Escolar Documentos
Profissional Documentos
Cultura Documentos
MIP (2,1)
Hirotada Kobayashi and Keiji Matsumoto
February 25, 2008
Introduction
We simulate classical interactive proof systems by the ones with the quantum provers and the classical verier.
Here, quantum provers may share an arbitrary entangled state. Especially, we simulate (1) 1-round 2-provers MIP
proof systems by 1-round 3-quantum provers MIP* proof systems, and (2) polynomial-rounds IP proof systems with
1-round 2-quantum provers MIP* proof systems.
3
3.1
Theorem 1 Suppose there is a classical single prover, r-rounds interactive proof system which accepts a language
L with the probability pc and ps for completeness side and soundness side, respectively. Suppose also that the
probability distribution for the th and 0 th round question are mutually independent. Based on such a protocol, we
can construct a classical protocol for a proof system with two quantum provers such that the acceptance probability
for the completeness side is pc , and the acceptance probability for the soundness pqc
c is upperbounded as follows.
pqc
s
1 ps
5 (r 1)
3.2
A protocol
(3) The verier checks the consistency of the answers. If the consistency is checked, he proceeds to the verication
procedure of the classical IP protocol.
3.3
Obviously, the acceptance probability of the protocol for the completeness side cannot be smaller than the classical
protocol, since the provers can only do classical operations, generating a depending only on q . Hence, we below
discuss only the soundness side, where the dishonest provers can increase the probability of acceptance.
If the provers are dishonest, in general, the state of P1 P2 can be an entangled state. Each prover performs
a local measurement, whose composition depends on q and qr0 respectively, and sends its measurement result, a
and a0r0 , respectively, to the verier. (Composition of unitary operations, measurements, and computations are
encapsulated in a measurement.) Since our protocol is single round, we are only interested in the statistics of each
measurement, which is encapsulated in a POVM. We denote by fMaq g the POVM of the measurement by P1 . Here,
subscript indicates the measurement result corresponding to each operator, andP
the composition of the measurement
q
depends
on
the
question
from
the
verier
indicated
as
the
superscript.
Hence,
a Ma = 1. Similarly, we denote by
o
n
P
q
q
~ arr0 = 1.
~ arr0 the POVM by P2 , and
M
M
a r0
Let q = q1 q2
qr be an elements of Q. The way to choose q will be discussed later, but for a while,we choose
it randomly according to the same distribution as q.
q1 q q +1 qr
Let us dene Maq := Ma
and denote by Maq the marginal of Maq on a = a1
a . We dene
q
q
q
q
p
p
q
q
q
q
q
~a
~ aq . We also
M
Ma , qa ( ) := Ma
Ma , ~ qa ( ) := M
the following CP maps: qa ( ) := Ma
dene
X
q
q
a :
a :=
a
qr , though we do not
Note that qa is not the marginal of qa . Note also that qa and a depends on q +1
write explicitly.
By c (r0 ), we denote the probability that the answer from the two provers are consistent
Pr conditioned that the
particular value of r0 is chosen. c is the average probability of consistency, and c = r 1 1 r0 =1 c (r0 ).
qr
q2
q1
Our strategy is to show qa
ar
a2
a1 , or (6). This means that P1 is forced to generate a depending
only on q . First we show the key inequalities used in the proof. Below, E means the expectation.
Lemma 2 We have following inequalities:
X
q +
Eqq
a +
a
Eqq
Eqq
Eqq
~ qa
q
a
q
a
~ qa
I ( )
~ qa
~ qa
+
+
q
a
( )
I ( )
q
a
~ aq
1
1
q
a
~ qa
1
1
( )
p
3 1
p
3 1
p
6 1
( );
(1)
( ):
(2)
( );
(3)
1)
(4)
Its proof will be presented in the appendix B. Here, we show intuitive discussion which suggests these inequalities.
A key observation is as follows. If a particular measurement result occurs with certainty, the quantum state
cannot be changed by the measurement. In our case, by convention, suppose P1 does his measurement rst. Then,
the perfect coincidence means that P2 s measurement cannot demolish the state after the measurement by P1 . By
replacing the order of the measurement, we also have that P1 s measurement cannot demolish the post measurement
state by P2 . Since the coincidence has to occur only with high probability, non-demolishment has to be true only
approximately, and goodness of this approximation should be increasing in 1
c . Thus, the inequalities (1)-(3).
(3) follows from the inequalities (1)-(3) and the triangle inequality. Note also, for a0 1 6= a 1 , we have
q 1q
~ qa 11 0;since the coincidence occurs with high probability. Hence the inequality (4) has to be true.
a0 1 a
Combination of (1)-(4) leads to the following lemma.
Lemma 3
Eqq
q
a
q
a
q
a
I( )
1
1
p
10 1
1) :
1
1
q
a
Proof.
X
Eqq
q
a
q
a
q
a
q
a
q
a
~ qa
I ( )
1
1
Eqq
( )
1
1
+ Eqq
I ( )
1
1
(5)
X
c
~ aq
q
a
(1
p
4 1
q
a
~ qa
q
a
p
1)) + 3 1
(
c
~ qa
q
a
1
1
1
1
( )
+ Eqq
q
a
~ qa
q
a
1
1
( )
1)
1);
where the inequality in the third line is due to the identity (4) and the inequality (1). The second term of (5) is,
using the lemma 10, upperbounded by
X
p
q 1
Eqq
I ~ qa 11
I ( )
6 1
1) ;
c(
a 1
1
Eqq
q
a
q1
a1
qr
ar
q2
a2
qr
ar
qr0 +2
ar0 +2
I( )
r 1 X
X
Eqq
qr0 +1
ar0 +1
qr0 +2
ar0 +2
qr
ar
qr0 +1
ar0 +1
qr0
a r0
I( )
r0 =1 a
r 1
X
Eqq
r0 =1 a1
r 1
X
r0 =1
qr0
a r0
I( )
ar0 +1
p
10 1
10 (r
qr0 +1
ar0 +1
qr0 +1
ar0 +1
p
1) 1
(r0 )
c
The inequality in the third line is due to the lemma 10, the inequality in the fourth line is due to the lemma 3, and
p
the last inequality is due to convexity of . Since this is true for the average over all q , there at least is a particular
pair of q with
X
p
q
qr
q2
q1
Eq
I ( ) 1 10 (r 1) 1
(6)
c:
a
ar
a2
a1
a
Therefore, if x 2
= L, the input is accepted with the probability not larger than
(
1 X
q
qr
q2
q1
max 1; ps + Eq
c
a
ar
a2
a1
2
a
p
=
max 1; ps + 5 (r 1) 1
c
c
1
1 ps
5 (r 1)
I( )
3.4
So far, we have assumed that the probability distribution for q and q 0 are independent, since it is su cient to
accept PSPACE. However, it may be interesting to simulate simulate correlated sequence of questions by single
round protocol. Indeed, it turns out to be possible, and the proof of the validity of the protocol is easier.
(1) The verier generates q, according to the distribution p (q1 ; q2 ;
; qr ), and choose r0 2 f1; r 1g uniformly
randomly. The verier asks qr0 := q1
qr0 to P2 , and ips a coin. With probability 12 , he asks P1 either qr0
or qr0 +1 , respectively.
(2) P1 and P2 reply.
(3) The verier checks the consistency of the answers. If the verier had asked q r to P1 , after checking the
consistency, he proceeds to the verication procedure of the classical IP protocol.
Theorem 4 Suppose there is a classical single prover, r-rounds interactive proof system which accepts a language
L with the probability pc and ps for completeness side and soundness side, respectively. Also, we assume that the
question to the questions are generated non-adaptively, i.e., all the questions q1 , q2 ,
, qr0 are generated before the
protocol starts. Based on such a protocol, we can construct a classical protocol for a proof system with two quantum
provers such that the acceptance probability for the completeness side is
pqc
c =
pc + 2 (r
2 (r
1)
1)
=1
1 pc
;
2 (r 1)
1
2
1 pc
6 (r 1)
Lemma 5
Eq
X
a
Eq
~q
q
a
q
a
~ qa
q
a
~ qa
q
a
I ( )
q
a
I ( )
Eq
X
a
Eq
Eq
~ qa
~ qa
I
q
a
( )
I ( )
q
a
~q
a
q
a
~q
( )
p
3 1
p
3 1
p
3 1
p
6 1
( ;
( ; );
(8)
( ; );
(9)
( ; );
(10)
1)
(11)
( ;
1) ;
(7)
The proof of this is similar to the inequalities (1)-(4). Using these inequalities, we have the following lemma.
Lemma 6
Eq
q
a
q
a
q
a
I( )
1
1
p
6 1
( ;
1) + 6
1;
1):
1
1
I ( )
Proof.
Eq
q
a
q
a
q
a
q
a
q
a
~ aq
I ( )
1
1
Eq
( )
1
1
+ Eq
~ qa
q
a
q
a
1
1
q
a
(12)
q
a
q
a
~q
~ qa
q
a
( )
1
1
Eq
X
a
(1
p
4 1
p
1)) + 3 1
( ;
c
( ;
~q
q
a
1
1
( ;
1
1
( )
+ Eq
q
a
q
a
~ qa
1
1
( )
1)
1);
where the inequality in the third line is due to the identity (11) and the inequality (7). The second term of (12) is,
using the lemma 10, upperbounded by
X
p
q 1
I ~ aq 11
I ( )
Eq
6 1
1;
1) ;
c(
a 1
1
q
a
q1
a1
qr
ar
q2
a2
qr
ar
qr0 +2
ar0 +2
I( )
Eq
r 1 X
X
qr0 +1
ar0 +1
qr0 +2
ar0 +2
qr
ar
qr0 +1
ar0 +1
qr0
a r0
I( )
r0 =1 a
Eq
r 1
X
r0 =1 a1
r 1
X
r0 =1
qr0 +1
ar0 +1
qr0 +1
ar0 +1
qr0
a r0
I( )
ar0 +1
p
6 1
p
(r0 + 1; r0 ) + 6 1
(r0 ; r0 )
12 (r
p
1) 1
Therefore, if x 2
= L, the input is accepted with the probability not larger than
(
1
1
1 X
q
qr
1
max 1; ps + Eq
c+
a
ar
2 (r 1)
2 (r 1)
2
a
1
2 (r
1
1
1
1
2
1)
1
2 (r
2 (r
1)
1 p
6 (r 1)
1)
1 p
6 (r 1)
max 1; ps + 6 (r
2
p
1) 1
c:
q2
a2
q1
a1
I( )
4
4.1
Theorem 7 Suppose there is a classical two provers one round interactive proof system which accepts a language
L with the probability pc and ps for completeness side and soundness side, respectively. Based on this protocol, we
can construct a classical protocol for three quantum provers with unlimited entanglement such that the acceptance
probability for the completeness side is pc , and the acceptance probability for the soundness pqc
c is upperbounded as
follows:
2
1 ps
:
pqc
1
s
6 max fjQ1 j ; jQ2 jg
Corollary 8 NP
4.2
1
polynomial ),
MIP (3; 1; 1; 1
NEXP
1
exp(cn) ).
MIP (3; 1; 1; 1
A protocol
Suppose that the verier asks q 1 2 Q1 and q 2 2 Q2 to the rst and the second prover respectively, in a given this
symmetrized classical proof system. Our quantum protocol with classical messages is as follows.
(1) The verier ask q 1 2 Q1 and q 2 2 Q2 to P1 and P2 , respectively. With probability 12 , he asks P3 either q 1 2 Q1
or q 2 2 Q2 . The joint probability distribution of q1 , q2 is denoted by p(q 1 ; q 2 ), and its marginal distributions
are denoted by p1 (q 1 ) and p2 (q 2 ).
n 2o
n 1o
, and send the measurement result a1 2 A1
and Naq
(2) P1 and P2 performs the measurement Maq
a2A2n
a2A1 n
o
o
ea;q2
faq1
), in case that the question from
( N
and a2 2 A2 to the verier. Meantime, P3 performs M
a2A2
a2A1
the verier is an element of Q1 ( Q2 , respectively). He sends the measurement result a3 to the verier.
(3) The verier checks the relation a1 = a3 ( a2 = a3 ), in case that the veriers question is an element of Q1 (Q2 ,
respectively).
4.3
4.4
:= trP3
p
p
p q p q q
q
~ aq
~ aq , q := P qa
Ma
Ma , ~ a ( ) := M
M
a ( ) :=
a
p
p
p
p
P
q
~aq
~aq , q := q qa
N
Naq
Naq , ~ qa ( ) := N
a ( ) :=
a
P
P
1
q
fq , 2 (q) :=
eq
1 M
Naq N
c (q) :=
a
c
a
a trMa
a tr1
P
P
1
1
1
1
+ 21 q2 2Q2 p2 q 2 1c q 2
c := 2
c q
q1 2Q1 p1 q
Lemma 9
q
12
12
p
6 1
p
6 1
12
1
12
1
1
c
(q);
(13)
1
c
(q)
(14)
Proof. We only prove the rst one. By monotonicity of the trace distance,
q
12
12
I( )
Using the same argument as the proof of the inequality (3), we have (13).
I ~q ( )
Observe that
q0
q 00
q 000
12
12
q0
q 00
q 000
12
q0
q0
q 00
q 000
12
1
q 00
q 000
12
1
q 00
+ I
q
q 000
12
12
1
q 000
+ I
p
6 1
1
c
12
(q) + 6
p
1
1
c
12
12
1
q0
12
q 000
1
q 00
12
q 00
12
(q 0 ) + 6
12
12
1
12
1
q 00
+ I
q 00
+ I
12
p
1
2
c
12
(q 00 ) + 6
p
1
2
c
(q 000 );
(15)
=jQ2 j
and reply to the veriers question obeying this measurement outcome. Obviously, with such a strategy, the provers
cannot cheat the verier beyond the classical limit. Below, we show that any proversstarategy can be approximated
by such an imaginary strategy in terms of the joint probability distribution of a1 0 , a2 0 for all 0 and 0 .
The joint probability distribution of a1 0 , a2 0 of the imaginary strategy is
X
tr
1
Y
1
Y
q1
a
=jQ1 j
q2
a
12
q1 0
a 0
= tr
1
Y
=jQ2 j
0;
0)
6=
0;
0)
=
a
X
0
;a
tr
1
Y
1
Y
q1 0
a 0
1
Y
q1
1
0 1
X
p
1
6
1
c
q2 0
a 0
q1
1
1
Y
=
q2
12
=1
1
0 1q
X
=1
0,
2
c
q2
6=
q2
0
a 0
q2
12
(q 1 ) + 6
1
Y
q1
0
a 0
where the sum in the LHS is taken for variables a1 , and a2 with
q2 0
a 0
q1
12
0.
12
q2
12
tr
q1 0
a 0
q2 0
a 0
12
jQ1 j
p1 (q 1 0 )
0;
0)
jQ1 j
=1
0 1
X
p
1
c
jQ2 j
(q 1 ) + 6
0 = +1
0 1q
X
p2 (q 2 0 )
0 =1
=1
jQ1 j
X X
=1
jQ1 j
0 =1
i
pi (qjQ
) (this can be assumed without loss of generality),
ij
p
p1 (q 1 0 ) 1
p
jQ1 j p1 (q 1 ) 1
1
c
(q 1 ) + 6
jQ2 j
1
c
(q 1 ) + 6
jQ2 j
=1
q
p2 (q 2 0 ) 1
0 = +1
q
jQ2 j p2 (q 2 ) 1
jQ1 j
p
1X
12 max fjQ1 j ; jQ2 jg @
p1 (q 1 ) 1
2 =1
v
u jQ1 j
u1 X
12 max fjQ1 j ; jQ2 jg t
p1 (q 1 ) (1
2 =1
p
= 12 max fjQ1 j ; jQ2 jg 1
c
q2
=1
jQ2 j
X X
=1
2
c
2
c
2
c
q2
q2
jQ2 j
q
1X
1 (q 1 ) +
p2 (q 2 ) 1
c
2 =1
1
c
(q 1 )) +
jQ2 j
1X
p2 (q 2 )
2 =1
2
c
2
c
q2 A
q2
Suppose that there is a classical protocol which accepts the language L with the probability pc and ps for completeness side and soundness side, respectively. Based on this protocol, our modied quantum protocol with classical
message will accept L with the probability pc . The acceptance probability for the soundness pqc
s is upperbounded
as follows:
2
3
X
1
pqc
min 41; ps +
p(q 1 0 ; q 2 0 ) ( 0 ; 0 )5
c
s
2 ;
0
0
p
ps + 6 max fjQ1 j ; jQ2 jg 1
c
c min 1;
1 ps
6 max fjQ1 j ; jQ2 jg
1
To see this, let y =
f (y) = (1
behaves in the interval [0; 1]. At y = 0; f (0) = pc 1, f 0 (0) > 0. f 0 (y) stays positive until y reaches y , and then
f 0 (y) turns to negative, and in the end, f (1) = 0: Meantime, pc + 6y max fjQ1 j ; jQ2 jg is monotone increasing, and
1 ps
. Observe y is smaller than y . Therefore, the upperbound to pqc
reaches f (y) = 1 at y = y := 6 maxfjQ
cc
1 j;jQ2 jg
equals f (y) in the interval [0; y ] and equals 1 y 2 in the interval [y ; 1], which takes maximum at y = y , and
we have the upperbound presented above.
References
[1] A. Winter, "Coding Theorems of Quantum Information Theory," doctoral thesis, quant-ph/9907077 (1999)
Lemma 10 Let f
ag
be an instrument, i.e.,
X
k
a
a
is a CP map and
(X)
(Y )k1
kX
Y k1
Proof. Observe that an instrument can be viewed as a CPTP map from a state to a pair of classical informations
and states. In other words, the map
M
X!
a (X)
a
X
a
(X)
(Y )k1
and X :=
(X)
(Y )
Y k1 :
p
3 1
1. Then, we have
trX
kX
p
:=
X M
a
Letting
= 1. Then,
In the proof or the following lemma, we repeatedly use the following argument. Since q and q obey the same
probability distribution and the probability distribution of q and q 0 are independent, we have
Eqq
q
a
tr
~q
+
+
( )
Eqq
Eq
Eq
qr
+ +1
~q
( )
Eqq
q
a
tr
trMa
+ +1
qr
~ aq
M
trMaq
~ aq
M
~ aq
M
trMaq
=
Proof. We use the lemma 12. Let
X
q
a
q
a
~ qa
+
+
:=
+
+
q
a
+
+
c ( ):
I ( ) and Xa
I ( )
s
3 1
=
Since
s
3 1
(16)
+
:= I
tr I
~ aq
M
tr
q
a
q
a
+
+
I ( )
~ q , and we obtain
M
a
~ qa
+
+
( );
is concave, taking the average both side, we have the inequality (1). The inequality (2) is proved almost
analogously. Let a + := I ~ qa +
( ) and Xa := Maq
I, and we obtain
Eqq
X
a
q
a
+
+
~ qa
~ qa
( )
s
3 1
Eqq
X
a
tr
q
a
+
+
~ qa
( );
which is nothing but our second inequality. The inequalities (1)-(2), with the help of the triangle inequality, leads
to (3).
q
The identity (4) is proved as follows. Since qa
1( )
1 ( ) due to the denition of qa ,
a
o
Xn
X
q
q 1
q
q 1
q
q 1
q
q 1
~
~
~
~
(
)
tr
(
)
=
E
tr
(
)
Eqq
qq
a
a 1
a
a 1
a
a 1
a
a 1
a
10
Eqq tr
q
a
~ qa
1
1
( ):