Schedule for: 24w4006 - Frontiers of Quantum information and Computation

Beginning on Sunday, December 8 and ending Friday December 13, 2024

All times in Chennai, India time, MST (UTC-7).

Sunday, December 8
16:00 - 23:00 Check-in begins at 16:00 on Sunday and is open 24 hours
Hotel address:
The Marina Mall,
13/1A, OMR, Near Navalur Toll,
Egattur, Chennai,
Tamil Nadu - 603103.

https://www.royalorchidhotels.com/regenta-central-rs-chennai/overview
(Hotel Regenta Central - Front Desk)
Monday, December 9
07:30 - 08:50 Breakfast (Hotel Regenta Central - Kafe 24)
08:50 - 09:20 Transport to CMI Institute
Meet at the hotel lobby
(Other (See Description))
09:20 - 09:30 Introduction and Welcome by CMI Staff (CMI - Lecture Hall 202)
09:30 - 10:00 Anand Natarajan: Tutorial - Cryptography (CMI - Lecture Hall 202)
10:30 - 11:00 Coffee Break (CMI - Lecture Hall 202)
11:00 - 11:30 Atul Singh Arora: A computational test of quantum contextuality, and even simpler proofs of quantumness
Bell non-locality is a fundamental feature of quantum mechanics whereby measurements performed on "spatially separated" quantum systems can exhibit correlations that cannot be understood as revealing predetermined values. This is a special case of the more general phenomenon of "quantum contextuality", which says that such correlations can occur even when the measurements are not necessarily on separate quantum systems, but are merely "compatible" (i.e. commuting). Crucially, while any non-local game yields an experiment that demonstrates quantum advantage by leveraging the "spatial separation" of two or more devices (and in fact several such demonstrations have been conducted successfully in recent years), the same is not true for quantum contextuality: finding the contextuality analogue of such an experiment is arguably one of the central open questions in the foundations of quantum mechanics.

In this work, we show that an arbitrary contextuality game can be compiled into an operational "test of contextuality" involving a single quantum device, by only making the assumption that the device is computationally bounded. Our work is inspired by the recent work of Kalai et al. (STOC '23) that converts any non-local game into a classical test of quantum advantage with a single device. The central idea in their work is to use cryptography to enforce spatial separation within subsystems of a single quantum device. Our work can be seen as using cryptography to enforce "temporal separation", i.e. to restrict communication between sequential measurements. Beyond contextuality, we employ our ideas to design a "proof of quantumness" that, to the best of our knowledge, is arguably even simpler than the ones proposed in the literature so far.
(CMI - Lecture Hall 202)
11:30 - 12:00 Srijita Kundu: Uncloneable quantum states are necessary as proofs and advice
Uncloneability is one of the most remarkable properties of quantum states that separates them from classical information. Over the years, this property has found numerous uses in cryptography - many tasks that are classically impossible become possible in quantum cryptography due to uncloneability. In this talk, we examine the utility of uncloneable quantum states in complexity theory, specifically in the form of proofs and advice.

We define and study languages that necessarily need uncloneable quantum proofs and advice. We define strictly uncloneable versions of the classes QMA, BQP/qpoly and FEQP/qpoly (which is the class of relational problems solvable exactly with polynomial-sized quantum advice). Strictly uncloneable QMA is defined to be the class of languages in QMA that only have uncloneable proofs, i.e., given any family of candidate proof states, a polynomial-time cloning algorithm cannot act on it to produce states that are jointly usable by $k$ separate polynomial-time verifiers, for arbitrary polynomial $k$. This is a stronger notion of uncloneable proofs and advice than those considered in previous works, which only required the existence of a single family of proof or advice states that are uncloneable. We show that in the quantum oracle model, there exist languages in strictly uncloneable QMA and strictly uncloneable BQP/qpoly. The language in strictly uncloneable QMA also gives a quantum oracle separation between QMA and the class cloneableQMA introduced by Nehoran and Zhandry (2024). We also show without using any oracles that the language used by Aaronson, Buhrman and Kretschmer (2024) to separate FEQP/qpoly and FBQP/poly, is in strictly uncloneable FEQP/qpoly.

Based on joint work with Rohit Chatterjee and Supartha Podder.
(CMI - Lecture Hall 202)
12:00 - 12:30 Yihui Quek: The Learning Stabilizers with Noise problem
Random classical codes have good error correcting properties, and yet they are notoriously hard to decode in practice. Despite many decades of extensive study, the fastest known algorithms still run in exponential time. The Learning Parity with Noise (LPN) problem, which can be seen as the task of decoding a random linear code in the presence of noise, has thus emerged as a prominent hardness assumption with numerous applications in both cryptography and learning theory. Is there a natural quantum analog of the LPN problem? In this work, we introduce the Learning Stabilizers with Noise (LSN) problem, the task of decoding a random stabilizer code in the presence of local depolarizing noise, and give evidence of its hardness as well as applications in both learning theory and cryptography. 
(CMI - Lecture Hall 202)
12:30 - 14:00 Lunch
Location will be announced at the start of each workshop.
(CMI - Lecture Hall 202)
14:00 - 14:30 Amit Behera: Quantum Cryptography: Scopes and Anomalies
In this talk, we will discuss the impact of quantum information on cryptography, both in terms of achieving cryptographic tasks beyond the limits of classical computation as well as the interesting anomalies arising in the quantum cryptographic landscape, which is in stark contrast to classical cryptography. In particular, we will discuss the main results and open questions in unclonable cryptography, a subfield of quantum cryptography that does not have a classical cryptographic analog. Next, we will review recent developments concerning the possibility of cryptography without one-way functions and the question of minimal assumption in quantum cryptography.
(CMI - Lecture Hall 202)
14:30 - 15:00 Atul Mantri: Quantum Security Analysis of the Key-Alternating Ciphers
We investigate the quantum security of key-alternating ciphers (KAC), a generalization of Even-Mansour ciphers extended over multiple rounds. KAC serves as a model for many block cipher constructions, including widely used ciphers like AES. While there is a substantial body of work on the classical security of KAC, little is understood about its resilience against quantum adversaries.

In this talk, we present the first non-trivial quantum key-recovery attack on multi-round KAC in a setting where the adversary has quantum access to just one of the public permutations. This attack, which works for any $t$-round KAC, achieves a quantum query complexity of $O(2^{\frac{t(t+1)n}{(t+1)^2+1}})$, where $n$ is key size. For comparison, the best-known classical attack requires $O(2^{\frac{tn}{(t+1)}})$ queries, as established by Bogdanev et al. (EUROCRYPT 2012). Our approach employs a novel use of MNRS-style quantum walk algorithms by Magniez et al. (STOC 2007), which may have further applications in quantum cryptanalysis.

Moreover, by leveraging a hybrid quantum-classical attack model, we extend the classical Even-Mansour lower bound for $t$-round KACs, from $\Omega(2^{\frac{n}{3}})$ as shown by Alagic et al. (EUROCRYPT 2022), to a tighter bound of $\Omega(2^{\frac{(t-1)n}{t}})$ for $t \geq 2$. This work enhances our understanding of the limitations and vulnerabilities of classical cipher constructions in the presence of quantum adversaries, with potential implications for future block cipher designs in the quantum era.

The talk is based on joint work with Chen Bai and Mehdi Esmaili.
(CMI - Lecture Hall 202)
15:00 - 15:30 Rishabh Batra: Commitments are equivalent to statistically-verifiable one-way state generators
One-way state generators (OWSG) are natural quantum analogs to classical one-way functions. We consider statistically-verifiable OWSGs (sv-OWSG), which are potentially weaker objects than OWSGs. We show that O(n/log(n))-copy sv-OWSGs (n represents the input length) are equivalent to poly(n)-copy sv-OWSGs and to quantum commitments. Since known results show that o(n/log(n))-copy OWSGs cannot imply commitments, this shows that O(n/log(n))-copy sv-OWSGs are the weakest OWSGs from which we can get commitments (and hence much of quantum cryptography).

Our construction follows along the lines of Hastad, Impagliazzo, Levin and Luby [HILL99], who obtained classical pseudorandom generators (PRG) from classical one-way functions (OWF), however with crucial modifications. Our construction, when applied to the classical case, provides an alternative to the classical construction to obtain a classical mildly non-uniform PRG from any classical OWF. Since we do not argue conditioned on the output f(x), our construction and analysis is arguably simpler and may be of independent interest. For converting a mildly non-uniform PRG to a uniform PRG, we can use the same construction as [HILL99].
(CMI - Lecture Hall 202)
15:30 - 16:00 Coffee Break (CMI - Lecture Hall 202)
16:00 - 16:30 Pranab Sen: Practical resilient efficient one way QKD
Almost all known QKD protocols use two way communication, including the earliest and most famous one viz. BB84. Also most known QKD protocols have an information reconciliation step where Alice and Bob go from there respective raw keys, which are slightly different due to Eve's actions, to their reconciled raw keys which are exactly the same. No efficient algorithm for information reconciliation is known. All experimental implementations of QKD suffer significant channel losses, which have to be handled by two way communication.

One way QKD becomes important in some critical / military scenarios. The one way protocol should be practical i.e. designed for today's hardware, resilient i.e. able to handle realistic amount of channel losses and Eve's eavesdropping, and efficient i.e every aspect of the protocol from end to end should be implementable in classical polynomial time.

  We design a strictly one way QKD protocol that achieves all the above requirements. Using the 4 BB84 states, it can tolerate up to 25% losses without eavesdropping bit errors, or 4%  bit errors without losses. A tradeoff exists between losses and bit errors e.g. loss of 10% and bit error of 1% is tolerable which is a realistic figure. In addition, our information reconciliation subroutine can be plugged into existing QKD protocols like BB84, making them fully efficient for the first time. We also obtain extensions to our protocol using the standard set of six states.

This is joint work with Sayantan Chakraborty and Upendra Kapshikar.
(CMI - Lecture Hall 202)
16:30 - 17:00 Rahul Jain: Quantum secure non-malleable cryptography
In this talk, we survey some recent results in quantum secure non-malleable cryptography. We look at some recent constructions of non-malleable extractors and their applications in privacy amplification (e.g. for QKD), constructing non-malleable randomness-encoders, non-malleable codes, and non-malleable secret sharing schemes (both for classical and quantum secrets). 

Talk based on: ArXiv:2308.06466 (TCC 2024), ArXiv: 2308.07340 (QCrypt 2023), ArXiv:2202.13354 (IEEE-T-IT 2023), ArXiv:2109.03097 (TQC 2023) and ArXiv:2106.02766 (IEEE-T-IT 2023).
(CMI - Lecture Hall 202)
18:00 - 21:30 Dinner (Hotel Regenta Central - Kafe 24)
Tuesday, December 10
07:30 - 09:00 Breakfast (Hotel Regenta Central - Kafe 24)
09:00 - 09:30 Transport to CMI Institute
Meet at the hotel lobby
(Other (See Description))
09:30 - 10:00 Anthony Munson: The value of lacking complexity in quantum computation
Quantum complexity is emerging as a key feature of many-body systems, including early quantum computers, black holes, and topological materials. A state’s quantum complexity quantifies the difficulty of preparing the state from a simple tensor product, or the difficulty of uncomputing the state to a simple tensor product. The greater a state’s distance from maximal complexity, or “uncomplexity,” the more useful the state is as input to a quantum computation. Separately, resource theories—simple models for agents subject to constraints—are burgeoning in quantum information theory. I will unite the two domains, meeting Brown and Susskind’s long-standing challenge to construct a resource theory of uncomplexity. I will present the resource theory’s definition, two operational tasks analyzable in the theory, and monotones (resource-theory measures of a state’s usefulness). This work brings to many-body complexity a powerful mathematical and conceptual toolkit from quantum information theory.

References
1) NYH, Kothakonda, Haferkamp, Munson, Eisert, and Faist, Phys. Rev. A 106, 062417 (2022).
2) Munson, Kothakonda, Haferkamp, NYH, Eisert, and Faist, arXiv:2403.04828 (2024).
3) Haferkamp, Kothakonda, Faist, Eisert, and NYH, Nat. Phys. (2022).
(CMI - Lecture Hall 202)
10:00 - 10:30 Pavithran Iyer Sridharan: Quantum Error Correction Beyond the Pauli Paradigm
Quantum systems are prone to environmental interactions that lead to faults in a computation process, posing significant engineering roadblocks for building large-scale quantum computers. Quantum error correction (QEC) provides a theoretical framework to ensure that logical operations can performed reliably in the presence of noise. However, many of these theoretical guarantees rely on overly simplistic error models, often assuming decoherence caused by unknown Pauli operations such as a Depolarizing channel. This approach fails to accurately capture realistic noise, where quantum systems undergo a general time evolution while being entangled with their environment. For example, the physical process associated with a qubit's T1 relaxation time does not conform to a Depolarizing channel. Similarly, coherent errors arising from imperfect calibration present another critical deviation. Analyzing the behavior of QEC schemes under such realistic noise conditions is crucial for optimizing their design and performance. In this talk, I will present an overview of some of my works (arXiv:1711.04736, arXiv:2108.10830, arXiv:2303.06846, and another in preparation) that provide insights into benchmarking and improving the performance of QEC schemes under realistic noise models, paving the way for designing optimal and efficient QEC schemes.
(CMI - Lecture Hall 202)
10:30 - 11:00 Coffee Break (CMI - Lecture Hall 202)
11:00 - 12:00 Hsin-Yuan (Robert) Huang: Tutorial - Learning theory (CMI - Lecture Hall 202)
12:00 - 12:30 Rajat Mittal: Composition of approximate degree
Approximate degree is known to be a lower bound on the quantum query complexity. For a measure $M$, composition question asks if $M(f\circ g) = \Theta (M(f) M(g)$. Even though the composition question for most of the measures based on decision tree (how does  for a measure $M$?) has been answered, the complete picture is missing for approximate degree. In this talk we will focus on the composition question of approximate degree.

We will discuss methods (like dual witness) which have been tried to prove composition. This will allow us to prove composition for some interesting classes of functions. Specifically, we will see the composition result when the inner or the outer function is a recursive composition itself.

This is a joint work with Sourav Chakraborty, Chandrima Kayal, Manaswi Paraashar and Nitin Saurabh.  
(CMI - Lecture Hall 202)
12:40 - 13:30 Lunch
Location will be announced at the start of each workshop.
(CMI - Lecture Hall 202)
13:30 - 19:00 Optional outing: Mahabalipuram
More information will follow.
(Other (See Description))
14:00 - 17:00 Discussion Time (CMI - Lecture Hall 202)
18:00 - 21:30 Dinner (Hotel Regenta Central - Kafe 24)
Wednesday, December 11
07:30 - 09:00 Breakfast (Hotel Regenta Central - Kafe 24)
09:00 - 09:30 Transport to CMI Institute
Meet at the hotel lobby
(Other (See Description))
09:30 - 10:00 Graeme Smith (CMI - Lecture Hall 202)
10:00 - 10:30 Marco Tomamichel: Quantum conditional entropies
Fully quantum conditional entropies are widely used in quantum information theory and cryptography to quantify the uncertainty about the state of a quantum system from the perspective of an observer with access to a potentially correlated quantum system. Using a novel construction, we find a comprehensive family of conditional entropy that contain all previously studied examples of R\'enyi entropies. We show that they satisfy a list of desiderata: data-processing inequalities, additivity under tensor products, duality relations, chain rules, concavity or convexity, and various monotonicity relations in their parameters. We provide unified proofs that in many cases simplify previous more specialised arguments.
(CMI - Lecture Hall 202)
10:30 - 11:00 Coffee Break (CMI - Lecture Hall 202)
11:00 - 12:00 Pranab Sen: Tutorial - Quantum Shannon Theory (CMI - Lecture Hall 202)
12:00 - 12:30 Arul Lakshminarayan: Quantum channels and dynamical systems
Quantum channels derived from various dynamical systems are considered. If there is a classical limit, classical channels, defined via the unitary Koopman operators, enable a detailed study of classical structures in quantum channel modes, including scarring. For many-body systems these channels provide a fresh insight into integrability breaking and the quantum equivalents of Ruelle-Pollicot resonances that govern decay of correlations. Some universal features such as the application of the single-ring theorem from random matrix theory in the spectral properties of quantum channels is also pointed out.
(CMI - Lecture Hall 202)
12:30 - 12:40 Group Photo (CMI - Lecture Hall 202)
12:30 - 14:00 Lunch
Location will be announced at the start of each workshop.
(CMI - Lecture Hall 202)
14:00 - 14:30 Uma Girish: Trade-offs between Entanglement and Communication
We study the power of entanglement in classical communication complexity. In particular, we study LOCC communication where Alice and Bob have limited entanglement and can exchange classical messages that depend on measurement outcomes of their shared state. We give explicit partial functions on N bits for which reducing the entanglement even by a small amount exponentially increases the classical communication complexity. Among several results, we show that for every k >= 1, 

(1.) Classical simultaneous protocols with O(k log N) qubits of entanglement can exponentially outperform quantum simultaneous protocols with O(k) qubits of entanglement.  

(2.) Classical one-way protocols with O(k^5 log^3 N) qubits of entanglement can exponentially outperform classical two-way protocols with O(k) qubits of entanglement. 

Collectively, these results show that we cannot efficiently reduce the entanglement in a quantum protocol using only a small amount of classical two-way communication or quantum simultaneous communication. This is based on a joint work with Srinivasan Arunachalam.
(CMI - Lecture Hall 202)
14:30 - 15:00 Soumik Ghosh: Learning and cryptography with random circuits 
The talk is in two parts. —  In the first part, we prove a lower bound on the scrambling speed of a random quantum circuit. We give three applications of this:

a) An optimal lower bound on the depth required for ε-approximate unitary designs; 
b) A polynomial-time quantum algorithm that computes the depth of a bounded-depth circuit, given oracle access to the circuit;
c) A polynomial-time algorithm that learns log-depth circuits up to polynomially small diamond distance, given oracle access to the circuit.

—  In the second part, we show that concrete hardness assumptions about learning or cloning the output state of a random quantum circuit can be used as the foundation for secure quantum cryptography. Our random circuit-based constructions provide concrete instantiations of quantum crypto-graphic primitives whose security do not depend on the existence of one-way functions. The use of random circuits in our constructions also opens the door to NISQ-friendly quantum cryptography.
(CMI - Lecture Hall 202)
15:00 - 15:30 Apoorva Patel: Understanding Quantum Advantage in Machine Learning
Machine learning models are used for pattern recognition analysis of big data, without direct human intervention. The task of supervised learning is to classify new data after learning patterns from training data, while that of unsupervised learning is to find the probability distribution that would best describe the available data, and then use it to make predictions. The former uses feature maps, while the latter uses Boltzmann distributions, both with a large number of tunable parameters. Quantum extensions of these models replace classical probability distributions with the quantum density matrix. An advantage can be obtained only when features of quantum density matrices that are missing in classical probability distributions are exploited. Such situations depend on the input data as well as the targeted observables. Illustrative examples bring out the constraints limiting quantum advantage. The problem-dependent extent of quantum advantage has implications for both data analysis and sensing applications.
(CMI - Lecture Hall 202)
15:30 - 16:00 Coffee Break (CMI - Lecture Hall 202)
16:00 - 16:30 Prabha Mandayam (CMI - Lecture Hall 202)
16:30 - 17:30 Panel discussion: New directions in Quantum Information and Computation
Moderator: Ashwin Nayak Rahul Jain Arul Lakshminarayan Frederic Magniez Anand Natarajan Apoorva Patel
(CMI - Lecture Hall 202)
18:00 - 21:30 Dinner (Hotel Regenta Central - Kafe 24)
Thursday, December 12
07:30 - 09:00 Breakfast (Hotel Regenta Central - Kafe 24)
09:00 - 09:30 Transport to CMI Institute
Meet at the hotel lobby
(Other (See Description))
09:30 - 10:30 Frederic Magniez: Tutorial - Query complexity (CMI - Lecture Hall 202)
10:30 - 11:00 Coffee Break (CMI - Lecture Hall 202)
11:00 - 11:30 Avhishek Chatterjee: Effect of Correlated Errors on Quantum Memory
Recent results on constant overhead LDPC code based fault-tolerance against i.i.d. errors naturally lead to the question of fault-tolerance against errors with long-range correlations. Though any correlation can be captured by a joint (system and bath) Hamiltonian, an arbitrary joint Hamiltonian is often intractable. Hence, the joint Hamiltonian model with pairwise terms was introduced and developed in a seminal series of papers, Terhal et al. 2005, Aliferis et al. 2005 and Aharonov et al. 2006. However, the analysis of the new constant overhead codes in that error model appears quite challenging. In this work, for modeling correlated errors in quantum memory we introduce a classical correlation model based on hidden random fields. This proposed model, which includes stationary and ergodic (non-Markov) error distributions, is shown to capture correlations not captured by the joint Hamiltonian model with pairwise terms. On the other hand, we show that for a broad class of non-Markov and (possibly) non-stationary error distributions within our proposed model, quantum Tanner codes can ensure an exponential retention time (in the number of physical qubits), when the error rate is below a threshold.  We also discuss some new insights obtained from the analysis of the proposed model that are complementary to the pairwise Hamiltonian model. 

This is a joint work with Smita Bagewadi (IIT Madras).
(CMI - Lecture Hall 202)
11:30 - 12:00 Hui Khoon Ng: Resource cost of noisy quantum computing and more
I will give an overview of the research work in my group [in collaboration with the groups of A Auffeves (MajuLab, CNRS) and R Whitney (Grenoble)] in the past few years on the topic of resource costs of doing quantum computing with noisy components [PRX Quantum 4, 040319 (2023) and PRX Quantum 2, 040335 (2021)]. I will also touch on an upcoming posting on the cost of quantum metrology using exotic states.
(CMI - Lecture Hall 202)
12:00 - 12:30 Quynh Nguyen: Quantum fault tolerance with constant-space and logarithmic-time overheads
In a model of fault-tolerant quantum computation with quick and noiseless polylog-time classical auxiliary computation, we construct a quantum fault tolerance protocol with constant-space and $\widetilde{O}(\log N)$-time overheads. This significantly improves over the previous state-of-the-art due to Yamasaki and Koashi who achieved constant-space and quasipolylog-time overhead. Our construction is obtained by using constant-rate quantum locally testable codes (qLTC) of appropriately chosen block size and developing new fault-tolerant gadgets on qLTCs and qLDPC codes. In particular, we obtain the following new technical results: (1) Magic state distillation protocol with almost-constant spacetime overhead, (2) Single-shot decoder for quantum codes based on the cubical complex constructions, including a recent breakthrough almost-c3 qLTC construction of Dinur-Lin-Vidick, (3) Fault-tolerant universal logical state preparation with almost-constant spacetime overhead on qLTCs. (4) Resource states to obtain addressable qLDPC logic that can be easily prepared using our state preparation schemes. We obtain the mentioned quantum fault tolerance protocol by combining the above results with carefully chosen parameters. To our knowledge, this gives the lowest overhead to date in the considered model of quantum fault tolerance, which we conjecture is optimal, up to sub-polylog factors.

Joint work with Christopher A. Pattison
(CMI - Lecture Hall 202)
12:30 - 14:00 Lunch
Location will be announced at the start of each workshop.
(CMI - Lecture Hall 202)
14:00 - 15:00 Pavel Panteleev: Tutorial - Error-correction (CMI - Lecture Hall 202)
15:00 - 15:30 Anirudh Krishna: Hierarchical memories: Simulating quantum LDPC codes with local gates
Constant-rate low-density parity-check (LDPC) codes are promising candidates for constructing efficient fault-tolerant quantum memories. However, if physical gates are subject to geometric-locality constraints, it becomes challenging to realize these codes. In this paper, we construct a new family of [[N,K,D]] codes, referred to as hierarchical codes, that encode a number of logical qubits K = Omega(N/\log(N)^2). The N-th element of this code family is obtained by concatenating a constant-rate quantum LDPC code with a surface code; nearest-neighbor gates in two dimensions are sufficient to implement the corresponding syndrome-extraction circuit and achieve a threshold. Below threshold the logical failure rate vanishes superpolynomially as a function of the distance D(N). We present a bilayer architecture for implementing the syndrome-extraction circuit, and estimate the logical failure rate for this architecture. Under conservative assumptions, we find that the hierarchical code outperforms the basic encoding where all logical qubits are encoded in the surface code.

This is joint work with Chris Pattison and John Preskill. The talk will be based on arXiv2303.04798.
(CMI - Lecture Hall 202)
15:30 - 16:00 Coffee Break (CMI - Lecture Hall 202)
16:00 - 17:00 Alexander Belov: Taming Quantum Time Complexity (part tutorial)
Quantum query complexity has several nice properties with respect to composition. First, bounded-error quantum query algorithms can be composed without incurring log factors through error reduction (exactness). Second, through careful accounting (thriftiness), the total query complexity is smaller if subroutines are mostly run on cheaper inputs -- a property that is much less obvious in quantum algorithms than in their classical counterparts.

While these properties were previously seen through the model of span programs (alternatively, the dual adversary bound), a recent work by two of the authors (Belovs, Yolcu 2023) showed how to achieve these benefits without converting to span programs, by defining quantum Las Vegas query complexity. Independently, recent works, including by one of the authors (Jeffery 2022), have worked towards bringing thriftiness to the more practically significant setting of quantum time complexity.

In this work, we show how to achieve both exactness and thriftiness in the setting of time complexity. We generalize the quantum subroutine composition results of Jeffery 2022 so that, in particular, no error reduction is needed. We give a time complexity version of the well-known result in quantum query complexity, $Q(f\circ g)=O(Q(f)\cdot Q(g))$, without log factors.

We achieve this by employing a novel approach to the design of quantum algorithms based on what we call transducers, and which we think is of large independent interest. While a span program is a completely different computational model, a transducer is a direct generalisation of a quantum algorithm, which allows for much greater transparency and control. Transducers naturally characterize general state conversion, rather than only decision problems;  provide a very simple treatment of other quantum primitives such as quantum walks; and lend themselves well to time complexity analysis.
(CMI - Lecture Hall 202)
17:00 - 17:30 Pavel Panteleev (CMI - Lecture Hall 202)
18:00 - 21:30 Dinner (Hotel Regenta Central - Kafe 24)
Friday, December 13
07:30 - 09:00 Breakfast (Hotel Regenta Central - Kafe 24)
09:00 - 09:30 Transport to CMI Institute
Meet at the hotel lobby
(Other (See Description))
09:30 - 10:00 Shantanav Chakraborty: Implementing any Linear Combination of Unitaries on Intermediate-term Quantum Computers
I will talk about some of the new techniques we developed for implementing any Linear combination of Unitaries (LCU) on intermediate-term quantum computers. While the standard LCU procedure requires several ancilla qubits and sophisticated multi-qubit controlled operations, our methods consume significantly fewer quantum resources. 

The first method, known as Single-ancilla LCU, implements any LCU using only a single ancilla qubit, no multi-qubit controlled logic, and quantum circuits of shorter depth than the standard method. The key idea is to substitute complicated controlled operations (in the standard LCU approach) with importance sampling and make several independent runs of short-depth quantum circuits to estimate the expectation value of observables vis-à-vis any state prepared by LCU. We apply this to develop new algorithms for ground state property estimation, Hamiltonian simulation, and quantum linear systems that are more amenable to intermediate-term implementation. We characterize the end-to-end complexities of our algorithms, which, remarkably in some regimes, have shorter gate depths than even state-of-the-art methods despite requiring significantly fewer resources. Time permitting, I will also talk about two other approaches:  Analog LCU, a simple, physically motivated, continuous-time analogue of LCU tailored to hybrid qubit-qumode systems, and  Ancilla-free LCU, which, as the name suggests, allows for implementing LCU without any ancilla qubits when we are interested in the projection of a quantum state (prepared by the LCU procedure) in some subspace of interest.  Both these methods also find applications in different areas. 

Overall, our results are pretty generic and can be readily applied to other problems, even beyond those considered in our work.

Reference: S. Chakraborty, arXiv:2302.13555v4 [arxiv.org] (To appear in Quantum).
(CMI - Lecture Hall 202)
10:00 - 10:30 Amolak Ratan Kalra: Synthesis and Arithmetic of Qutrit Circuits
In this talk I will discuss qutrit circuit synthesis over various families of universal gate sets. I will describe a method which relates the question of exact synthesis for both single qubits and single qutrits to the problem of solving a system of polynomial equations mod p. 

This is work done in collaboration with Dinesh Valluri and Michele Mosca. 
(CMI - Lecture Hall 202)
10:30 - 11:00 Coffee Break (CMI - Lecture Hall 202)
11:00 - 11:30 Hsin-Yuan (Robert) Huang: Quantum Computing Enhanced Sensing
Quantum computing and quantum sensing represent two distinct frontiers of quantum technology. In this work, we harness quantum computing to solve a fundamental and practically important sensing problem: the detection of weak oscillating fields with unknown strength and frequency. We present a quantum computing enhanced sensing protocol that outperforms all existing approaches. Furthermore, we prove our approach is optimal by establishing the Grover-Heisenberg limit --- a fundamental lower bound on the minimum sensing time. The key idea is to robustly digitize the continuous, analog signal into a discrete operation, which is then integrated into a quantum algorithm. Our metrological gain fundamentally requires quantum computation, distinguishing our protocol from conventional sensing approaches. Indeed, we prove that any approach based on quantum Fisher information, finite-lifetime quantum memory, or classical signal processing is strictly less powerful. Our protocol is compatible with multiple experimental platforms. We propose and analyze a proof-of-principle experiment using nitrogen-vacancy centers, where meaningful improvements are achievable using current technology. This work establishes quantum computation as a powerful new resource for advancing sensing capabilities.
(CMI - Lecture Hall 202)
11:30 - 12:00 Check out by 12pm (Hotel Regenta Central - Front Desk)
11:30 - 12:00 Avantika Agarwal: Oracle Separations for the Quantum-Classical Polynomial Hierarchy
We study the quantum-classical polynomial hierarchy, QCPH, which is the class of languages solvable by a constant number of alternating classical quantifiers followed by a quantum verifier. Our main result is that QCPH is infinite relative to a random oracle (previously, this was not even known relative to any oracle). We further prove that higher levels of PH are not contained in lower levels of QCPH relative to a random oracle; this is a strengthening of the somewhat recent result that PH is infinite relative to a random oracle (Rossman, Servedio, and Tan 2016). To establish this, we give a new switching lemma for quantum algorithms which may be of independent interest. Our lemma says that if we apply a random restriction to a function f with low quantum query complexity, the restricted function becomes exponentially close (in terms of depth)  to a small depth decision tree. Our switching lemma works even in a “worst-case” sense, in that only the indices to be restricted are random; the values they are restricted to are chosen adversarially. Moreover, the switching lemma also works for polynomial degree in place of quantum query complexity. This talk is based on joint work with Shalev Ben-David.
(CMI - Lecture Hall 202)
12:00 - 12:30 Frederic Magniez: Quantum property testing in sparse directed graphs
We initiate the study of quantum property testing in sparse directed graphs, and more particularly in the unidirectional model, where the algorithm is allowed to query only the outgoing edges of a vertex.

In the classical unidirectional model the problem of testing k-star-freeness, and more generally k-source-subgraph-freeness, is almost maximally hard for large k. We prove that this problem has almost quadratic advantage in the quantum setting. Moreover, we prove that this advantage is nearly tight, by showing a quantum lower bound using the method of dual polynomials on an intermediate problem for a new, property testing version of the k-collision problem that was not studied before.

To illustrate that not all problems in graph property testing admit such a quantum speedup, we consider the problem of 3-colorability in the related undirected bounded-degree model, when graphs are now undirected. This problem is maximally hard to test classically, and we show that also quantumly it requires a linear number of queries.
(CMI - Lecture Hall 202)
12:30 - 14:00 Lunch
Location will be announced at the start of each workshop.
(CMI - Lecture Hall 202)