This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

thanks: A preliminary version of this work appeared in the proceedings of the 12th Innovations in Theoretical Computer Science Conference (ITCS 2021) [25].

The Quantum Supremacy Tsirelson Inequality

William Kretschmer [email protected] Department of Computer Science, The University of Texas at Austin, Austin, TX 78712, USA
Abstract

A leading proposal for verifying near-term quantum supremacy experiments on noisy random quantum circuits is linear cross-entropy benchmarking. For a quantum circuit CC on nn qubits and a sample z{0,1}nz\in\{0,1\}^{n}, the benchmark involves computing |z|C|0n|2|\langle z|C|0^{n}\rangle|^{2}, i.e. the probability of measuring zz from the output distribution of CC on the all zeros input. Under a strong conjecture about the classical hardness of estimating output probabilities of quantum circuits, no polynomial-time classical algorithm given CC can output a string zz such that |z|C|0n|2|\langle z|C|0^{n}\rangle|^{2} is substantially larger than 12n\frac{1}{2^{n}} (Aaronson and Gunn, 2019). On the other hand, for a random quantum circuit CC, sampling zz from the output distribution of CC achieves |z|C|0n|222n|\langle z|C|0^{n}\rangle|^{2}\approx\frac{2}{2^{n}} on average (Arute et al., 2019).

In analogy with the Tsirelson inequality from quantum nonlocal correlations, we ask: can a polynomial-time quantum algorithm do substantially better than 22n\frac{2}{2^{n}}? We study this question in the query (or black box) model, where the quantum algorithm is given oracle access to CC. We show that, for any ε1poly(n)\varepsilon\geq\frac{1}{\mathrm{poly}(n)}, outputting a sample zz such that |z|C|0n|22+ε2n|\langle z|C|0^{n}\rangle|^{2}\geq\frac{2+\varepsilon}{2^{n}} on average requires at least Ω(2n/4poly(n))\Omega\left(\frac{2^{n/4}}{\mathrm{poly}(n)}\right) queries to CC, but not more than O(2n/3)O\left(2^{n/3}\right) queries to CC, if CC is either a Haar-random nn-qubit unitary, or a canonical state preparation oracle for a Haar-random nn-qubit state. We also show that when CC samples from the Fourier distribution of a random Boolean function, the naive algorithm that samples from CC is the optimal 1-query algorithm for maximizing |z|C|0n|2|\langle z|C|0^{n}\rangle|^{2} on average.

1 Introduction

A team based at Google has claimed the first experimental demonstration of quantum computational supremacy on a programmable device [10]. The experiment involved random circuit sampling, where the task is to sample (with nontrivial fidelity) from the output distribution of a quantum circuit containing random 11- and 22-qubit gates. To verify their experiment, they used the so-called Linear Cross-Entropy Benchmark, or Linear XEB. Specifically, for an nn-qubit quantum circuit CC and samples z1,,zk{0,1}nz_{1},\ldots,z_{k}\in\{0,1\}^{n}, the benchmark is given by:

b=2nki=1k|zi|C|0n|2.b=\frac{2^{n}}{k}\cdot\sum_{i=1}^{k}|\langle z_{i}|C|0^{n}\rangle|^{2}.

The goal is for bb to be large with high probability over the choice of the random circuit and the randomness of the sampler, as this demonstrates that the observations tend to concentrate on the outputs that are more likely to be measured under the ideal distribution for CC (i.e. the noiseless distribution in which zz is measured with probability |z|C|0n|2|\langle z|C|0^{n}\rangle|^{2}). We formalize this task as the bb-XHOG task:

Problem 1 (bb-XHOG, or Linear Cross-Entropy Heavy Output Generation).

Fix a distribution 𝒟\mathcal{D} over quantum circuits on nn-qubits.111We will sometimes leave the choice of 𝒟\mathcal{D} implicit when it is clear from context. Given a quantum circuit CC sampled from 𝒟\mathcal{D}, output a sample z{0,1}nz\in\{0,1\}^{n} such that:

𝔼C𝒟[|z|C|0n|2]b2n.\mathop{\mathbb{E}}_{C\sim\mathcal{D}}\left[|\langle z|C|0^{n}\rangle|^{2}\right]\geq\frac{b}{2^{n}}.

We emphasize that in this work, bb-XHOG is fundamentally an average-case problem: it is always defined with respect to a distribution 𝒟\mathcal{D} over the choice of circuit CC, which is why we require that the Linear XEB score exceeds bb in expectation. Note also that the procedure for solving XHOG could itself be randomized (e.g. if it involves sampling zz from the output of a quantum device), so the expectation in the above definition is taken with respect to this randomness as well.

For the purposes of demonstrating quantum supremacy, we will typically think of “large” bb as any bb bounded away from 11, as guessing zz uniformly at random achieves b=1b=1 (regardless of the distribution 𝒟\mathcal{D}!), just because z{0,1}n|z|C|0n|2=1\sum_{z\in\{0,1\}^{n}}|\langle z|C|0^{n}\rangle|^{2}=1 for any nn-qubit circuit CC. On the other hand, sampling from the noiseless output distribution of CC achieves b2b\approx 2 when 𝒟\mathcal{D} selects random circuits of polynomial size and sufficient depth. Indeed, sampling from CC achieves b2b\approx 2 whenever the circuit distribution 𝒟\mathcal{D} empirically exhibits the Porter-Thomas distribution on circuit output probabilities, in which the output probabilities are approximately i.i.d. exponential random variables [10, 3].

Under a strong complexity-theoretic conjecture about the classical hardness of nontrivially estimating output probabilities of quantum circuits, Aaronson and Gunn showed that no classical polynomial-time algorithm can solve bb-XHOG for any b1+1poly(n)b\geq 1+\frac{1}{\mathrm{poly}(n)} on random quantum circuits of polynomial size [3]. Thus, a physical quantum computer that solves bb-XHOG for b1+Ω(1)b\geq 1+\Omega(1) is considered strong evidence of quantum computational supremacy.

In this work, we ask: can an efficient quantum algorithm for bb-XHOG do substantially better than b=2b=2?222We thank Scott Aaronson [1] for raising this question, and for suggesting the analogy with the Tsirelson inequality. That is, what is the largest bb for which a polynomial-time quantum algorithm can solve bb-XHOG on random circuits? Note that the largest bb we could hope for is achieved by the optimal sampler that always outputs the string zz maximizing |z|C|0n|2|\langle z|C|0^{n}\rangle|^{2}. If the random circuits induce a Porter-Thomas distribution on output probabilities, then this solves bb-XHOG for b=Θ(n)b=\Theta(n) (see 13 below). However, finding the largest output probability might be computationally difficult even on a quantum computer, which is why we restrict our attention to efficient quantum algorithms.

We refer to our problem as the “quantum supremacy Tsirelson inequality” in reference to the Bell [12] and Tsirelson [19] inequalities for quantum nonlocal correlations (for a modern overview, see [21]). Under this analogy, the quantity bb in XHOG plays a similar role as the probability pp of winning some nonlocal game. For example, the Bell inequality for the CHSH game [20] states that no classical strategy can win the game with probability p>34p>\frac{3}{4}; we view this as analogous to the conjectured inability of efficient classical algorithms to solve bb-XHOG for any b>1b>1. By contrast, a quantum strategy with pre-shared entanglement allows players to win the CHSH game with probability p=cos2(π8)0.854>34p=\cos^{2}\left(\frac{\pi}{8}\right)\approx 0.854>\frac{3}{4}. An experiment that wins the CHSH game with probability p>34p>\frac{3}{4}, a violation of the Bell inequality, is analogous to an experimental demonstration of bb-XHOG for b>1b>1 on a quantum computer that establishes quantum computational supremacy. Finally, the Tsirelson inequality for the CHSH game states that any quantum strategy involving arbitrary pre-shared entanglement wins with probability pcos2(π8)p\leq\cos^{2}\left(\frac{\pi}{8}\right). Hence, an upper bound on bb for efficient quantum algorithms is the quantum supremacy counterpart to the Tsirelson inequality. We emphasize that our choice to refer to this as a “Tsirelson inequality” is purely by analogy; we do not claim that the question involving quantum supremacy or the techniques one might use to answer it are otherwise related to quantum nonlocal correlations.

1.1 Our Results

We study the quantum supremacy Tsirelson inequality in the quantum query (or black box) model. That is, we consider bb-XHOG with respect to distributions 𝒟\mathcal{D} that take the following form. We fix a quantum circuit CC that queries a classical or quantum oracle 𝒪\mathcal{O}. To sample CC from 𝒟\mathcal{D}, we choose 𝒪\mathcal{O} according to some distribution over oracles. We then ask what is the largest bb such that bb-XHOG with respect to 𝒟\mathcal{D} is solvable with polynomially many queries to 𝒪\mathcal{O}.

Our motivation for studying this problem in the query model is twofold. First, quantum query results often give useful intuition for what to expect in the real world, and can provide insight into why naive algorithmic approaches fail. Second, we view this as an interesting quantum query complexity problem in its own right. Whereas most other quantum query lower bounds involve decision problems [6] or relation problems [13], XHOG is more like a weighted, average-case relation problem, because we only require that |z|C|0n|2|\langle z|C|0^{n}\rangle|^{2} be large on average. Contrast this with the relation problem considered in [2], where the task is to output a zz such that |z|C|0n|2|\langle z|C|0^{n}\rangle|^{2} is greater than some threshold.

Note that there are known quantum query complexity lower bounds for relation problems [10], and even relation problems where the output is a quantum state [7, 27]. Yet, it is unclear whether existing quantum query lower bound techniques are useful here. Whereas the adversary method tightly characterizes the quantum query complexity of decision problems and state conversion problems [26], it is not known to characterize the query complexity of relation problems, unless they are efficiently verifiable [13]. The adversary method appears to be essentially useless for saying anything about XHOG, which is not efficiently verifiable and is not a relation problem in the traditional sense.333As we will see later, however, the polynomial method [11] plays an important role in one of our results.

The XHOG task is well-defined for any distribution of random quantum circuits, so this gives us a choice in selecting the distribution. We focus on three classes of oracle circuits that either resemble random circuits used in practical experiments, or that were previously studied in the context of quantum supremacy. Formal definitions of these oracles (and the associated versions of XHOG) are given in Section 2.2.

Canonical State Preparation Oracles

Because the linear cross-entropy benchmark for a circuit CC depends only on the state |ψ:=C|0n|\psi\rangle:=C|0^{n}\rangle produced by the circuit on the all zeros input, it is natural to consider an oracle 𝒪ψ\mathcal{O}_{\psi} that prepares a random state |ψ|\psi\rangle without leaking additional information about |ψ|\psi\rangle. Formally, we choose a Haar-random nn-qubit state |ψ|\psi\rangle, and fix a canonical state ||\bot\rangle orthogonal to all nn-qubit states.444We can always assume that a convenient ||\bot\rangle exists by extending the Hilbert space, if needed. For example, if |ψ|\psi\rangle is an nn-qubit state, a natural choice is to encode |ψ|\psi\rangle by |ψ|1|\psi\rangle|1\rangle and to choose |=|0n|0|\bot\rangle=|0^{n}\rangle|0\rangle. Then, we take the oracle 𝒪ψ\mathcal{O}_{\psi} that acts as 𝒪ψ|=|ψ\mathcal{O}_{\psi}|\bot\rangle=|\psi\rangle, 𝒪ψ|ψ=|\mathcal{O}_{\psi}|\psi\rangle=|\bot\rangle, and 𝒪ψ|φ=|φ\mathcal{O}_{\psi}|\varphi\rangle=|\varphi\rangle for any state |φ|\varphi\rangle that is orthogonal to both ||\bot\rangle and |ψ|\psi\rangle. Equivalently, 𝒪ψ\mathcal{O}_{\psi} is the reflection about the state |ψ|2\frac{|\psi\rangle-|\bot\rangle}{\sqrt{2}}. Finally, we let CC be the composition of 𝒪ψ\mathcal{O}_{\psi} with any unitary that sends |0n|0^{n}\rangle to ||\bot\rangle, so that C|0n=|ψC|0^{n}\rangle=|\psi\rangle. This model is often chosen when proving lower bounds for quantum algorithms that query state preparation oracles [8, 4, 14], in part because the ability to simulate 𝒪ψ\mathcal{O}_{\psi} follows in a completely black box manner from the ability to prepare |ψ|\psi\rangle unitarily without garbage (see Lemma 7 below). Hence, the oracle 𝒪ψ\mathcal{O}_{\psi} is “canonical” in the sense that it is uniquely determined by |ψ|\psi\rangle and is not any more powerful than any other oracle that prepares |ψ|\psi\rangle without garbage.

Haar-Random Unitaries

A random polynomial-size quantum circuit CC does not behave like a canonical state preparation oracle: C|xC|x\rangle looks like a random quantum state for any computational basis state |x|x\rangle, not just x=0nx=0^{n}. Indeed, random quantum circuits are known to information-theoretically approximate the Haar measure in certain regimes [15, 22], and it seems plausible that they are also computationally difficult to distinguish from the Haar measure. Thus, one could alternatively model random quantum circuits by Haar-random nn-qubit unitaries.

Fourier Sampling Circuits

Finally, we consider quantum circuits that query a random classical oracle. For this, we use Fourier Sampling circuits, which Aaronson and Chen [2] previously studied in the context of proving oracular quantum supremacy for a problem related to XHOG. Fourier Sampling circuits are defined as HnUfHnH^{\otimes n}U_{f}H^{\otimes n}, where UfU_{f} is a phase oracle for a uniformly random Boolean function f:{0,1}n{1,1}f:\{0,1\}^{n}\to\{-1,1\}. On the all-zeros input, Fourier Sampling circuits output a string z{0,1}nz\in\{0,1\}^{n} with probability proportional to the squared Fourier coefficient f^(z)2\hat{f}(z)^{2}. This model has the advantage that in principle, one can prove the corresponding quantum supremacy Bell inequality for classical algorithms given query access to ff, and that in some cases one can replace ff by a pseudorandom function to base quantum supremacy on cryptographic assumptions [2].

Our first result is an exponential lower bound on the number of quantum queries needed to solve (2+ε)(2+\varepsilon)-XHOG given either of the two types of quantum oracles that we consider:

Theorem 2 (Informal version of Theorem 17 and Theorem 20).

For any ε1poly(n)\varepsilon\geq\frac{1}{\mathrm{poly}(n)}, any quantum query algorithm for (2+ε)(2+\varepsilon)-XHOG with query access to either:

  1. (1)

    a canonical state preparation oracle 𝒪ψ\mathcal{O}_{\psi} for a Haar-random nn-qubit state |ψ|\psi\rangle, or

  2. (2)

    a Haar-random nn-qubit unitary,

requires at least Ω(2n/4poly(n))\Omega\left(\frac{2^{n/4}}{\mathrm{poly}(n)}\right) queries.

Recall that, because Haar-random states induce a Porter-Thomas distribution on measurement probabilities, the naive algorithm that outputs a sample from the measurement distribution of the state solves bb-XHOG for b2b\approx 2. Hence, in the black box setting, Theorem 2 implies that it is computationally difficult to substantially beat the naive algorithm for XHOG. We do not know if Theorem 2 is quantitatively optimal, but we show in Theorem 18 that a simple algorithm based on the quantum collision finding algorithm [16] solves (2+Ω(1))(2+\Omega(1))-XHOG using O(2n/3)O\left(2^{n/3}\right) queries to either oracle.

Finally, we show that for Fourier Sampling circuits, the naive algorithm of simply running the circuit is optimal among all 11-query algorithms:

Theorem 3 (Informal version of Theorem 22).

Any 11-query quantum algorithm for bb-XHOG with Fourier Sampling circuits achieves b3b\leq 3.

Note that the value of bb achieved by the naive quantum algorithm for XHOG depends on the distribution of circuits used. In contrast to Haar-random circuits that achieve b2b\approx 2, Fourier Sampling circuits achieve b3b\approx 3 (see Proposition 21). This stems from the fact that the amplitudes of a Haar-random quantum state are approximately distributed as complex normal random variables, whereas the amplitudes of a state produced by a random Fourier Sampling circuit are approximately distributed as real normal random variables.

1.2 Our Techniques

The starting point for our proof of the Tsirelson inequality with a canonical state preparation oracle 𝒪ψ\mathcal{O}_{\psi} is a result of Ambainis, Rosmanis, and Unruh [8]. It shows that any algorithm that queries 𝒪ψ\mathcal{O}_{\psi} can be approximately simulated by a different algorithm that makes no queries, but starts with copies of a resource state that depends on |ψ|\psi\rangle. This resource state consists of polynomially many (in the number of queries to 𝒪ψ\mathcal{O}_{\psi}) states of the form α|ψ+β|\alpha|\psi\rangle+\beta|\bot\rangle, i.e. copies of |ψ|\psi\rangle in superposition with ||\bot\rangle. Our strategy is to show that if any algorithm solves bb-XHOG given this resource state, then a similar algorithm solves bb-XHOG given copies of |ψ|\psi\rangle alone. Then, we prove a lower bound on the number of copies of |ψ|\psi\rangle needed to solve bb-XHOG. To do so, we argue that if |ψ|\psi\rangle is Haar-random, then the best algorithm for bb-XHOG given copies of |ψ|\psi\rangle is a simple collision-finding algorithm: measure all copies of |ψ|\psi\rangle in the computational basis, and output whichever string z{0,1}nz\in\{0,1\}^{n} appears most frequently in the measurement results. For a Haar-random nn-qubit state, the chance of seeing any collisions is exponentially unlikely, unless the number of copies of |ψ|\psi\rangle is exponentially large in nn, and so this does not do much better than measuring a single copy of |ψ|\psi\rangle and outputting the result.

To prove the analogous lower bound for bb-XHOG with a Haar-random unitary oracle, we show more generally that the canonical state preparation oracles and Haar-random unitary oracles are essentially equivalent as resources, which may be of independent interest. More specifically, we show that for an nn-qubit state |ψ|\psi\rangle, using a constant number of queries to 𝒪ψ\mathcal{O}_{\psi}, one can approximately simulate (to exponential precision) queries to a random oracle that prepares |ψ|\psi\rangle. By “random oracle that prepares |ψ|\psi\rangle,” we mean an nn-qubit unitary UψU_{\psi} that acts as Uψ|0n=|ψU_{\psi}|0^{n}\rangle=|\psi\rangle but Haar-random everywhere else. We can construct such a UψU_{\psi} by taking an arbitrary nn-qubit unitary that maps |0n|0^{n}\rangle to |ψ|\psi\rangle, then composing it with a Haar-random unitary on the (2n1)\left(2^{n}-1\right)-dimensional subspace orthogonal to |0n|0^{n}\rangle.

Our lower bound for Fourier Sampling circuits uses an entirely different technique. We use the polynomial method of Beals et al. [11], which shows that for any quantum algorithm that makes TT queries to a classical oracle, the output probabilities of the algorithm can be expressed as degree-2T2T polynomials in the variables of the classical oracle. Our key observation is that the average linear XEB score achieved by such a quantum query algorithm can also be expressed as a polynomial in the variables of the classical oracle. We further observe that this polynomial is constrained by the requirement that the polynomials representing the output probabilities must be nonnegative and sum to 11. This allows us to upper bound the largest linear XEB score achievable by the maximum value of a certain linear program, whose variables are the coefficients of the polynomials that represent the output probabilities of the algorithm. To upper bound this quantity, we exhibit a solution to the dual linear program.

2 Preliminaries

2.1 Notation

We use [N][N] to denote the set {1,2,,N}\{1,2,\ldots,N\}. We use 𝟙\mathbbold{1} to denote the identity matrix (of implicit size). We let TD(ρ,σ)\mathrm{TD}(\rho,\sigma) denote the trace distance between density matrices ρ\rho and σ\sigma, and let A\left|\left|A\right|\right|_{\diamond} denote the diamond norm of a superoperator AA acting on density matrices (see [5] for definitions). For a unitary matrix UU, we use UUU\cdot U^{\dagger} to denote the superoperator that maps ρ\rho to UρUU\rho U^{\dagger}. In a slight abuse of notation, if AA denotes a quantum algorithm (which may consist of unitary gates, measurements, oracle queries, and initialization of ancilla qubits), then we also use AA to denote the superoperator corresponding to the action of AA on input density matrices.

2.2 Oracles for Quantum States

We frequently consider quantum algorithms that query quantum oracles. In this model, a query to a unitary matrix UU consists of a single application of either UU, UU^{\dagger}, or controlled versions of UU or UU^{\dagger}. We also consider quantum algorithms that make queries to random oracles. In analogue with the classical random oracle model, such calls are not randomized at each query. Rather, a unitary UU is chosen randomly (from some distribution) at the start of the execution of the algorithm, and thereafter all queries for the duration of the algorithm are made to UU.

We now define several types of unitary oracles that we will use. These definitions (and associated lemmas giving constructions of them) have appeared implicitly or explicitly in prior work, e.g. [8, 4, 14, 9]. For completeness, we provide proofs of the constructions.

Definition 4.

For an nn-qubit quantum state |ψ|\psi\rangle, the reflection about |ψ|\psi\rangle, denoted ψ\mathcal{R}_{\psi}, is the nn-qubit unitary ψ:=𝟙𝟚|ψψ|\mathcal{R}_{\psi}:=\mathbbold{1}-2|\psi\rangle\langle\psi|.

In other words, |ψ|\psi\rangle is a 1-1 eigenstate of ψ\mathcal{R}_{\psi}, and all states orthogonal to |ψ|\psi\rangle are +1+1 eigenstates. Note that some authors define the reflection about |ψ|\psi\rangle to be the negation of this operator (e.g. [28, 31, 9]), while others follow our convention (e.g. [17, 24, 4]). This makes little difference, as these definitions are equivalent up to a global phase (or, if using the controlled versions, equivalent up to a Pauli ZZ gate).

The following lemma shows that ψ\mathcal{R}_{\psi} can be simulated given any unitary that prepares |ψ|\psi\rangle from the all-zeros state, possibly with unentangled garbage.

Lemma 5.

Let UU be a unitary that acts as U|0n|0m=|ψ|φU|0^{n}\rangle|0^{m}\rangle=|\psi\rangle|\varphi\rangle, where |ψ|\psi\rangle and |φ|\varphi\rangle are nn- and mm-qubit states, respectively. Then one can simulate TT queries to the reflection ψ\mathcal{R}_{\psi} using 2T+12T+1 queries to UU.

Proof.

Consider the unitary U(𝟙𝟚|𝟘𝕞+𝕟𝟘𝕞+𝕟|)𝕌U(\mathbbold{1}-2|0^{m+n}\rangle\langle 0^{m+n}|)U^{\dagger}. For any nn-qubit state |x|x\rangle, the action of this unitary on |x|φ|x\rangle|\varphi\rangle is equivalent to the action of ψ\mathcal{R}_{\psi} on |x|φ|x\rangle|\varphi\rangle. So, we can simulate ψ\mathcal{R}_{\psi} on |x|x\rangle as follows: first use one query to UU to prepare |ψ|φ|\psi\rangle|\varphi\rangle from |0m+n|0^{m+n}\rangle, so that we have a copy of |φ|\varphi\rangle. Then, simulate each query to ψ\mathcal{R}_{\psi} using a query to UU and UU^{\dagger} to perform U(𝟙𝟚|𝟘𝕞+𝕟𝟘𝕞+𝕟|)𝕌U(\mathbbold{1}-2|0^{m+n}\rangle\langle 0^{m+n}|)U^{\dagger} applied to |x|φ|x\rangle|\varphi\rangle, using the copy of |φ|\varphi\rangle prepared in the first step. ∎

Definition 6.

For a quantum state |ψ|\psi\rangle, the canonical state preparation oracle for |ψ|\psi\rangle, denoted 𝒪ψ\mathcal{O}_{\psi}, is the reflection about the state |ψ|2\frac{|\psi\rangle-|\bot\rangle}{\sqrt{2}}, where ||\bot\rangle is some canonical state orthogonal to |ψ|\psi\rangle.

Unless otherwise specified, we generally assume that if |ψ|\psi\rangle is an nn-qubit state, then ||\bot\rangle is orthogonal to the space of nn-qubit states under a suitable encoding (see Footnote 4).

The next lemma shows that 𝒪ψ\mathcal{O}_{\psi} can be simulated from any oracle that prepares |ψ|\psi\rangle without garbage:

Lemma 7.

Let UU be an nn-qubit unitary that satisfies U|0n=|ψU|0^{n}\rangle=|\psi\rangle. Then one can simulate TT queries to 𝒪ψ\mathcal{O}_{\psi} using 4T+24T+2 queries to UU.

Proof.

||\bot\rangle is known, so we may assume that a known unitary VV acts as V|0n=|V|0^{n}\rangle=|\bot\rangle. Because 𝒪ψ\mathcal{O}_{\psi} is defined as the reflection about |ψ|2\frac{|\psi\rangle-|\bot\rangle}{\sqrt{2}}, by Lemma 5, it suffices to construct a unitary that prepares any state of the form |ψ|2|φ\frac{|\psi\rangle-|\bot\rangle}{\sqrt{2}}|\varphi\rangle from |0n|0m|0^{n}\rangle|0^{m}\rangle using 22 queries to UU. The following circuit accomplishes this, with |φ=|0|\varphi\rangle=|0\rangle:

\Qcircuit@C=1em@R=.7em\lstick|0n&/\qw\qw\gateV\gateU\qw\ctrlo1\gateU\qw\lstick|0\gateX\gateH\ctrl1\ctrl1\gateX\targ\qw\qw\Qcircuit@C=1em@R=.7em{\lstick{|0^{n}\rangle}&/\qw\qw\gate{V}\gate{U^{\dagger}}\qw\ctrlo{1}\gate{U}\qw\\ \lstick{|0\rangle}\gate{X}\gate{H}\ctrl{-1}\ctrl{-1}\gate{X}\targ\qw\qw}

We introduce the notion of a random state preparation oracle, which, to our knowledge, is new.

Definition 8.

For an nn-qubit state |ψ|\psi\rangle we define a random state preparation oracle for |ψ|\psi\rangle, denoted UψU_{\psi}, as follows. We fix an arbitrary nn-qubit unitary VV that satisfies V|0n=|ψV|0^{n}\rangle=|\psi\rangle, then choose a Haar-random unitary WW that acts on the (2n1)\left(2^{n}-1\right)-dimensional subspace orthogonal to |0n|0^{n}\rangle in the space of nn-qubit states. Finally, we set Uψ=VWU_{\psi}=VW.

The invariance of the Haar measure guarantees that this distribution over UψU_{\psi} is independent of the choice of VV, and hence this is well-defined. Note that while we often refer to UψU_{\psi} as a single unitary matrix, UψU_{\psi} really refers to a distribution over unitary matrices. Notice also that if |ψ|\psi\rangle is distributed as a Haar-random nn-qubit state, then UψU_{\psi} is distributed as a Haar-random nn-qubit unitary.

With these definitions in hand, we can now formally define the three versions of the bb-XHOG task (1) that we consider in this paper.

Problem 9 (bb-XHOG with canonical state preparation).

Let |ψ|\psi\rangle be a Haar-random nn-qubit state. Given oracle access to 𝒪ψ\mathcal{O}_{\psi}, output a sample z{0,1}nz\in\{0,1\}^{n} such that:

𝔼|ψ[|z|ψ|2]b2n.\mathop{\mathbb{E}}_{|\psi\rangle}\left[|\langle z|\psi\rangle|^{2}\right]\geq\frac{b}{2^{n}}.
Problem 10 (bb-XHOG with a Haar-random oracle).

Let UU be a Haar-random nn-qubit unitary. Given oracle access to UU, output a sample z{0,1}nz\in\{0,1\}^{n} such that:

𝔼U[|z|U|0n|2]b2n.\mathop{\mathbb{E}}_{U}\left[|\langle z|U|0^{n}\rangle|^{2}\right]\geq\frac{b}{2^{n}}.

Equivalently, in the above definition, we can let |ψ|\psi\rangle be a Haar-random state, choose U=UψU=U_{\psi}, and output a sample zz such that:

𝔼|ψ[|z|ψ|2]b2n.\mathop{\mathbb{E}}_{|\psi\rangle}\left[|\langle z|\psi\rangle|^{2}\right]\geq\frac{b}{2^{n}}.
Problem 11 (bb-XHOG with Fourier Sampling circuits).

Let f:{0,1}n{1,1}f:\{0,1\}^{n}\to\{-1,1\} be a uniformly random Boolean function of nn bits. Let UfU_{f} denote the phase oracle for ff, meaning the unitary transformation which acts as Uf|x=f(x)|xU_{f}|x\rangle=f(x)|x\rangle for any x{0,1}nx\in\{0,1\}^{n}. Given oracle access to UfU_{f}, output a sample z{0,1}nz\in\{0,1\}^{n} such that:

𝔼f[|z|HnUfHn|0n|2]b2n,\mathop{\mathbb{E}}_{f}\left[|\langle z|H^{\otimes n}U_{f}H^{\otimes n}|0^{n}\rangle|^{2}\right]\geq\frac{b}{2^{n}},

where HH is the Hadamard transformation.

2.3 Other Useful Facts

We use the following formula for the distance between unitary superoperators in the diamond norm.

Fact 12 ([5]).

Let VV and WW be unitary matrices, and suppose dd is the distance between 0 and the polygon in the complex plane whose vertices are the eigenvalues of VWVW^{\dagger}. Then

VVWW=21d2.\left|\left|V\cdot V^{\dagger}-W\cdot W\right|\right|_{\diamond}=2\sqrt{1-d^{2}}.

Finally, we observe that for a Haar-random nn-qubit quantum state, the information-theoretically largest linear XEB achievable is O(n)O(n), and this is tight.

Fact 13.

Let |ψ|\psi\rangle be a Haar-random nn-qubit quantum state. Then:

𝔼|ψ[maxz{0,1}n|z|ψ|2]=Θ(n)2n.\mathop{\mathbb{E}}_{|\psi\rangle}\left[\max_{z\in\{0,1\}^{n}}|\langle z|\psi\rangle|^{2}\right]=\frac{\Theta(n)}{2^{n}}.
Proof sketch.

For a Haar-random |ψ|\psi\rangle, the probabilities |z|ψ|2|\langle z|\psi\rangle|^{2} follow a Porter-Thomas distribution [10], which is to say that they approach i.i.d. exponential random variables with mean 12n\frac{1}{2^{n}} in the limit. By a well-known result of Rényi [32], the maximum of NN i.i.d. exponential random variables with mean μ\mu is distributed as i=1NEii\sum_{i=1}^{N}\frac{E_{i}}{i}, where E1,,ENE_{1},\ldots,E_{N} are i.i.d. exponentially distributed with mean μ\mu. In particular, the expected value of the maximum of NN i.i.d. exponential random variables with mean μ\mu is HNμH_{N}\cdot\mu, where HNH_{N} is the NNth harmonic number. So, 𝔼[maxz{0,1}n|z|ψ|2]\mathop{\mathbb{E}}\left[\max_{z\in\{0,1\}^{n}}|\langle z|\psi\rangle|^{2}\right] should approach Θ(n)2n\frac{\Theta(n)}{2^{n}}, because HNlnNH_{N}\approx\ln N.

In reality, the probabilities |z|ψ|2|\langle z|\psi\rangle|^{2} are not exactly i.i.d. exponentially distributed, but are distributed according to a Dirichlet distribution (in fact, uniform on the 2n2^{n}-dimensional probability simplex). This distribution can be sampled from as follows: sample E1,E2,,E2nE_{1},E_{2},\ldots,E_{2^{n}} to be i.i.d. exponential random variables, and set |z|ψ|2=Ezi=12nEi|\langle z|\psi\rangle|^{2}=\frac{E_{z}}{\sum_{i=1}^{2^{n}}E_{i}}. The same proof idea still works, essentially because the denominator i=12nEi\sum_{i=1}^{2^{n}}E_{i} concentrates well (indeed, the denominator is exponentially close to 11 with high probability). ∎

3 Canonical State Preparation Oracles

In this section, we prove the quantum supremacy Tsirelson inequality for XHOG with a canonical state preparation oracle for a Haar-random state (9). We first sketch the important ideas in the proof. At the heart of our proof is the following lemma, due to Ambainis, Rosmanis, and Unruh [8]. It shows that any quantum algorithm that makes queries to a canonical state preparation oracle 𝒪ψ\mathcal{O}_{\psi} can be approximately simulated by a quantum algorithm that makes no queries to 𝒪ψ\mathcal{O}_{\psi}, and instead receives various copies of |ψ|\psi\rangle and superpositions of |ψ|\psi\rangle with some canonical orthogonal state.

Lemma 14 ([8]).

Let AA be a quantum query algorithm that makes TT queries to 𝒪ψ\mathcal{O}_{\psi}. Then for any kk, there is a quantum algorithm BB that makes no queries to 𝒪ψ\mathcal{O}_{\psi}, and a quantum state |R|R\rangle of the form:

|R:=j=1kαj|ψ+βj||R\rangle:=\mathop{\bigotimes}_{j=1}^{k}\alpha_{j}|\psi\rangle+\beta_{j}|\bot\rangle

such that for any state |φ|\varphi\rangle:

TD(A(|φφ|),B(|RR|,|φφ|))O(Tk).\mathrm{TD}(A(|\varphi\rangle\langle\varphi|),B(|R\rangle\langle R|,|\varphi\rangle\langle\varphi|))\leq O\left(\frac{T}{\sqrt{k}}\right).

So long as kT2k\gg T^{2}, the output of BB will be arbitrarily close to the output of AA in trace distance. We will use this and 13 to show that if AA solves bb-XHOG for some b>2b>2, then so does BB. Then, to prove a lower bound on the number of queries TT to 𝒪ψ\mathcal{O}_{\psi} needed to solve bb-XHOG, it suffices to instead lower bound kk, the number of states of the form αj|ψ+βj|\alpha_{j}|\psi\rangle+\beta_{j}|\bot\rangle needed to solve bb-XHOG.

When |ψ|\psi\rangle is a Haar-random state, notice that the linear XEB depends only on the magnitude of the amplitudes in |ψ|\psi\rangle; the phases are irrelevant. So, when considering algorithms that attempt to solve bb-XHOG given only a state |R|R\rangle of the form used in Lemma 14, we might as well assume that the algorithm randomly reassigns the phases on |ψ|\psi\rangle. More formally, define the mixed state σR\sigma_{R} as

σR:=𝔼diagonalU[Uk|RR|Uk],\sigma_{R}:=\mathop{\mathbb{E}}_{\mathrm{diagonal}\ U}\left[U^{\otimes k}|R\rangle\langle R|U^{\dagger\otimes k}\right], (1)

where the expectation is over the diagonal unitaries UU such that the entries i|U|i\langle i|U|i\rangle are i.i.d. uniformly random complex phases (and by convention, |U|=1\langle\bot|U|\bot\rangle=1). Then, the algorithm’s average linear XEB score given σR\sigma_{R} for a random choice of |ψ|\psi\rangle is identical to its average linear XEB score given |R|R\rangle for a random choice of |ψ|\psi\rangle, because of the invariance of the Haar measure with respect to phases.

Next, we observe that one can prepare σR\sigma_{R} by measuring kk copies of |ψ|\psi\rangle in the computational basis. We prove this in Lemma 15. So, when considering algorithms for XHOG that start with |R|R\rangle, it suffices to instead consider algorithms that simply measure kk copies of |ψ|\psi\rangle in the computational basis. Such algorithms are much easier to analyze, because once we have measured the kk copies of |ψ|\psi\rangle, we can assume (by convexity) that any optimal such algorithm for XHOG outputs a string zz deterministically given the kk measurement results. And in that case, clearly the optimal strategy is to output whichever zz maximizes the posterior expectation of |z|ψ|2|\langle z|\psi\rangle|^{2} given the measurement results. We analyze this strategy in Lemma 16, and show that roughly 2n/22^{n/2} copies of |ψ|\psi\rangle are needed to solve bb-XHOG for bb bounded away from 2. The intuition is that the posterior expectation of |z|ψ|2|\langle z|\psi\rangle|^{2} increases only when we see zz at least twice in the measurement results. However, the probability that any two measurement results are the same is tiny—on the order of 2n2^{-n}—and so we need to measure at least 2n/22^{n/2} copies of |ψ|\psi\rangle to see any collisions with decent probability.

We now proceed to proving the necessary lemmas.

Lemma 15.

Let |ψ=i=1Nψi|i|\psi\rangle=\sum_{i=1}^{N}\psi_{i}|i\rangle be an unknown quantum state, and consider a state |R|R\rangle of the form:

|R:=j=1kαj|ψ+βj|,|R\rangle:=\mathop{\bigotimes}_{j=1}^{k}\alpha_{j}|\psi\rangle+\beta_{j}|\bot\rangle,

where αj,βj\alpha_{j},\beta_{j} are known for j[k]j\in[k], and the vectors {|1,|2,,|N,|}\{|1\rangle,|2\rangle,\ldots,|N\rangle,|\bot\rangle\} form an orthonormal basis. Define the mixed state σR\sigma_{R} as above (1). Then there exists a protocol to prepare σR\sigma_{R} by measuring kk copies of |ψ|\psi\rangle in the computational basis.

To give some intuition, we note that it is simpler to prove Lemma 15 in the case where αj=1\alpha_{j}=1 for all jj. In that case, σR\sigma_{R} can be viewed as an Nk×NkN^{k}\times N^{k} density matrix where both the rows and columns are indexed by strings in [N]k[N]^{k}. Then, the averaging over diagonal unitaries implies that σR\sigma_{R} is obtained from (|RR|)k(|R\rangle\langle R|)^{\otimes k} by zeroing out all entries where the index corresponding to the row is not a reordering of the index corresponding to the column. In fact, one can show that σR\sigma_{R} is expressible as a mixture of pure states, where each pure state is a uniform superposition over basis states that are reorderings of each other. Moreover, the probability associated with each pure state in this mixture is precisely the probability that one of the reorderings is observed when we measure kk copies of |ψ|\psi\rangle in the computational basis. So, to prepare σR\sigma_{R}, it suffices to measure |ψk|\psi\rangle^{\otimes k} and then output the uniform superposition over reorderings of the measurement result.

The proof of Lemma 15 is similar, but we instead have to randomly set some of the measurement results to \bot with probability |βj|2|\beta_{j}|^{2}.

Proof of Lemma 15.

We first describe the protocol. Define [N]:=[N]{}[N_{\bot}]:=[N]\cup\{\bot\}. Measure |ψk|\psi\rangle^{\otimes k} in the computational basis to obtain a string 𝐱[N]k\mathbf{x}\in[N]^{k}. Then, sample a string 𝐱¯[N]k\mathbf{\overline{x}}\in[N_{\bot}]^{k} by setting

𝐱¯j={𝐱jwith probability |αj|2with probability |βj|2\mathbf{\overline{x}}_{j}=\begin{cases}\mathbf{x}_{j}&\text{with probability }|\alpha_{j}|^{2}\\ \bot&\text{with probability }|\beta_{j}|^{2}\end{cases}

independently for each j[k]j\in[k]. Let 𝐙:={z[N]k:z is a reordering of 𝐱¯}\mathbf{Z}:=\{z\in[N_{\bot}]^{k}:z\text{ is a reordering of }\mathbf{\overline{x}}\}. For each z𝐙z\in\mathbf{Z} and j[k]j\in[k], define

γzj:={αjzjβjzj=.\gamma_{zj}:=\begin{cases}\alpha_{j}&z_{j}\neq\bot\\ \beta_{j}&z_{j}=\bot.\end{cases}

Finally, prepare and output the state

|ζ𝐙:=z𝐙(j=1kγzj)|zz𝐙j=1kγzjγzj.|\zeta_{\mathbf{Z}}\rangle:=\frac{\sum_{z\in\mathbf{Z}}\left(\prod_{j=1}^{k}\gamma_{zj}\right)|z\rangle}{\sqrt{\sum_{z\in\mathbf{Z}}\prod_{j=1}^{k}\gamma_{zj}\gamma_{zj}^{*}}}. (2)

This allows us to express the density matrix ρR\rho_{R} output by this protocol as follows:

ρR:=Z[N]kPr[𝐙=Z]|ζZζZ|.\rho_{R}:=\sum_{Z\subset[N_{\bot}]^{k}}\Pr[\mathbf{Z}=Z]\cdot|\zeta_{Z}\rangle\langle\zeta_{Z}|. (3)

To complete the proof, we want to show that ρR=σR\rho_{R}=\sigma_{R}. To see that this holds, first consider an entry x|σR|y\langle x|\sigma_{R}|y\rangle of σR\sigma_{R}, where x,y[N]kx,y\in[N_{\bot}]^{k}. It is equal to

x|σR|y\displaystyle\langle x|\sigma_{R}|y\rangle =𝔼diagonalU[(j=1kγxjγyj)(j:xjUxjxjψxj)(j:yjUyjyjψyj)]\displaystyle=\mathop{\mathbb{E}}_{\mathrm{diagonal}\ U}\left[\left(\prod_{j=1}^{k}\gamma_{xj}\gamma_{yj}^{*}\right)\cdot\left(\prod_{j:x_{j}\neq\bot}U_{x_{j}x_{j}}\psi_{x_{j}}\right)\cdot\left(\prod_{j:y_{j}\neq\bot}U_{y_{j}y_{j}}^{*}\psi_{y_{j}}^{*}\right)\right] (4)
=x|RR|y𝔼diagonalU[(j:xjUxjxj)(j:yjUyjyj)]\displaystyle=\langle x|R\rangle\langle R|y\rangle\cdot\mathop{\mathbb{E}}_{\mathrm{diagonal}\ U}\left[\left(\prod_{j:x_{j}\neq\bot}U_{x_{j}x_{j}}\right)\cdot\left(\prod_{j:y_{j}\neq\bot}U_{y_{j}y_{j}}^{*}\right)\right] (5)
={x|RR|yx is a reordering of y0otherwise.\displaystyle=\begin{cases}\langle x|R\rangle\langle R|y\rangle&x\text{ is a reordering of }y\\ 0&\text{otherwise.}\end{cases} (6)

Here, (4) and (5) are simple calculations that follow from the definitions of |R|R\rangle and σR\sigma_{R}. In (6), we use the fact that the entries UiiU_{ii} are independent, uniformly random complex units, and so 𝔼[UiiaUiib]=𝔼[Uiiab]\mathop{\mathbb{E}}[U_{ii}^{a}U_{ii}^{*b}]=\mathop{\mathbb{E}}[U_{ii}^{a-b}] is 11 if a=ba=b and 0 otherwise, for positive integers a,ba,b. Also, if iji\neq j, then 𝔼[UiiaUjjb]=0\mathop{\mathbb{E}}[U_{ii}^{a}U_{jj}^{*b}]=0 unless a=b=0a=b=0.

Evidently, x|ρR|y=x|σR|y=0\langle x|\rho_{R}|y\rangle=\langle x|\sigma_{R}|y\rangle=0 whenever xx is not a reordering of yy, because ρR\rho_{R} is a mixture of pure states, each of which is a superposition of basis states that are reorderings of one another. So, it remains to show that x|ρR|y=x|σR|y=x|RR|y\langle x|\rho_{R}|y\rangle=\langle x|\sigma_{R}|y\rangle=\langle x|R\rangle\langle R|y\rangle whenever xx is a reordering of yy. Let Z:={z[N]k:z is a reordering of x}Z:=\{z\in[N_{\bot}]^{k}:z\text{ is a reordering of }x\}. Then:

x|ρR|y\displaystyle\langle x|\rho_{R}|y\rangle =Pr[𝐙=Z]x|ζZζZ|y\displaystyle=\Pr[\mathbf{Z}=Z]\cdot\langle x|\zeta_{Z}\rangle\langle\zeta_{Z}|y\rangle (7)
=(zZPr[𝐱¯=z])x|ζZζZ|y\displaystyle=\left(\sum_{z\in Z}\Pr[\mathbf{\overline{x}}=z]\right)\cdot\langle x|\zeta_{Z}\rangle\langle\zeta_{Z}|y\rangle (8)
=(zZ(j=1mγzjγzj)(j:zjψzjψzj))j=1mγxjγyjzZj=1mγzjγzj\displaystyle=\left(\sum_{z\in Z}\left(\prod_{j=1}^{m}\gamma_{zj}\gamma_{zj}^{*}\right)\left(\prod_{j:z_{j}\neq\bot}\psi_{z_{j}}\psi_{z_{j}}^{*}\right)\right)\cdot\frac{\prod_{j=1}^{m}\gamma_{xj}\gamma_{yj}^{*}}{\sum_{z\in Z}\prod_{j=1}^{m}\gamma_{zj}\gamma_{zj}^{*}} (9)
=(j=1mγxjγyj)(j:xjψxjψxj)\displaystyle=\left(\prod_{j=1}^{m}\gamma_{xj}\gamma_{yj}^{*}\right)\cdot\left(\prod_{j:x_{j}\neq\bot}\psi_{x_{j}}\psi_{x_{j}}^{*}\right) (10)
=x|RR|y\displaystyle=\langle x|R\rangle\langle R|y\rangle (11)
=x|σR|y.\displaystyle=\langle x|\sigma_{R}|y\rangle. (12)

Here, (7) holds because |ζZ|\zeta_{Z}\rangle and |ζZ|\zeta_{Z^{\prime}}\rangle have disjoint support when ZZ=Z\cap Z^{\prime}=\emptyset; (8) holds by definition of 𝐙\mathbf{Z}; (9) holds by definitions of 𝐱¯\mathbf{\overline{x}} and |ζZ|\zeta_{Z}\rangle; (10) is a simplification; (11) holds by definition of |R|R\rangle, and (12) follows from (6), because xx was assumed to be a reordering of yy. ∎

Combining Lemma 14 and Lemma 15, we have reduced the problem of lower bounding the number of 𝒪ψ\mathcal{O}_{\psi} queries needed to solve bb-XHOG, to lower bounding the number of copies of |ψ|\psi\rangle needed to solve bb-XHOG. The next lemma lower bounds this latter quantity.

Lemma 16.

Let |ψ|\psi\rangle be a Haar-random nn-qubit quantum state. Consider a quantum algorithm that receives as input |ψk|\psi\rangle^{\otimes k} and outputs a string z{0,1}nz\in\{0,1\}^{n}. Then:

𝔼|ψ,z[|z|ψ|2]22n+O(k2)4n.\mathop{\mathbb{E}}_{|\psi\rangle,z}\left[|\langle z|\psi\rangle|^{2}\right]\leq\frac{2}{2^{n}}+\frac{O(k^{2})}{4^{n}}.
Proof.

Let |R=|ψk|R\rangle=|\psi\rangle^{\otimes k}. As we have argued above, the algorithm achieves the same linear XEB score on average if it instead begins with the mixed state σR\sigma_{R} defined in (1), because of the invariance of the Haar measure with respect to phases. By Lemma 15, the algorithm can prepare σR\sigma_{R} by measuring |R|R\rangle in the computational basis. By a convexity argument, we can assume that the algorithm outputs zz deterministically given the measurement results.

Suppose the measurement results are z1,z2,,zkz_{1},z_{2},\ldots,z_{k}. Clearly, the choice of zz that maximizes 𝔼[|z|ψ|2]\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\right] is whichever zz appears most frequently in z1,z2,,zkz_{1},z_{2},\ldots,z_{k} (with ties broken arbitrarily): the probabilities |i|ψ|2|\langle i|\psi\rangle|^{2} are distributed according to a Dir(1,1,,1)\mathrm{Dir}(1,1,\ldots,1) distribution, so we can easily compute the posterior expectations 𝔼[|i|ψ|2z1,z2,,zk]\mathop{\mathbb{E}}\left[|\langle i|\psi\rangle|^{2}\mid z_{1},z_{2},\ldots,z_{k}\right]. So, it suffices to bound 𝔼[|z|ψ|2]\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\right] for the algorithm that chooses zz to be the most frequent measurement result.

Let mm be a random variable that denotes the frequency of the chosen zz. Then

𝔼[|z|ψ|2]\displaystyle\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\right] =𝔼[𝔼[|z|ψ|2m]]\displaystyle=\mathop{\mathbb{E}}\left[\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\mid m\right]\right] (13)
=𝔼[1+m2n+k]\displaystyle=\mathop{\mathbb{E}}\left[\frac{1+m}{2^{n}+k}\right] (14)
12n+𝔼[m2n]\displaystyle\leq\frac{1}{2^{n}}+\mathop{\mathbb{E}}\left[\frac{m}{2^{n}}\right] (15)
12n+𝔼[1+ij𝟙[𝕫𝕚=𝕫𝕛]2n]\displaystyle\leq\frac{1}{2^{n}}+\mathop{\mathbb{E}}\left[\frac{1+\sum_{i\neq j}\mathbbold{1}[z_{i}=z_{j}]}{2^{n}}\right] (16)
=22n+ijPr[zi=zj]2n\displaystyle=\frac{2}{2^{n}}+\sum_{i\neq j}\frac{\Pr[z_{i}=z_{j}]}{2^{n}} (17)
=22n+(k2)22n(2n+1)\displaystyle=\frac{2}{2^{n}}+\binom{k}{2}\frac{2}{2^{n}(2^{n}+1)} (18)
22n+O(k2)4n.\displaystyle\leq\frac{2}{2^{n}}+\frac{O(k^{2})}{4^{n}}. (19)

Here, (13) is valid by the law of total expectation. (14) substitutes the formula for the posterior expectation of a Dirichlet distribution. (15) is valid by linearity of expectation. In (16), we use the crude upper bound that mm is at most one more than the number of pairwise collisions in z1,,zkz_{1},\ldots,z_{k} (which is tight when the number of collisions is 0 or 1). (17) is valid by linearity of expectation. (18) expands the sum, and computes the collision probabilities in terms of moments of the underlying Dir(1,1,,1)\mathrm{Dir}(1,1,\ldots,1) prior distribution. ∎

We note that one should not expect Lemma 16 to be tight for large kk (say, k=Ω(2n/2)k=\Omega\left(2^{n/2}\right)). For example, to achieve b=4b=4, we need at least enough samples to see m3m\geq 3 with good probability. But Pr[m3]\Pr[m\geq 3] is negligible unless k=Ω(22n/3)k=\Omega\left(2^{2n/3}\right). More generally, a tight bound on the number of copies of |ψ|\psi\rangle needed to achieve a particular value of bb seems closely related to the number of measurements of |ψ|\psi\rangle needed to see mb1m\geq b-1. This is like a sort of “balls into bins” problem [23, 30] with kk balls and 2n2^{n} bins in which we want to bound the probability that the maximum load of any bin exceeds mm, but where the probabilities associated to each bin follow a Dirichlet prior rather than being uniform.

We finally have the tools to prove the main result of this section.

Theorem 17.

Any quantum query algorithm for (2+ε)(2+\varepsilon)-XHOG with query access to 𝒪ψ\mathcal{O}_{\psi} for a Haar-random nn-qubit state |ψ|\psi\rangle requires Ω(2n/4ε5/4n)\Omega\left(\frac{2^{n/4}\varepsilon^{5/4}}{n}\right) queries.

Proof.

Consider a quantum algorithm AA that makes TT queries to 𝒪ψ\mathcal{O}_{\psi} and solves (2+ε)(2+\varepsilon)-XHOG. Choose k=c2T2n2ε2k=\frac{c^{2}T^{2}n^{2}}{\varepsilon^{2}} in Lemma 14 for a constant cc to be chosen later. By Lemma 14, there is a quantum algorithm BB that makes no queries to 𝒪ψ\mathcal{O}_{\psi} and instead starts with a state |R|R\rangle (depending on |ψ|\psi\rangle) such that the trace distance between the output of AA and BB is at most O(εcn)O\left(\frac{\varepsilon}{cn}\right) for every |ψ|\psi\rangle. In particular, if we view |ψ|\psi\rangle as fixed, then the total variation distance between the outputs zAz_{A} and zBz_{B} of AA and BB, respectively, (as probability distributions over {0,1}n\{0,1\}^{n}) is at most O(εcn)O\left(\frac{\varepsilon}{cn}\right). Hence, for every |ψ|\psi\rangle, we may write:

𝔼zA[|zA|ψ|2]𝔼zB[|zB|ψ|2]\displaystyle\mathop{\mathbb{E}}_{z_{A}}\left[|\langle z_{A}|\psi\rangle|^{2}\right]-\mathop{\mathbb{E}}_{z_{B}}\left[|\langle z_{B}|\psi\rangle|^{2}\right] =z{0,1}n|z|ψ|2(Pr[zA=z]Pr[zB=z])\displaystyle=\sum_{z\in\{0,1\}^{n}}|\langle z|\psi\rangle|^{2}\cdot\left(\Pr[z_{A}=z]-\Pr[z_{B}=z]\right)
z{0,1}n|z|ψ|2|Pr[zA=z]Pr[zB=z]|\displaystyle\leq\sum_{z\in\{0,1\}^{n}}|\langle z|\psi\rangle|^{2}\cdot\left|\Pr[z_{A}=z]-\Pr[z_{B}=z]\right|
maxz{0,1}n|z|ψ|2z{0,1}n|Pr[zA=z]Pr[zB=z]|\displaystyle\leq\max_{z\in\{0,1\}^{n}}|\langle z|\psi\rangle|^{2}\cdot\sum_{z^{\prime}\in\{0,1\}^{n}}\left|\Pr[z_{A}=z^{\prime}]-\Pr[z_{B}=z^{\prime}]\right|
maxz{0,1}n|z|ψ|2O(εcn),\displaystyle\leq\max_{z\in\{0,1\}^{n}}|\langle z|\psi\rangle|^{2}\cdot O\left(\frac{\varepsilon}{cn}\right),

because the sum in the penultimate inequality is twice the total variation distance between zAz_{A} and zBz_{B}. 13 states that for a Haar-random |ψ|\psi\rangle, 𝔼|ψ[maxz{0,1}n|z|ψ|2]O(n)2n\mathop{\mathbb{E}}_{|\psi\rangle}\left[\max_{z\in\{0,1\}^{n}}|\langle z|\psi\rangle|^{2}\right]\leq\frac{O(n)}{2^{n}}. So, for a Haar-random |ψ|\psi\rangle, we have

𝔼|ψ,zA[|zA|ψ|2]𝔼|ψ,zB[|zB|ψ|2]O(εc2n).\mathop{\mathbb{E}}_{|\psi\rangle,z_{A}}\left[|\langle z_{A}|\psi\rangle|^{2}\right]-\mathop{\mathbb{E}}_{|\psi\rangle,z_{B}}\left[|\langle z_{B}|\psi\rangle|^{2}\right]\leq O\left(\frac{\varepsilon}{c2^{n}}\right).

In particular, if we choose cc sufficiently large, then BB solves (2+ε2)\left(2+\frac{\varepsilon}{2}\right)-XHOG.

Because of the invariance of the Haar measure with respect to phases, BB still solves (2+ε2)\left(2+\frac{\varepsilon}{2}\right)-XHOG if the pure state |R|R\rangle is replaced with the mixed state σR\sigma_{R} defined in (1). By Lemma 15, this implies the existence of an algorithm that solves (2+ε2)\left(2+\frac{\varepsilon}{2}\right)-XHOG given kk copies of |ψ|\psi\rangle. By Lemma 16, such an algorithm must satisfy:

ε2O(k2)2n.\frac{\varepsilon}{2}\leq\frac{O(k^{2})}{2^{n}}.

Plugging in kk gives the desired lower bound on TT:

ε2O(T4n42nε4)\frac{\varepsilon}{2}\leq O\left(\frac{T^{4}n^{4}}{2^{n}\varepsilon^{4}}\right)
TΩ(2n/4ε5/4n).T\geq\Omega\left(\frac{2^{n/4}\varepsilon^{5/4}}{n}\right).\qed

Lastly, we give an upper bound on the number of queries needed to nontrivially beat the naive algorithm for XHOG with 𝒪ψ\mathcal{O}_{\psi}. In fact, the following algorithm works with any oracle that prepares a Haar-random state (including a Haar-random unitary), because the algorithm only needs copies of |ψ|\psi\rangle and the ability to perform the reflection ψ\mathcal{R}_{\psi}. We thank Scott Aaronson for suggesting this approach based on quantum collision-finding.

Theorem 18.

There is a quantum algorithm for (2+Ω(1))(2+\Omega(1))-XHOG that makes O(2n/3)O\left(2^{n/3}\right) queries to a state preparation oracle for a Haar-random nn-qubit state |ψ|\psi\rangle.

Proof.

The quantum algorithm is essentially equivalent to the collision-finding algorithm of Brassard, Høyer, and Tapp [16]. We proceed by measuring k=2n/3k=2^{n/3} copies of |ψ|\psi\rangle in the computational basis, with results z1,z2,,zk{0,1}nz_{1},z_{2},\ldots,z_{k}\in\{0,1\}^{n}. If any string appears twice in z1,z2,,zkz_{1},z_{2},\ldots,z_{k}, we output the first such collision. Otherwise, we perform quantum amplitude amplification [17] on another copy of |ψ|\psi\rangle, where the “good” subspace is spanned by z1,z2,,zkz_{1},z_{2},\ldots,z_{k}. This uses the reflection ψ\mathcal{R}_{\psi}, which can be simulated using a constant number of queries to any oracle that prepares |ψ|\psi\rangle (see Lemma 5). Finally, we measure and output the result of the amplitude amplification; call this result zk+1z_{k+1}. For the purpose of analyzing this algorithm, we say that the algorithm “succeeds” if it either finds a collision in z1,z2,,zkz_{1},z_{2},\ldots,z_{k}, or if zk+1z_{k+1} is contained in the good subspace.

We first argue that for any |ψ|\psi\rangle, O(2n/3)O\left(2^{n/3}\right) queries to ψ\mathcal{R}_{\psi} (for amplitude amplification) are sufficient for the algorithm to succeed with high probability. For this part of the analysis, we view |ψ|\psi\rangle as fixed, and consider only the randomness of the algorithm. Notice that for each 1ik1\leq i\leq k, Pr[|zi|ψ|212n+1]12\Pr\left[|\langle z_{i}|\psi\rangle|^{2}\geq\frac{1}{2^{n+1}}\right]\geq\frac{1}{2}, because at most half of the probability mass of the output distribution of |ψ|\psi\rangle can be placed on inputs for which the output probability is less than 12n+1\frac{1}{2^{n+1}}, because there are only 2n2^{n} possible outputs. Thus, by a Chernoff bound, we have that:

Pr[i=1k|zi|ψ|2k2n+2]1exp(O(k)).\Pr\left[\sum_{i=1}^{k}|\langle z_{i}|\psi\rangle|^{2}\geq\frac{k}{2^{n+2}}\right]\geq 1-\exp(O(k)).

In particular, with probability 1exp(O(k))1-\exp(O(k)), either the algorithm finds a collision in z1,z2,,zkz_{1},z_{2},\ldots,z_{k}, or else O(2nk)=O(2n/3)O\left(\sqrt{\frac{2^{n}}{k}}\right)=O\left(2^{n/3}\right) applications of ψ\mathcal{R}_{\psi} within the amplitude amplification subroutine are sufficient to measure a good string with arbitrarily high constant probability. So overall, the algorithm can be assumed to succeed with arbitrarily high constant probability.

Next, we argue that the algorithm outputs a string zz such that 𝔼[|z|ψ|2]2+Ω(1)2n\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\right]\geq\frac{2+\Omega(1)}{2^{n}}. Suppose that instead of performing amplitude amplification at the end, we just measured one additional copy of |ψ|\psi\rangle (still calling the result zk+1z_{k+1}) and output zk+1z_{k+1} if there were no collisions in z1,z2,,zkz_{1},z_{2},\ldots,z_{k}. Then notice that, conditional on this modified algorithm’s success, the expected XEB score is at least 3o(1)2n\frac{3-o(1)}{2^{n}}. In symbols, we claim that:

𝔼[|z|ψ|2success]32n+k+1\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\mid\mathrm{success}\right]\geq\frac{3}{2^{n}+k+1}

for this modified algorithm, because conditional on success, zz was observed at least twice in z1,z2,,zk+1z_{1},z_{2},\ldots,z_{k+1}, so 32n+k+1\frac{3}{2^{n}+k+1} is a lower bound on the posterior expectation of the underlying Dirichlet prior distribution on the output probabilities of |ψ|\psi\rangle. But now, we claim that 𝔼[|z|ψ|2success]\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\mid\mathrm{success}\right] is the same for both the modified algorithm and the original algorithm that uses amplitude amplification. The reason is that amplitude amplification preserves conditional probabilities: the conditional probability distribution of zk+1z_{k+1} is exactly the same in both algorithms, when conditioned on measuring in the good subspace. So overall, we have that:

𝔼[|z|ψ|2]\displaystyle\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\right] =𝔼[|z|ψ|2success]Pr[success]+𝔼[|z|ψ|2failure]Pr[failure]\displaystyle=\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\mid\mathrm{success}\right]\cdot\Pr[\mathrm{success}]+\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\mid\mathrm{failure}\right]\cdot\Pr[\mathrm{failure}]
𝔼[|z|ψ|2success]Pr[success]\displaystyle\geq\mathop{\mathbb{E}}\left[|\langle z|\psi\rangle|^{2}\mid\mathrm{success}\right]\cdot\Pr[\mathrm{success}]
=3o(1)2n(1p)\displaystyle=\frac{3-o(1)}{2^{n}}\cdot(1-p)
2+Ω(1)2n,\displaystyle\geq\frac{2+\Omega(1)}{2^{n}},

where pp is the arbitrarily small constant failure probability of amplitude amplification. ∎

We remark that a sharper analysis could most likely improve the above algorithm from solving (2+Ω(1))(2+\Omega(1))-XHOG to solving (3o(1))(3-o(1))-XHOG, while still using the same number of queries. For most Haar-random states |ψ|\psi\rangle, the probability of measuring in the “good” subspace should concentrate very well. As a result, it should be possible to fix some T(n)T(n) such that running exactly T(n)T(n) iterations of Grover’s algorithm ensures finding a marked with high probability, rather than constant probability.

4 Random State Preparation Oracles

In this section, we show that a canonical state preparation oracle and a random state preparation oracle are essentially equivalent, and use it to prove the quantum supremacy Tsirelson inequality for XHOG with a Haar-random oracle (10).

By Lemma 7, for a state |ψ|\psi\rangle, query access to a random state preparation oracle UψU_{\psi} implies query access to the canonical state preparation oracle 𝒪ψ\mathcal{O}_{\psi} with constant overhead. The reverse direction is less obvious. We know from the definition of UψU_{\psi} (Definition 8) that one can simulate UψU_{\psi} given any nn-qubit unitary VV that prepares |ψ|\psi\rangle from |0n|0^{n}\rangle. So, it is tempting to let V=𝒪ψV=\mathcal{O}_{\psi} with |=|0n|\bot\rangle=|0^{n}\rangle to argue that 𝒪ψ\mathcal{O}_{\psi} allows simulating UψU_{\psi}. However, this is only possible if |0n|0^{n}\rangle is orthogonal to |ψ|\psi\rangle. And while we previously argued that we can always find a canonical state ||\bot\rangle that is orthogonal to |ψ|\psi\rangle (Footnote 4), this requires extending the Hilbert space, so that 𝒪ψ\mathcal{O}_{\psi} no longer acts on nn qubits!

To address this, imagine that we knew an explicit nn-qubit state |ψ|\psi^{\bot}\rangle orthogonal to |ψ|\psi\rangle. Notice that we could perfectly swap |ψ|\psi\rangle and |ψ|\psi^{\bot}\rangle: the composition 𝒪ψ𝒪ψ𝒪ψ\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi} sends |ψ|\psi\rangle to |ψ|\psi^{\bot}\rangle, |ψ|\psi^{\bot}\rangle to |ψ|\psi\rangle, and acts trivially on all states orthogonal to |ψ|\psi\rangle and |ψ|\psi^{\bot}\rangle. In particular, this swaps |ψ|\psi\rangle and |ψ|\psi^{\bot}\rangle while acting only on the space of nn-qubit states. Next, if we know |ψ|\psi^{\bot}\rangle explicitly, we can certainly come up with an nn-qubit unitary that sends |0n|0^{n}\rangle to |ψ|\psi^{\perp}\rangle. By composing such a unitary with 𝒪ψ𝒪ψ𝒪ψ\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi}, we are left with an nn-qubit unitary that sends |0n|0^{n}\rangle to |ψ|\psi\rangle. This is sufficient to construct UψU_{\psi}, by Definition 8.

While we do not necessarily have such a state |ψ|\psi^{\bot}\rangle, a random nn-qubit state |φ|\varphi\rangle will be exponentially close to such a |ψ|\psi^{\bot}\rangle with overwhelming probability. The next theorem shows that we can use this observation to approximately simulate UψU_{\psi} given 𝒪ψ\mathcal{O}_{\psi}, by going through the steps above and keeping track of deviation from the ideal construction in terms of ψ|φ\langle\psi|\varphi\rangle.

Theorem 19.

Let |ψ|\psi\rangle be an nn-qubit state. Consider a quantum query algorithm AA that makes TT queries to UψU_{\psi}. Then there is a quantum query algorithm BB that makes 2T2T queries to 𝒪ψ\mathcal{O}_{\psi} such that:

𝔼Uψ[A]B10T+42n/2.\left|\left|\mathop{\mathbb{E}}_{U_{\psi}}\left[A\right]-B\right|\right|_{\diamond}\leq\frac{10T+4}{2^{n/2}}.
Proof.

Without loss of generality, assume ||\bot\rangle is orthogonal to all nn-qubit states. Let |φ|\varphi\rangle be a Haar-random nn-qubit state, and let VV be an arbitrary nn-qubit unitary that satisfies V|0n=|φV|0^{n}\rangle=|\varphi\rangle. Write |φ=α|ψ+β|ψ|\varphi\rangle=\alpha|\psi^{\bot}\rangle+\beta|\psi\rangle, where |ψ|\psi^{\bot}\rangle is some nn-qubit state orthogonal to |ψ|\psi\rangle, with the phase chosen so that α\alpha is real and nonnegative. Note that β=ψ|φ\beta=\langle\psi|\varphi\rangle.

Suppose we had an oracle VV^{\prime} acting on nn qubits such that V|0n=|ψV^{\prime}|0^{n}\rangle=|\psi^{\bot}\rangle. Then we could appeal to Lemma 7 to simulate an oracle 𝒪ψ\mathcal{O}_{\psi^{\bot}} that reflects about the state |ψ|2\frac{|\psi^{\bot}\rangle-|\bot\rangle}{\sqrt{2}} using queries to VV^{\prime}. Then the composition 𝒪ψ𝒪ψ𝒪ψ\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi} would swap |ψ|\psi\rangle and |ψ|\psi^{\bot}\rangle, while acting only on the space of nn-qubit states. Furthermore, we would have that 𝒪ψ𝒪ψ𝒪ψV|0n=|ψ\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi}V^{\prime}|0^{n}\rangle=|\psi\rangle, where 𝒪ψ𝒪ψ𝒪ψV\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi}V^{\prime} acts on nn qubits. So, by Definition 8, we could simulate UψU_{\psi} perfectly by choosing a random (2n1)(2^{n}-1)-dimensional unitary WW and replacing calls to UψU_{\psi} with 𝒪ψ𝒪ψ𝒪ψVW\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi}V^{\prime}W.

Unfortunately, we do not have such an oracle VV^{\prime}; we only have VV. However, we can show that there exists an oracle VV^{\prime} that is close to VV, so if we replace all occurrences of VV^{\prime} with VV, the resulting unitary we get is close to a random state preparation oracle for |ψ|\psi\rangle. Specifically, we take RR to be a rotation in the 2-dimensional space spanned by |ψ|\psi\rangle and |ψ|\psi^{\bot}\rangle that satisfies R|φ=|ψR|\varphi\rangle=|\psi^{\bot}\rangle. Then, we let V=RVV^{\prime}=RV.

RR is a rotation by angle θ=arccos(α)\theta=\arccos(\alpha) in this 2-dimensional subspace, and acts as the identity elsewhere. So, RR has eigenvalues eiθe^{i\theta}, eiθe^{-i\theta}, and 11. The assumption that α0\alpha\geq 0 implies θπ2\theta\leq\frac{\pi}{2}, so by 12,

VVVV=21cos2(θ)=2sinθ=2|ψ|φ|.\left|\left|V\cdot V^{\dagger}-V^{\prime}\cdot V^{\prime\dagger}\right|\right|_{\diamond}=2\sqrt{1-\cos^{2}(\theta)}=2\sin\theta=2|\langle\psi|\varphi\rangle|. (20)

Lemma 7 shows that VV^{\prime} (or more precisely, controlled-VV^{\prime} or its inverse) is used 4T+24T+2 times in implementing TT queries to 𝒪ψ\mathcal{O}_{\psi^{\bot}}, which means we need 5T+25T+2 applications of VV^{\prime} to implement TT queries to 𝒪ψ𝒪ψ𝒪ψV\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi}V^{\prime}.

Let BψB_{\psi^{\bot}} denote the quantum algorithm that simulates AA using 𝒪ψ𝒪ψ𝒪ψVW\mathcal{O}_{\psi}\mathcal{O}_{\psi^{\bot}}\mathcal{O}_{\psi}V^{\prime}W (for a random choice of WW) in place of UψU_{\psi}, and let BφB_{\varphi} denote the quantum algorithm that simulates BψB_{\psi^{\bot}} using VV in place of VV^{\prime}. Then

𝔼Uψ[A]Bφ\displaystyle\left|\left|\mathop{\mathbb{E}}_{U_{\psi}}[A]-B_{\varphi}\right|\right|_{\diamond} =BψBφ\displaystyle=\left|\left|B_{\psi^{\bot}}-B_{\varphi}\right|\right|_{\diamond} (21)
(5T+2)VVVV\displaystyle\leq(5T+2)\left|\left|V\cdot V^{\dagger}-V^{\prime}\cdot V^{\prime\dagger}\right|\right|_{\diamond} (22)
=(10T+4)|ψ|φ|,\displaystyle=(10T+4)|\langle\psi|\varphi\rangle|, (23)

where (21) holds because 𝔼Uψ[A]\mathop{\mathbb{E}}_{U_{\psi}}[A] and BψB_{\psi^{\bot}} are equivalent as superoperators; (22) holds by the subadditivity of the diamond norm under composition, because BψB_{\psi^{\bot}} queries VV^{\prime} a total of 5T+25T+2 times; and (23) substitutes (20).

Finally, let B=𝔼|φ[Bφ]B=\mathop{\mathbb{E}}_{|\varphi\rangle}\left[B_{\varphi}\right] (i.e. run BφB_{\varphi} for a Haar-random choice of |φ|\varphi\rangle). Then

𝔼Uψ[A]B\displaystyle\left|\left|\mathop{\mathbb{E}}_{U_{\psi}}[A]-B\right|\right|_{\diamond} =𝔼Uψ[A]𝔼|φ[Bφ]\displaystyle=\left|\left|\mathop{\mathbb{E}}_{U_{\psi}}[A]-\mathop{\mathbb{E}}_{|\varphi\rangle}\left[B_{\varphi}\right]\right|\right|_{\diamond} (24)
𝔼|φ[𝔼Uψ[A]Bφ]\displaystyle\leq\mathop{\mathbb{E}}_{|\varphi\rangle}\left[\left|\left|\mathop{\mathbb{E}}_{U_{\psi}}[A]-B_{\varphi}\right|\right|_{\diamond}\right] (25)
𝔼|φ[(10T+4)|ψ|φ|]\displaystyle\leq\mathop{\mathbb{E}}_{|\varphi\rangle}\left[(10T+4)|\langle\psi|\varphi\rangle|\right] (26)
=(10T+4)𝔼|φ[i=12n|i|φ|2n]\displaystyle=(10T+4)\mathop{\mathbb{E}}_{|\varphi\rangle}\left[\frac{\sum_{i=1}^{2^{n}}|\langle i|\varphi\rangle|}{2^{n}}\right] (27)
10T+42nmax|φ[i=12n|i|φ|]\displaystyle\leq\frac{10T+4}{2^{n}}\max_{|\varphi\rangle}\left[\sum_{i=1}^{2^{n}}|\langle i|\varphi\rangle|\right] (28)
10T+42n/2,\displaystyle\leq\frac{10T+4}{2^{n/2}}, (29)

where (24) holds by the definition of BB; (25) holds by Jensen’s inequality because the diamond norm, like every norm, is convex; (26) substitutes (23); (27) holds by symmetry (the choice of orthonormal basis {|i:i[2n]}\{|i\rangle:i\in[2^{n}]\} is arbitrary); (28) trivially upper bounds (27); and (29) holds because the 11-norm of an nn-qubit quantum state is at most 2n/22^{n/2} (maximized by a uniform superposition). ∎

The above theorem implies that the oracle 𝒪ψ\mathcal{O}_{\psi} in Theorem 17 can be replaced by a Haar-random nn-qubit unitary.

Theorem 20.

Any quantum query algorithm for (2+ε)(2+\varepsilon)-XHOG with query access to UψU_{\psi} for a Haar-random nn-qubit state |ψ|\psi\rangle (i.e. a Haar-random nn-qubit unitary) requires Ω(2n/4ε5/4n)\Omega\left(\frac{2^{n/4}\varepsilon^{5/4}}{n}\right) queries.

Proof.

Consider a quantum algorithm AA that makes TT queries to UψU_{\psi} and solves (2+ε)(2+\varepsilon)-XHOG. Let cc be a constant to be chosen later. If T>c2n/2εnT>c\frac{2^{n/2}\varepsilon}{n}, then we are done, because we can always assume that εO(n)\varepsilon\leq O(n) (13), so 2n/2εn2n/4ε5/4n\frac{2^{n/2}\varepsilon}{n}\geq\frac{2^{n/4}\varepsilon^{5/4}}{n} for sufficiently large nn. In the complementary case, suppose that Tc2n/2εnT\leq c\frac{2^{n/2}\varepsilon}{n}. By Theorem 19 and the definition of the diamond norm, there is a quantum query algorithm BB that makes 2T2T queries to 𝒪ψ\mathcal{O}_{\psi} such that the trace distance between the output of AA (averaged over the choice of UψU_{\psi}) and BB is at most 10T+42n/214T2n/214cεn\frac{10T+4}{2^{n/2}}\leq\frac{14T}{2^{n/2}}\leq\frac{14c\varepsilon}{n} for every |ψ|\psi\rangle. By an argument involving 13 similar to the one used in the proof of Theorem 17, we conclude that if cc is a sufficiently small constant, then BB solves (2+ε2)\left(2+\frac{\varepsilon}{2}\right)-XHOG (with a canonical state preparation oracle for a Haar-random state). By Theorem 17, this implies T=Ω(2n/4ε5/4n)T=\Omega\left(\frac{2^{n/4}\varepsilon^{5/4}}{n}\right). ∎

5 Fourier Sampling Circuits

In this section, we prove the quantum supremacy Tsirelson inequality for single-query algorithms over Fourier Sampling circuits (11).

Throughout this section, we let N=2nN=2^{n}, and let n:={f:{0,1}n{1,1}}\mathcal{F}_{n}:=\left\{f:\{0,1\}^{n}\to\{-1,1\}\right\} denote the set of all nn-bit Boolean functions. Given a function fnf\in\mathcal{F}_{n}, we define the Fourier coefficient

f^(z):=12nx{0,1}nf(x)(1)xz\hat{f}(z):=\frac{1}{2^{n}}\sum_{x\in\{0,1\}^{n}}f(x)(-1)^{x\cdot z}

for each z{0,1}nz\in\{0,1\}^{n}. We also define the characters χz:{0,1}n{1,1}\chi_{z}:\{0,1\}^{n}\to\{-1,1\} for each z{0,1}nz\in\{0,1\}^{n}:

χz(x):=(1)xz.\chi_{z}(x):=(-1)^{x\cdot z}.

Given oracle access to a function fnf\in\mathcal{F}_{n}, the Fourier Sampling quantum circuit for ff consists of a layer of Hadamard gates, then a single query to ff, then another layer of Hadamard gates, so that the resulting circuit samples a string z{0,1}nz\in\{0,1\}^{n} with probability f^(z)2\hat{f}(z)^{2}. In the context of XHOG, we consider the distribution of Fourier Sampling circuits where the oracle ff is chosen uniformly at random from n\mathcal{F}_{n}.

Proposition 21.

Fourier Sampling circuits over nn qubits solve (322n)(3-\frac{2}{2^{n}})-XHOG.

Proof.

Because the circuit samples zz with probability f^(z)2\hat{f}(z)^{2}, the expected linear XEB score is:

𝔼fn[z{0,1}nf^(z)4]\displaystyle\mathop{\mathbb{E}}_{f\in\mathcal{F}_{n}}\left[\sum_{z\in\{0,1\}^{n}}\hat{f}(z)^{4}\right] =𝔼fn[z{0,1}nfχz^(0n)4]\displaystyle=\mathop{\mathbb{E}}_{f\in\mathcal{F}_{n}}\left[\sum_{z\in\{0,1\}^{n}}\widehat{f\cdot\chi_{z}}(0^{n})^{4}\right] (30)
=2n𝔼fn[f^(0n)4]\displaystyle=2^{n}\mathop{\mathbb{E}}_{f\in\mathcal{F}_{n}}\left[\hat{f}(0^{n})^{4}\right] (31)
=2n(22n)4𝔼[(B(2n,1/2)𝔼[B(2n,1/2)])4]\displaystyle=2^{n}\left(\frac{2}{2^{n}}\right)^{4}\mathop{\mathbb{E}}\left[\left(B(2^{n},1/2)-\mathop{\mathbb{E}}\left[B(2^{n},1/2)\right]\right)^{4}\right] (32)
=322n2n,\displaystyle=\frac{3-\frac{2}{2^{n}}}{2^{n}}, (33)

where (30) applies the substitution f^(z)=fχz^(0n)\hat{f}(z)=\widehat{f\cdot\chi_{z}}(0^{n}); (31) is valid because if ff is uniform over n\mathcal{F}_{n} then so is fχzf\cdot\chi_{z}; (32) uses the fact that 2n2(f^(0n)+1)\frac{2^{n}}{2}(\hat{f}(0^{n})+1) is binomially distributed with 2n2^{n} trials and success probability 12\frac{1}{2}; and (33) uses the formula Np(1p)(1+(3N6)p(1p))Np(1-p)(1+(3N-6)p(1-p)) for the 44th central moment of a binomial distribution with NN trials and success probability pp. ∎

The remainder of this section constitutes the proof of the following theorem, which shows the optimality of the 1-query algoritm for XHOG with Fourier Sampling circuits:

Theorem 22.

Any 11-query algorithm for bb-XHOG over nn-qubit Fourier Sampling circuits satisfies b322nb\leq 3-\frac{2}{2^{n}}.

To prove Theorem 22, we use the polynomial method of Beals et al. [11]. Consider a quantum query algorithm that makes TT queries to fnf\in\mathcal{F}_{n} and outputs a string z{0,1}nz\in\{0,1\}^{n}. The polynomial method implies that for each z{0,1}nz\in\{0,1\}^{n}, the probability that the algorithm outputs zz can be expressed as a real multilinear polynomial of degree 2T2T in the bits of ff. We write such a polynomial as:

pz(f)=S{0,1}n,|S|2Tcz,SxSf(x).p_{z}(f)=\sum_{S\subset\{0,1\}^{n},|S|\leq 2T}c_{z,S}\cdot\prod_{x\in S}f(x).

Then, the expected XEB score of this quantum query algorithm is given by:

12Nfnz{0,1}npz(f)f^(z)2.\frac{1}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p_{z}(f)\cdot\hat{f}(z)^{2}. (34)

Our key observation is that the quantity (34) is linear in the coefficients cz,Sc_{z,S}. This allows us to express the largest XEB score achievable by polynomials of degree 2T2T as a linear program, with the constraints that the polynomials {pz(f):z{0,1}n}\{p_{z}(f):z\in\{0,1\}^{n}\} must represent a probability distribution. Then, the objective value of the linear program can be upper bounded by giving a solution to the dual linear program. We can write the linear program as follows:

max12Nfnz{0,1}npz(f)f^(z)2subject topz(f)0 for each fn;z{0,1}nz{0,1}npz(f)=1 for each fncz,S for each z{0,1}n;0|S|2T\boxed{\begin{array}[]{lll}\text{max}&\displaystyle\frac{1}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p_{z}(f)\cdot\hat{f}(z)^{2}\\ \text{subject to}&p_{z}(f)\geq 0&\text{ for each }f\in\mathcal{F}_{n};z\in\{0,1\}^{n}\\ &\displaystyle\sum_{z\in\{0,1\}^{n}}p_{z}(f)=1&\text{ for each }f\in\mathcal{F}_{n}\\ &c_{z,S}\in\mathbb{R}&\text{ for each }z\in\{0,1\}^{n};0\leq|S|\leq 2T\end{array}} (35)

Before giving a solution to (or even writing down) the dual linear program, we will first show that the primal linear program can be simplified considerably.

We first argue that one can apply a sort of symmetrization to reduce the number of variables. Consider a solution to the linear program (35) in terms of polynomials pzp_{z}, and define:

pz(f)=1Ny{0,1}npyz(fχy).p^{\prime}_{z}(f)=\frac{1}{N}\sum_{y\in\{0,1\}^{n}}p_{y\oplus z}(f\cdot\chi_{y}).

Then we claim that the polynomials pzp^{\prime}_{z} are also a solution to the linear program with the same objective value. The intuition is that f^(z)=fχy^(yz)\hat{f}(z)=\widehat{f\cdot\chi_{y}}(y\oplus z), so we might as well assume that the probability of outputting zz on ff is the same as the probability of outputting yzy\oplus z on fχyf\cdot\chi_{y}, by averaging over the possible choices of yy. We verify that the objective value is:

12Nfnz{0,1}npz(f)f^(z)2\displaystyle\frac{1}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p^{\prime}_{z}(f)\cdot\hat{f}(z)^{2} =1N2Nfnz{0,1}ny{0,1}npyz(fχy)f^(z)2\displaystyle=\frac{1}{N2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}\sum_{y\in\{0,1\}^{n}}p_{y\oplus z}(f\cdot\chi_{y})\cdot\hat{f}(z)^{2}
=1N2Nfnz{0,1}ny{0,1}npyz(fχy)fχy^(yz)2\displaystyle=\frac{1}{N2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}\sum_{y\in\{0,1\}^{n}}p_{y\oplus z}(f\cdot\chi_{y})\cdot\widehat{f\cdot\chi_{y}}(y\oplus z)^{2}
=1N2Ny{0,1}nfnz{0,1}npyz(fχy)fχy^(yz)2\displaystyle=\frac{1}{N2^{N}}\sum_{y\in\{0,1\}^{n}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p_{y\oplus z}(f\cdot\chi_{y})\cdot\widehat{f\cdot\chi_{y}}(y\oplus z)^{2}
=12Nfnz{0,1}npz(f)f^(z)2.\displaystyle=\frac{1}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p_{z}(f)\cdot\hat{f}(z)^{2}.

The nonnegativity constraint on each pz(f)p^{\prime}_{z}(f) is satisfied by convexity, and the polynomials sum to 11 for each ff because

z{0,1}npz(f)\displaystyle\sum_{z\in\{0,1\}^{n}}p^{\prime}_{z}(f) =1Nz{0,1}ny{0,1}npyz(fχy)\displaystyle=\frac{1}{N}\sum_{z\in\{0,1\}^{n}}\sum_{y\in\{0,1\}^{n}}p_{y\oplus z}(f\cdot\chi_{y})
=1Ny{0,1}nz{0,1}npyz(fχy)\displaystyle=\frac{1}{N}\sum_{y\in\{0,1\}^{n}}\sum_{z\in\{0,1\}^{n}}p_{y\oplus z}(f\cdot\chi_{y})
=1Ny{0,1}nz{0,1}npz(fχy)\displaystyle=\frac{1}{N}\sum_{y\in\{0,1\}^{n}}\sum_{z\in\{0,1\}^{n}}p_{z}(f\cdot\chi_{y})
=1Ny{0,1}n1\displaystyle=\frac{1}{N}\sum_{y\in\{0,1\}^{n}}1
=1.\displaystyle=1.

Notice that the pzp^{\prime}_{z}s satisfy pz(f)=p0n(fχz)p^{\prime}_{z}(f)=p^{\prime}_{0^{n}}(f\cdot\chi_{z}). So, we can rewrite the linear program in terms of p0n(f)p^{\prime}_{0^{n}}(f) alone. Define p(f)=p0n(f)p(f)=p^{\prime}_{0^{n}}(f) and define the coefficients of p(f)p(f) by:

p(f)=S{0,1}n,|S|2TcSxSf(x).p(f)=\sum_{S\subset\{0,1\}^{n},|S|\leq 2T}c_{S}\cdot\prod_{x\in S}f(x).

Now, we can rewrite the linear program (35) in terms of p(f)p(f) as:

max12Nfnz{0,1}np(fχz)f^(z)2subject top(f)0 for each fnz{0,1}np(fχz)=1 for each fncS for each 0|S|2T\boxed{\begin{array}[]{lll}\text{max}&\displaystyle\frac{1}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p(f\cdot\chi_{z})\cdot\hat{f}(z)^{2}\\ \text{subject to}&p(f)\geq 0&\text{ for each }f\in\mathcal{F}_{n}\\ &\displaystyle\sum_{z\in\{0,1\}^{n}}p(f\cdot\chi_{z})=1&\text{ for each }f\in\mathcal{F}_{n}\\ &c_{S}\in\mathbb{R}&\text{ for each }0\leq|S|\leq 2T\end{array}} (36)

We can simplify the objective function of the linear program (36) even further:

12Nfnz{0,1}np(fχz)f^(z)2\displaystyle\frac{1}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p(f\cdot\chi_{z})\cdot\hat{f}(z)^{2} =12Nfnz{0,1}np(fχz)fχz^(0n)2\displaystyle=\frac{1}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\sum_{z\in\{0,1\}^{n}}p(f\cdot\chi_{z})\cdot\widehat{f\cdot\chi_{z}}(0^{n})^{2}
=12Nz{0,1}nfnp(fχz)fχz^(0n)2\displaystyle=\frac{1}{2^{N}}\sum_{z\in\{0,1\}^{n}}\sum_{f\in\mathcal{F}_{n}}p(f\cdot\chi_{z})\cdot\widehat{f\cdot\chi_{z}}(0^{n})^{2}
=12Nz{0,1}nfnp(f)f^(0n)2\displaystyle=\frac{1}{2^{N}}\sum_{z\in\{0,1\}^{n}}\sum_{f\in\mathcal{F}_{n}}p(f)\cdot\widehat{f}(0^{n})^{2}
=N2Nfnp(f)f^(0n)2.\displaystyle=\frac{N}{2^{N}}\sum_{f\in\mathcal{F}_{n}}p(f)\cdot\hat{f}(0^{n})^{2}.

Notice that we can also assume p(f)=p(f)p(f)=p(-f) without loss of generality, because the squared Fourier coefficient of ff is the same as the squared Fourier coefficient of its negation, and because replacing p(f)p(f) by p(f)+p(f)2\frac{p(f)+p(-f)}{2} still satisfies all of the constraints. In particular,we can assume cS=0c_{S}=0 if |S||S| is odd.

Next, we turn to simplifying the equality constraint. Define q(f)q(f) by:

q(f)\displaystyle q(f) :=z{0,1}np(fχz)\displaystyle:=\sum_{z\in\{0,1\}^{n}}p(f\cdot\chi_{z})
=z{0,1}n|S|2TcSxSf(x)(1)xz,\displaystyle=\sum_{z\in\{0,1\}^{n}}\sum_{|S|\leq 2T}c_{S}\cdot\prod_{x\in S}f(x)\cdot(-1)^{x\cdot z},

which is also a multilinear polynomial in ff of degree 2T2T. Then the equality constraint reads as q(f)=1q(f)=1 for every fnf\in\mathcal{F}_{n}. Because qq is multilinear, this implies q(f)=1q(f)=1 in fact holds identically over all f:{0,1}nf:\{0,1\}^{n}\to\mathbb{R}, and not just Boolean-valued ff. So, the coefficient on the monomial of the set SS in qq must be 11 if S=S=\emptyset and 0 otherwise. For SS empty, we have:

z{0,1}nc=1,\sum_{z\in\{0,1\}^{n}}c_{\emptyset}=1,

which is to say that c=1Nc_{\emptyset}=\frac{1}{N}. Otherwise, for nonempty SS we have:

z{0,1}ncSxS(1)xz=0.\sum_{z\in\{0,1\}^{n}}c_{S}\prod_{x\in S}(-1)^{x\cdot z}=0.

We can rewrite the equation above as:

z{0,1}ncS(1)(xSx)z=0.\sum_{z\in\{0,1\}^{n}}c_{S}(-1)^{\left(\sum_{x\in S}x\right)\cdot z}=0.

Now, there are two cases:

  • If xSx=0n\mathop{\bigoplus}_{x\in S}x=0^{n}, then the equation holds if and only if cS=0c_{S}=0.

  • If xSx0n\mathop{\bigoplus}_{x\in S}x\neq 0^{n}, then the terms in the sum are cSc_{S} half of the time and cS-c_{S} the other half of the time, so equality always holds.

Putting this altogether, we can conclude:

  • c=1Nc_{\emptyset}=\frac{1}{N}.

  • cS=0c_{S}=0 if xSx=0n\mathop{\bigoplus}_{x\in S}x=0^{n}.

  • cS=0c_{S}=0 if |S||S| is odd.

  • cSc_{S} is otherwise unconstrained by q(f)=1q(f)=1.

After all of this, our linear program now has the much simpler form:555Here, S\bigoplus S is shorthand for xSx\bigoplus_{x\in S}x.

maxN2Nfnp(f)f^(0n)2subject top(f)0 for each fnc=1NcS for each 2|S|2T with |S| even, S0n\boxed{\begin{array}[]{lll}\text{max}&\displaystyle\frac{N}{2^{N}}\sum_{f\in\mathcal{F}_{n}}p(f)\cdot\hat{f}(0^{n})^{2}\\ \text{subject to}&p(f)\geq 0&\text{ for each }f\in\mathcal{F}_{n}\\ &\displaystyle c_{\emptyset}=\frac{1}{N}\\ &c_{S}\in\mathbb{R}&\text{ for each }2\leq|S|\leq 2T\text{ with }|S|\text{ even, }\bigoplus S\neq 0^{n}\end{array}} (37)

Alternatively, we can express the linear program (37) purely in terms of the variables cSc_{S}, rather than leaving them implicit in p(f)p(f). In the objective function, the coefficient on cSc_{S} is given by:

kS:=N2Nfnf^(0n)2xSf(x).k_{S}:=\frac{N}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\hat{f}(0^{n})^{2}\cdot\prod_{x\in S}f(x).

We compute kSk_{S} depending on the size of SS:

  • If S=S=\emptyset, then kS=N𝔼[f^(0n)2]=N𝔼[f^(0n)2𝔼[f^(0n)]2]=NVar[f^(0n)]=1k_{S}=N\cdot\mathop{\mathbb{E}}\left[\hat{f}(0^{n})^{2}\right]=N\cdot\mathop{\mathbb{E}}\left[\hat{f}(0^{n})^{2}-\mathop{\mathbb{E}}\left[\hat{f}(0^{n})\right]^{2}\right]=N\cdot\mathop{\mathrm{Var}}\left[\hat{f}(0^{n})\right]=1, because for a random ff, f^(0n)\hat{f}(0^{n}) is a sum of 2n2^{n} independent ±12n\pm\frac{1}{2^{n}} variables.

  • If SS\neq\emptyset, then:

    kS\displaystyle k_{S} =N2Nfn122nx1{0,1}nx2{0,1}nf(x1)f(x2)xSf(x)\displaystyle=\frac{N}{2^{N}}\sum_{f\in\mathcal{F}_{n}}\frac{1}{2^{2n}}\sum_{x_{1}\in\{0,1\}^{n}}\sum_{x_{2}\in\{0,1\}^{n}}f(x_{1})f(x_{2})\prod_{x\in S}f(x)
    =N2N122nx1{0,1}nx2{0,1}nfnf(x1)f(x2)xSf(x)\displaystyle=\frac{N}{2^{N}}\frac{1}{2^{2n}}\sum_{x_{1}\in\{0,1\}^{n}}\sum_{x_{2}\in\{0,1\}^{n}}\sum_{f\in\mathcal{F}_{n}}f(x_{1})f(x_{2})\prod_{x\in S}f(x)
    ={2N|S|=20|S|>2,\displaystyle=\begin{cases}\frac{2}{N}&|S|=2\\ 0&|S|>2\end{cases},

    because in the second line, the innermost sum is 0 unless {x1,x2}=S\{x_{1},x_{2}\}=S.

So, the final primal linear program takes the form:

maxc+2N|S|=2cSsubject toScSxSf(x)0 for each fnc=1NcS for each 2|S|2T with |S| even, S0n\boxed{\begin{array}[]{lll}\text{max}&\displaystyle c_{\emptyset}+\frac{2}{N}\sum_{|S|=2}c_{S}\\ \text{subject to}&\displaystyle\sum_{S}c_{S}\cdot\prod_{x\in S}f(x)\geq 0&\text{ for each }f\in\mathcal{F}_{n}\\ &\displaystyle c_{\emptyset}=\frac{1}{N}\\ &c_{S}\in\mathbb{R}&\text{ for each }2\leq|S|\leq 2T\text{ with }|S|\text{ even, }\bigoplus S\neq 0^{n}\end{array}} (38)

Standard manipulations reveal the dual linear program of (38):

minbNsubject tobfnψf=1fnψfxSf(x)=2N for each |S|=2fnψfxSf(x)=0 for each 4|S|2T with |S| even, S0nψf0 for each fnb\boxed{\begin{array}[]{lll}\text{min}&\displaystyle\frac{b}{N}\\ \text{subject to}&\displaystyle b-\sum_{f\in\mathcal{F}_{n}}\psi_{f}=1\\ &\displaystyle-\sum_{f\in\mathcal{F}_{n}}\psi_{f}\prod_{x\in S}f(x)=\frac{2}{N}&\text{ for each }|S|=2\\ &\displaystyle-\sum_{f\in\mathcal{F}_{n}}\psi_{f}\prod_{x\in S}f(x)=0&\text{ for each }4\leq|S|\leq 2T\text{ with }|S|\text{ even, }\bigoplus S\neq 0^{n}\\ &\psi_{f}\geq 0&\text{ for each }f\in\mathcal{F}_{n}\\ &b\in\mathbb{R}\end{array}} (39)

We now construct a solution to the dual linear program (39) for T=1T=1 query. Our dual solution is motivated by complementary slackness, which guarantees that a variable in (39) of the optimal dual solution is nonzero if and only if the corresponding constraint in (38) is tight in the optimal primal solution. The naive XHOG algorithm solves the primal linear program with p(f)=f^(0n)2p(f)=\hat{f}(0^{n})^{2}, so p(f)=0p(f)=0 if and only if f^(0n)=0\hat{f}(0^{n})=0. Thus, if we think that the naive algorithm is optimal, then we should look for a dual solution where ψf\psi_{f} is nonzero if and only if f^(0n)=0\hat{f}(0^{n})=0.

For some κ\kappa to be chosen later, we choose ψf=κ\psi_{f}=\kappa if f^(0n)=0\hat{f}(0^{n})=0 and ψf=0\psi_{f}=0 otherwise. In other words, we let ψf=κHalfN(f)\psi_{f}=\kappa\cdot\mathrm{Half}_{N}(f), where HalfN:{1,1}N{0,1}\mathrm{Half}_{N}:\{-1,1\}^{N}\to\{0,1\} is the 0-11 indicator of the set of functions in n\mathcal{F}_{n} (viewed as NN-bit strings) with exactly N2\frac{N}{2} coordinates equal to 1-1.

Viewing ψf=ψ(f)\psi_{f}=\psi(f) as a function ψ:{1,1}N\psi:\{-1,1\}^{N}\to\mathbb{R}, it will be convenient to rewrite the constraints of the dual linear program in terms of the Fourier coefficients of ψ\psi. We use the inner product formula below for Fourier coefficients, with the understanding that we identify a set S[N]S\subseteq[N] with its characteristic string in {0,1}N\{0,1\}^{N}:

ψ^(S)=12Nf{1,1}NψfxSf(x).\hat{\psi}(S)=\frac{1}{2^{N}}\sum_{f\in\{-1,1\}^{N}}\psi_{f}\prod_{x\in S}f(x).

Now, the dual linear program reads as:

minbNsubject tob2Nψ^()=12Nψ^(S)=2N for each |S|=2ψ^(S)=0 for each 4|S|2T with |S| even, S0nψf0 for each fnb\boxed{\begin{array}[]{lll}\text{min}&\displaystyle\frac{b}{N}\\ \text{subject to}&\displaystyle b-2^{N}\hat{\psi}(\emptyset)=1\\ &\displaystyle 2^{N}\hat{\psi}(S)=-\frac{2}{N}&\text{ for each }|S|=2\\ &\displaystyle\hat{\psi}(S)=0&\text{ for each }4\leq|S|\leq 2T\text{ with }|S|\text{ even, }\bigoplus S\neq 0^{n}\\ &\psi_{f}\geq 0&\text{ for each }f\in\mathcal{F}_{n}\\ &b\in\mathbb{R}\end{array}} (40)

The Fourier coefficients of HalfN\mathrm{Half}_{N} are well known [29, Theorem 5.19], though they are also easy to compute by hand for sets of small size. For |S|=2j|S|=2j, they are given by:

HalfN^(S)=(1)j(N/2j)(N2j)(NN/2)2N.\widehat{\mathrm{Half}_{N}}(S)=(-1)^{j}\frac{\binom{N/2}{j}}{\binom{N}{2j}}\cdot\frac{\binom{N}{N/2}}{2^{N}}.

The |S|=2|S|=2 equality constraint of the dual linear program (40) implies

2NκHalfN^(S)=2N2^{N}\cdot\kappa\cdot\widehat{\mathrm{Half}_{N}}(S)=-\frac{2}{N}
κ=12N2N(N2)(N/21)2N(NN/2)=4(N2)N2(NN/2)=2(N1)N(NN/2).\kappa=\frac{1}{2^{N}}\cdot\frac{2}{N}\cdot\frac{\binom{N}{2}}{\binom{N/2}{1}}\cdot\frac{2^{N}}{\binom{N}{N/2}}=\frac{4\binom{N}{2}}{N^{2}\binom{N}{N/2}}=\frac{2(N-1)}{N\binom{N}{N/2}}.

Plugging this value of κ\kappa into the constraint on ψ^()\hat{\psi}(\emptyset) gives:

b2NκHalfN^()=1b-2^{N}\cdot\kappa\cdot\widehat{\mathrm{Half}_{N}}(\emptyset)=1
b=1+2Nκ(N/20)(N0)(NN/2)2N=1+2N1N=32N.b=1+2^{N}\cdot\kappa\cdot\frac{\binom{N/2}{0}}{\binom{N}{0}}\cdot\frac{\binom{N}{N/2}}{2^{N}}=1+2\frac{N-1}{N}=3-\frac{2}{N}.

This completes the proof, as we have shown a solution to the dual linear program with objective value 32NN\frac{3-\frac{2}{N}}{N}.

6 Discussion

The most natural question left for future work is whether our bounds could be improved. Our lower bounds for bb-XHOG with 𝒪ψ\mathcal{O}_{\psi} or UψU_{\psi} show that for constant ε\varepsilon, (2+ε)(2+\varepsilon)-XHOG requires Ω(2n/4poly(n))\Omega\left(\frac{2^{n/4}}{\mathrm{poly}(n)}\right) queries to either oracle, while the best upper bound we know of solves (2+ε)(2+\varepsilon)-XHOG in O(2n/3)O\left(2^{n/3}\right) queries. We conjecture that this upper bound is tight.

One possible approach towards improving the lower bound for bb-XHOG with 𝒪ψ\mathcal{O}_{\psi} (and by extension, UψU_{\psi}) is to use the polynomial method, as we did for the Fourier Sampling lower bound. Indeed, the output probabilities of an algorithm that makes TT queries to 𝒪ψ\mathcal{O}_{\psi} can be expressed as degree-2T2T polynomials in the entries of 𝒪ψ\mathcal{O}_{\psi}. If we write |ψ=i=1Nαi|i|\psi\rangle=\sum_{i=1}^{N}\alpha_{i}|i\rangle, then these are polynomials in the amplitudes α1,,αN\alpha_{1},\ldots,\alpha_{N} and the conjugates of the amplitudes α1,,αN\alpha_{1}^{*},\ldots,\alpha_{N}^{*}. Because of the invariance of the Haar measure with respect to phases, and because the linear XEB score depends only on the magnitudes of the amplitudes, we can further assume without loss of generality that the output probabilities are polynomials in the variables |α1|2,,|αN|2|\alpha_{1}|^{2},\ldots,|\alpha_{N}|^{2}, which are equivalently the measurement probabilities of |ψ|\psi\rangle in the computational basis. We can also assume that these polynomials are homogeneous, because the input variables satisfy i=1N|αi|2=1\sum_{i=1}^{N}|\alpha_{i}|^{2}=1, so we can multiply any lower-degree terms by this sum to make all terms have the same degree. Like in our Fourier Sampling lower bound, the polynomials are constrained to represent a probability distribution for all valid inputs. However, unlike the Fourier Sampling lower bound, this introduces uncountably many constraints in the primal linear program: the polynomials representing the output probabilities must be nonnegative for all inputs (|α1|2,,|αN|2)(|\alpha_{1}|^{2},\ldots,|\alpha_{N}|^{2}) on the probability simplex. It may still be possible to exhibit a solution to the dual linear program if only finitely many of the constraints are relevant (such an approach was used in [18], for example). Put another way, it might suffice to throw out all but finitely many of the primal constraints to obtain a nontrivial upper bound on the value of the linear program.

Our bb-XHOG bound for Fourier Sampling circuits is tight, but it only applies to single-query algorithms. In principle, our lower bound approach via the polynomial method could be generalized to algorithms that make additional queries, by increasing the degree of the polynomials in the linear program (38) and exhibiting another dual solution. The challenge seems to be that the parity constraint on the monomials with nonzero coefficients becomes unwieldy when working with polynomials of larger degree.

Beyond possible improvements to the query complexity bounds, it would be interesting to give some evidence that beating the naive XHOG algorithm is hard in the real world. Aaronson and Gunn [3] showed that (1+ε)(1+\varepsilon)-XHOG is classically hard, assuming the classical hardness of nontrivially estimating the output probabilities of random quantum circuits. It is not clear whether a similar argument could work for quantum algorithms, though, because sampling from a random quantum circuit gives a better-than-trivial algorithm for estimating its output probabilities.

Acknowledgements

Thanks to Scott Aaronson, Sabee Grewal, Sam Gunn, Robin Kothari, Daniel Liang, Patrick Rall, Andrea Rocchetto, and Justin Thaler for helpful discussions and illuminating insights. Thanks also to anonymous reviewers for helpful comments regarding the presentation of this work. This work was supported by a Vannevar Bush Fellowship and a National Defense Science and Engineering Graduate (NDSEG) Fellowship from the US Department of Defense.

References

  • Aaronson [2020] Scott Aaronson. Random circuit sampling: Thoughts and open problems. The Quantum Wave in Computing, 2020. URL https://simons.berkeley.edu/talks/tbd-124.
  • Aaronson and Chen [2017] Scott Aaronson and Lijie Chen. Complexity-Theoretic Foundations of Quantum Supremacy Experiments. In Ryan O’Donnell, editor, 32nd Computational Complexity Conference (CCC 2017), volume 79 of Leibniz International Proceedings in Informatics (LIPIcs), pages 22:1–22:67, Dagstuhl, Germany, 2017. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. ISBN 978-3-95977-040-8. doi: 10.4230/LIPIcs.CCC.2017.22. URL http://drops.dagstuhl.de/opus/volltexte/2017/7527.
  • Aaronson and Gunn [2020] Scott Aaronson and Sam Gunn. On the classical hardness of spoofing linear cross-entropy benchmarking. Theory of Computing, 16(11):1–8, 2020. doi: 10.4086/toc.2020.v016a011. URL http://www.theoryofcomputing.org/articles/v016a011.
  • Aaronson et al. [2020] Scott Aaronson, Robin Kothari, William Kretschmer, and Justin Thaler. Quantum Lower Bounds for Approximate Counting via Laurent Polynomials. In Shubhangi Saraf, editor, 35th Computational Complexity Conference (CCC 2020), volume 169 of Leibniz International Proceedings in Informatics (LIPIcs), pages 7:1–7:47, Dagstuhl, Germany, 2020. Schloss Dagstuhl–Leibniz-Zentrum für Informatik. ISBN 978-3-95977-156-6. doi: 10.4230/LIPIcs.CCC.2020.7. URL https://drops.dagstuhl.de/opus/volltexte/2020/12559.
  • Aharonov et al. [1998] Dorit Aharonov, Alexei Kitaev, and Noam Nisan. Quantum circuits with mixed states. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC ’98, page 20–30, New York, NY, USA, 1998. Association for Computing Machinery. ISBN 0897919629. doi: 10.1145/276698.276708. URL https://doi.org/10.1145/276698.276708.
  • Ambainis [2018] Andris Ambainis. Understanding quantum algorithms via query complexity. In Proceedings of the 2018 International Congress of Mathematicians, volume 3, pages 3249–3270, 2018. doi: 10.1142/9789813272880_0181.
  • Ambainis et al. [2011] Andris Ambainis, Loïck Magnin, Martin Roetteler, and Jeremie Roland. Symmetry-assisted adversaries for quantum state generation. In Proceedings of the 2011 IEEE 26th Annual Conference on Computational Complexity, CCC ’11, page 167–177, USA, 2011. IEEE Computer Society. ISBN 9780769544113. doi: 10.1109/CCC.2011.24. URL https://doi.org/10.1109/CCC.2011.24.
  • Ambainis et al. [2014] Andris Ambainis, Ansis Rosmanis, and Dominique Unruh. Quantum attacks on classical proof systems: The hardness of quantum rewinding. In Proceedings of the 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, FOCS ’14, page 474–483, USA, 2014. IEEE Computer Society. ISBN 9781479965175. doi: 10.1109/FOCS.2014.57. URL https://doi.org/10.1109/FOCS.2014.57.
  • Arunachalam et al. [2020] Srinivasan Arunachalam, Aleksandrs Belovs, Andrew M. Childs, Robin Kothari, Ansis Rosmanis, and Ronald de Wolf. Quantum Coupon Collector. In Steven T. Flammia, editor, 15th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2020), volume 158 of Leibniz International Proceedings in Informatics (LIPIcs), pages 10:1–10:17, Dagstuhl, Germany, 2020. Schloss Dagstuhl–Leibniz-Zentrum für Informatik. ISBN 978-3-95977-146-7. doi: 10.4230/LIPIcs.TQC.2020.10. URL https://drops.dagstuhl.de/opus/volltexte/2020/12069.
  • Arute et al. [2019] Frank Arute, Kunal Arya, Ryan Babbush, et al. Quantum supremacy using a programmable superconducting processor. Nature, 574(7779):505–510, 2019. doi: 10.1038/s41586-019-1666-5. URL https://doi.org/10.1038/s41586-019-1666-5.
  • Beals et al. [2001] Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. Quantum lower bounds by polynomials. J. ACM, 48(4):778–797, July 2001. ISSN 0004-5411. doi: 10.1145/502090.502097. URL https://doi.org/10.1145/502090.502097.
  • Bell [1964] John Bell. On the Einstein-Podolsky-Rosen paradox. Physics, 1:195–200, Nov 1964. doi: 10.1103/PhysicsPhysiqueFizika.1.195. URL https://link.aps.org/doi/10.1103/PhysicsPhysiqueFizika.1.195.
  • Belovs [2015] Aleksandrs Belovs. Variations on quantum adversary, 2015.
  • Belovs and Rosmanis [2020] Aleksandrs Belovs and Ansis Rosmanis. Tight quantum lower bound for approximate counting with quantum states, 2020.
  • Brandão et al. [2016] Fernando G. S. L. Brandão, Aram W. Harrow, and Michał Horodecki. Local random quantum circuits are approximate polynomial-designs. Communications in Mathematical Physics, 346(2):397–434, 2016. doi: 10.1007/s00220-016-2706-8. URL https://doi.org/10.1007/s00220-016-2706-8.
  • Brassard et al. [1997] Gilles Brassard, Peter Høyer, and Alain Tapp. Quantum cryptanalysis of hash and claw-free functions. SIGACT News, 28(2):14–19, June 1997. ISSN 0163-5700. doi: 10.1145/261342.261346. URL https://doi.org/10.1145/261342.261346.
  • Brassard et al. [2002] Gilles Brassard, Peter Høyer, Michele Mosca, and Alain Tapp. Quantum amplitude amplification and estimation. In Quantum Computation and Quantum Information, volume 305 of Contemporary Mathematics, pages 53–74. American Mathematical Society, 2002. ISBN 9780821821404. doi: 10.1090/conm/305.
  • Bun and Thaler [2015] Mark Bun and Justin Thaler. Dual lower bounds for approximate degree and Markov-Bernstein inequalities. Inf. Comput., 243(C):2–25, August 2015. ISSN 0890-5401. doi: 10.1016/j.ic.2014.12.003. URL https://doi.org/10.1016/j.ic.2014.12.003.
  • Cirel’son  [Tsirelson] Boris Cirel’son (Tsirelson). Quantum generalizations of Bell’s inequality. Letters in Mathematical Physics, 4(2):93–100, 1980. doi: 10.1007/BF00417500. URL https://doi.org/10.1007/BF00417500.
  • Clauser et al. [1969] John F. Clauser, Michael A. Horne, Abner Shimony, and Richard A. Holt. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett., 23:880–884, Oct 1969. doi: 10.1103/PhysRevLett.23.880. URL https://link.aps.org/doi/10.1103/PhysRevLett.23.880.
  • Cleve et al. [2004] Richard Cleve, Peter Høyer, Benjamin Toner, and John Watrous. Consequences and limits of nonlocal strategies. In Proceedings of the 19th IEEE Annual Conference on Computational Complexity, CCC ’04, page 236–249, USA, 2004. IEEE Computer Society. ISBN 0769521207. doi: 10.1109/CCC.2004.1313847.
  • Harrow and Mehraban [2018] Aram Harrow and Saeed Mehraban. Approximate unitary t-designs by short random quantum circuits using nearest-neighbor and long-range gates, 2018.
  • Johnson and Kotz [1977] Norman L. Johnson and Samuel Kotz. Urn models and their application: an approach to modern discrete probability theory. Wiley, 1977. ISBN 9780471446309.
  • Kimmel et al. [2017] Shelby Kimmel, Cedric Yen-Yu Lin, Guang Hao Low, Maris Ozols, and Theodore J. Yoder. Hamiltonian simulation with optimal sample complexity. npj Quantum Information, 3(1):13, 2017. doi: 10.1038/s41534-017-0013-7. URL https://doi.org/10.1038/s41534-017-0013-7.
  • Kretschmer [2021] William Kretschmer. The Quantum Supremacy Tsirelson Inequality. In James R. Lee, editor, 12th Innovations in Theoretical Computer Science Conference (ITCS 2021), volume 185 of Leibniz International Proceedings in Informatics (LIPIcs), pages 13:1–13:13, Dagstuhl, Germany, 2021. Schloss Dagstuhl–Leibniz-Zentrum für Informatik. ISBN 978-3-95977-177-1. doi: 10.4230/LIPIcs.ITCS.2021.13. URL https://drops.dagstuhl.de/opus/volltexte/2021/13552.
  • Lee et al. [2011] Troy Lee, Rajat Mittal, Ben W. Reichardt, Robert Špalek, and Mario Szegedy. Quantum query complexity of state conversion. In Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS ’11, page 344–353, USA, 2011. IEEE Computer Society. ISBN 9780769545714. doi: 10.1109/FOCS.2011.75. URL https://doi.org/10.1109/FOCS.2011.75.
  • Lindzey and Rosmanis [2020] Nathan Lindzey and Ansis Rosmanis. A Tight Lower Bound For Non-Coherent Index Erasure. In Thomas Vidick, editor, 11th Innovations in Theoretical Computer Science Conference (ITCS 2020), volume 151 of Leibniz International Proceedings in Informatics (LIPIcs), pages 59:1–59:37, Dagstuhl, Germany, 2020. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. ISBN 978-3-95977-134-4. doi: 10.4230/LIPIcs.ITCS.2020.59. URL https://drops.dagstuhl.de/opus/volltexte/2020/11744.
  • Magniez et al. [2007] Frederic Magniez, Ashwin Nayak, Jeremie Roland, and Miklos Santha. Search via quantum walk. In Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, STOC ’07, page 575–584, New York, NY, USA, 2007. Association for Computing Machinery. ISBN 9781595936318. doi: 10.1145/1250790.1250874. URL https://doi.org/10.1145/1250790.1250874.
  • O’Donnell [2014] Ryan O’Donnell. Analysis of Boolean Functions. Cambridge University Press, USA, 2014. ISBN 1107038324. doi: 10.1017/CBO9781139814782.
  • Raab and Steger [1998] Martin Raab and Angelika Steger. “Balls into bins” - a simple and tight analysis. In Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM ’98, pages 159–170, Berlin, Heidelberg, 1998. Springer-Verlag. ISBN 354065142X. doi: 10.1007/3-540-49543-6_13.
  • Reichardt [2011] Ben W. Reichardt. Reflections for quantum query algorithms. In Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’11, page 560–569, USA, 2011. Society for Industrial and Applied Mathematics. doi: 10.1137/1.9781611973082.44.
  • Rényi [1953] Alfréd Rényi. On the theory of order statistics. Acta Mathematica Academiae Scientiarum Hungarica, 4(3):191–231, 1953. doi: 10.1007/BF02127580. URL https://doi.org/10.1007/BF02127580.