then there is a vertex subset ZVZ\subset V such that |Z|<|V|3|Z|<\frac{|V|}{3} and the graph G=G[VZ]G^{\prime}=G[V\setminus Z] is a [1,|G|2]\left[1,\frac{|G^{\prime}|}{2}\right]-expander.

The most significant result of minors of expander graphs is Claim 8 below. It is known that this bound (O(|V|log(|V|))O(\frac{|V|}{\log(|V|)})) is tight especially in terms of the size of grid minors.

Claim 8 (Corollary 8.3 in [32] and Theorem 1.1 in [20]).

Let graph G=(V,E)G=(V,E) be a [1,|V|2]\left[1,\frac{|V|}{2}\right]-expander. For any graph HH with O(|V|log(|V|))O(\frac{|V|}{\log(|V|)}) vertices and edges, G contains H as a minor.

Finally, using the above claims, we can prove Lemma 3.3.

Proof A.3 (Proof of Lemma 3.3).

From Claim 20, after the removal, the left graph has a connected component CC which is a [|C|3,2|C|3]\left[\frac{|C|}{3},\frac{2|C|}{3}\right]-expander. Using Claim 21, CC contains an induced subgraph CC^{\prime} such that CC^{\prime} is a [1,|C|2]\left[1,\frac{|C^{\prime}|}{2}\right]-expander and |C|>2|C|3>|V|3|C^{\prime}|>\frac{2|C|}{3}>\frac{|V|}{3}. When nn is sufficiently large, nlog(n)n12\frac{n}{\log(n)}\gg n^{\frac{1}{2}}. Therefore, from Claim 22, CC contains a Ω(|V|14)×Ω(|V|14)\Omega(|V|^{\frac{1}{4}})\times\Omega(|V|^{\frac{1}{4}}) grid as a minor since the maximum degree of grid graphs is 4, which is a constant, and the number of vertices and edges of a Ω(|V|14)×Ω(|V|14)\Omega(|V|^{\frac{1}{4}})\times\Omega(|V|^{\frac{1}{4}}) grid is Ω(|V|12)\Omega(|V|^{\frac{1}{2}}).

Appendix B Proof of Lemma 4.1

We note a mathematical claim below.

Claim 9 ([7, 14, 26]).

Consider any affine function q:{0,1}3{0,1}q:\{0,1\}^{3}\rightarrow\{0,1\} and any three affine function q1:{0,1}2{0,1},q2:{0,1}2{0,1},q3:{0,1}2{0,1}q_{1}:\{0,1\}^{2}\rightarrow\{0,1\},q_{2}:\{0,1\}^{2}\rightarrow\{0,1\},q_{3}:\{0,1\}^{2}\rightarrow\{0,1\} such that

q1(b2,b3)q2(b1,b3)q3(b1,b2)=0q_{1}(b_{2},b_{3})\oplus q_{2}(b_{1},b_{3})\oplus q_{3}(b_{1},b_{2})=0

holds for any (b1,b2,b3){0,1}3(b_{1},b_{2},b_{3})\in\{0,1\}^{3}. Then at least one of the four following equalities does not hold:

q(0,0,0)=0,\displaystyle\mspace{-75.0mu}q(0,0,0)=0,
q(0,1,1)q1(1,1)=1,\displaystyle q(0,1,1)\oplus q_{1}(1,1)=1,
q(1,0,1)q2(1,1)=1,\displaystyle q(1,0,1)\oplus q_{2}(1,1)=1,
q(1,1,0)q3(1,1)=1.\displaystyle q(1,1,0)\oplus q_{3}(1,1)=1.
Proof B.1 (Proof of Lemma 4.1).

Let us write z=F(x,r)z=F(x,r) for the function which is computed by the circuit. Below we show for each rr there exists a xx such that F(x,r)τ(x)F(x,r)\notin\tau(x). Let rr be fixed and we consider z=F(x,r)z=F(x,r) as a function of xx. Suppose first that zRzBzL=1z_{R}\oplus z_{B}\oplus z_{L}=1 for some x0{0,1}3x_{0}\in\{0,1\}^{3}. Then by Claim 1, F(x0,r)τ(x0)F(x_{0},r)\notin\tau(x_{0}) and we are done. Next suppose that zRzBzL=0z_{R}\oplus z_{B}\oplus z_{L}=0 for all x{0,1}3x\in\{0,1\}^{3}. From the assumption, zEz_{E} is an affine function of xux_{u}, xvx_{v} and xwx_{w}. In the same way, zLz_{L} is an affine function xux_{u} and xvx_{v}. zRz_{R} is an affine function of xvx_{v}, xwx_{w} and zBz_{B} is one of xux_{u}, xwx_{w}. Therefore, we can correspond zEz_{E}, zLz_{L}, zRz_{R} and zBz_{B} to q,q1,q2q,q_{1},q_{2} and q3q_{3} in Claim 9 and, from Claim 9, the output zz cannot meet all the four equation (2)-(5) simultaneously. Therefore, the classical circuit cannot output zτ(x)z\in\tau(x) with high probability.