Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Simple constructions of linear-depth t-designs and pseudorandom unitaries (2404.12647v1)

Published 19 Apr 2024 in quant-ph and cs.CR

Abstract: Uniformly random unitaries, i.e. unitaries drawn from the Haar measure, have many useful properties, but cannot be implemented efficiently. This has motivated a long line of research into random unitaries that "look" sufficiently Haar random while also being efficient to implement. Two different notions of derandomisation have emerged: $t$-designs are random unitaries that information-theoretically reproduce the first $t$ moments of the Haar measure, and pseudorandom unitaries (PRUs) are random unitaries that are computationally indistinguishable from Haar random. In this work, we take a unified approach to constructing $t$-designs and PRUs. For this, we introduce and analyse the "$PFC$ ensemble", the product of a random computational basis permutation $P$, a random binary phase operator $F$, and a random Clifford unitary $C$. We show that this ensemble reproduces exponentially high moments of the Haar measure. We can then derandomise the $PFC$ ensemble to show the following: (1) Linear-depth $t$-designs. We give the first construction of a (diamond-error) approximate $t$-design with circuit depth linear in $t$. This follows from the $PFC$ ensemble by replacing the random phase and permutation operators with their $2t$-wise independent counterparts. (2) Non-adaptive PRUs. We give the first construction of PRUs with non-adaptive security, i.e. we construct unitaries that are indistinguishable from Haar random to polynomial-time distinguishers that query the unitary in parallel on an arbitary state. This follows from the $PFC$ ensemble by replacing the random phase and permutation operators with their pseudorandom counterparts. (3) Adaptive pseudorandom isometries. We show that if one considers isometries (rather than unitaries) from $n$ to $n + \omega(\log n)$ qubits, a small modification of our PRU construction achieves general adaptive security.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (50)
  1. Quantum pseudoentanglement. In 15th Innovations in Theoretical Computer Science Conference (ITCS 2024). Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2024.
  2. A fast and simple randomized parallel algorithm for the maximal independent set problem. Journal of Algorithms, 7(4):567–583, 1986.
  3. Quantum t𝑡titalic_t-designs: t𝑡titalic_t-wise independence in the quantum world. In Twenty-Second Annual IEEE Conference on Computational Complexity (CCC’07), pages 129–140. IEEE, 2007.
  4. Pseudorandom isometries. arXiv preprint arXiv:2311.02901, 2023.
  5. Almost k𝑘kitalic_k-wise vs. k𝑘kitalic_k-wise independent permutations, and uniformity for general group actions. Theory of Computing, 9(15):559–577, 2013.
  6. Cryptography from pseudorandom quantum states. In Annual International Cryptology Conference, pages 208–236. Springer, 2022.
  7. Models of quantum complexity growth. PRX Quantum, 2(3):030316, 2021.
  8. Scrambling speed of random quantum circuits. arXiv preprint arXiv:1210.6644, 2012.
  9. Local random quantum circuits are approximate polynomial-designs. Communications in Mathematical Physics, 346:397–434, 2016.
  10. Uncloneable quantum encryption via oracles. In 15th Conference on the Theory of Quantum Computation, Communication and Cryptography, 2020.
  11. Hadamard-free circuits expose the structure of the clifford group. IEEE Transactions on Information Theory, 67(7):4546–4563, July 2021.
  12. Real-valued somewhat-pseudorandom unitaries. arXiv preprint arXiv:2403.16704, 2024.
  13. D. Bump. Lie Groups. Graduate Texts in Mathematics. Springer New York, 2013.
  14. Efficient unitary designs and pseudorandom unitaries from permutations. In preparation, 2024.
  15. Efficient unitary t-designs from random sums. arXiv preprint arXiv:2402.09335, 2024.
  16. In preparation, 2024.
  17. Matthias Christandl. The Structure of Bipartite Quantum States-Insights from Group Theory and Cryptography. Ph. D. Thesis, 2006.
  18. Tame automorphism groups of polynomial rings with property (t) and infinitely many alternating group quotients. Transactions of the American Mathematical Society, 376(11):7983–8021, 2023.
  19. Near-linear constructions of exact unitary 2-designs. Quantum Info. Comput., 16(9–10):721–756, jul 2016.
  20. Hidden cosets and applications to unclonable cryptography. In Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part I 41, pages 556–584. Springer, 2021.
  21. Quantum copy-protection of compute-and-compare programs in the quantum random oracle model. arXiv preprint arXiv:2009.13865, 2020.
  22. Exact and approximate unitary 2222-designs and their application to fidelity estimation. Physical Review A, 80(1):012304, 2009.
  23. Cryptographic censorship. arXiv preprint arXiv:2402.03425, 2024.
  24. Representation theory: a first course, volume 129. Springer Science & Business Media, 2013.
  25. Evenly distributed unitaries: On the structure of unitary designs. Journal of mathematical physics, 48(5), 2007.
  26. Jonas Haferkamp. Random quantum circuits are approximate unitary t𝑡titalic_t-designs in depth O⁢(n⁢t5+o⁢(1))𝑂𝑛superscript𝑡5𝑜1{O}(nt^{5+o(1)})italic_O ( italic_n italic_t start_POSTSUPERSCRIPT 5 + italic_o ( 1 ) end_POSTSUPERSCRIPT ). Quantum, 6:795, 2022.
  27. Aram W Harrow. The church of the symmetric subspace. arXiv preprint arXiv:1308.6595, 2013.
  28. Quantum advantage in learning from experiments. Science, 376(6598):1182–1186, 2022.
  29. Pseudorandom unitaries are neither real nor sparse nor noise-robust. arXiv preprint arXiv:2306.11677, 2023.
  30. Efficient approximate unitary designs from random pauli rotations. arXiv preprint arXiv:2402.05239, 2024.
  31. Black holes as mirrors: quantum information in random subsystems. Journal of High Energy Physics, 2007(09):120–120, September 2007.
  32. Pseudorandom quantum states. In Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III 38, pages 126–152. Springer, 2018.
  33. A. Joffe. On a Set of Almost Deterministic k𝑘kitalic_k-Independent Random Variables. The Annals of Probability, 2(1):161 – 162, 1974.
  34. Martin Kassabov. Symmetric groups and expander graphs. Inventiones mathematicae, 170(2):327–354, 2007.
  35. Randomized benchmarking of quantum gates. Physical Review A, 77(1):012307, 2008.
  36. Complementarity and the unitarity of the black hole S-matrix. Journal of High Energy Physics, 2023(2), February 2023.
  37. William Kretschmer. Quantum pseudorandomness and classical complexity. arXiv preprint arXiv:2103.09320, 2021.
  38. Quantum pseudorandom scramblers. arXiv preprint arXiv:2309.08941, 2023.
  39. Antonio Anna Mele. Introduction to Haar measure tools in quantum information: A beginner’s tutorial. arXiv preprint arXiv:2307.08956, 2023.
  40. Characterizing quantum gates via randomized benchmarking. Physical Review A, 85(4):042311, 2012.
  41. Pseudorandom unitaries with non-adaptive security. arXiv preprint arXiv:2402.14803, 2024.
  42. Quantum commitments and signatures without one-way functions. In Annual International Cryptology Conference, pages 269–295. Springer, 2022.
  43. Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, 2010.
  44. Explicit orthogonal and unitary designs. In 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), pages 1240–1260. IEEE, 2023.
  45. Leonard Susskind. Computational complexity and black hole horizons. Fortschritte der Physik, 64(1):24–43, 2016.
  46. Ewout van den Berg. A simple method for sampling random Clifford operators. In 2021 IEEE International Conference on Quantum Computing and Engineering (QCE), pages 54–59. IEEE, 2021.
  47. A. Winter. Coding theorem and strong converse for quantum channels. IEEE Transactions on Information Theory, 45(7):2481–2485, 1999.
  48. Mark Zhandry. Secure identity-based encryption in the quantum random oracle model. In Reihaneh Safavi-Naini and Ran Canetti, editors, Advances in Cryptology – CRYPTO 2012, pages 758–775, Berlin, Heidelberg, 2012. Springer Berlin Heidelberg.
  49. Mark Zhandry. A note on quantum-secure PRPs. arXiv preprint arXiv:1611.05564, 2016.
  50. Mark Zhandry. How to construct quantum random functions. Journal of the ACM (JACM), 68(5):1–43, 2021.
Citations (17)

Summary

  • The paper presents a novel PFC ensemble that simulates Haar random unitaries up to the t-th moment with diamond-error decreasing as O(t/sqrt(d)).
  • The paper introduces the first construction of t-designs with circuit depth linear in t, leveraging t-wise independent approximations for random operations.
  • The paper develops non-adaptively secure pseudorandom unitaries and adaptive pseudorandom isometries, paving the way for secure quantum computations and cryptographic protocols.

Analyzing Simple Constructions of Linear-Depth tt-Designs and Pseudorandom Unitaries

The paper introduces novel constructions of linear-depth tt-designs and pseudorandom unitaries (PRUs), driven by the need for efficient quantum computations that emulate the effects of Haar random unitaries. The work is built upon the foundations of random unitary ensembles which aim to reproduce properties of the Haar measure—a pivotal concept in quantum information theory—while being implementable with feasible resources.

Overview of Key Contributions

The authors present the "PFC ensemble," an ensemble composed of a product of three components: a random permutation operator PP, a random binary phase operator FF, and a random Clifford unitary CC. The ensemble is shown to be a diamond-error tt-design with a vanishingly small error for tt up to superpolynomial in the number of qubits. This asserts that the PFCPFC ensemble behaves indistinguishably from Haar random unitaries up to the tt-th moment, although with an error decreasing as O(t/d)\mathcal{O}(t/\sqrt{d}) for dimension d=2nd=2^n.

Efficient tt-Design Constructions

Leveraging tt-wise independence principles from classical pseudo-randomness, the authors present the first construction of tt-designs that feature a circuit depth linear in tt. They achieve this by replacing fully random functions and permutations with their respective tt-wise independent counterparts. The result is a diamond-error approximate tt-design with circuit size and depth scaling as O(tpoly(n))O(t \cdot \mathrm{poly}(n)). This offers significant improvements in practicality, offering a pathway to efficiently simulate high-moment Haar randomness.

Pseudorandom Unitaries with Non-Adaptive Security

A parallel contribution focuses on constructing non-adaptively secure pseudorandom unitaries. In classical terms, a pseudorandom function appears random to any polynomial-time bounded observer. The paper extends this concept to quantum computing by utilizing pseudorandom permutations and functions, ensuring that polynomial-time quantum adversaries cannot discern these from true Haar random unitaries under non-adaptive access conditions.

Adaptive Security and Pseudorandom Isometries

While adaptive security—protection against adversaries which adaptively query the system—was not achieved for PRUs, a related construct known as pseudorandom isometries (PRIs) obtains such a security level. By transforming the input space slightly, from nn qubits to n+ω(logn)n + \omega(\log n) qubits, adaptive security is demonstrated. This represents a promising avenue for applications requiring secure quantum state generation.

Implications and Future Directions

The paper's advancements open numerous possibilities in both theoretical and practical domains of quantum computing. Efficient tt-designs have significant implications for simulating quantum dynamics, such as quantum chaos, and optimizing random quantum circuits. Non-adaptive PRUs might find use in cryptographic protocols where the efficiency of the quantum process is paramount, while adaptive PRIs suggest new avenues in secure multiparty quantum cryptography.

While this research answers several open questions about the efficiency of tt-designs and the construction of PRUs, further exploration could enhance their security to fully adaptive paradigms. Additionally, extending the computational indistinguishability to scenarios allowing inverse or controlled access to the unitary could broaden applications in complexity theory and cryptographic primitives.

In summary, the approach presented in the paper provides crucial insights and practical methods for simulating Haar measure properties with quantum computational efficiency, bridging gaps in longstanding theoretical and practical endeavors in quantum information science.

Youtube Logo Streamline Icon: https://streamlinehq.com