This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

On the Power of Quantum Distributed Proofs

Atsuya Hasegawa atsuyahasegawa@is.s.u-tokyo.ac.jp Graduate School of Information Science and Technology, The University of Tokyo, Japan Srijita Kundu srijita.kundu@uwaterloo.ca Institute for Quantum Computing and Department of Combinatorics and Optimization, University of Waterloo, Canada Harumichi Nishimura hnishimura@i.nagoya-u.ac.jp Graduate School of Informatics, Nagoya University, Japan
Abstract

Quantum nondeterministic distributed computing was recently introduced as 𝖽𝖰𝖬𝖠\mathsf{dQMA} (distributed quantum Merlin-Arthur) protocols by Fraigniaud, Le Gall, Nishimura and Paz (ITCS 2021). In 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols, with the help of quantum proofs and local communication, nodes on a network verify a global property of the network. Fraigniaud et al. showed that, when the network size is small, there exists an exponential separation in proof size between distributed classical and quantum verification protocols, for the equality problem, where the verifiers check if all the data owned by a subset of them are identical. In this paper, we further investigate and characterize the power of the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for various decision problems.

First, we give a more efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the equality problem with a simpler analysis. This is done by adding a symmetrization step on each node and exploiting properties of the permutation test, which is a generalization of the SWAP test. We also show a quantum advantage for the equality problem on path networks still persists even when the network size is large, by considering “relay points” between extreme nodes.

Second, we show that even in a general network, there exist efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for the ranking verification problem, the Hamming distance problem, and more problems that derive from efficient quantum one-way communication protocols. Third, in a line network, we construct an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for a problem that has an efficient two-party 𝖰𝖬𝖠\mathsf{QMA} communication protocol.

Finally, we obtain the first lower bounds on the proof and communication cost of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols. To prove a lower bound on the equality problem, we show any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol with an entangled proof between nodes can be simulated with a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol with a separable proof between nodes by using a 𝖰𝖬𝖠\mathsf{QMA} communication-complete problem introduced by Raz and Shpilka (CCC 2004).

1 Introduction

1.1 Background

Quantum distributed computing

Quantum distributed computing is the quantum analog of distributed computing where parties are quantum computers and communication in a network is done via qubits. A few early works initiated the study of quantum distributed computing [BOH05, TKM12, GKM09, EKNP14]. See also [BT08, DP08, AF14] for general discussions.

Recently, the quantum distributed computing model has been intensively studied to identify quantum advantages in the number of rounds and the amount of communication in distributed computing. The major models in classical distributed computing have been explored since the seminal work by Le Gall and Magniez [GM18]; 𝖢𝖮𝖭𝖦𝖤𝖲𝖳\mathsf{CONGEST} model [GM18, IGM20, MN22, CHFG+22, vAdV22, WY22], 𝖢𝖮𝖭𝖦𝖤𝖲𝖳\mathsf{CONGEST}-𝖢𝖫𝖨𝖰𝖴𝖤\mathsf{CLIQUE} model [IG19] and 𝖫𝖮𝖢𝖠𝖫\mathsf{LOCAL} model [GNR19, GR22, CRdG+23].

Nondeterministic distributed computing

For both theoretical and application reasons, on distributed networks, it is quite important to efficiently verify some global properties of the network with local (i.e., constant-round) communication. The most widely accepted and studied criteria for distributed verification is as follows [Fra10]:

  • (completeness) For a yes-instance, all the nodes must accept.

  • (soundness) For a no-instance, at least one node must reject.

Intuitively, if the global property of the graph is appropriate, all the nodes are satisfied, and otherwise, at least one node raises an alarm to all the other nodes.

On the other hand, many properties cannot be checked with such local communication, and usually require many rounds on the networks. A possible extension is to give information to the nodes on the network. Such a scheme was introduced as proof-labelling schemes [KKP10] and locally checkable proofs [GS16], which are considered distributed 𝖭𝖯\mathsf{NP} protocols. More recently, randomized proof-labeling schemes were introduced [FPSP19], and these protocols are considered as distributed Merlin-Arthur (𝖽𝖬𝖠\mathsf{dMA}) protocols. In a 𝖽𝖬𝖠\mathsf{dMA} protocol, an untrusted prover sends a classical proof to all the nodes on a network. Based on their part of the proof, each node, who can use a randomized algorithm, on the network simultaneously sends messages to its neighbors and receives messages from its neighbors in constantly many rounds. Finally each node outputs accept or reject in a probabilistic manner so that completeness is high, i.e., the completeness condition holds with probability at least, say, 23\frac{2}{3} (completeness 23\frac{2}{3}) and soundness error is low, i.e., the soundness condition does not hold with probability at most, say, 13\frac{1}{3} (soundness 13\frac{1}{3}).

While a 𝖽𝖬𝖠\mathsf{dMA} protocol is more powerful than usual deterministic distributed computing, unfortunately, there are still limits on this model for some predicates [FGNP21].

Distributed quantum Merlin-Arthur (𝖽𝖰𝖬𝖠\mathsf{dQMA}) protocols

Fraigniaud, Le Gall, Nishimura, and Paz [FGNP21] introduced the setting where a prover and nodes are quantum computers and communicate with quantum messages, and named such the protocols distributed quantum Merlin-Arthur (𝖽𝖰𝖬𝖠\mathsf{dQMA}) protocols.

The global property they considered was the problem 𝖤𝖰\mathsf{EQ} of deciding whether all the distributed data (nn-bit binary strings) on the network are the same or not. The basic idea behind their 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol is to make the prover send quantum fingerprints for the input data [BCWdW01] to all the nodes; subsequently, each node sends the fingerprint it receives to its neighbor, and they do the SWAP test [BCWdW01], a quantum procedure for checking whether two quantum fingerprints are the same or not. Their 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol needs local proof size O(tr2logn)O(tr^{2}\log n), namely, each node receives an O(tr2logn)O(tr^{2}\log n)-qubit proof, where rr is the radius of the network and tt is the number of distributed inputs. As a complementary result to their 𝖽𝖰𝖬𝖠\mathsf{dQMA} upper bound, they showed that any 𝖽𝖬𝖠\mathsf{dMA} protocol with high completeness and low soundness error requires an Ω(n)\Omega(n) size classical proof for at least one node. As a consequence, they gave an exponential gap in the proof size between 𝖽𝖬𝖠\mathsf{dMA} protocols and 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for the equality problem.

They also derive an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a path, for any function that has an efficient quantum one-way communication protocol with bounded error in the communication complexity setting. As a corollary, they have an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a path for the Hamming distance problem since it has an efficient quantum one-way communication protocol [Yao03].

The results of [FGNP21] are summarized in Table 1, where #\#Terminals represents the number of terminals, the nodes that have distributed inputs. For a function f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\to\{0,1\}, let us denote by 𝖡𝖰𝖯1(f)\mathsf{BQP}^{1}(f) the quantum one-way communication complexity of ff.

Protocol Problem #\#Terminals Round Number Local Proof Size
Quantum 𝖤𝖰\mathsf{EQ} tt 1 O(tr2logn)O(tr^{2}\log n)
Quantum ff 2 1 O(r2𝖡𝖰𝖯1(f)log(n+r))O(r^{2}\mathsf{BQP}^{1}(f)\log(n+r))
Classical 𝖤𝖰\mathsf{EQ} 2 ν\nu Ω(nν)\Omega(\frac{n}{\nu})
Table 1: Summary of the results by Fraigniaud, Le Gall, Nishimura, and Paz [FGNP21]

1.2 Our results

In this work, we further investigate the power and limits of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols, and give a comprehensive characterization for various decision problems.

Improved 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for 𝖤𝖰\mathsf{EQ}

We derive a more efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ} on a general graph with multiple input terminals, by a simpler analysis of soundness. Our protocol and analysis are simpler than the ones in [FGNP21] and the proof size of our 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol does not depend on the number of the terminals and matches the size of the path case with two terminals.

Theorem 1 (Theorem 19).

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ} between tt terminals, on a network of radius rr, with perfect completeness (i.e., completeness 11) and sufficiently low soundness error, using local proof and message of size O(r2logn)O(r^{2}\log n).

The result of [FGNP21] implies that there is an exponential difference in proof size between 𝖽𝖬𝖠\mathsf{dMA} and 𝖽𝖰𝖬𝖠\mathsf{dQMA} for 𝖤𝖰\mathsf{EQ} on a path. However, such a big difference holds only when the network size is much smaller than the input size, i.e., rnr\ll n. Since there exists a trivial classical protocol with nn-bit proofs (the prover sends the whole nn-bit string to all the nodes, and each node checks if the proofs of its neighbors are identical to its own or not), the quantum strategy can be even worse than the trivial classical strategy when the network size is not so small.

In this paper, we show that even when the network size is not so small, a provable quantum advantage still persists. To claim the quantum advantage, we consider the complexity measure of the total size of proofs to all the nodes rather than the size of respective proofs to each node.

Theorem 2 (Informal version of Theorem 22 and Corollary 25).

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ} on the path of length rr, with 1-round communication, perfect completeness and sufficiently low soundness error, and with O~(rn23)\tilde{O}(rn^{\frac{2}{3}}) qubits as proofs in total. In contrast, any 𝖽𝖬𝖠\mathsf{dMA} protocol for 𝖤𝖰\mathsf{EQ} with constant-round communication, sufficiently high completeness and low soundness error, requires Ω(rn)\Omega(rn) bits as proofs in total.

The power of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for various problems

Checking how large an input is among all inputs held by the terminals in a network is a fundamental problem. We name this problem the ranking verification (𝖱𝖵\mathsf{RV}) problem, and show that there exists an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for it.

Definition 1 (Ranking verification problem, informal version of Definition 9).

For i,j[1,t]i,j\in[1,t], 𝖱𝖵ti,j(x1,,xt)=1\mathsf{RV}^{i,j}_{t}(x_{1},\ldots,x_{t})=1 if and only if xix_{i}, which is held by the ii-th terminal, is the jj-th largest input among tt nn-bit integers x1,,xtx_{1},\ldots,x_{t}.

Theorem 3 (Informal version of Theorem 29).

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖱𝖵\mathsf{RV} between tt terminals on a network of radius rr, with perfect completeness and sufficiently low soundness error, using local proof and messages of size O(tr2logn)O(tr^{2}\log n).

To prove this statement, we derive an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a path to solve the greater-than function. The greater-than function (𝖦𝖳\mathsf{GT}) is defined as 𝖦𝖳(x,y)=1\mathsf{GT}(x,y)=1 if and only if x>yx>y, where xx and yy are nn-bit integers.

Theorem 4 (Theorem 26).

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT} on the path of length rr with 11-round communication, perfect completeness, and sufficiently low soundness error, using local proof and message of size O(r2logn)O(r^{2}\log n).

We can show that any 𝖽𝖬𝖠\mathsf{dMA} protocol for 𝖦𝖳\mathsf{GT} with high completeness and low soundness error requires Ω(nr)\Omega(nr) size classical proofs in total. Thus, this provides us another fundamental problem that exhibits an exponential quantum advantage in distributed verification.

The result of [FGNP21] on converting a quantum one-way communication protocol to a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol only works on a path with two inputs, and no efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol was known for three or more inputs over general networks. We construct an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a general graph with multiple terminals, for any function which has an efficient quantum one-way communication protocol with bounded error. For a function f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\to\{0,1\}, we define the multi-input function tf:({0,1}n)t{0,1}\forall_{t}f:(\{0,1\}^{n})^{t}\to\{0,1\} where tf(x1,,xt)=1\forall_{t}f(x_{1},\ldots,x_{t})=1 iff f(xi,xj)=1f(x_{i},x_{j})=1 for any i,j[1,t]i,j\in[1,t].

Theorem 5 (Theorem 32).

For a function f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\to\{0,1\}, there exists a 1-round 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for tf\forall_{t}f on a network of radius rr, with sufficiently high completeness and low soundness error, using local proof and message of size O(t2r2𝖡𝖰𝖯1(f)log(n+t+r))O(t^{2}r^{2}\mathsf{BQP}^{1}(f)\log(n+t+r)).

We also construct an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for a function which has an efficient 𝖰𝖬𝖠\mathsf{QMA} communication protocol (introduced by Raz and Shpilka [RS04]) rather than an efficient quantum one-way communication protocol. Let us denote by 𝖰𝖬𝖠𝖼𝖼(f)\mathsf{QMAcc}(f) the sum of the proof and communication amount of 𝖰𝖬𝖠\mathsf{QMA} communication protocols for ff.

Theorem 6 (Informal version of Proposition 47).

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol to solve ff on the path of length rr with sufficiently high completeness and low soundness error, using local proof and message of size O(r2log(r)poly(𝖰𝖬𝖠𝖼𝖼(f)))O(r^{2}\log(r)\mathrm{poly}(\mathsf{QMAcc}(f))).

In addition, we show that any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol in which entangled proofs are given to the nodes can be simulated with a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol with “separable” proofs, in which the local part of the proof at each node is not entangled with the other nodes, with some overheads. A 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol whose completeness holds with a proof that is separable between nodes.

Theorem 7 (Informal version of Theorem 46).

For a function ff which has a constant-round efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a path (with entangle proofs), there exists a 11-round efficient 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol for ff.

Our results on quantum upper bounds and classical lower bounds are summarized in Table 2. As seen in the table, all the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols constructed in this paper are actually 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} ones. Let 𝖽𝖰𝖬𝖠(f)\mathsf{dQMA}(f) denote the sum of the total proof size and the communication size of a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for ff.

Protocol Problem #\#Terminals Local Proof Size Total Proof Size Ref
𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} 𝖤𝖰\mathsf{EQ} tt O(r2logn)O(r^{2}\log n) § 3
𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} 𝖤𝖰\mathsf{EQ} 22 nn or O(r2logn)O(r^{2}\log n) O~(rn23)\tilde{O}(rn^{\frac{2}{3}}) § 4.1
𝖽𝖬𝖠\mathsf{dMA} 𝖤𝖰,𝖦𝖳\mathsf{EQ},\mathsf{GT} 22 Ω(rn)\Omega(rn) § 4.2
𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} 𝖦𝖳\mathsf{GT} 22 O(r2logn)O(r^{2}\log n) § 5.1
𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} 𝖱𝖵\mathsf{RV} tt O(tr2logn)O(tr^{2}\log n) § 5.2
𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} tf\forall_{t}f tt O(t2r2𝖡𝖰𝖯1(f)log(n+t+r))O(t^{2}r^{2}\mathsf{BQP}^{1}(f)\log(n+t+r)) § 6
𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} ff 22 O(r2log(r)poly(𝖰𝖬𝖠𝖼𝖼(f)))O(r^{2}\log(r)\mathrm{poly}(\mathsf{QMAcc}(f))) § 7
𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} ff 22 O~(r2(𝖽𝖰𝖬𝖠(f))2)\tilde{O}(r^{2}(\mathsf{dQMA}(f))^{2}) § 7
Table 2: Summary of our results on quantum upper bounds and classical lower bounds

Lower bounds for 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols

In this paper, we derive the first lower bounds on the proof and communication cost of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols. We introduce a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol as another variant of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols where a prover can only send separable proofs between nodes (and thus soundness holds only with respect to separable proofs). When we restrict the power of the prover, we obtain the following strong lower bound (note that it implies the matching lower bounds for 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT} with respect to the order of the input size nn as their sizes of 11-fooling sets are 2n2^{n}).

Theorem 8 (Informal version of Theorem 51).

Let ν\nu\in\mathbb{N} be a constant and f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\rightarrow\{0,1\} be a Boolean function with a 11-fooling set of size 2n2^{n} (the definition of 11-fooling sets is given in Section 2.2.1). Let 𝒫\mathcal{P} be a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol for ff on the path of length rr with ν\nu-round communication, sufficiently high completeness and low soundness error. Then, the total proof size is Ω(rlogn)\Omega(r\log n).

It is notoriously hard to prove lower bounds when dealing with entanglement between parties, and the seminal example is the case of 𝖬𝖨𝖯\mathsf{MIP^{*}} [CHTW04, IV12, NW19, JNV+21]. In 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols, nodes on a network might exploit the power of entangled proofs from a prover by clever local communication and computations. Despite this difficulty, we prove several lower bounds of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols. The main result is as follows.

Theorem 9 (Informal version of Theorem 56).

Let f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\rightarrow\{0,1\} be a Boolean function with a 11-fooling set of size 2n2^{n} (including 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT}). Let 𝒫\mathcal{P} be a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for ff on the path of length rr with constant-round communication, sufficiently high completeness and low soundness error. Then, the total proof and communication size of 𝒫\mathcal{P} is Ω((logn)1/4ϵ)\Omega((\log n)^{1/4-\epsilon}) for a sufficiently small constant ϵ>0\epsilon>0.

Additionally, we prove a 𝖽𝖰𝖬𝖠\mathsf{dQMA} lower bound for functions which are hard for 𝖰𝖬𝖠\mathsf{QMA} communication protocols, in terms of the one-sided smooth discrepancy [Kla11]. Let us denote by 𝗌𝖽𝗂𝗌𝖼1(f)\mathsf{sdisc}^{1}(f) the one-sided smooth discrepancy of a function ff; it was shown in [Kla11] that 𝗌𝖽𝗂𝗌𝖼1\mathsf{sdisc}^{1} is a lower bound on 𝖰𝖬𝖠\mathsf{QMA} communication complexity.

Theorem 10 (Informal version of Theorem 63).

Assume that 𝒫\mathcal{P} is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a line of length rr with arbitrary rounds to solve ff with sufficiently high completeness and low soundness error. Then, the total proof and communication size of 𝒫\mathcal{P} is Ω(log𝗌𝖽𝗂𝗌𝖼1(f))\Omega(\sqrt{\log\mathsf{sdisc}^{1}(f)}).

Note that the above theorem does not give a nontrivial lower bound for the equality function, since this function has a constant-cost classical randomized communication protocol, and therefore 𝗌𝖽𝗂𝗌𝖼1(𝖤𝖰)\mathsf{sdisc}^{1}(\mathsf{EQ}) is at most constant. Theorem 9 thus outperforms Theorem 10 for the 𝖤𝖰\mathsf{EQ} function.

Our results on lower bounds (including other ones than the above three theorems) are summarized in the following Table 3. In the table, ϵ>0\epsilon>0 is any small constant and f+f^{+} is any non-constant Boolean function ff. As functions which are hard for 𝖰𝖬𝖠\mathsf{QMA} communication protocols [Kla11], let us denote by 𝖣𝖨𝖲𝖩\mathsf{DISJ} the disjointness function, by 𝖨𝖯\mathsf{IP} the inner product function, by P𝖠𝖭𝖣P_{\mathsf{AND}} the pattern matrix [She11] of the AND function. These lower bounds will be formally stated and proved in Section 8.

Protocol Problem Round Number Lower Bound
𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} 𝖤𝖰,𝖦𝖳\mathsf{EQ},\mathsf{GT} constant total proof size Ω(rlogn)\Omega(r\log n)
𝖽𝖰𝖬𝖠\mathsf{dQMA} 𝖤𝖰,𝖦𝖳\mathsf{EQ},\mathsf{GT} constant total proof & communication size Ω((logn)12ϵr1+ϵ)\Omega(\frac{(\log n)^{\frac{1}{2}-\epsilon}}{r^{1+\epsilon}})
𝖽𝖰𝖬𝖠\mathsf{dQMA} f+f^{+} constant total proof size Ω(r)\Omega(r)
𝖽𝖰𝖬𝖠\mathsf{dQMA} 𝖤𝖰,𝖦𝖳\mathsf{EQ},\mathsf{GT} constant total proof & communication size Ω((logn)14ϵ)\Omega((\log n)^{\frac{1}{4}-\epsilon})
𝖽𝖰𝖬𝖠\mathsf{dQMA} 𝖣𝖨𝖲𝖩\mathsf{DISJ} arbitrary total proof & communication size Ω(n13)\Omega(n^{\frac{1}{3}})
𝖽𝖰𝖬𝖠\mathsf{dQMA} 𝖨𝖯\mathsf{IP} arbitrary total proof & communication size Ω(n12)\Omega(n^{\frac{1}{2}})
𝖽𝖰𝖬𝖠\mathsf{dQMA} P𝖠𝖭𝖣P_{\mathsf{AND}} arbitrary total proof & communication size Ω(n13)\Omega(n^{\frac{1}{3}})
Table 3: Summary of our results on quantum lower bounds

1.3 Overview of our techniques

Improved protocol for 𝖤𝖰\mathsf{EQ} with a simpler analysis and the permutation test

In [FGNP21], they designed a protocol on a path where each node sends the received proof (quantum fingerprint) to its left neighbor with probability 12\frac{1}{2}, and thus the conditional probability that the SWAP test occurs is needed to analyze. To simplify the analysis of the soundness of the protocol, we add an extra step called the symmetrization step for each node. With this step, we can avoid using conditional probability because each node conducts the SWAP test with certainty.

In the [FGNP21] protocol for 𝖤𝖰\mathsf{EQ} with three or more terminals, every non-terminal node performs the SWAP test on the state that consists of the state received from the prover and a state randomly chosen from states received from the children. Every node discards the other states received from the children and are not used for the SWAP test. To improve the proof size of the protocol for general graphs from O(tr2logn)O(tr^{2}\log n) to O(r2logn)O(r^{2}\log n), we make each node perform the permutation test [BBD+97, BCWdW01, KNY08] on all the states from its children.

The permutation test is a generalization of the SWAP test from 2-partite systems to kk-partite systems for any integer k2k\geq 2. We identify the permutation test with a projector to the symmetric subspace of multiple systems as a special case of weak Schur Sampling [BCH06]. Using properties of Schur sampling, we show that, by using the permutation test, we can test how close the subspace is to given states.

Robust quantum advantage for 𝖤𝖰\mathsf{EQ} on a path

To prove a universal quantum advantage for 𝖤𝖰\mathsf{EQ}, we consider inserting multiple “relay points” per O(n13)O(n^{\frac{1}{3}}) nodes between extreme nodes that receive nn-qubit proofs. Based on the nn-bit measurement results, nodes between relay points conduct the SWAP test-based quantum strategy. This makes for a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol in which all the nodes receive O~(rn23)\tilde{O}(rn^{\frac{2}{3}}) qubits in total and has high completeness and low soundness error.

To complement this result, we claim any 𝖽𝖬𝖠\mathsf{dMA} protocol for 𝖤𝖰\mathsf{EQ} with high completeness and low soundness error has to receive Ω(rn)\Omega(rn) bits in total by a finer observation of the classical lower bound in [FGNP21].

Protocol for the greater-than problem and the ranking verification problem

It was shown that the quantum one-way communication complexity of 𝖦𝖳\mathsf{GT} is maximal, i.e., 𝖡𝖰𝖯1(𝖦𝖳)=Θ(n)\mathsf{BQP}^{1}(\mathsf{GT})=\Theta(n) by Zhang [Appendix B in [Zha11]]. Therefore, one cannot apply the technique from [FGNP21], and no efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT} was previously known. In this paper, we derive a new way to use quantum fingerprints with classical indexes, and construct an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT}.

To construct a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the greater-than (𝖦𝖳\mathsf{GT}) problem, we first observe that for x,y{0,1}nx,y\in\{0,1\}^{n}, 𝖦𝖳(x,y)=1\mathsf{GT}(x,y)=1 if and only if there exists an index ii such that a part of xx and yy from the 11st bit to the (i1)(i-1)th bit are the same and the iith bit of xx is 11 and the iith bit of yy is 0. Therefore, we can run the protocol for the equality problem for a part of the inputs, and make the prover send the classical index ii.

To prove the soundness for the ranking verification problem, we consider to make the prover send a direction bit indicating which input is larger and add a step for a root node to count the directions. We then have an efficient protocol for the ranking verification problem by running the protocol for 𝖦𝖳\mathsf{GT} between multiple terminals in parallel.

Protocol from a quantum one-way communication protocol on general graphs

To derive a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for a function that has an efficient quantum one-way communication protocol with multiple terminals, one difficulty is that we need to run the operation of Bob, a party that receives a message from the other party Alice, in the one-way protocol for the function on every leaf. Therefore, we consider a protocol from root to leaves, which is the reverse of the direction of messages in the protocol for 𝖤𝖰\mathsf{EQ}.

The other caveat is that a protocol on one tree is not enough to prove soundness. This is because even if f(xi,xi+1)=1f(x_{i},x_{i+1})=1 and f(xi,xi+2)=1f(x_{i},x_{i+2})=1, the value of f(xi+1,xi+2)f(x_{i+1},x_{i+2}) can be 0. To overcome this, we consider running the protocols in parallel for all the tt spanning trees whose roots are the tt terminals.

Construction of a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol with separable proofs from any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol

To construct a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol with separable proofs from any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol, we use a 𝖰𝖬𝖠\mathsf{QMA} communication complete problem introduced by Raz and Shpilka [RS04].

𝖰𝖬𝖠\mathsf{QMA} communication protocols are two-party communication protocols with a prover who can send a proof to one party Alice. Raz and Shpilka [RS04] defined the Linear Subspace Distance (LSD) problem as a 𝖰𝖬𝖠\mathsf{QMA} communication complete problem, i.e., any 𝖰𝖬𝖠\mathsf{QMA} communication protocol can be reduced to the LSD problem. The LSD problem is a problem to decide whether two subspaces held respectively by the two parties Alice and Bob are close or not.

A useful property of the LSD problem is that it can be solved with a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol with a proof to Alice. Exploiting this property and the SWAP test strategy [FGNP21], we construct a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol for any function that has a 𝖰𝖬𝖠\mathsf{QMA} communication protocol.

In addition, we observe that any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol can be viewed as a 𝖰𝖬𝖠\mathsf{QMA} communication protocol when we split the total nodes into two groups of nodes and consider Alice and Bob to simulate the protocol of the nodes. This leads us to get a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol from any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol.

Lower bounds for 𝖽𝖰𝖬𝖠\mathsf{dQMA}

We obtain some lower bounds by counting arguments over quantum states for fooling inputs. To prove our bounds, we use a result from [BCWdW01, dW01], which states that in order to keep non-trivial distances between each pair of a set of 2n2^{n} states, at least Ω(logn)\Omega(\log n) qubits are required. From this we can prove that, to answer correctly on 2n2^{n} fooling inputs for 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT}, local nodes in a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol must receive at least Ω(logn)\Omega(\log n) qubits. Then, by the pigeonhole principle, we show that at least Ω(rlogn)\Omega(r\log n) qubits are required as a quantum proof in total. This lower bound and proof strategy can be regarded as a quantum analog of the classical lower bound in [FGNP21].

In order for the above proof strategy to be applicable, proofs between nodes are required to be separable, since entanglement between nodes might fool the verifiers. However, by combining our result on the simulation of any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol with a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol, we show a lower bound even for entangled proofs and communications, where the order of the bound is an inverse of a polynomial in rr, due to the overhead of the simulation.

For entangled proofs, we can also show a simpler lower bound. Let us suppose that there are consecutive nodes which receive no proof from a prover. Then, even for a function that has only two fooling inputs, the verifiers are easily fooled by the two inputs, because the information the nodes have is separated between the two parts. To deliver quantum proofs to each local node, it can be shown that Ω(r)\Omega(r) qubits are required as a quantum proof in total. By combining the two lower bounds for entangled proofs, for 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT} we can obtain a lower bound which does not depend on rr which is the main result of our lower bounds.

We obtain other lower bounds by a reduction to 𝖰𝖬𝖠\mathsf{QMA} communication lower bounds by Klauck [Kla11]. To make a reduction, we first introduce 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocols where proofs are sent to the two parties and they might be entangled. Then, we observe that a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol can be used to give a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol, and then the results of [Kla11] can be applied.

1.4 Related works

Raz and Shpilka [RS04] introduced the Linear Subspace Distance problem as a complete problem for 𝖰𝖬𝖠\mathsf{QMA} communication protocols, and showed that there exists an efficient 𝖰𝖬𝖠\mathsf{QMA} (two-party) communication protocol and no efficient quantum communication protocol and 𝖬𝖠\mathsf{MA} communication protocol for the problem. To prove the completeness, they considered a superposition of each step of 𝖰𝖬𝖠\mathsf{QMA} communication protocols similar to Kitaev’s circuit-to-Hamiltonian construction [KSV02].

Klauck [Kla11] proved the first lower bounds for the 𝖰𝖬𝖠\mathsf{QMA} communication protocols. To derive the lower bounds, Klauck introduced a new technique named one-sided discrepancy, and showed separations between 𝖠𝖬\mathsf{AM} communication complexity and 𝖯𝖯\mathsf{PP} communication complexity, and between 𝖠𝖬\mathsf{AM} communication complexity and 𝖰𝖬𝖠\mathsf{QMA} communication complexity.

In [GMN23a], Le Gall, Miyamoto, and Nishimura considered the state synthesis [Aar16] on the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols. They introduced the state generation on distributed inputs (SGDI) and gave a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the task. As an application, they constructed an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the Set Equality problem introduced by [NPY20]. They also showed that from any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol, we can replace quantum communications with classical communications between verifiers on the network and construct an 𝖫𝖮𝖢𝖢\mathsf{LOCC} (Local Operation and Classical Communication) 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol to simulate the original 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol.

In [GMN23b], Le Gall, Miyamoto, and Nishimura introduced distributed quantum interactive proofs (𝖽𝖰𝖨𝖯\mathsf{dQIP}) as a quantum analog of the distributed interactive proofs (𝖽𝖠𝖬\mathsf{dAM}) introduced by [KOS18]. They proved that any 𝖽𝖠𝖬\mathsf{dAM} protocols with constant turns communication between verifiers and a prover can be converted into 𝖽𝖰𝖨𝖯\mathsf{dQIP} protocols with 5 turns if no shared randomness on the network and 3 turns if the shared randomness is allowed.

1.5 Discussion and open problems

In this paper, we investigate the power of the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols and show the protocols are indeed useful for many problems but have limits for some functions.

Here we list some problems that are left open by our work.

  1. 1.

    There are many variants of 𝖰𝖬𝖠\mathsf{QMA} (see [Gha24] for a comprehensive survey on 𝖰𝖬𝖠\mathsf{QMA} and its variants) and we can define more variants of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols. For example, we can define a 𝖽𝖰𝖢𝖬𝖠\mathsf{dQCMA} protocol if we allow only classical proofs from a prover while the verifier can communicate with qubits. Another example is a 𝖽𝖰𝖬𝖠(k)\mathsf{dQMA}(k) protocol for kk\in\mathbb{N} if we allow kk provers who send quantum proofs to the nodes independently and whose proofs are promised to be separable. Can we find a new relationship between 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols and their variants?

    Note that some relations are known. In [GMN23a], the authors showed that any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol can be simulated by an 𝖫𝖮𝖢𝖢\mathsf{LOCC} 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol with some overheads. This paper shows that any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol can be simulated by a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol with some overheads.

  2. 2.

    In our paper and relevant papers about 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols, a quantum advantage on the input size is the focus. In [GS16], Göös and Suomela classified graph properties according to their proof size complexity with local verification based on the graph size. Can we have a quantum advantage in distributed verification concerning the graph size? Can we give an efficient quantum verification protocol for a graph property that is shown to be hard in [GS16]?

  3. 3.

    There are gaps between upper and lower bounds for 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT}. Can we fill the gaps by providing stronger upper or lower bounds?

1.6 Organization

In Section 2, we give some preliminaries for this paper. In Section 3, we apply the permutation test to obtain our improved 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ}. In Section 4, we prove a quantum advantage on distributed verification protocols on a path for 𝖤𝖰\mathsf{EQ} still persists even when there is no condition on the size of the path networks. In Section 5, we derive an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT} and the ranking verification problem. In Section 6, we present an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the Hamming distance problem with multiple terminals and its applications. In Section 7, we show how to convert a 𝖰𝖬𝖠\mathsf{QMA} communication protocol and a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol to a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol. In Section 8, we derive some lower bounds for 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols.

2 Preliminaries

When we do not care about constant factors, we use the asymptotic notations. We say T(n)=O(f(n))T(n)=O(f(n)) if there exist constants cc and n0n_{0} such that for all the integers nn0n\geq n_{0}, we have T(n)cf(n)T(n)\leq cf(n). We say T(n)=Ω(f(n))T(n)=\Omega(f(n)) if there exist constants cc and n0n_{0} such that for all the integers nn0n\geq n_{0}, we have T(n)cf(n)T(n)\geq cf(n). T(n)=Θ(f(n))T(n)=\Theta(f(n)) means that T(n)=O(f(n))T(n)=O(f(n)) and T(n)=Ω(f(n))T(n)=\Omega(f(n)) hold simultaneously. We also say T(n)=O~(f(n))T(n)=\tilde{O}(f(n)) if there exists a constant cc such that T(n)=O(f(n)logc(f(n)))T(n)=O(f(n)\cdot\log^{c}(f(n))).

This paper considers simple connected graphs as the underlying graph of networks and identifies a network with its underlying graph. The radius rr of a network G=(V,E)G=(V,E) is defined as r:=minuVmaxvV𝖽𝗂𝗌𝗍G(u,v)r:=\min_{u\in V}\max_{v\in V}\mathsf{dist}_{G}(u,v), where 𝖽𝗂𝗌𝗍G(u,v)\mathsf{dist}_{G}(u,v) denotes the distance between uu and vv in GG.

For any event AA and BB, let us denote the complement of AA by ¬A\neg A, the intersection of AA and BB by ABA\land B, the union of AA and BB by ABA\lor B. We will need the following basic property on probability.

Lemma 11.

Let AjA_{j} be an event for j=1,2,,nj=1,2,\ldots,n.111Note that these events are not necessarily independent. Then,

Pr[A1A2An]1nj=1nPr[Aj].\mathrm{Pr}[A_{1}\lor A_{2}\lor\cdots\lor A_{n}]\geq\frac{1}{n}\sum_{j=1}^{n}\mathrm{Pr}[A_{j}].
Proof.

nPr[A1A2An]=j=1nPr[A1A2An]j=1nPr[Aj]n\mathrm{Pr}[A_{1}\lor A_{2}\lor\cdots\lor A_{n}]=\sum_{j=1}^{n}\mathrm{Pr}[A_{1}\lor A_{2}\lor\cdots\lor A_{n}]\geq\sum_{j=1}^{n}\mathrm{Pr}[A_{j}]

2.1 Quantum computation and information

We assume that readers are familiar with basic notations of quantum computation and information. We refer to [NC10, Wat18, dW19] for standard references.

For a Hilbert (finite-dimensional complex Euclidean) space \mathcal{H}, ()\mathcal{B}(\mathcal{H}) and 𝒟()\mathcal{D}(\mathcal{H}) denote the sets of pure and mixed states over \mathcal{H} respectively. Let us consider Hilbert spaces 1,,n\mathcal{H}_{1},\ldots,\mathcal{H}_{n} and a matrix MM on 1n\mathcal{H}_{1}\otimes\cdots\otimes\mathcal{H}_{n}. We will denote by |byx\ket{b^{x}_{y}} a yyth orthonormal basis vector of x\mathcal{H}_{x}. Then, let us define the reduced matrix tri¯(M)\text{tr}_{\bar{i}}(M) on i\mathcal{H}_{i} obtained by tracing out 1,,i1\mathcal{H}_{1},\ldots,\mathcal{H}_{i-1},i+1,,n\mathcal{H}_{i+1},\ldots,\mathcal{H}_{n} as

tri¯(M)=j1,,ji1,ji+1,,jn(bj11|bji1i1|Ibji+1i+1|bjnn|)M(|bj11|bji1i1I|bji+1i+1|bjnn).\mathrm{tr}_{\bar{i}}(M)=\sum_{j_{1},\ldots,j_{i-1},j_{i+1},\ldots,j_{n}}(\bra{b_{j_{1}}^{1}}\otimes\cdots\otimes\bra{b_{j_{i-1}}^{i-1}}\otimes I\otimes\bra{b_{j_{i+1}}^{i+1}}\otimes\cdots\otimes\bra{b_{j_{n}}^{n}})M(\ket{b_{j_{1}}^{1}}\otimes\cdots\otimes\ket{b_{j_{i-1}}^{i-1}}\otimes I\otimes\ket{b_{j_{i+1}}^{i+1}}\otimes\cdots\otimes\ket{b_{j_{n}}^{n}}).

We also define the reduced matrix tri(M)\text{tr}_{i}(M) on 1i1i+1n\mathcal{H}_{1}\otimes\cdots\otimes\mathcal{H}_{i-1}\otimes\mathcal{H}_{i+1}\otimes\cdots\otimes\mathcal{H}_{n} obtained by tracing out i\mathcal{H}_{i} as

tri(M)=j(IIbji|II)M(II|bjiII).\mathrm{tr}_{i}(M)=\sum_{j}(I\otimes\cdots\otimes I\otimes\bra{b_{j}^{i}}\otimes I\otimes\cdots\otimes I)M(I\otimes\cdots\otimes I\otimes\ket{b_{j}^{i}}\otimes I\otimes\cdots\otimes I).

One common measure of distance between quantum states is the trace distance, which is defined as half of the trace norm of the difference of the matrices:

D(ρ,σ):=12ρσ1,D(\rho,\sigma):=\frac{1}{2}\|\rho-\sigma\|_{1},

where A1trAA\|A\|_{1}\equiv\mathrm{tr}\sqrt{A^{\dagger}A} is the trace norm of AA, and A\sqrt{A} is the unique semidefinite BB such that B2=AB^{2}=A (which is always defined for positive semidefinite AA). The trace distance can be regarded as a maximum probability to distinguish the two states by POVM measurements since

D(ρ,σ)=maxMtr(M(ρσ)),D(\rho,\sigma)=\max_{M}\mathrm{tr}(M(\rho-\sigma)),

where the maximization is taken over all positive operators MIM\leq I. The other common measure of the distance is the fidelity, which is defined as

F(ρ,σ):=trρσρ.F(\rho,\sigma):=\mathrm{tr}\sqrt{\sqrt{\rho}\sigma\sqrt{\rho}}.

The relation between the trace distance and the fidelity is known as follows.

Fact 1 (Fuchs-van de Graaf inequalities [FvdG99]).

For any quantum states ρ\rho and σ\sigma,

1F(ρ,σ)D(ρ,σ)1F(ρ,σ)2.1-F(\rho,\sigma)\leq D(\rho,\sigma)\leq\sqrt{1-F(\rho,\sigma)^{2}}.

Here is a useful lemma to connect the trace norm and the fidelity as a corollary of the Uhlmann theorem [Uhl76].

Lemma 12 (Corollary 3.23 in [Wat18]).

Let |ψ\ket{\psi} and |ϕ\ket{\phi} be two pure states on 𝒳𝒴\mathcal{X}\otimes\mathcal{Y} where 𝒳\mathcal{X} and 𝒴\mathcal{Y} are finite-dimensional complex Euclidean spaces. Then,

tr𝒳(|ψϕ|)1=F(tr𝒴(|ψψ|),tr𝒴(|ϕϕ|)).\|\mathrm{tr}_{\mathcal{X}}(\ket{\psi}\bra{\phi})\|_{1}=F(\mathrm{tr}_{\mathcal{Y}}(\ket{\psi}\bra{\psi}),\mathrm{tr}_{\mathcal{Y}}(\ket{\phi}\bra{\phi})).

We will also need some mathematical facts.

Fact 2 (Schmidt decomposition, e.g., Theorem 2.7 in [NC10]).

Suppose |ψ\ket{\psi} is a pure state of a composite system ABAB. Then there exist orthonormal states |iA\ket{i_{A}} for system AA, and orthonormal states |iB\ket{i_{B}} of system BB such that

|ψ=iλi|iA|iB,\ket{\psi}=\sum_{i}\lambda_{i}\ket{i_{A}}\ket{i_{B}},

where λi\lambda_{i} are non-negative numbers satisfying iλi2=1\sum_{i}\lambda_{i}^{2}=1.

Fact 3.

For any two mixed states ρ\rho and σ\sigma, any quantum algorithm 𝒜\mathcal{A} and any classical string s,

|Pr[𝒜(ρ)=s]Pr[𝒜(σ)=s]|D(ρ,σ).|\mathrm{Pr}[\mathcal{A}(\rho)=s]-\mathrm{Pr}[\mathcal{A}(\sigma)=s]|\leq D(\rho,\sigma).
Fact 4.

The trace distance is contractive under completely positive and trace preserving (CPTP) maps, i.e., if Φ\Phi is a CPTP map, then D(Φ(ρ),Φ(σ))D(ρ,σ)D(\Phi(\rho),\Phi(\sigma))\leq D(\rho,\sigma) for any states ρ\rho and σ\sigma.

2.2 Computational models

In this subsection, we recall definitions of several important computational models and related concepts.

2.2.1 Communication complexity

As standard references, we refer to [KN96, RY20] for classical communication complexity and [dW02, BCMdW10] for quantum communication complexity and the simultaneous message passing (SMP) model.

The goal in communication complexity is for Alice and Bob to compute a function F:𝒳×𝒴{0,1,}F:\mathcal{X}\times\mathcal{Y}\to\{0,1,\perp\}. We interpret 11 as “accept” and 0 as “reject” and we mostly consider 𝒳=𝒴={0,1}n\mathcal{X}=\mathcal{Y}=\{0,1\}^{n}. In the computational model, Alice receives an input x𝒳x\in\mathcal{X} (unknown to Bob) and Bob receives an input y𝒴y\in\mathcal{Y} (unknown to Alice) promised that (x,y)𝖽𝗈𝗆(F)=F1({0,1})(x,y)\in\mathsf{dom}(F)=F^{-1}(\{0,1\}). In a one-way communication protocol, Alice sends a single message to Bob, and he is required to output F(x,y)F(x,y). In a two-way communication protocol, Alice and Bob can exchange messages with multiple rounds. The cost of a classical (resp. quantum) communication protocol is the number of bits (resp. qubits) communicated. The (bounded-error) communication complexity (resp. one-way communication complexity) of FF is defined as the minimum cost of two-way (resp. one-way) classical or quantum communication protocols to compute F(x,y)F(x,y) with high probability, say 23\frac{2}{3}.

The simultaneous message passing (SMP) model is a specific model of communication protocols. In this model, Alice and Bob each send a single (possibly quantum or randomized) message to a referee Charlie. The goal for Charlie is to output F(x,y)F(x,y) with high probability, say at least 23\frac{2}{3}. The complexity measure of the protocol is the total amount of messages Charlie receives from Alice and Bob.

In this paper, 𝖡𝖰𝖯1(f)\mathsf{BQP}^{1}(f) and 𝖡𝖰𝖯||(f)\mathsf{BQP}^{||}(f) denote the quantum one-way and SMP communication complexity of ff, respectively. Note that 𝖡𝖰𝖯1(f)𝖡𝖰𝖯||(f)\mathsf{BQP}^{1}(f)\leq\mathsf{BQP}^{||}(f) for any ff since any SMP protocol can be efficiently simulated by a one-way communication protocol where Charlie is simulated by Bob.

A basic function considered in communication complexity is the equality function 𝖤𝖰n:{0,1}n×{0,1}n{0,1}\mathsf{EQ}_{n}:~{}\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, which is defined as 𝖤𝖰n(x,y)=1\mathsf{EQ}_{n}(x,y)=1 if x=yx=y and 0 otherwise. This paper frequently uses the fact that 𝖤𝖰n\mathsf{EQ}_{n} can be solved by a one-way quantum protocol of cost clognc\log n with one-sided error for some constant c>0c>0; the protocol outputs 11 if x=yx=y with probability 11, and outputs 0 with probability 2/32/3. In what follows, such the protocol is called π\pi, let |hx|h_{x}\rangle be the clognc\log n-qubit state from Alice to Bob (fingerprint of xx), and let {My,1,My,0}\{M_{y,1},M_{y,0}\} be the POVM measurement performed by Bob on |hx\ket{h_{x}}, where My,1M_{y,1} corresponds to the measurement result 11 (accept) and My,0M_{y,0} to the measurement result 0 (reject).

For any Boolean function f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\to\{0,1\}, a set S{0,1}n×{0,1}nS\subseteq\{0,1\}^{n}\times\{0,1\}^{n} is a 1-fooling set for ff if f(x,y)=1f(x,y)=1 for any (x,y)S(x,y)\in S ,and f(x1,y2)=0f(x_{1},y_{2})=0 or f(x2,y1)=0f(x_{2},y_{1})=0 for any two pairs (x1,y1)(x2,y2)S×S(x_{1},y_{1})\neq(x_{2},y_{2})\in S\times S.

2.2.2 𝖰𝖬𝖠\mathsf{QMA} communication protocols and its variants

Let us recall the definition of 𝖰𝖬𝖠\mathsf{QMA} communication protocols.

Definition 2 (𝖰𝖬𝖠\mathsf{QMA} communication protocol and 𝖰𝖬𝖠𝖼𝖼(f)\mathsf{QMAcc}(f), Definition 3 in [Kla11] and Definition 4 in [RS04]).

In a 𝖰𝖬𝖠\mathsf{QMA} communication protocol for an input (x,y)(x,y), Alice has a part of the input xx and Bob has the other part of the input yy, and Merlin produces a quantum state ρ\rho (the proof) on some γ\gamma qubits, which he sends to Alice. Alice and Bob then communicate using a quantum protocol of μ\mu qubits in total with multiple rounds, and either accept or reject the input (x,y)(x,y). We say that a 𝖰𝖬𝖠\mathsf{QMA} communication protocol computes a Boolean function f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, if for all inputs (x,y)(x,y) such that f(x,y)=1f(x,y)=1, there exists a quantum proof such that the protocol accepts with probability at least 23\frac{2}{3}, and for all inputs (x,y)(x,y) such that f(x,y)=0f(x,y)=0, and all quantum proofs, the protocol accepts with probability at most 13\frac{1}{3}. The cost of a 𝖰𝖬𝖠\mathsf{QMA} communication protocol is the sum of the proof size γ\gamma and the length of the communication μ\mu between Alice and Bob. We define 𝖰𝖬𝖠𝖼𝖼(f)\mathsf{QMAcc}(f) as the minimum cost of the protocol that computes ff.

We say for a function ff, 𝖰𝖬𝖠𝖼𝖼(f)=γ+μ\mathsf{QMAcc}(f)=\gamma+\mu if there exists a 𝖰𝖬𝖠\mathsf{QMA} communication protocol whose proof size is γ\gamma and communication amount is μ\mu.

Next, let us define a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol and a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol as two variants of the 𝖰𝖬𝖠\mathsf{QMA} communication protocol. In the 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol, Alice can send a message once to Bob and no more communication is prohibited.

Definition 3 (𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol and 𝖰𝖬𝖠𝖼𝖼1(f)\mathsf{QMAcc}^{1}(f)).

In a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol for an input (x,y)(x,y), Alice has a part of the input xx and Bob has the other part of the input yy, and Merlin produces a quantum state ρ\rho (the proof) on some γ\gamma qubits, which he sends to Alice. Alice applies some quantum operations on the proof depending on her input xx and sends μ\mu qubits to Bob. Bob applies some quantum operations depending on his input yy and outputs accept or reject. We say that a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol computes a Boolean function f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, if for all inputs (x,y)(x,y) such that f(x,y)=1f(x,y)=1, there exists a quantum proof such that the protocol accepts with probability at least 23\frac{2}{3}, and for all inputs (x,y)(x,y) such that f(x,y)=0f(x,y)=0, the protocol accepts with probability at most 13\frac{1}{3} for any quantum proof. The cost of a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol is the sum of the proof size γ\gamma and the length of the one-way communication μ\mu from Alice to Bob. We define 𝖰𝖬𝖠𝖼𝖼1(f)\mathsf{QMAcc}^{1}(f) as the minimum cost of the protocol that computes f.

In the 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol, Alice and Bob can receive proofs respectively from Merlin and the proofs might be entangled.

Definition 4 (𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol and 𝖰𝖬𝖠𝖼𝖼(f)\mathsf{QMAcc}^{*}(f)).

In a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol for an input (x,y)(x,y), Alice has a part of the input xx and Bob has the other part of the input yy, and Merlin produces a quantum state ρ\rho (the proof) on some (γ1+γ2)(\gamma_{1}+\gamma_{2}) qubits, which he sends γ1\gamma_{1} qubits to Alice and γ2\gamma_{2} qubits to Bob. Alice and Bob then communicate using a quantum protocol of μ\mu qubits in total with multiple rounds, and either accept or reject the input (x,y)(x,y). We say that a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol computes a Boolean function f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\rightarrow\{0,1\}, if for all inputs (x,y)(x,y) such that f(x,y)=1f(x,y)=1, there exists a quantum proof such that the protocol accepts with probability at least 23\frac{2}{3}, and for all inputs (x,y)(x,y) such that f(x,y)=0f(x,y)=0, and all quantum proofs, the protocol accepts with probability at most 13\frac{1}{3}. The cost of a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol is the sum of the total proof size γ1+γ2\gamma_{1}+\gamma_{2} and the length of the communication μ\mu between Alice and Bob. We define 𝖰𝖬𝖠𝖼𝖼(f)\mathsf{QMAcc}^{*}(f) as the minimum cost of the protocol that computes ff on all the inputs.

We say for a function ff, 𝖰𝖬𝖠𝖼𝖼1(f)=γ+μ\mathsf{QMAcc}^{1}(f)=\gamma+\mu and 𝖰𝖬𝖠𝖼𝖼(f)=γ1+γ2+μ\mathsf{QMAcc}^{*}(f)=\gamma_{1}+\gamma_{2}+\mu similar to 𝖰𝖬𝖠𝖼𝖼(f)=γ+μ\mathsf{QMAcc}(f)=\gamma+\mu. There are (trivial) relationships between them. First, for any ff, 𝖰𝖬𝖠𝖼𝖼(f)𝖰𝖬𝖠𝖼𝖼1(f)\mathsf{QMAcc}(f)\leq\mathsf{QMAcc}^{1}(f) by their definitions. Second, for any ff for which 𝖰𝖬𝖠𝖼𝖼(f)=γ1+γ2+μ\mathsf{QMAcc}^{*}(f)=\gamma_{1}+\gamma_{2}+\mu,

𝖰𝖬𝖠𝖼𝖼(f)γ1+2γ2+μ.\mathsf{QMAcc}(f)\leq\gamma_{1}+2\gamma_{2}+\mu. (1)

This is because any 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol 𝒫\mathcal{P} such that Merlin sends γ1\gamma_{1} qubits to Alice and γ2\gamma_{2} qubits to Bob can be simulated by a 𝖰𝖬𝖠\mathsf{QMA} communication protocol where Merlin sends Alice the (γ1+γ2)(\gamma_{1}+\gamma_{2}) qubits sent by Merlin in 𝒫\mathcal{P}, Alice sends the Bob-part in 𝒫\mathcal{P} (γ2\gamma_{2} qubits) to Bob, and Alice and Bob conduct the subsequent communication protocol in 𝒫\mathcal{P}.

2.2.3 Distributed verification

Let us recall the definition of classical distributed verification protocols called distributed Merlin-Arthur protocols (𝖽𝖬𝖠\mathsf{dMA} protocols).

In a ν\nu-round 𝖽𝖬𝖠\mathsf{dMA} protocol for a binary-valued function ff, the prover (Merlin) first sends a message called a proof (or certificate) to the verifier (Arthur) that consists of the nodes of a network G=(V,E)G=(V,E). More precisely, the prover sends a c(u)c(u)-bit string to each uVu\in V. Then, the nodes of GG run a ν\nu-round verification algorithm, namely, a randomized algorithm (or protocol) using ν\nu-round communication among the nodes. Here, tt nodes uiu_{i} called terminals have own input string xix_{i}. Then, the condition that the 𝖽𝖬𝖠\mathsf{dMA} protocol should satisfy for verifying whether f(x1,,xt)=1f(x_{1},\ldots,x_{t})=1 or not is as follows.

Definition 5.

On a network G=(V,E)G=(V,E), a ν\nu-round 𝖽𝖬𝖠\mathsf{dMA} protocol π\pi of c(u)c(u) bits proof for uVu\in V and m(v,w)m(v,w) bits communication for {v,w}E\{v,w\}\in E has completeness aa and soundness bb for a function f:({0,1}n)t{0,1}f:(\{0,1\}^{n})^{t}\to\{0,1\} if there exists a ν\nu-round verification algorithm with messages of m(u,v)m(u,v) bits in total between nodes vv and ww for {v,w}E\{v,w\}\in E respectively such that for all the inputs (x1,,xt)({0,1}n)t:(x_{1},\dots,x_{t})\in(\{0,1\}^{n})^{t}:

  • Completeness: if f(x1,,xt)=1f(x_{1},\dots,x_{t})=1, then there exists a (uVc(u))(\sum_{u\in V}c(u))-bit proof to the nodes such that Pr[all the nodes accept]a;\Pr[\mbox{all the nodes accept}]\geq a;

  • Soundness: if f(x1,,xt)=0f(x_{1},\dots,x_{t})=0, then Pr[all the nodes accept]b\Pr[\mbox{all the nodes accept}]\leq b for any (uVc(u))(\sum_{u\in V}c(u))-bit proof.

In particular, we say that the protocol π\pi has perfect completeness if a=1a=1. The sum uVc(v)\sum_{u\in V}c(v) (resp. {v,w}Em(v,w)\sum_{\{v,w\}\in E}m(v,w)) is called the total proof (resp. message) size of π\pi, and maxuVc(v)\max_{u\in V}c(v) (resp. max{u,w}Em(v,w)\max_{\{u,w\}\in E}m(v,w)) is called the local proof (resp. message) size of π\pi.

Let us next recall the definition of quantum verification protocols called distributed quantum Merlin-Arthur protocols (𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols). A 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol is defined similarly to 𝖽𝖬𝖠\mathsf{dMA} protocols except that the message from the prover is a quantum state and the algorithm of each node and the communication among the nodes are also quantum (and thus the complexity is measured by the number of qubits). The condition that the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol should satisfy for verifying whether f(x1,,xn)=1f(x_{1},\ldots,x_{n})=1 or not is as follows; let v\mathcal{H}_{v} denote the Hilbert space associated with the quantum register RvR_{v} sent from the prover to the node vv.

Definition 6.

On a network G=(V,E)G=(V,E), a ν\nu-round 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol of c(u)c(u) qubits proof for uVu\in V and m(v,w)m(v,w) qubits communication for {v,w}E\{v,w\}\in E has completeness aa and soundness bb for a function f:({0,1}n)t{0,1}f:(\{0,1\}^{n})^{t}\to\{0,1\} if there exists a ν\nu-round quantum verification algorithm with messages of m(v,w)m(v,w) qubits in total between nodes vv and ww for {v,w}E\{v,w\}\in E respectively such that for all the inputs (x1,,xt)({0,1}n)t:(x_{1},\dots,x_{t})\in(\{0,1\}^{n})^{t}:

  • Completeness: if f(x1,,xt)=1f(x_{1},\dots,x_{t})=1, then there exists a (uVc(u))(\sum_{u\in V}c(u))-qubit proof |ξ\ket{\xi} on the Hilbert space uVu\bigotimes_{u\in V}\mathcal{H}_{u} to the nodes such that Pr[all the nodes accept]a;\Pr[\mbox{all the nodes accept}]\geq a;

  • Soundness: if f(x1,,xt)=0f(x_{1},\dots,x_{t})=0, then for any (uVc(u))(\sum_{u\in V}c(u))-qubit proof |ξ\ket{\xi} on uVu\bigotimes_{u\in V}\mathcal{H}_{u}, Pr[all the nodes accept]b\Pr[\mbox{all the nodes accept}]\leq b.

In the definition above, we consider quantum proofs that are only pure states. Since mixed states are convex combinations of pure states, this restriction does not affect the completeness and soundness parameters and lose generality as in the case for 𝖰𝖬𝖠\mathsf{QMA}.

Let us define some variants of the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol. For 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocols, the completeness holds with a separable proof between nodes and the soundness holds against any entangled proof. Actually, the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols in [FGNP21] as well as the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols in this paper are 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocols while we do not state it in some of the theorems for the simplicity of their statements.

Definition 7.

On a network G=(V,E)G=(V,E), a ν\nu-round 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol of c(u)c(u) qubits proof for uVu\in V and m(v,w)m(v,w) qubits communication for {v,w}E\{v,w\}\in E has completeness aa and soundness bb for a function f:({0,1}n)t{0,1}f:(\{0,1\}^{n})^{t}\to\{0,1\} if there exists a ν\nu-round quantum verification algorithm with messages of m(v,w)m(v,w) qubits between nodes vv and ww for {v,w}E\{v,w\}\in E respectively such that for all the inputs (x1,,xt)({0,1}n)t:(x_{1},\dots,x_{t})\in(\{0,1\}^{n})^{t}:

  • Completeness: if f(x1,,xt)=1f(x_{1},\dots,x_{t})=1, then there is a (uVc(u))(\sum_{u\in V}c(u))-qubit proof uV|ξu\bigotimes_{u\in V}\ket{\xi_{u}}, where |ξu\ket{\xi_{u}} is a state on u\mathcal{H}_{u} for uVu\in V, to the nodes such that Pr[all the nodes accept]a;\Pr[\mbox{all the nodes accept}]\geq a;

  • Soundness: if f(x1,,xt)=0f(x_{1},\dots,x_{t})=0, then for any (uVc(u))(\sum_{u\in V}c(u))-qubit proof |ξ\ket{\xi} on uVu\bigotimes_{u\in V}\mathcal{H}_{u}, Pr[all the nodes accept]b\Pr[\mbox{all the nodes accept}]\leq b.

For 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocols, the completeness holds with a separable proof and the soundness holds against only separable proofs. In other words, a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol where a prover can send only separable proofs over nodes.

Definition 8.

On a network G=(V,E)G=(V,E), a ν\nu-round 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol of c(u)c(u) qubits proof for uVu\in V and m(v,w)m(v,w) qubits communication for {v,w}E\{v,w\}\in E has completeness aa and soundness bb for a function f:({0,1}n)t{0,1}f:(\{0,1\}^{n})^{t}\to\{0,1\} if there exists a ν\nu-round quantum verification algorithm with messages of m(v,w)m(v,w) qubits between nodes vv and ww for {v,w}E\{v,w\}\in E respectively such that for all the inputs (x1,,xt)({0,1}n)t:(x_{1},\dots,x_{t})\in(\{0,1\}^{n})^{t}:

  • Completeness: if f(x1,,xt)=1f(x_{1},\dots,x_{t})=1, then there is a (uVc(u))(\sum_{u\in V}c(u))-qubit proof uV|ξu\bigotimes_{u\in V}\ket{\xi_{u}}, where |ξu\ket{\xi_{u}} is a state on u\mathcal{H}_{u} for uVu\in V, to the nodes such that Pr[all the nodes accept]a;\Pr[\mbox{all the nodes accept}]\geq a;

  • Soundness: if f(x1,,xt)=0f(x_{1},\dots,x_{t})=0, then for any (uVc(u))(\sum_{u\in V}c(u))-qubit proof uV|ξu\bigotimes_{u\in V}\ket{\xi_{u}}, where |ξu\ket{\xi_{u}} is a state on u\mathcal{H}_{u} for uVu\in V, Pr[all the nodes accept]b\Pr[\mbox{all the nodes accept}]\leq b.

Note that if a protocol 𝒫\mathcal{P} is a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol, then 𝒫\mathcal{P} is also a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol from the definitions.

In what follows, a distributed verification protocol is a 11-round one when we do not mention the number of rounds explicitly.

3 Improved 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ} with the permutation test

In this section, we derive a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the equality function exploiting the property of the permutation test.

3.1 Property and application of the permutation test

The permutation test [BBD+97, BCWdW01, KNY08] is a generalization of the SWAP test. In this subsection, we identify the property of the permutation test as a special case of the weak Schur sampling and the generalized phase estimation [Har05, CHW07]. We refer to Section 4.2.2 in [MdW16] for a comprehensive summary. We then apply the property of the permutation test to check how the reduced states on subsystems are close.

First, let us recall the SWAP test. The test is a protocol with a given input state on =12\mathcal{H}=\mathcal{H}_{1}\otimes\mathcal{H}_{2} where 1\mathcal{H}_{1} and 2\mathcal{H}_{2} are Hilbert spaces. We here consider 1\mathcal{H}_{1} and 2\mathcal{H}_{2} are corresponding to registers R1R_{1} and R2R_{2}.

Algorithm 1  The SWAP test

Input:  ρ𝒟(12)\rho\in\mathcal{D}(\mathcal{H}_{1}\otimes\mathcal{H}_{2}) on registers R1R_{1} and R2R_{2}.

1:Prepare an ancilla qubit and initialize the state with |0\ket{0}.
2:Apply the Hadamard gate H=12(1111)H=\frac{1}{\sqrt{2}}\left(\begin{matrix}1&1\\ 1&-1\end{matrix}\right) on the state and obtain the state |+=12(|0+|1)\ket{+}=\frac{1}{\sqrt{2}}(\ket{0}+\ket{1}).
3:Apply the controlled swap |00|I+|11|SWAP\ket{0}\bra{0}\otimes I+\ket{1}\bra{1}\otimes\mathrm{SWAP} where SWAP\mathrm{SWAP} is defined by SWAP|i1|i2=|i2|i1\mathrm{SWAP}\ket{i_{1}}\ket{i_{2}}=\ket{i_{2}}\ket{i_{1}} for |i1(1)\ket{i_{1}}\in\mathcal{B}(\mathcal{H}_{1}) and |i2(2)\ket{i_{2}}\in\mathcal{B}(\mathcal{H}_{2}).
4:Apply the Hadamard gate again on the ancilla qubit and measure it in the computational basis. If the measurement result is |0\ket{0}, the test accepts. Else, it rejects.

It is well known that when pure states |ψ1|\psi_{1}\rangle and |ψ2|\psi_{2}\rangle on R1R_{1} and R2R_{2} are given, the SWAP test accepts with probability 12+12|ψ1|ψ2|2\frac{1}{2}+\frac{1}{2}|\langle\psi_{1}|\psi_{2}\rangle|^{2}. In particular, the SWAP test accepts with probability 11 when |ψ1=|ψ2|\psi_{1}\rangle=|\psi_{2}\rangle.

For completeness, we rewrite the lemmas about the property and application of the SWAP test from [FGNP21], which will be used in Section 3.2. Let S2\mathcal{H}_{S}^{2} denote the symmetric subspace of 12\mathcal{H}_{1}\otimes\mathcal{H}_{2} and let A\mathcal{H}_{A} denote the anti-symmetric subspace in 12\mathcal{H}_{1}\otimes\mathcal{H}_{2}. Note that any state in 12\mathcal{H}_{1}\otimes\mathcal{H}_{2} can be represented as a superposition of a state in S2\mathcal{H}_{S}^{2} and a state in A\mathcal{H}_{A}, i.e., 12=S2A\mathcal{H}_{1}\otimes\mathcal{H}_{2}=\mathcal{H}_{S}^{2}\oplus\mathcal{H}_{A} since SWAP is a Hermitian matrix which has only +1+1 and 1-1 eigenvalues.

Lemma 13 (Lemma 4 in [FGNP21]).

Assume that |ψ=α|ψS+β|ψA|\psi\rangle=\alpha|\psi_{S}\rangle+\beta|\psi_{A}\rangle where |ψS(S2)|\psi_{S}\rangle\in\mathcal{B}(\mathcal{H}_{S}^{2}) and |ψA(A)|\psi_{A}\rangle\in\mathcal{B}(\mathcal{H}_{A}). Then, the SWAP test on input |ψ|\psi\rangle accepts with probability |α|2|\alpha|^{2}.

Lemma 14 (Lemma 5 in [FGNP21]).

Let 0ϵ10\leq\epsilon\leq 1, and assume that the SWAP test on input ρ\rho in the input register (R1,R2)(R_{1},R_{2}) accepts with probability 1ϵ1-\epsilon. Then, D(ρ1,ρ2)2ϵ+ϵD(\rho_{1},\rho_{2})\leq 2\sqrt{\epsilon}+\epsilon, where ρj\rho_{j} is the reduced state on RjR_{j} of ρ\rho. Moreover, if the SWAP test on input ρ\rho accepts with probability 1, then ρ1=ρ2\rho_{1}=\rho_{2} (and hence D(ρ1,ρ2)=0D(\rho_{1},\rho_{2})=0).

The SWAP test can be considered as a test to estimate the absolute value of the amplitude in the symmetric subspace of a bipartite system. We will next generalize the test to kk-partite systems for any integer kk. Let SkS_{k} denote the symmetric group on kk elements and define a unitary operator UπU_{\pi} which acts by permuting kk-partite systems according to π\pi as

Uπ|i1|ik=|iπ1(1)|iπ1(k).U_{\pi}\ket{i_{1}}\cdots\ket{i_{k}}=\ket{i_{\pi^{-1}(1)}}\cdots\ket{i_{\pi^{-1}(k)}}.

Let λ\lambda denote a partition of {1,,k}\{1,\ldots,k\} that corresponds to an irreducible representation (irrep) of SkS_{k}. We denote dλd_{\lambda} the dimension of the corresponding irreducible representation VλV_{\lambda} of SkS_{k}, which associates a dλd_{\lambda}-dimensional square matrix with each permutation πSk\pi\in S_{k}. The quantum Fourier transform (QFT) over SkS_{k} is a unitary operator that performs a change of bases from {|π:πSk}\{\ket{\pi}:\pi\in S_{k}\} to {|λ,i,j:1i,jdλ}\{\ket{\lambda,i,j}:1\leq i,j\leq d_{\lambda}\}. Then, the algorithm of the permutation test can be described as Algorithm 2.

Algorithm 2  The permutation test

Input:  ρ𝒟(1k)\rho\in\mathcal{D}(\mathcal{H}_{1}\otimes\cdots\otimes\mathcal{H}_{k}) on registers R1,,RkR_{1},\ldots,R_{k}.

1:Prepare a (k!)(k!)-dimensional ancilla register whose basis states correspond to |λ,i,j\ket{\lambda,i,j}.
2:Initialize the ancilla register in the state |(k),1,1\ket{(k),1,1} where (k)(k) is corresponding to the trivial irrep.
3:Apply the inverse quantum Fourier transform over SkS_{k} to the ancilla qubits and obtain the state 1k!πSk|π\frac{1}{\sqrt{k!}}\sum_{\pi\in S_{k}}\ket{\pi}.
4:Apply the controlled permutation πSk|ππ|Uπ\sum_{\pi\in S_{k}}\ket{\pi}\bra{\pi}\otimes U_{\pi}.
5:Apply the quantum Fourier transform over SkS_{k} to the ancilla and measure it in the computational basis.
6:If the measurement result of the partition λ\lambda is (k)(k), the test accepts. Else, it rejects.

The probability that λ\lambda is output is tr(Pλρ)\text{tr}(P_{\lambda}\rho) [BCH06, Har05]. The projector PλP_{\lambda} is defined by

Pλ:=dλk!πSkχλ(π)Uπ,P_{\lambda}:=\frac{d_{\lambda}}{k!}\sum_{\pi\in S_{k}}\chi_{\lambda}(\pi)U_{\pi},

where χλ\chi_{\lambda} is the corresponding character tr(Vλ)\mathrm{tr}(V_{\lambda}). In this paper, we concentrate on the case where λ\lambda is the trivial irrep (kk) which maps π1\pi\mapsto 1 for all πSk\pi\in S_{k}. In the case, dλ=1d_{\lambda}=1 and χλ(π)=1\chi_{\lambda}(\pi)=1 for all πSk\pi\in S_{k}. Therefore, Pλ=1k!πSkUπP_{\lambda}=\frac{1}{k!}\sum_{\pi\in S_{k}}U_{\pi}. This is equal to (d+k1k)𝑑ψ|ψkψ|k\displaystyle{d+k-1\choose k}\int d\psi\ket{\psi}^{\otimes k}\bra{\psi}^{\otimes k}, which is the projector Πsym\Pi_{\mathrm{sym}} to the symmetric subspace Sk:={|Φ((d)k):Uπ|Φ=|Φ}\mathcal{H}_{S}^{k}:=\{\ket{\Phi}\in\mathcal{B}((\mathbb{C}^{d})^{\otimes k}):U_{\pi}\ket{\Phi}=\ket{\Phi}\}. See e.g., Lemma 1.7 in [Chr06] and Lemma 1 in [Sco06] for the reference of this fact.

The following lemma is an analog of Lemma 13 for the kk-partite case using the permutation test. We will denote by N\mathcal{H}_{N} the orthogonal subspace of 1k\mathcal{H}_{1}\otimes\cdot\cdot\cdot\otimes\mathcal{H}_{k} to the symmetric subspace Sk\mathcal{H}_{S}^{k}, i.e., 1k=SkN\mathcal{H}_{1}\otimes\cdot\cdot\cdot\otimes\mathcal{H}_{k}=\mathcal{H}_{S}^{k}\oplus\mathcal{H}_{N}.

Lemma 15.

Assume that |ψ=Πsym(|ψ)+(IΠsym)(|ψ)=α|ψS+β|ψN\ket{\psi}=\Pi_{\mathrm{sym}}(\ket{\psi})+(I-\Pi_{\mathrm{sym}})(\ket{\psi})=\alpha\ket{\psi_{S}}+\beta\ket{\psi_{N}} where |ψS(Sk)\ket{\psi_{S}}\in\mathcal{B}(\mathcal{H}_{S}^{k}) and |ψN(N)\ket{\psi_{N}}\in\mathcal{B}(\mathcal{H}_{N}). Then, the permutation test on input |ψ\ket{\psi} accepts with probability |α|2|\alpha|^{2}. In particular, the test accepts with probability 11 if |ψ=|φk|\psi\rangle=|\varphi\rangle^{\otimes k} for some |φ|\varphi\rangle.

The following lemma is also an analog of Lemma 14 for the kk-partite case using the permutation test. Note that a similar analysis was first done by Rosgen (Lemma 5.1 in [Ros08]) with the fidelity as a measure between quantum states.

Lemma 16.

Let 0ϵ10\leq\epsilon\leq 1, and assume the permutation test on input ρ\rho in the registers R1,,RnR_{1},\ldots,R_{n} accepts with probability 1ϵ1-\epsilon. Then, for any i,j[n]i,j\in[n], D(ρi,ρj)2ϵ+ϵD(\rho_{i},\rho_{j})\leq 2\sqrt{\epsilon}+\epsilon where ρi\rho_{i} and ρj\rho_{j} are the reduced states of RiR_{i} and RjR_{j} respectively. Moreover, if the permutation test on input ρ\rho accepts with probability 1, then, for any i,j[n]i,j\in[n], ρi=ρj\rho_{i}=\rho_{j} (and hence D(ρi,ρj)=0D(\rho_{i},\rho_{j})=0).

Proof.

The mixed state ρ\rho can be decomposed into an ensemble of pure states as kpk|ψkψk|\sum_{k}p_{k}\ket{\psi_{k}}\bra{\psi_{k}}. In addition, each pure state is a superposition of a state in the symmetric subspace and a state in the orthogonal subspace, namely |ψk=αk|ψkS+βk|ψkN\ket{\psi_{k}}=\alpha_{k}\ket{\psi_{k}^{S}}+\beta_{k}\ket{\psi_{k}^{N}}. By Lemma 15 and the assumption of the acceptance probability, kpk|αk|21ϵ\sum_{k}p_{k}|\alpha_{k}|^{2}\geq 1-\epsilon. Then,

kpk|βk|2ϵ.\sum_{k}p_{k}|\beta_{k}|^{2}\leq\epsilon. (2)

The state ρ\rho can be moreover represented as

ρ=kpk(|αk|2|ψkSψkS|+αkβk|ψkSψkN|+αkβk|ψkNψkS|+|βk|2|ψkNψkN|).\rho=\sum_{k}p_{k}(|\alpha_{k}|^{2}\ket{\psi_{k}^{S}}\bra{\psi_{k}^{S}}+\alpha_{k}\beta_{k}^{*}\ket{\psi_{k}^{S}}\bra{\psi_{k}^{N}}+\alpha_{k}^{*}\beta_{k}\ket{\psi_{k}^{N}}\bra{\psi_{k}^{S}}+|\beta_{k}|^{2}\ket{\psi_{k}^{N}}\bra{\psi_{k}^{N}}).

Let us denote ψks=|ψkSψkS|\psi_{k}^{s}=\ket{\psi_{k}^{S}}\bra{\psi_{k}^{S}}, ψksn=|ψkSψkN|\psi_{k}^{sn}=\ket{\psi_{k}^{S}}\bra{\psi_{k}^{N}}, ψkns=|ψkNψkS|\psi_{k}^{ns}=\ket{\psi_{k}^{N}}\bra{\psi_{k}^{S}} and ψkn=|ψkNψkN|\psi_{k}^{n}=\ket{\psi_{k}^{N}}\bra{\psi_{k}^{N}}. Using the notations, the subsystems ρi\rho_{i} and ρj\rho_{j} can be described as follows.

ρi=kpk(|αk|2tri¯(ψks)+αkβktri¯(ψksn)+αkβktri¯(ψkns)+|βk|2tri¯(ψkn)),\displaystyle\rho_{i}=\sum_{k}p_{k}(|\alpha_{k}|^{2}\text{tr}_{\bar{i}}(\psi_{k}^{s})+\alpha_{k}\beta_{k}^{*}\text{tr}_{\bar{i}}(\psi_{k}^{sn})+\alpha_{k}^{*}\beta_{k}\text{tr}_{\bar{i}}(\psi_{k}^{ns})+|\beta_{k}|^{2}\text{tr}_{\bar{i}}(\psi_{k}^{n})),
ρj=kpk(|αk|2trj¯(ψks)+αkβktrj¯(ψksn)+αkβktrj¯(ψkns)+|βk|2trj¯(ψkn)).\displaystyle\rho_{j}=\sum_{k}p_{k}(|\alpha_{k}|^{2}\text{tr}_{\bar{j}}(\psi_{k}^{s})+\alpha_{k}\beta_{k}^{*}\text{tr}_{\bar{j}}(\psi_{k}^{sn})+\alpha_{k}^{*}\beta_{k}\text{tr}_{\bar{j}}(\psi_{k}^{ns})+|\beta_{k}|^{2}\text{tr}_{\bar{j}}(\psi_{k}^{n})).

From the definition of the symmetric subspace, tri¯(ψks)=trj¯(ψks)\text{tr}_{\bar{i}}(\psi_{k}^{s})=\text{tr}_{\bar{j}}(\psi_{k}^{s}). We then get

ρiρj=kpk(αkβk(tri¯(ψksn)trj¯(ψksn))+αkβk(tri¯(ψkns)trj¯(ψkns))+|βk|2(tri¯(ψkn)trj¯(ψkn))).\rho_{i}-\rho_{j}=\sum_{k}p_{k}(\alpha_{k}\beta_{k}^{*}(\text{tr}_{\bar{i}}(\psi_{k}^{sn})-\text{tr}_{\bar{j}}(\psi_{k}^{sn}))+\alpha_{k}^{*}\beta_{k}(\text{tr}_{\bar{i}}(\psi_{k}^{ns})-\text{tr}_{\bar{j}}(\psi_{k}^{ns}))+|\beta_{k}|^{2}(\text{tr}_{\bar{i}}(\psi_{k}^{n})-\text{tr}_{\bar{j}}(\psi_{k}^{n}))).

From the positive scalability and the triangle inequality of the trace norm, we obtain

D(ρi,ρj)=12ρiρj1\displaystyle D(\rho_{i},\rho_{j})=\frac{1}{2}\|\rho_{i}-\rho_{j}\|_{1}
\displaystyle\leq 12kpk(|αk||βk|tri¯(ψksn)trj¯(ψksn)1+|αk||βk|tri¯(ψkns)trj¯(ψkns)1+|βk|2tri¯(ψkn)trj¯(ψkn)1).\displaystyle\frac{1}{2}\sum_{k}p_{k}(|\alpha_{k}||\beta_{k}|\|\text{tr}_{\bar{i}}(\psi_{k}^{sn})-\text{tr}_{\bar{j}}(\psi_{k}^{sn})\|_{1}+|\alpha_{k}||\beta_{k}|\|\text{tr}_{\bar{i}}(\psi_{k}^{ns})-\text{tr}_{\bar{j}}(\psi_{k}^{ns})\|_{1}+|\beta_{k}|^{2}\|\text{tr}_{\bar{i}}(\psi_{k}^{n})-\text{tr}_{\bar{j}}(\psi_{k}^{n})\|_{1}).

Since tri¯(ψkn)\text{tr}_{\bar{i}}(\psi_{k}^{n}) and trj¯(ψkn)\text{tr}_{\bar{j}}(\psi_{k}^{n}) are quantum states, their trace norms are 1. We thus have

tri¯(ψkn)trj¯(ψkn)1tri¯(ψkn)1+trj¯(ψkn)1=1+1=2.\|\text{tr}_{\bar{i}}(\psi_{k}^{n})-\text{tr}_{\bar{j}}(\psi_{k}^{n})\|_{1}\leq\|\text{tr}_{\bar{i}}(\psi_{k}^{n})\|_{1}+\|\text{tr}_{\bar{j}}(\psi_{k}^{n})\|_{1}=1+1=2.

With Lemma 12 and the fact that the fidelity between any quantum states can be bounded by 1,

tri¯(ψksn)1=F(tri(ψks),tri(ψkn))1,\displaystyle\|\text{tr}_{\bar{i}}(\psi_{k}^{sn})\|_{1}=F(\text{tr}_{i}(\psi_{k}^{s}),\text{tr}_{i}(\psi_{k}^{n}))\leq 1,
trj¯(ψksn)1=F(trj(ψks),trj(ψkn))1.\displaystyle\|\text{tr}_{\bar{j}}(\psi_{k}^{sn})\|_{1}=F(\text{tr}_{j}(\psi_{k}^{s}),\text{tr}_{j}(\psi_{k}^{n}))\leq 1.

We hence have

tri¯(ψksn)trj¯(ψksn)1tri¯(ψksn)1+trj¯(ψksn)1=1+1=2.\|\text{tr}_{\bar{i}}(\psi_{k}^{sn})-\text{tr}_{\bar{j}}(\psi_{k}^{sn})\|_{1}\leq\|\text{tr}_{\bar{i}}(\psi_{k}^{sn})\|_{1}+\|\text{tr}_{\bar{j}}(\psi_{k}^{sn})\|_{1}=1+1=2.

A similar argument holds as tri¯(ψkns)trj¯(ψkns)12.\|\text{tr}_{\bar{i}}(\psi_{k}^{ns})-\text{tr}_{\bar{j}}(\psi_{k}^{ns})\|_{1}\leq 2. Therefore, we have

D(ρi,ρj)kpk2|αk||βk|+kpk|βk|2.D(\rho_{i},\rho_{j})\leq\sum_{k}p_{k}2|\alpha_{k}||\beta_{k}|+\sum_{k}p_{k}|\beta_{k}|^{2}.

From Eq. (2), the Cauchy-Schwarz inequality and |αk|1|\alpha_{k}|\leq 1,

kpk2|αk||βk|+jpk|βk|2\displaystyle\sum_{k}p_{k}2|\alpha_{k}||\beta_{k}|+\sum_{j}p_{k}|\beta_{k}|^{2} \displaystyle\leq 2kpk|βk|+ϵ\displaystyle 2\sum_{k}p_{k}|\beta_{k}|+\epsilon
=\displaystyle= 2kpkpk|βk|+ϵ\displaystyle 2\sum_{k}\sqrt{p_{k}}\sqrt{p_{k}}|\beta_{k}|+\epsilon
\displaystyle\leq 2(kpk)12(kpk|βk|2)12+ϵ\displaystyle 2\left(\sum_{k}p_{k}\right)^{\frac{1}{2}}\left(\sum_{k}p_{k}|\beta_{k}|^{2}\right)^{\frac{1}{2}}+\epsilon
\displaystyle\leq 2ϵ+ϵ,\displaystyle 2\sqrt{\epsilon}+\epsilon,

which concludes the proof. ∎

3.2 Protocol on paths

In this subsection, we focus on the case where the verifier v0,,vrv_{0},\ldots,v_{r} are arranged in a row and the two extremities v0v_{0} and vrv_{r} have inputs. Let x{0,1}nx\in\{0,1\}^{n} be the input string owned by v0v_{0}, and y{0,1}ny\in\{0,1\}^{n} be the input string owned by vrv_{r}. We are going to derive a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the equality function 𝖤𝖰\mathsf{EQ}.

Our 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol 𝒫π\mathcal{P}_{\pi} is described in Algorithm 3 (recall that π\pi, |hx|h_{x}\rangle, and {My,1,My,0}\{M_{y,1},M_{y,0}\} are defined in Section 2.2.1).

Algorithm 3   Protocol 𝒫π\mathcal{P}_{\pi} for 𝖤𝖰\mathsf{EQ} on an input pair (x,y)(x,y) in a path v0,,vrv_{0},\ldots,v_{r}
1:The prover sends two clognc\log n-qubit registers Rj,0,Rj,1R_{j,0},R_{j,1} to each of the intermediate nodes vjv_{j} for j{1,,r1}j\in\{1,\ldots,r-1\}.
2:The left-end node v0v_{0} prepares the state ρ0=|hxhx|\rho_{0}=\ket{h_{x}}\bra{h_{x}} in the register R0R_{0} by itself, and sends R0R_{0} to the right neighbor v1v_{1}.
3:Each intermediate node vjv_{j} swaps the states between Rj,0R_{j,0} and Rj,1R_{j,1} with probability 12\frac{1}{2}, i.e., symmetrizes the states on Rj,0R_{j,0} and Rj,1R_{j,1}.
4:Each intermediate node vjv_{j} sends Rj,1R_{j,1} to the right neighbor vj+1v_{j+1}.
5:Each intermediate node vjv_{j} receives Rj1,1R_{j-1,1} from its left neighbor vj1v_{j-1}. Then vjv_{j} performs the SWAP test on the registers (Rj1,1,Rj,0)(R_{{j-1},1},R_{j,0}) and accepts or rejects accordingly.
6:The right-end node vrv_{r} receives Rr1,1R_{r-1,1} from its left neighbor vr1v_{r-1}. Then, vrv_{r} performs the POVM measurement {My,0,My,1}\{M_{y,0},M_{y,1}\} corresponding to π\pi applied to the state Rr1,1R_{r-1,1} and accepts or rejects accordingly.

In the above protocol 𝒫π\mathcal{P}_{\pi}, the size of the quantum proof that each node receives from the prover is 2clogn2c\log n, and the length of the quantum message that each node sends to the neighbor is clognc\log n. We next show that the above protocol has perfect completeness and soundness 481r2\frac{4}{81r^{2}}.

Completeness

Let us assume inputs xx and yy are satisfying 𝖤𝖰(x,y)=1\mathsf{EQ}(x,y)=1, i.e., x=yx=y. The prover sends |hx|hx\ket{h_{x}}\ket{h_{x}} to all the intermediate nodes. In step 3, as the state is already symmetric, the state does not change by the symmetrization. Therefore, in step 5, all the SWAP tests accept with certainty. Furthermore, the right end node vrv_{r} accepts with certainty. Then, from the definition of completeness, the protocol has perfect completeness.

Soundness

Let us assume inputs xx and yy are satisfying 𝖤𝖰(x,y)=0\mathsf{EQ}(x,y)=0, i.e., xyx\neq y. Then, the following lemma holds.

Lemma 17.

For j{1,,r}j\in\{1,\ldots,r\}, let EjE_{j} be the event that the local test vjv_{j} performs (the SWAP test or the POVM measurement) accepts. Then, j=1rPr[¬Ej]481r\sum_{j=1}^{r}\mathrm{Pr}[\neg{E_{j}}]\geq\frac{4}{81r}.

Proof.

For conciseness, let us denote pj=Pr[¬Ej]p_{j}=\mathrm{Pr}[\neg{E_{j}}]. By Lemma 14, the trace distance between the reduced states ρj1,1\rho_{j-1,1} on Rj1,1R_{j-1,1} and ρj,0\rho_{j,0} on Rj,0R_{j,0} can be bounded as

D(ρj1,1,ρj,0)2pj+pj.D(\rho_{j-1,1},\rho_{j,0})\leq 2\sqrt{p_{j}}+p_{j}.

We thus have D(ρj1,1,ρj,0)3pjD(\rho_{j-1,1},\rho_{j,0})\leq 3\sqrt{p_{j}}. By the symmetrization step of the protocol, ρj,0=ρj,1\rho_{j,0}=\rho_{j,1} for j=1,,r1j=1,\ldots,r-1. Therefore, with the triangle inequality of the trace norm, we have

D(ρ0,ρr1,1)3j=1r1pj.D(\rho_{0},\rho_{r-1,1})\leq 3\sum_{j=1}^{r-1}\sqrt{p_{j}}.

From the assumption of the soundness, tr(My,0ρ0)23\mathrm{tr}(M_{y,0}\rho_{0})\geq\frac{2}{3}. Then, by the linearity of the trace and the property of the trace norm, an inequality follows as

pr=tr(My,0ρr1,1)=tr(My,0ρ0)tr(My,0(ρ0ρr1,1))23ρ0ρr1,11233j=1r1pj.p_{r}=\mathrm{tr}(M_{y,0}\rho_{r-1,1})=\mathrm{tr}(M_{y,0}\rho_{0})-\mathrm{tr}(M_{y,0}(\rho_{0}-\rho_{r-1,1}))\geq\frac{2}{3}-\|\rho_{0}-\rho_{r-1,1}\|_{1}\geq\frac{2}{3}-3\sum_{j=1}^{r-1}\sqrt{p_{j}}.

Since 0pj10\leq p_{j}\leq 1, we have

3j=1rpj=3pr+3j=1r1pjpr+3j=1r1pjpr+3j=1r1pj23.3\sum_{j=1}^{r}\sqrt{p_{j}}=3\sqrt{p_{r}}+3\sum_{j=1}^{r-1}\sqrt{p_{j}}\geq\sqrt{p_{r}}+3\sum_{j=1}^{r-1}\sqrt{p_{j}}\geq p_{r}+3\sum_{j=1}^{r-1}\sqrt{p_{j}}\geq\frac{2}{3}.

From the Cauchy-Schwarz inequality, we get

rj=1rpjj=1rpj.\sqrt{r}\sqrt{\sum_{j=1}^{r}p_{j}}\geq\sum_{j=1}^{r}\sqrt{p_{j}}.

We thus conclude

j=1rpj(1rj=1rpj)2(233r)2=481r,\sum_{j=1}^{r}p_{j}\geq\left(\frac{1}{\sqrt{r}}\sum_{j=1}^{r}\sqrt{p_{j}}\right)^{2}\geq\left(\frac{2}{3\cdot 3\sqrt{r}}\right)^{2}=\frac{4}{81r},

as claimed. ∎

By Lemma 11, we have

Pr[¬E1¬E2¬Er]\displaystyle\mathrm{Pr}[\neg{E_{1}}\lor\neg{E_{2}}\lor\cdot\cdot\cdot\lor\neg{E_{r}}] \displaystyle\geq 1rj=1rPr[¬Ej].\displaystyle\frac{1}{r}\sum_{j=1}^{r}\mathrm{Pr}[\neg{E_{j}}].
\displaystyle\geq 481r2,\displaystyle\frac{4}{81r^{2}},

which implies that the protocol 𝒫π\mathcal{P}_{\pi} has soundness 1481r21-\frac{4}{81r^{2}}.

Full protocol

Let us consider a kk-times repetition of the protocol 𝒫π\mathcal{P}_{\pi} to reduce the soundness error which is a standard technique for 𝖰𝖬𝖠\mathsf{QMA} as in [AN02, KSV02]. The protocol 𝒫π[k]\mathcal{P}_{\pi}[k] described in Algorithm 4 has soundness (1481r2)k(1-\frac{4}{81r^{2}})^{k}. Let us set k=281r24k=\lceil 2\frac{81r^{2}}{4}\rceil and then the protocol has soundness (1e)2<13(\frac{1}{e})^{2}<\frac{1}{3}. The proof size is O(r2logn)O(r^{2}\log n) qubits for each node and the communication amount between nodes is O(r2logn)O(r^{2}\log n) respectively.

Algorithm 4   Protocol 𝒫π[k]\mathcal{P}_{\pi}[k]
1:The prover sends 2k2k quantum registers Rj,0,i,Rj,1,iR_{j,0,i},R_{j,1,i} for i{1,,k}i\in\{1,\ldots,k\}, which are clognc\log n qubits respectively, as proofs to each of the intermediate nodes vjv_{j} for j{1,,r1}j\in\{1,\ldots,r-1\}.
2:The left-end node v0v_{0} prepares kk states (|hxhx|)k(\ket{h_{x}}\bra{h_{x}})^{\otimes k} in the registers R0,1,iR_{0,1,i} for i{1,,k}i\in\{1,\ldots,k\} by itself. Then v0v_{0} sends their registers to v1v_{1}.
3:Each intermediate node vjv_{j} swaps the states between Rj,0,iR_{j,0,i} and Rj,1,iR_{j,1,i} with probability 12\frac{1}{2}, i.e., symmetrizes the states on Rj,0,iR_{j,0,i} and Rj,1,iR_{j,1,i}.
4:Each intermediate node vjv_{j} sends Rj,1,iR_{j,1,i} to the right neighbor vj+1v_{j+1} for all i{1,,k}i\in\{1,\ldots,k\}.
5:Each intermediate node vjv_{j} receives kk quantum registers Rj1,1,iR_{j-1,1,i} from its left neighbor vj1v_{j-1}. Then vjv_{j} performs the SWAP test on the registers (Rj1,1,i,Rj,0,i)(R_{{j-1},1,i},R_{j,0,i}) for each i{1,,k}i\in\{1,\ldots,k\}. The node vjv_{j} rejects if at least one of the performed SWAP tests rejects, and accepts otherwise.
6:The right-end node vrv_{r} receives kk registers Rr1,1,iR_{r-1,1,i} from its left neighbor. Then, vrv_{r} performs the POVM measurement {My,0,My,1}\{M_{y,0},M_{y,1}\} corresponding to π\pi applied to the states Rr1,1,iR_{r-1,1,i}. The node vrv_{r} rejects if at least one of the performed POVM measurements rejects, and accepts otherwise.

3.3 Protocol on general graphs

Let G=(V,E)G=(V,E) be a network of radius rr with terminals u1,,utu_{1},\ldots,u_{t}. Let us assume, without loss of generality, that u1u_{1} is the most central node among them, i.e., it satisfies maxi=1,,t𝖽𝗂𝗌𝗍G(u1,ui)=minj=1,,tmaxi=1,,t𝖽𝗂𝗌𝗍G(uj,ui)\max_{i=1,\ldots,t}\mathsf{dist}_{G}(u_{1},u_{i})=\min_{j=1,\ldots,t}\max_{i=1,\ldots,t}\mathsf{dist}_{G}(u_{j},u_{i}). Let us construct a tree TT rooted at u1u_{1}, with the other terminals as leaves, maximum degree tt, and depth at most r+1r+1. To do this, we start with the breadth-first search from uiu_{i} and find a tree TT^{\prime}. Then, we truncate TT^{\prime} at each terminal uiu_{i} that does not have any terminal as successors, which limits the depth of the tree to rr and the maximum degree to tt. For every terminal uiu_{i} that is not a leaf, replace uiu_{i} and connect uiu_{i} to uiu_{i}^{\prime} as a leaf, where uiu_{i} keeps the input xix_{i}. By this construction, we ensure all the terminals have degree 11 and the depth can be increased by at most 1. See Figure 1 in [FGNP21] for an illustration of the construction. Any protocol of uiu_{i} and uiu_{i}^{\prime} over TT is simulated on the node uiu_{i} over TT^{\prime}, which does not affect the soundness and completeness of 𝖽𝖬𝖠\mathsf{dMA} and 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols from their definitions.

It is also known that there exists a deterministic 𝖽𝖬𝖠\mathsf{dMA} protocol that checks if a tree TT satisfies the condition.

Lemma 18 ([Pel00, KKP10]).

For any network G=(V,E)G=(V,E) with nodes IDs taken in a range polynomial in |V||V|, there is a deterministic 𝖽𝖬𝖠\mathsf{dMA} protocol (i.e., with completeness 11 and soundness 0) for the tree TT using a proof of O(log|V|)O(\log|V|) bits for each node.

Based on the tree construction and the deterministic 𝖽𝖬𝖠\mathsf{dMA} protocol above, we can focus on a protocol over the tree TT since if any malicious prover tells a fake tree construction over nodes, at least one node can detect it with certainty.

Now we present a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the equality function 𝖤𝖰nt\mathsf{EQ}^{t}_{n}, which is a function from ({0,1}n)t(\{0,1\}^{n})^{t} to {0,1}\{0,1\} defined as 𝖤𝖰nt(x1,,xt)=1\mathsf{EQ}^{t}_{n}(x_{1},\ldots,x_{t})=1 if x1==xtx_{1}=\cdots=x_{t} and 0 otherwise.

Theorem 19.

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰nt\mathsf{EQ}^{t}_{n} on a network GG of radius rr with perfect completeness and soundness 13\frac{1}{3}, using local proof and message of size O(r2logn)O(r^{2}\log n).

Proof.

Our protocol assuming a spanning tree TT rooted at u1u_{1} guaranteed by Lemma 18 is described as Algorithm 5.

Algorithm 5   Protocol 𝒫(𝖤𝖰nt)\mathcal{P}(\mathsf{EQ}_{n}^{t}) on a spanning tree TT
1:The prover sends two clognc\log n-qubit states in registers Rv,0R_{v,0} and Rv,1R_{v,1} to each of the nodes vv which has no input. Then, vv symmetrizes the two clognc\log n-qubit states on Rv,0R_{v,0} and Rv,1R_{v,1}.
2:For every i{1,,t}i\in\{1,\ldots,t\}, the node uiu_{i} prepares the clognc\log n-qubit state |hxi\ket{h_{x_{i}}} in register Rui,1R_{u_{i},1}.
3:Every non-root node vv of the tree sends its clognc\log n-qubit state in Rv,1R_{v,1} to its parent in TT.
4:Every non-terminal node vv receives some clognc\log n-qubit states from the children. Then, it performs the permutation test on states that consist of the clognc\log n-qubit state received from the prover and the clognc\log n-qubit states received from the children. Then, it accepts or rejects accordingly.
5:The root node u1u_{1} receives some clognc\log n-qubit states form its children. Then u1u_{1} performs the permutation test on the state that consist of |hx1\ket{h_{x_{1}}} and the states from the children. Then, accept or reject accordingly.

The perfect completeness follows from Lemma 15 since fingerprints |hxi|h_{x_{i}}\rangle for i=1,,ti=1,\ldots,t are the same. For the soundness, let us assume 𝖤𝖰nt(x1,,xt)=0\mathsf{EQ}_{n}^{t}(x_{1},\ldots,x_{t})=0, i.e., there is a leaf uiu_{i} whose input xix_{i} is not equal to x1x_{1}. Then, a similar analysis holds as in Section 3.2 for the path connecting u1u_{1} and uiu_{i}. This is because the analysis of Lemma 17 holds even if some of the nodes on the path conduct the permutation test instead of the SWAP test due to Lemma 16. Therefore, 𝒫(𝖤𝖰nt)\mathcal{P}(\mathsf{EQ}_{n}^{t}) has soundness 1O(1r2)1-O(\frac{1}{r^{2}}). By the parallel O(r2)O(r^{2}) repetitions of 𝒫(𝖤𝖰nt)\mathcal{P}(\mathsf{EQ}_{n}^{t}) similar to the protocol 𝒫π\mathcal{P}_{\pi}, the soundness error can be reduced to 13\frac{1}{3} and thus the proof of Theorem 19 is completed. ∎

Finally, we can combine the technique to replace quantum communication with classical communication by [GMN23a] with our result. If the communication at the verification stage (i.e., the communication among the nodes) of a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol is classical, [GMN23a] named it an 𝖫𝖮𝖢𝖢\mathsf{LOCC} (Local Operation and Classical Communication) 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol. In [GMN23a], the following result was obtained.

Lemma 20 (Theorem 5 in [GMN23a]).

For any constant pcp_{c} and psp_{s} such that 0ps<pc10\leq p_{s}<p_{c}\leq 1, let 𝒫\mathcal{P} be a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for some problem on a network GG with completeness pcp_{c}, soundness psp_{s}, local proof size sc𝒫s^{\mathcal{P}}_{c} and local message size sm𝒫s^{\mathcal{P}}_{m}. For any small enough constant γ>0\gamma>0, there exists an 𝖫𝖮𝖢𝖢\mathsf{LOCC} 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol 𝒫\mathcal{P^{\prime}} for the same problem on GG with completeness pcp_{c}, soundness ps+γp_{s}+\gamma, local proof size sc𝒫+O(dmaxsm𝒫stm𝒫)s^{\mathcal{P}}_{c}+O(d_{max}s^{\mathcal{P}}_{m}s^{\mathcal{P}}_{tm}), and local message size O(sm𝒫stm𝒫)O(s^{\mathcal{P}}_{m}s^{\mathcal{P}}_{tm}), where dmaxd_{max} is the maximum degree of GG, and stm𝒫s^{\mathcal{P}}_{tm} is the total number of qubits sent in the verification stage of 𝒫\mathcal{P}.

Theorem 19 and Lemma 20 lead to the following corollary, which shows a more efficient 𝖫𝖮𝖢𝖢\mathsf{LOCC} 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the equality function than Corollary 1 in [GMN23a].

Corollary 21.

For any small constant ϵ>0\epsilon>0, there is an 𝖫𝖮𝖢𝖢\mathsf{LOCC} 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰nt\mathsf{EQ}^{t}_{n} on a network G=(V,E)G=(V,E) of radius rr with completeness 11, soundness ϵ\epsilon, local proof size O(dmax|V|r4log2(n))O(d_{max}|V|r^{4}\log^{2}(n)) and message size O(|V|r4log2(n))O(|V|r^{4}\log^{2}(n)).

4 Robust quantum advantage for 𝖤𝖰\mathsf{EQ} on a path

In this section, we consider the path v0,,vrv_{0},\ldots,v_{r} as a network topology, and v0v_{0} and vrv_{r} have nn-bit input strings xx and yy, respectively. We will show that a quantum advantage of distributed verification protocols for the equality problem (𝖤𝖰\mathsf{EQ}) still persists even when the size of the network rr is not so small compared with the size of the inputs nn.

4.1 Quantum upper bound

In this subsection, we give a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol that is efficient even when the network size is not small.

Theorem 22.

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol to solve 𝖤𝖰\mathsf{EQ} on the path of length rr with total proof size ic(vi)=O~(rn23)\sum_{i}c(v_{i})=\tilde{O}(rn^{\frac{2}{3}}), perfect completeness and soundness 13\frac{1}{3}.

Proof.

Let us denote by SS a set of nodes such that the indexes can be divided by n13\lceil n^{\frac{1}{3}}\rceil, i.e., S={vn13,v2n13,,vrn13n13}S=\bigg{\{}v_{\lceil n^{\frac{1}{3}}\rceil},v_{2\lceil n^{\frac{1}{3}}\rceil},\ldots,v_{\Bigl{\lfloor}\frac{r}{\lceil n^{\frac{1}{3}}\rceil}\Bigr{\rfloor}\lceil n^{\frac{1}{3}}\rceil}\bigg{\}}. Let us call nodes of SS relay points. Then, the protocol can be described as Algorithm 6.

The total size of the proof is

O(n23logn)×(n131)×(rn13+1)+n×rn13=O~(rn23).O(n^{\frac{2}{3}}\log n)\times(\lceil n^{\frac{1}{3}}\rceil-1)\times\bigg{(}\frac{r}{\lceil n^{\frac{1}{3}}\rceil}+1\bigg{)}+n\times\Bigl{\lfloor}\frac{r}{\lceil n^{\frac{1}{3}}\rceil}\Bigl{\rfloor}=\tilde{O}(rn^{\frac{2}{3}}).

To show completeness, let us assume x=yx=y. Then, when the proofs for viSv_{i}\in S are |x\ket{x} and the proofs for viSv_{i}\notin S are |hx42(n13)2\ket{h_{x}}^{\otimes 42(\lceil n^{\frac{1}{3}}\rceil)^{2}}, all the SWAP tests accept. To show soundness, let us assume xyx\neq y. Then, for any quantum proof, nn-bit measurement results of at least one adjacent pair of the relay points differ. Then, between the two relay points, at least one node outputs reject from the soundness of the protocol 𝒫π[42r2]\mathcal{P}_{\pi}[42r^{2}] in Algorithm 4 with probability 23\frac{2}{3} as claimed. ∎

Algorithm 6   Protocol for 𝖤𝖰\mathsf{EQ} with “relay points”
1:The prover sends an nn-qubit state to the relay points viSv_{i}\in S.
2:The prover sends two 42((n13))2clogn42(\lceil(n^{\frac{1}{3}})\rceil)^{2}c\log n-qubit states to each of the intermediate nodes viSv_{i}\notin S. Then, the nodes symmetrize the states.
3:On the relay points, the node viSv_{i}\in S measures the proof in the computational basis. Based on the nn-bit measurement results, the nodes create 2 ×\times 42(n13)242(\lceil n^{\frac{1}{3}}\rceil)^{2} fingerprints (see Section 2.2.1 for a formal definition of the quantum fingerprints).
4:The left-end node creates 42(n13)242(\lceil n^{\frac{1}{3}}\rceil)^{2} fingerprints |hx\ket{h_{x}}. The right-end node creates 42(n13)242(\lceil n^{\frac{1}{3}}\rceil)^{2} fingerprints |hy\ket{h_{y}}.
5:Each node except the right-end node sends a 42(n13)2clogn42(\lceil n^{\frac{1}{3}}\rceil)^{2}c\log n-qubit state to the right neighbor. Then, each node except the left-end node conducts the SWAP test 42(n13)242(\lceil n^{\frac{1}{3}}\rceil)^{2} times on the own fingerprints and the fingerprints from the left neighbor. If even at least one the SWAP test rejects, each node rejects. Otherwise, each node accepts.

4.2 Classical lower bound

In this subsection, we show that a stronger lower bound of the proof size of 𝖽𝖬𝖠\mathsf{dMA} protocols with 1-round verification for 𝖤𝖰\mathsf{EQ}.

Let us first show that a linear size proof is required for each local 2 nodes. This is a corollary of Theorem 9 in [FGNP21] but we give a proof for completeness.

Lemma 23.

Let f(x,y)f(x,y) be any Boolean function with a 1-fooling set of size at least kk. Let 𝒫\mathcal{P} be a 𝖽𝖬𝖠\mathsf{dMA} protocol for ff on the path of length rr, with ν\nu-round of communication among the nodes, shared randomness. Suppose that the proof of size satisfying j=iν+1i+νc(vj)=12log(k1)\sum_{j=i-\nu+1}^{i+\nu}c(v_{j})=\lfloor\frac{1}{2}\log(k-1)\rfloor bits for i[ν,rν1]i\in[\nu,r-\nu-1], and 𝒫\mathcal{P} has completeness 1p1-p. Then, 𝒫\mathcal{P} has soundness error at least 12p1-2p.

Proof.

For conciseness, we show only the case that 𝒫\mathcal{P} is a 1-round communication protocol (we can easily modify the following proof to the ν\nu-round case). Since ff has a large 11-fooling set and the proof size is small, there exist two distinct pairs of fooling inputs that have the same assignment of proofs on viv_{i} and vi+1v_{i+1}. Let us fix such two inputs pairs (x,y)(x,y) and (x,y)(x^{\prime},y^{\prime}) such that f(x,y)=f(x,y)=1f(x,y)=f(x^{\prime},y^{\prime})=1 and f(x,y)=0f(x,y^{\prime})=0 with corresponding assignment of proofs ww and ww^{\prime} such that w(vi)=w(vi)w(v_{i})=w^{\prime}(v_{i}) and w(vi+1)=w(vi+1)w(v_{i+1})=w^{\prime}(v_{i+1}), where w(vj)w(v_{j}) is the vjv_{j}’s part of ww.

We denote by 𝗈𝗎𝗍i(x,y,w)\mathsf{out}_{i}(x,y,w) the output of viv_{i} when the inputs are xx and yy and the proof assignment is ww. Since 𝒫\mathcal{P} has completeness 1p1-p, we have

Prs[j:ji𝗈𝗎𝗍j(x,y,w)=1j:ji+1𝗈𝗎𝗍j(x,y,w)=1]1p,\Pr_{s}\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y,w)=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x,y,w)=1\big{]}\geq 1-p,

where ss denotes the random string taken in 𝒫{\cal P}. The same holds for (x,y,w)(x^{\prime},y^{\prime},w^{\prime}). Hence,

Prs[j:ji𝗈𝗎𝗍j(x,y,w)=1]1p,\Pr_{s}\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y,w)=1\big{]}\geq 1-p,
Prs[j:ji+1𝗈𝗎𝗍j(x,y,w)=1]1p.\Pr_{s}\big{[}\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x^{\prime},y^{\prime},w^{\prime})=1\big{]}\geq 1-p.

Let w′′w^{\prime\prime} be the proof assignment defined by w′′(vj)=w(vj)w^{\prime\prime}(v_{j})=w(v_{j}) for j[0,i1]j\in[0,i-1], w′′(vj)=w(vj)=w(vj)w^{\prime\prime}(v_{j})=w(v_{j})=w^{\prime}(v_{j}) for j=i,i+1j=i,i+1 and w′′(vj)=w(vj)w^{\prime\prime}(v_{j})=w^{\prime}(v_{j}) for j[i+2,r]j\in[i+2,r]. Consider the input assignment (x,y)(x,y^{\prime}) combined with the proof assignment w′′w^{\prime\prime}. Then, the nodes vjv_{j} for jij\leq i receive the same partial inputs and proof when the total inputs and proof are (x,y,w′′)(x,y^{\prime},w^{\prime\prime}) and (x,y,w)(x,y,w) and the nodes vjv_{j} for ji+1j\geq i+1 receive the same partial inputs and proof when the total inputs and proof are (x,y,w′′)(x,y^{\prime},w^{\prime\prime}) and (x,y,w)(x^{\prime},y^{\prime},w^{\prime}). Therefore, by a union bound, we have

Prs[j:ji𝗈𝗎𝗍j(x,y,w′′)=1j:ji+1𝗈𝗎𝗍j(x,y,w′′)=1]\displaystyle\Pr_{s}\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y^{\prime},w^{\prime\prime})=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x,y^{\prime},w^{\prime\prime})=1\big{]}
\displaystyle\geq 1Prs[¬j:ji𝗈𝗎𝗍j(x,y,w′′)=1]Prs[¬j:ji+1𝗈𝗎𝗍j(x,y,w′′)=1]\displaystyle 1-\Pr_{s}\big{[}\lnot\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y^{\prime},w^{\prime\prime})=1\big{]}-\Pr_{s}\big{[}\lnot\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x^{\prime},y^{\prime},w^{\prime\prime})=1\big{]}
=\displaystyle= 1Prs[¬j:ji𝗈𝗎𝗍j(x,y,w)=1]Prs[¬j:ji+1𝗈𝗎𝗍j(x,y,w)=1]\displaystyle 1-\Pr_{s}\big{[}\lnot\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y,w)=1\big{]}-\Pr_{s}\big{[}\lnot\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x^{\prime},y^{\prime},w^{\prime})=1\big{]}
\displaystyle\geq 12p,\displaystyle 1-2p,

which implies the soundness error is at least 12p1-2p. ∎

Proposition 24.

Let f(x,y)f(x,y) be any Boolean function with a 1-fooling set of size at least kk. Let 𝒫\mathcal{P} be a 𝖽𝖬𝖠\mathsf{dMA} protocol for ff on the path of length rr, with ν\nu-round of communication among the nodes, shared randomness, total proof size j=0rc(vj)r12ν12log(k1)\sum_{j={0}}^{r}c(v_{j})\leq\lfloor\frac{r-1}{2\nu}\rfloor\lfloor\frac{1}{2}\log(k-1)\rfloor, and completeness 1p1-p. Then, 𝒫\mathcal{P} has soundness error at least 12p1-2p.

Proof.

By the pigeonhole principle, there exists i[ν,rν1]i\in[\nu,r-\nu-1] such that j=ii+1c(vj)12log(k1)\sum_{j={i}}^{i+1}c(v_{j})\leq\lfloor\frac{1}{2}\log(k-1)\rfloor. Then, Lemma 23, the protocol 𝒫\mathcal{P} has soundness error at least 12p1-2p. ∎

Since 𝖤𝖰\mathsf{EQ} has a 1-fooling set of size 2n2^{n}, the corollary below directly follows from Proposition 24.

Corollary 25.

Let 𝒫\mathcal{P} be any 𝖽𝖬𝖠\mathsf{dMA} protocol for 𝖤𝖰\mathsf{EQ} with ν\nu-round of communication between the nodes on the path of length rr with total proof size j=0rc(vj)r12ν12(n1)\sum_{j={0}}^{r}c(v_{j})\leq\lfloor\frac{r-1}{2\nu}\rfloor\lfloor\frac{1}{2}(n-1)\rfloor, and completeness 1p1-p. Then, 𝒫\mathcal{P} has soundness error at least 12p1-2p.

Corollary 25 implies that any 𝖽𝖬𝖠\mathsf{dMA} protocol with constant-round, sufficiently high completeness and low soundness error has to receive Ω(rn)\Omega(rn) bits as proofs in total.

5 Protocol for comparing the values of inputs

In this section, we give 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols to compare the values of inputs regarded as integers.

5.1 Protocol for the greater-than problem

In this subsection, we construct an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the greater-than function (𝖦𝖳\mathsf{GT}).

The function 𝖦𝖳:{0,1,,2n1}×{0,1,,2n1}{0,1}\mathsf{GT}:\{0,1,\ldots,2^{n}-1\}\times\{0,1,\ldots,2^{n}-1\}\rightarrow\{0,1\} is defined as 𝖦𝖳(x,y)=1\mathsf{GT}(x,y)=1 if and only if x>yx>y. We identify

x\displaystyle x =\displaystyle= x0×2n1+x1×2n2++xn2×21+xn1×20,\displaystyle{x_{0}\times 2^{n-1}+x_{1}\times 2^{n-2}+\cdots+x_{n-2}\times 2^{1}+x_{n-1}\times 2^{0}},
y\displaystyle y =\displaystyle= y0×2n1+y1×2n2++yn2×21+yn1×20\displaystyle{y_{0}\times 2^{n-1}+y_{1}\times 2^{n-2}+\cdots+y_{n-2}\times 2^{1}+y_{n-1}\times 2^{0}}

by the nn-bit strings x=x0x1xn2xn1x={x_{0}x_{1}\cdots x_{n-2}x_{n-1}} and y=y0y1yn2yn1y={y_{0}y_{1}\cdots y_{n-2}y_{n-1}}.

We first observe 𝖦𝖳(x,y)=1\mathsf{GT}(x,y)=1 if and only if there exists an index i[0,n1]i\in[0,n-1] such that xi=1x_{i}=1, yi=0y_{i}=0 and x[i]=y[i]x[i]=y[i], where x[i]:=x0xi1x[i]:=x_{0}\cdots x_{i-1} and y[i]:=y0yi1y[i]:=y_{0}\cdots y_{i-1}. Then, we construct a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT} using the protocol for 𝖤𝖰\mathsf{EQ} as a subroutine.

Theorem 26.

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT} on the path of length rr with perfect completeness and soundness 13\frac{1}{3}, using local proof and message of size O(r2logn)O(r^{2}\log n).

Proof.

The protocol before the parallel repetition can be described in Algorithm 7.

Algorithm 7   Protocol for 𝖦𝖳\mathsf{GT} on an input pair (x,y)(x,y) in a path v0,,vrv_{0},\ldots,v_{r}
1:The prover sends two O(logn)O(\log n)-qubit registers Rj,0,Rj,1R_{j,0},R_{j,1} called fingerprint registers to each of the intermediate nodes vjv_{j} for j{1,,r1}j\in\{1,\ldots,r-1\}. The prover also sends a logn\lceil\log n\rceil-qubit register, called an index register, to each of all the nodes.
2:The node v0v_{0} measures the index register in the computational basis and let us denote by i0{0,1}logni_{0}\in\{0,1\}^{\lceil\log n\rceil} the measurement result. If xi0=0x_{i_{0}}=0, v0v_{0} rejects. Then, v0v_{0} prepares the state ρ0=|hx[i0]hx[i0]|\rho_{0}=\ket{h_{x[i_{0}]}}\bra{h_{x[i_{0}]}} in register R0R_{0} as the fingerprint of the binary string x[i0]:=x0xi01x[i_{0}]:=x_{0}\cdots x_{i_{0}-1}. If i0=0i_{0}=0, it prepares |\ket{\perp}.
3:Each intermediate node vjv_{j} measures the index register in the computational basis. It also swaps the states between Rj,0R_{j,0} and Rj,1R_{j,1} with probability 12\frac{1}{2}, i.e., symmetrizes the states on Rj,0R_{j,0} and Rj,1R_{j,1}.
4:The node vrv_{r} measures the index register in the computational basis and let us denote by ir{0,1}logni_{r}\in\{0,1\}^{\lceil\log n\rceil} the measurement result. If yir=1y_{i_{r}}=1, vrv_{r} rejects. Then, vrv_{r} prepares the state ρr=|hy[ir]hy[ir]|\rho_{r}=\ket{h_{y[i_{r}]}}\bra{h_{y[i_{r}]}} in register RrR_{r} as the fingerprint of the binary string y[ir]:=y0yir1y[i_{r}]:=y_{0}\cdots y_{i_{r}-1}. If ir=0i_{r}=0, it prepares |\ket{\perp}.
5:The node v0v_{0} sends R0R_{0} and a register R0R^{\prime}_{0} that encodes the measurement result of the index register to the right neighbor v1v_{1}. Each intermediate node vjv_{j} sends Rj,1R_{j,1} and a register RjR^{\prime}_{j} that encodes the measurement result of the index register to the right neighbor vj+1v_{j+1}.
6:Each intermediate node vjv_{j} receives Rj1,1R_{{j-1},1} from its left neighbor vj1v_{j-1}. The node vjv_{j} also receives Rj1R^{\prime}_{j-1} from vj1v_{j-1} and measures them in the computational basis to check if the measurement result is the same as the own index register or not. If they are different, vjv_{j} rejects. Otherwise, vjv_{j} performs the SWAP test on the registers (Rj1,1,Rj,0)(R_{{j-1},1},R_{j,0}) and accepts or rejects accordingly.
7:The node vrv_{r} receives Rr1,1R_{r-1,1} and Rr1R^{\prime}_{r-1} from its left neighbor vr1v_{r-1}. Then, vrv_{r} measures Rr1R^{\prime}_{r-1} in the computational basis and checks if the measurement result is the same as the own index register. If they are different, vrv_{r} rejects. Otherwise, vrv_{r} performs the SWAP test on (Rr1,1,Rr)(R_{r-1,1},R_{r}), and accepts or rejects accordingly.

Completeness

Let us assume 𝖦𝖳(x,y)=1\mathsf{GT}(x,y)=1, i.e., x>yx>y. Then, there exists an index ii such that xi=1x_{i}=1, yi=0y_{i}=0, and x[i]=y[i]x[i]=y[i]. To achieve perfect completeness, the honest prover can send the index ii in the index register and |hx[i]=|hy[i]\ket{h_{x[i]}}=\ket{h_{y[i]}} in the fingerprint register to all the nodes. If i=0i=0, the prover sends the index 0 in the index register and |\ket{\perp} in the fingerprint register. Then, all the nodes accept since xi=1x_{i}=1, yi=0y_{i}=0, and all the index comparisons and the SWAP tests are accepted.

Soundness

From the index comparisons in the protocol, the prover must send the same index in all the index registers to maximize the acceptance probability. Thus we assume the prover sends the same index ii in all the index registers.

Let us assume 𝖦𝖳(x,y)=0\mathsf{GT}(x,y)=0, i.e., xyx\leq y. If xi=0x_{i}=0 or yi=1y_{i}=1, v0v_{0} or vrv_{r} rejects. Thus the prover must choose ii such that xi=1x_{i}=1 and yi=0y_{i}=0. Then x[i]y[i]x[i]\neq y[i] as otherwise x>yx>y, which contradicts 𝖦𝖳(x,y)=0\mathsf{GT}(x,y)=0. (Note that when i=0i=0, x0=0x_{0}=0 or y0=1y_{0}=1 holds from xyx\leq y and thus v0v_{0} or vrv_{r} rejects. Hence we can assume i1i\geq 1.) Then, by the soundness analysis of the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ}, at least one node rejects with probability O(1r2)O(\frac{1}{r^{2}}).

By the parallel repetition of Algorithm 7 with O(r2)O(r^{2}) times, the protocol has a sufficiently low constant soundness error. This completes the proof. ∎

Since the size of the 1-fooling set of 𝖦𝖳\mathsf{GT} is 2n2^{n}, a lower bound of 𝖽𝖬𝖠\mathsf{dMA} protocols can be shown from Proposition 24.

Corollary 27.

Let 𝒫\mathcal{P} be any ν\nu-round 𝖽𝖬𝖠\mathsf{dMA} protocol for 𝖦𝖳\mathsf{GT} on the path of length rr with total proof size j=0rc(vj)r12ν12(n1)\sum_{j={0}}^{r}c(v_{j})\leq\lfloor\frac{r-1}{2\nu}\rfloor\lfloor\frac{1}{2}(n-1)\rfloor and completeness 1p1-p. Then, 𝒫\mathcal{P} has soundness error at least 12p1-2p.

We can define three functions from {0,1,,2n1}×{0,1,,2n1}\{0,1,\ldots,2^{n}-1\}\times\{0,1,\ldots,2^{n}-1\} to {0,1}\{0,1\}, 𝖦𝖳<\mathsf{GT}_{<}, 𝖦𝖳\mathsf{GT}_{\geq}, and 𝖦𝖳\mathsf{GT}_{\leq} as follows: 𝖦𝖳<(x,y)=1\mathsf{GT}_{<}(x,y)=1 iff x<yx<y, 𝖦𝖳(x,y)=1\mathsf{GT}_{\geq}(x,y)=1 iff xyx\geq y, and 𝖦𝖳(x,y)=1\mathsf{GT}_{\leq}(x,y)=1 iff xyx\leq y.222𝖦𝖳\mathsf{GT} can be regarded as 𝖦𝖳>\mathsf{GT}_{>} in this notation. By modifying our protocol for 𝖦𝖳\mathsf{GT}, we also obtain 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for these functions.

Corollary 28.

There are 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for 𝖦𝖳<\mathsf{GT}_{<}, 𝖦𝖳\mathsf{GT}_{\geq}, and 𝖦𝖳\mathsf{GT}_{\leq} on the path of length rr with perfect completeness and soundness 13\frac{1}{3} and using local proof and message of size O(r2logn)O(r^{2}\log n).

5.2 Application for ranking verification

In this subsection, we apply the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT} for verifying the ranking of a terminal in a network.

Let us define the ranking verification problem, which asks whether the input xix_{i} of the ii-th terminal is the jj-the largest over all the inputs over the network.

Definition 9 (ranking verification).

For i,j[1,t]i,j\in[1,t], 𝖱𝖵t,ni,j(x1,,xt)=1\mathsf{RV}^{i,j}_{t,n}(x_{1},\ldots,x_{t})=1 if and only if

k[1,t]{i}𝖦𝖳(xi,xk)=tj+1.\sum_{k\in[1,t]\setminus\{i\}}\mathsf{GT}_{\geq}(x_{i},x_{k})=t-j+1.

By running the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖦𝖳\mathsf{GT}_{\geq} (and 𝖦𝖳<\mathsf{GT}_{<}) in parallel on a spanning tree rooted at uiu_{i}, we obtain a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖱𝖵\mathsf{RV}.

Theorem 29.

For i,j[1,t]i,j\in[1,t], there exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖱𝖵t,ni,j\mathsf{RV}^{i,j}_{t,n} with tt terminals and radius rr, with perfect completeness and soundness 13\frac{1}{3}, using local proof and message size O(tr2logn)O(tr^{2}\log n).

Proof.

Let u1,,utu_{1},\ldots,u_{t} be the tt terminals where xkx_{k} is owned by uku_{k}. The protocol is described as Algorithm 8.

Algorithm 8   Protocol for 𝖱𝖵t,ni,j\mathsf{RV}^{i,j}_{t,n}
1:An honest prover tells a spanning tree TT whose root is uiu_{i} and leaves are the other terminals.
2:For every leaf terminal uku_{k} and every node on the path between uiu_{i} and uku_{k} in TT, a 11-qubit register called a direction register is sent from the prover, where 0 and 11 in the direction register represent ``"``\geq" (which means xixkx_{i}\geq x_{k}) and ``<"``<" (which means xi<xkx_{i}<x_{k}), respectively. Moreover, the prover sends a proof ρ\rho to the nodes on the path according to the protocol for 𝖦𝖳\mathsf{GT}_{\geq} (when xixkx_{i}\geq x_{k}) or 𝖦𝖳<\mathsf{GT}_{<} (when xi<xkx_{i}<x_{k}).
3:For the node uiu_{i} and each of the other terminals uku_{k}, the following steps are done: (i) Check whether all the contents of the direction registers on the path between uiu_{i} and uku_{k} are the same or not using 11-bit information obtained by measuring each direction register in the computational basis. (ii) If all the contents are ``"``\geq" (resp. ``<"``<"), the nodes on the path conduct the protocol for 𝖦𝖳\mathsf{GT}_{\geq} (resp. 𝖦𝖳<\mathsf{GT}_{<}) using the proof ρ\rho from the prover.
4:The root node viv_{i} counts the number of ``"``\geq" in the t1t-1 direction registers from the prover, and rejects if k[1,t]{i}𝖦𝖳(xi,xk)tj+1\sum_{k\in[1,t]\setminus\{i\}}\mathsf{GT}_{\geq}(x_{i},x_{k})\neq t-j+1. Otherwise, viv_{i} accepts.

The local proof and message sizes are O(tr2logn)O(tr^{2}\log n) as every node receives at most t1t-1 fingerprint registers whose size is guaranteed by Corollary 28.

In the following analysis, we can assume that all nodes on the path between u1u_{1} and any leaf uku_{k} receive the same direction (\geq or <<) in the direction registers as otherwise the prover is rejected with probability 11.

The completeness holds because the honest prover can send the true direction for each path, namely, \geq (resp. <<) is chosen when xixkx_{i}\geq x_{k} (resp. xi<xkx_{i}<x_{k}). Then all the protocols for 𝖦𝖳\mathsf{GT}_{\geq} or 𝖦𝖳<\mathsf{GT}_{<} accept and the root node uiu_{i} also accepts at the final step since the number of ``"``\geq" is exactly tj+1t-j+1.

To show the soundness, let us assume that 𝖱𝖵t,ni,j(x1,,xt)=0\mathsf{RV}^{i,j}_{t,n}(x_{1},\ldots,x_{t})=0. If the prover sends the true direction and follows the corresponding protocol for 𝖦𝖳\mathsf{GT}_{\geq} (resp. 𝖦𝖳<\mathsf{GT}_{<}) according to xixkx_{i}\geq x_{k} (resp. xi<xkx_{i}<x_{k}) for every leaf xkx_{k}, the root node uiu_{i} rejects at the final step since k[1,t]{i}𝖦𝖳(xi,xk)tj+1\sum_{k\in[1,t]\setminus\{i\}}\mathsf{GT}_{\geq}(x_{i},x_{k})\neq t-j+1. Thus, the prover must send a false direction and cheat the protocol for 𝖦𝖳\mathsf{GT}_{\geq} or 𝖦𝖳<\mathsf{GT}_{<} on some path. However, from the soundness of the protocol for 𝖦𝖳\mathsf{GT}_{\geq} or 𝖦𝖳<\mathsf{GT}_{<} (by Corollary 28), the probability that at least one node on the path rejects is at least 23\frac{2}{3}. ∎

6 Protocol for the Hamming distance and beyond on general graphs

In this section, we derive 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols for the Hamming distance and more extended functions on general graphs.

6.1 Protocol for the Hamming distance

𝖧𝖠𝖬nd(x,y)=1\mathsf{HAM}^{\leq d}_{n}(x,y)=1 if and only if the Hamming distance between nn-bit strings xx and yy is at most dd. The SMP (and hence one-way) quantum communication complexity of 𝖧𝖠𝖬nd(x,y)\mathsf{HAM}^{\leq d}_{n}(x,y) is O(dlogn)O(d\log n) [LZ13], improving the previous works [Yao03, GKdW04]. Let cc^{\prime} be an enough large constant independent with nn, rr and dd, and let π\pi^{\prime} be a quantum one-way communication protocol for the Hamming distance transmitting cdlognc^{\prime}d\log n qubits from [LZ13], such that, for all input pairs (x,y)(x,y), if 𝖧𝖠𝖬nd(x,y)=1\mathsf{HAM}^{\leq d}_{n}(x,y)=1 then π\pi^{\prime} outputs 1 with probability at least 23\frac{2}{3}, and if 𝖧𝖠𝖬nd(x,y)=0\mathsf{HAM}^{\leq d}_{n}(x,y)=0, then π\pi^{\prime} output 0 with probability at least 23\frac{2}{3}. Let |ψ(x)|\psi(x)\rangle be the cdlognc^{\prime}d\log n-qubit (pure) state sent from Alice to Bob in π\pi^{\prime} when xx is an input for Alice.

As a previous work, there is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the Hamming distance problem on a path network.

Fact 5 (Corollary 3 in [FGNP21]).

For any c>0c>0 and dd\in\mathbb{Z}, there exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖧𝖠𝖬nd\mathsf{HAM}^{\leq d}_{n} on the path of length rr with completeness 11nc1-\frac{1}{n^{c}}, soundness 13\frac{1}{3}, and using local proof and message of size O(r2d(logn)log(n+r))O(r^{2}d(\log n)\log(n+r)).

We generalize the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for the Hamming distance between multiple inputs over apart nodes on a network. As in the case of the equality function, let rr be the radius and tt be the number of the terminals. The function of Hamming distance for tt terminals u1,,utu_{1},\ldots,u_{t} where uju_{j} has an nn-bit string xjx_{j} can be defined as follows; 𝖧𝖠𝖬t,nd(x1,,xt)=1\mathsf{HAM}^{\leq d}_{t,n}(x_{1},\ldots,x_{t})=1 if and only if the Hamming distance between any two nn-bit strings xix_{i} and xjx_{j} is at most dd. Then, we show the following theorem.

Theorem 30.

For any c>0c>0 and dd\in\mathbb{Z}, there exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖧𝖠𝖬t,nd\mathsf{HAM}^{\leq d}_{t,n} on a network of radius rr with completeness 11nc1-\frac{1}{n^{c}} and soundness 13\frac{1}{3}, using local proof and message of size O(t2r2d(logn)log(n+t+r))O(t^{2}r^{2}d(\log n)\log(n+t+r)).

Proof.

Let us first consider a two-sided error one-way protocol π′′\pi^{\prime\prime} that repeats the one-way communication protocol π\pi^{\prime} for O(log(n+t+r))O(\log(n+t+r)) times and takes a majority of the outcomes to reduce the error probability. The protocol π′′\pi^{\prime\prime} on input (x,y)(x,y) accepts with probability at least 1142nct2r21-\frac{1}{42n^{c}t^{2}r^{2}} when 𝖧𝖠𝖬nd(x,y)=1\mathsf{HAM}^{\leq d}_{n}(x,y)=1 and accepts with probability at most 13\frac{1}{3} when 𝖧𝖠𝖬nd(x,y)=0\mathsf{HAM}^{\leq d}_{n}(x,y)=0.333Actually, it is at most 142nct2r2\frac{1}{42n^{c}t^{2}r^{2}}, which is smaller than 13\frac{1}{3}. Note that |ψ′′(x):=|ψ(x)O(log(n+t+r))|\psi^{\prime\prime}(x)\rangle:=|\psi(x)\rangle^{\otimes O(\log(n+t+r))} is the state from Alice on input xx to Bob in π′′\pi^{\prime\prime}.

As our 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ}, we assume that the network can know the construction of the spanning tree whose root and leaves are terminals from the prover. In the 𝖤𝖰\mathsf{EQ} protocol, we considered a protocol where messages are sent from the leaves to the root. In contrast, let us consider a protocol where messages are sent from the root to the leaves to show the completeness of the protocol. We also consider running the protocols in parallel for all the tt spanning trees whose roots are the tt terminals to show the soundness of the protocol. The total verification algorithm can be described in Algorithm 9.

Algorithm 9   Protocol for the Hamming distance on general graphs
1:The (honest) prover sends tt spanning trees T1,,TtT_{1},\ldots,T_{t} to the nodes: the root of the jjth one is the jjth terminal uju_{j}, and the leaves are the other terminals.
2:for j=1,,tj=1,\ldots,t do
3:     The honest prover sends (δ+1)(\delta+1) quantum registers 𝖱j,v,1,,𝖱j,v,δ+1{\sf R}_{j,v,1},\ldots,{\sf R}_{j,v,\delta+1} to a node vv which is neither a root nor a leaf and whose number of its children is δ\delta. The contents of the registers are assumed to be the fingerprint |ψ′′(xr)|\psi^{\prime\prime}(x_{r})\rangle of the root uru_{r}. Then, vv permutes (δ+1)(\delta+1) registers by a permutation on Sδ+1S_{\delta+1} chosen uniformly at random. Then vv keeps 𝖱j,v,δ+1{\sf R}_{j,v,\delta+1} (renamed by the permutation), and sends 𝖱j,v,μ{\sf R}_{j,v,\mu} to the μ\muth child of vv.
4:     The root node uru_{r} with input xrx_{r} sends the fingerprint |ψ′′(xr)|\psi^{\prime\prime}(x_{r})\rangle to each of the children.
5:     Each of non-root nodes, vv, implements the SWAP test on 𝖱j,v,δ+1{\sf R}_{j,v,\delta+1} and the register sent from the parent. Then, vv accepts or rejects based on the result of the SWAP test.
6:     Each leaf ulu_{l} with input xlx_{l} does the POVM operation of Bob in the one-way communication protocol π′′\pi^{\prime\prime} on the register sent from the parent. Then, ulu_{l} accepts or rejects based on the result of the POVM operation.
7:     To reduce the soundness error, do the parallel repetition of Steps 3 to 6 with kk times similarly to Algorithm 4. Each node rejects if at least one of the performed SWAP tests or the operation of Bob in the one-way communication protocol π′′\pi^{\prime\prime} rejects, and accepts otherwise.
8:end for

Let k=42r2k=42r^{2}. The total size of the quantum registers Rj,v,1,,Rj,v,δR_{j,v,1},\ldots,R_{j,v,\delta} is O(tdlog(n)log(n+t+r))O(td\log(n)\log(n+t+r)) because δ\delta can be bounded by t1t-1. By the for-loop at Step 2 and the kk parallel repetitions at Step 7, the local proof and message sizes are O(t2r2dlog(n)log(n+t+r))O(t^{2}r^{2}d\log(n)\log(n+t+r)).

To show the completeness, let us assume that 𝖧𝖠𝖬t,nd(x1,,xt)=1\mathsf{HAM}^{\leq d}_{t,n}(x_{1},\ldots,x_{t})=1. The operations of Bob in the protocol π′′\pi^{\prime\prime} are done 42r2t(t1)42r^{2}t(t-1) times in total. Therefore the protocol has completeness (1142t2r2nc)42r2t(t1)11nc(1-\frac{1}{42t^{2}r^{2}n^{c}})^{42r^{2}t(t-1)}\geq 1-\frac{1}{n^{c}}.

To show the soundness, let us assume that 𝖧𝖠𝖬t,nd(x1,,xt)=0\mathsf{HAM}^{\leq d}_{t,n}(x_{1},\ldots,x_{t})=0. Then there exist ii and jj such that 𝖧𝖠𝖬nd(xi,xj)=0\mathsf{HAM}^{\leq d}_{n}(x_{i},x_{j})=0. Over the path on TjT_{j} whose extremities are uiu_{i} and uju_{j} with input xix_{i} and xjx_{j} respectively, the probability that all nodes on the path accept is at most (1481r2)k<13\left(1-\frac{4}{81r^{2}}\right)^{k}<\frac{1}{3} by a similar analysis of the 𝖤𝖰\mathsf{EQ} protocol in Section 3. ∎

Since 𝖤𝖰\mathsf{EQ} is a spacial case of 𝖧𝖠𝖬nd\mathsf{HAM}^{\leq d}_{n} when d=0d=0, it can be shown that a similar lower bound of 𝖽𝖬𝖠\mathsf{dMA} to Corollary 25 holds for 𝖧𝖠𝖬nd\mathsf{HAM}^{\leq d}_{n}.

Corollary 31.

Let 𝒫\mathcal{P} be any ν\nu-round 𝖽𝖬𝖠\mathsf{dMA} protocol for 𝖧𝖠𝖬nd\mathsf{HAM}^{\leq d}_{n} on the path of length rr with total proof size j=0rc(vj)r12ν12(n1)\sum_{j={0}}^{r}c(v_{j})\leq\lfloor\frac{r-1}{2\nu}\rfloor\lfloor\frac{1}{2}(n-1)\rfloor and completeness 1p1-p. Then, 𝒫\mathcal{P} has soundness error at least 12p1-2p.

6.2 Extended results

In this subsection, we extend Theorem 30 to other problems than the Hamming distance and 𝖫𝖮𝖢𝖢\mathsf{LOCC} 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols.

From a function f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\to\{0,1\}, let us denote a multi-input function tf:({0,1}n)t{0,1}\forall_{t}f:(\{0,1\}^{n})^{t}\to\{0,1\} where tf(x1,,xt)=1\forall_{t}f(x_{1},\ldots,x_{t})=1 iff f(xi,xj)=1f(x_{i},x_{j})=1 for any i,j[1,t]i,j\in[1,t]. Similarly to the proof of Theorem 30, we obtain the following theorem that converts any one-way two-party quantum communication complexity protocol to 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols over a network.

Theorem 32.

For a function f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\to\{0,1\} such that 𝖡𝖰𝖯1(f)=s\mathsf{BQP}^{1}(f)=s, there exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for tf\forall_{t}f on a network of radius rr with tt terminals, completeness 11poly(n)1-\frac{1}{\mathrm{poly}(n)} and soundness 13\frac{1}{3}, using local proof and message of size O(t2r2slog(n+t+r))O(t^{2}r^{2}s\log(n+t+r)).

We give a number of applications of Theorem 32. First, we apply the techniques of [DM18]. Let us introduce some definitions of l1l_{1}-graphs. Let V(H)V(H) denote the set of nodes of a graph HH.

Definition 10 (l1l_{1}-graph [DL97]).

A graph HH is an l1l_{1}-graph if its path metric 𝖽𝗂𝗌𝗍H\mathsf{dist}_{H} is l1l_{1}-embeddable, i.e., there is a map ff between V(H)V(H) and m\mathbb{R}^{m}, for some mm, such that 𝖽𝗂𝗌𝗍H(v,w)=f(v)f(w)1\mathsf{dist}_{H}(v,w)=\|f(v)-f(w)\|_{1}.

Definition 11 (kk-scale embedding [Shp93, BC08]).

Given two connected and undirected graphs HH and HH^{\prime}, we say that HH is a kk-scale embedding of HH^{\prime} if there exists a mapping f:V(H)V(H)f:V(H)\rightarrow V(H^{\prime}) such that 𝖽𝗂𝗌𝗍H(f(a),f(b))=k𝖽𝗂𝗌𝗍H(a,b)\mathsf{dist}_{H^{\prime}}(f(a),f(b))=k\cdot\mathsf{dist}_{H}(a,b) for all the vertices a,bV(H)a,b\in V(H).

Lemma 33 (Proposition 8.4 in [BC08]).

A graph HH is an l1l_{1}-graph if and only if it admits a constant scale embedding into a hypercube.

Examples of l1l_{1}-graphs are Hamming graphs [Che88], half cubes (the half-square of the hyper cubes) and Johnson graphs [Che17] are 22-embeddable into a hypercube [BC08]. Using the Johnson-Lindenstrauss lemma [JL84, GKdW06] to reduce the protocol complexity, Driguello and Montanaro showed the following statement as a subroutine of Protocol 2 in [DM18].

Lemma 34 ([DM18]).

Let H=(V,E)H=(V,E) be an 1\ell_{1}-graph with |V||V| vertices, and let u,vVu,v\in V. There exists a quantum protocol in the SMP\mathrm{SMP} model with private randomness which communicates O(d2loglog|V|)O(d^{2}\log\log|V|) qubits and decide 𝖽𝗂𝗌𝗍H(u,v)d\mathsf{dist}_{H}(u,v)\leq d or 𝖽𝗂𝗌𝗍H(u,v)d+1\mathsf{dist}_{H}(u,v)\geq d+1 with arbitrary high constant probability444Each party knows HH in this problem..

We define a tt-party version of the above problem.

Definition 12.

For an 1\ell_{1}-graph HH, 𝖽𝗂𝗌𝗍t,Hd(v1,,vt)=1\mathsf{dist}_{t,H}^{\leq d}(v_{1},\ldots,v_{t})=1 if 𝖽𝗂𝗌𝗍H(vi,vj)d\mathsf{dist}_{H}(v_{i},v_{j})\leq d for any distinct viv_{i} and vjv_{j} in HH, and 𝖽𝗂𝗌𝗍t,Hd(v1,,vt)=0\mathsf{dist}_{t,H}^{\leq d}(v_{1},\ldots,v_{t})=0 if 𝖽𝗂𝗌𝗍H(vi,vj)d+1\mathsf{dist}_{H}(v_{i},v_{j})\geq d+1 for some distinct viv_{i} and vjv_{j} in HH.

Then we have the following result from Theorem 32.

Corollary 35.

For any dd\in\mathbb{N}, 1\ell_{1}-graph HH, and network GG whose radius is rr and number of terminals is tt, there exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖽𝗂𝗌𝗍t,Hd(v1,,vt)\mathsf{dist}_{t,H}^{\leq d}(v_{1},\ldots,v_{t}) over GG with completeness 11poly(log|V(H)|)1-\frac{1}{\mathrm{poly}(\log|V(H)|)} and soundness 13\frac{1}{3}, using local proof and message of size O(t2r2d2loglog|V(H)|log(log(|V(H)|)+t+r))O({t}^{2}{r}^{2}d^{2}\log\log|V(H)|\log(\log(|V(H)|)+t+r)).

Driguello and Montanaro also showed an efficient quantum protocol of the SMP model to distinguish l1l_{1}-distances between vectors. A special case of the distance is the total variation distance of probabilistic distributions.

Lemma 36 (Section IV in [DM18]).

Let x,y[1,1]nx,y\in[-1,1]^{n} such that each entry of xx and yy is specified by a O(n)O(n)-bit string. For any d>0d>0, there is a quantum protocol in the SMP model which communicate O(lognϵ2)O(\frac{\log n}{\epsilon^{2}}) qubits and decide xy1d\|x-y\|_{1}\leq d or xy1d(1+ϵ)\|x-y\|_{1}\geq d(1+\epsilon) for any ϵ=Ω(1logn)\epsilon=\Omega(\frac{1}{\log n}) with failure probability bounded by an arbitrarily small constant.

We can also define a tt-party version.

Definition 13.

For vectors x1,,xt[1,1]nx_{1},\ldots,x_{t}\in[-1,1]^{n} such that each entry of a vector is specified by a O(n)O(n)-bit string, d>0d>0 and ϵ=Ω(1logn)\epsilon=\Omega(\frac{1}{\log n}), 𝖽𝗂𝗌𝗍nd,ϵ(x1,,xt)=1\mathsf{dist}_{\mathbb{R}^{n}}^{\leq d,\epsilon}(x_{1},\ldots,x_{t})=1 if xixj1d\|x_{i}-x_{j}\|_{1}\leq d for any distinct ii and jj and 𝖽𝗂𝗌𝗍nd,ϵ(x1,,xt)=0\mathsf{dist}_{\mathbb{R}^{n}}^{\leq d,\epsilon}(x_{1},\ldots,x_{t})=0 if xixj1d(1+ϵ)\|x_{i}-x_{j}\|_{1}\geq d(1+\epsilon) for at least one pair of distinct ii and jj.

By Theorem 32, the following result is obtained.

Corollary 37.

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖽𝗂𝗌𝗍nd,ϵ\mathsf{dist}_{\mathbb{R}^{n}}^{\leq d,\epsilon} on a network of radius rr with tt terminals, completeness 11poly(n)1-\frac{1}{\mathrm{poly}(n)} and soundness 13\frac{1}{3}, using local proof and message of size O(t2r2ϵ2lognlog(n+r+t))O(t^{2}r^{2}\epsilon^{-2}\log n\log(n+r+t)).

A function F(x,y)F(x,y) on {0,1}n×{0,1}n\{0,1\}^{n}\times\{0,1\}^{n} is an XOR function if F(x,y)=f(xy)F(x,y)=f(x\oplus y) for some function ff on nn-bit strings, where xyx\oplus y is the bit-wise XOR of xx and yy. An XOR function is symmetric if ff is symmetric, i.e., f(z)f(z) depends only on the Hamming weight of zz. The Hamming distance function is indeed an important symmetric XOR function, which can be also defined as follows.

𝖧𝖠𝖬nd(x,y)={1if|xy|d0if|xy|>d\mathsf{HAM}_{n}^{\leq d}(x,y)=\begin{cases}1\ \ \mathrm{if}\ |x\oplus y|\leq d\\ 0\ \ \mathrm{if}\ |x\oplus y|>d\end{cases}

Let us consider more general classes of the XOR function. A linear threshold functions (LTF) ff is defined by

f(z)={1ifiwiziθ0ifiwizi>θf(z)=\begin{cases}1\ \ \mathrm{if}\sum_{i}w_{i}z_{i}\leq\theta\\ 0\ \ \mathrm{if}\sum_{i}w_{i}z_{i}>\theta\end{cases}

where {wi}\{w_{i}\} are the weights and θ\theta is the threshold. We define

W0=maxz:f(z)=0iwiziandW1=minz:f(z)=1iwizi,W_{0}=\max_{z:f(z)=0}\sum_{i}w_{i}z_{i}\hskip 10.0pt\mathrm{and}\hskip 10.0ptW_{1}=\min_{z:f(z)=1}\sum_{i}w_{i}z_{i},

and define m0=θW0m_{0}=\theta-W_{0} and w1=W1θw_{1}=W_{1}-\theta. The margin of ff is m=max{m0,m1}m=\max\{m_{0},m_{1}\}. Note that the function remains the same if {wi}\{w_{i}\} are fixed and θ\theta varies in (W0,W1](W_{0},W_{1}]. Thus, without loss of generality, we assume that θ=W0+W12\theta=\frac{W_{0}+W_{1}}{2}, in which case m0=m1=mm_{0}=m_{1}=m.

Lemma 38 (Theorem 3 in [LZ13]).

For any linear threshold function ff whose threshold is θ\theta and margin is mm and a function gg such that g(x,y)=f(xy)g(x,y)=f(x\oplus y), 𝖡𝖰𝖯||(g)=O(θmlogn)\mathsf{BQP}^{||}(g)=O(\frac{\theta}{m}\log n).

Our multiparty problem and the result induced from Theorem 32 are given in the following.

Definition 14.

For any linear threshold function ff whose threshold is θ\theta and margin is mm and tt nn-bit inputs (x1,,xt)(x_{1},\ldots,x_{t}), 𝖫𝖳𝖥nθ,m(x1,,xt)=1\mathsf{LTF}_{n}^{\leq\theta,m}(x_{1},\ldots,x_{t})=1 if and only if f(xixj)=1f(x_{i}\oplus x_{j})=1 for any distinct ii and jj.

Corollary 39.

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖫𝖳𝖥nθ,m\mathsf{LTF}_{n}^{\leq\theta,m} on a network of radius rr with tt terminals, completeness 11poly(n)1-\frac{1}{\mathrm{poly}(n)} and soundness 13\frac{1}{3}, using local proof and message of size O(t2r2θmlognlog(n+r+t))O(t^{2}r^{2}\frac{\theta}{m}\log n\log(n+r+t)).

Let us next consider a function 𝔽q\mathbb{F}_{q}-𝗋𝖺𝗇𝗄nr:𝔽qn×n×𝔽qn×n{0,1}\mathsf{rank}_{n}^{r}:\mathbb{F}_{q}^{n\times n}\times\mathbb{F}_{q}^{n\times n}\to\{0,1\}. We define 𝔽q\mathbb{F}_{q}-𝗋𝖺𝗇𝗄nr(X,Y)=1\mathsf{rank}_{n}^{r}(X,Y)=1 if and only if the matrix X+YX+Y has rank less than rr, where the rank and the summation X+YX+Y are both over 𝔽q\mathbb{F}_{q}.

Lemma 40 (Theorem 4 in [LZ13]).

For f=𝔽qf=\mathbb{F}_{q}-𝗋𝖺𝗇𝗄nr\mathsf{rank}_{n}^{r}, 𝖡𝖰𝖯||(f)=min{qO(r2),O(nrlogq+nlogn)}\mathsf{BQP}^{||}(f)=\min\{q^{O(r^{2})},O(nr\log q+n\log n)\}.

Our multiparty problem and the result induced from Theorem 32 are given in the following.

Definition 15.

𝔽q\mathbb{F}_{q}-𝗋𝖺𝗇𝗄t,nr(X1,,Xt)=1\mathsf{rank}_{t,n}^{\leq r}(X_{1},\ldots,X_{t})=1 if and only if 𝔽q\mathbb{F}_{q}-𝗋𝖺𝗇𝗄nr(Xi,Xj)=1\mathsf{rank}_{n}^{r}(X_{i},X_{j})=1 for any distinct ii and jj.

Corollary 41.

There exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝔽q\mathbb{F}_{q}-𝗋𝖺𝗇𝗄t,nr(X1,,Xt)\mathsf{rank}_{t,n}^{\leq r}(X_{1},\ldots,X_{t}) on a network of radius rr with tt terminals, completeness 11poly(n)1-\frac{1}{poly(n)} and soundness 13\frac{1}{3}, using local proof and message of size O(t2r2min{qO(r2),O(nrlogq+nlogn)}log(n+r+t))O(t^{2}r^{2}\min\{q^{O(r^{2})},O(nr\log q+n\log n)\}\log(n+r+t)).

7 Construction of 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocols from 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols

In this section, we prove that any function which can be efficiently solved in a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol has an efficient 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol with some overheads.

We first show that any 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol can be transformed into a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a path with some overheads.

Theorem 42.

Suppose that, for a Boolean function f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\to\{0,1\}, there exists a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol with a γ\gamma-qubit proof and μ\mu-qubit communications, completeness 23\frac{2}{3} and soundness 13\frac{1}{3}. Then, there exists a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for ff on a path v0,,vrv_{0},\ldots,v_{r} with completeness 11poly(n)1-\frac{1}{\mathrm{poly}(n)} and soundness 13\frac{1}{3}, proof size c(v0)=O(r2γlog(n+r))c(v_{0})=O(r^{2}\gamma\log(n+r)), c(v1),c(v2),,c(vr1)=O(r2(γ+μ)log(n+r))c(v_{1}),c(v_{2}),\ldots,c(v_{r-1})=O(r^{2}(\gamma+\mu)\log(n+r)), and message size m(vi,vi+1)=O(r2(γ+μ)log(n+r))m(v_{i},v_{i+1})=O(r^{2}(\gamma+\mu)\log(n+r)) for i[0,r1]i\in[0,r-1].

Proof.

Let us consider a O(log(n+r))O(\log(n+r)) times repetition of the 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol for ff in a standard way as in [AN02, KSV02]. The repeated protocol requires a O(γlog(n+r))O(\gamma\log(n+r))-qubit proof and a O(μlog(n+r))O(\mu\log(n+r))-qubit communication from Alice to Bob and has completeness at least 1142ncr21-\frac{1}{42n^{c}r^{2}} and soundness at most 142ncr2\frac{1}{42n^{c}r^{2}}.

Let us describe the above 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol as follows. Note that this formalization holds for any 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol. Merlin produces a quantum state ρ\rho on γ=O(γlog(n+r))\gamma^{\prime}=O(\gamma\log(n+r)) qubits, which he sends to Alice. Then, Alice applies some quantum operation on ρ\rho depending on her input x{0,1}nx\in\{0,1\}^{n} and sends Bob a quantum state σ\sigma on μ=O(μlog(n+r))\mu^{\prime}=O(\mu\log(n+r)) qubits. Then, Bob conducts a POVM measurement {My,0,My,1}\{M_{y,0},M_{y,1}\} on the state σ\sigma depending on his input y{0,1}ny\in\{0,1\}^{n}.

To make a quantum message from Alice to Bob in the case of completeness a pure state rather than a mixed state, we consider a variant of the original protocol as follows. Not to confuse readers, let us call two parties Carol and Dave which have an input xx and yy respectively rather than Alice and Bob. Merlin produces a quantum state ρ\rho on γ\gamma^{\prime} qubits, which he sends to Carol. Then, Carol applies some unitary operation UxU_{x} on ρ\rho and her (γ+μ)(\gamma^{\prime}+\mu^{\prime}) ancilla qubits and sends Dave a (2γ+μ)(2\gamma^{\prime}+\mu^{\prime})-qubit state σ=Ux(ρ|0(γ+μ)0|(γ+μ))Ux\sigma^{\prime}=U_{x}(\rho\otimes\ket{0}^{\otimes(\gamma^{\prime}+\mu^{\prime})}\bra{0}^{\otimes(\gamma^{\prime}+\mu^{\prime})})U_{x}^{\dagger}. Then, Dave obtains σ\sigma by tracing out the last 2γ2\gamma^{\prime} qubits of σ\sigma^{\prime} and conducts the POVM measurement {My,0,My,1}\{M_{y,0},M_{y,1}\} on the state σ\sigma depending on his input y{0,1}ny\in\{0,1\}^{n}. Let us denote by a POVM measurement {My,0,My,1}\{M^{\prime}_{y,0},M^{\prime}_{y,1}\} the whole operations of Dave. This modification can be done from the fact that for any quantum operation (CPTP map) from nn-qubit to mm-qubit, there exists an equivalent operation of a unitary matrix on (2n+m)(2n+m)-qubit (see, e.g., Lemma 1 in [AKN98]). This modified protocol has the same completeness and soundness to the original protocol.

Algorithm 10 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol 𝒫𝖰𝖬𝖠𝖼𝖼\mathcal{P}_{\mathsf{QMAcc}} for a function ff such that 𝖰𝖬𝖠𝖼𝖼1(f)=γ+μ\mathsf{QMAcc}^{1}(f)=\gamma+\mu.
1:The prover sends a state ρ\rho on the quantum register R0,0R_{0,0}, whose size is O(γlog(n+r))O(\gamma\log(n+r)), to the left-end node v0v_{0} as a proof.
2:The prover sends the quantum registers Rj,0,Rj,1R_{j,0},R_{j,1}, which are O((γ+μ)log(n+r))O((\gamma+\mu)\log(n+r)) qubits respectively, as proofs to each of the intermediate nodes vjv_{j} for j{1,,r1}j\in\{1,\ldots,r-1\}.
3:The left-end node v0v_{0} applies the unitary operation UxU_{x} to ρ\rho and O((γ+μ)log(n+r))O((\gamma+\mu)\log(n+r)) ancilla qubits and sends a state Ux(ρ|0000|)UxU_{x}(\rho\otimes\ket{0\cdots 0}\bra{0\cdots 0})U_{x}^{\dagger} in the register R0,1R_{0,1} to v1v_{1}.
4:Each intermediate node vjv_{j} swaps the states between Rj,0R_{j,0} and Rj,1R_{j,1} with probability 12\frac{1}{2}, i.e., symmetrizes the states on Rj,0R_{j,0} and Rj,1R_{j,1}.
5:Each of the nodes sends its quantum register Rj,1R_{j,1} to the right neighbor vj+1v_{j+1}.
6:vjv_{j} receives a quantum register from its left neighbor vj1v_{j-1}. The node then performs the SWAP test on the registers (Rj1,1,Rj,0)(R_{{j-1},1},R_{j,0}) and accepts or rejects accordingly.
7:The right-end node vrv_{r} receives a state on a register Rr1,1R_{r-1,1} from its left neighbor. Then, vrv_{r} performs the POVM measurement {My,0,My,1}\{M^{\prime}_{y,0},M^{\prime}_{y,1}\} on the state of Rr1,1R_{r-1,1} and accepts or rejects accordingly.

Let us next analyze the completeness and soundness of the protocol 𝒫𝖰𝖬𝖠𝖼𝖼\mathcal{P}_{\mathsf{QMAcc}} described in Algorithm 10. Note that the analysis is quite close to the analysis of the 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for 𝖤𝖰\mathsf{EQ} on paths.

Completeness

Let us assume that an input (x,y)(x,y) satisfies f(x,y)=1f(x,y)=1. Then, there exists a quantum proof |ξ\ket{\xi} such that tr(My,1(Ux(|ξξ||0000|)Ux)))=1\mathrm{tr}(M^{\prime}_{y,1}(U_{x}(\ket{\xi}\bra{\xi}\otimes\ket{0\cdots 0}\bra{0\cdots 0})U_{x}^{\dagger})))=1 with probability at least 1142ncr21-\frac{1}{42n^{c}r^{2}}. The prover sends σ=|ξξ|\sigma=\ket{\xi}\bra{\xi} to v0v_{0} and Ux(|ξξ||0000|)UxUx(|ξξ||0000|)UxU_{x}(\ket{\xi}\bra{\xi}\otimes\ket{0\cdots 0}\bra{0\cdots 0})U_{x}^{\dagger}\otimes U_{x}(\ket{\xi}\bra{\xi}\otimes\ket{0\cdots 0}\bra{0\cdots 0})U_{x}^{\dagger} to all the intermediate nodes. Then, all the SWAP tests accept with certainty. Furthermore, the right-end node vrv_{r} accepts with probability at least 1142ncr21-\frac{1}{42n^{c}r^{2}}. Then, from the definition of the completeness of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols, the protocol 𝒫𝖰𝖬𝖠𝖼𝖼\mathcal{P}_{\mathsf{QMAcc}} has completeness at least 1142ncr21-\frac{1}{42n^{c}r^{2}}.

Soundness

Let us assume that an input (x,y)(x,y) satisfies f(x,y)=0f(x,y)=0 and, for any quantum proof |ξ\ket{\xi}, tr(My,0(Ux(|ξξ||0000|)Ux)))1142ncr223\mathrm{tr}(M^{\prime}_{y,0}(U_{x}(\ket{\xi}\bra{\xi}\otimes\ket{0\cdots 0}\bra{0\cdots 0})U_{x}^{\dagger})))\geq 1-\frac{1}{42n^{c}r^{2}}\geq\frac{2}{3}. Then, a lemma similar to Lemma 17 is shown.

Lemma 43.

For j{1,,r}j\in\{1,\ldots,r\}, let EjE_{j} be the event that the local test vjv_{j} performs (the SWAP test or the POVM measurement) accepts. Then, j=1rPr[¬Ej]481r\sum_{j=1}^{r}\mathrm{Pr}[\neg{E_{j}}]\geq\frac{4}{81r}.

Proof.

For conciseness, let us denote pj=Pr[¬Ej]p_{j}=\mathrm{Pr}[\neg{E_{j}}]. By the same discussion to Lemma 17, we have

D(ρ0,1,ρr1,1)3j=1r1pj,D(\rho_{0,1},\rho_{r-1,1})\leq 3\sum_{j=1}^{r-1}\sqrt{p_{j}},

where ρ0,1\rho_{0,1} is a reduced state on the register R0,1R_{0,1} and ρr1,1\rho_{r-1,1} is a reduced state on the register Rr1,1R_{r-1,1}. From the assumption of the soundness, tr(My,0(ρ0,1))23\mathrm{tr}(M^{\prime}_{y,0}(\rho_{0,1}))\geq\frac{2}{3}. Then, by the same discussion to Lemma 17, we conclude

j=1rpj481r.\sum_{j=1}^{r}p_{j}\geq\frac{4}{81r}.

Using Lemma 11, the protocol 𝒫𝖰𝖬𝖠𝖼𝖼\mathcal{P}_{\mathsf{QMAcc}} has soundness 481r2\frac{4}{81r^{2}}. Let us again consider a parallel repetition with O(r2)O(r^{2}) times as the protocol Pπ[k]P_{\pi}[k] in Algorithm 4, which completes the proof of Theorem 42. ∎

We next show any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol can be simulated by a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol with some overhead. To do it, let us restate the definition of the Linear Space Distance (LSD) problem from [RS04] as a complete problem for 𝖰𝖬𝖠\mathsf{QMA} communication protocols. For a subspace VmV\subset\mathbb{R}^{m}, let us define S(V)={vV|v=1}S(V)=\{v\in V|\|v\|=1\}, the unit sphere in VV where \|\cdot\| is the Euclidean norm. For two subspaces V1,V2mV_{1},V_{2}\subset\mathbb{R}^{m}, let us define

Δ(V1,V2)=minv1S(V1)minv2S(V2)v1v2,\Delta(V_{1},V_{2})=\min_{v_{1}\in S(V_{1})}\min_{v_{2}\in S(V_{2})}\|v_{1}-v_{2}\|,

as the distance between V1V_{1} and V2V_{2}.

Definition 16 (The Linear Space Distance (LSD) problem [RS04]).

Given two subspaces V1V_{1} and V2V_{2} of m\mathbb{R}^{m} under the promise that Δ(V1,V2)0.12\Delta(V_{1},V_{2})\leq 0.1\cdot\sqrt{2} or Δ(V1,V2)0.92\Delta(V_{1},V_{2})\geq 0.9\cdot\sqrt{2}, decide if the distance is small or not.

Lemma 44 (Theorem 7 in [RS04]).

Suppose f:𝒳×𝒴{0,1}f:\mathcal{X}\times\mathcal{Y}\to\{0,1\} has a ν\nu-round 𝖰𝖬𝖠\mathsf{QMA} communication protocol with a γ\gamma-qubit proof and μ\mu-qubit communications. Then, there exists a mapping from 𝒳\mathcal{X} and 𝒴\mathcal{Y} to subspaces of 2(γ+μ)poly(ν)\mathbb{R}^{2^{(\gamma+\mu)\mathrm{poly}(\nu)}}555The dimension of the vector space is different from Theorem 7 in [RS04], while it is observed by the analysis of the proof. A similar analysis is also considered in [KP14]., xAxx\mapsto A_{x}, yByy\mapsto B_{y}, such that if f(x,y)=1f(x,y)=1, Δ(Ax,By)0.12\Delta(A_{x},B_{y})\leq 0.1\cdot\sqrt{2} and if f(x,y)=0f(x,y)=0, Δ(Ax,By)0.92\Delta(A_{x},B_{y})\geq 0.9\cdot\sqrt{2}.

Lemma 45 (Theorem 16 in [RS04]).

There exists a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol of cost O(logm)O(\log m) to solve the LSD problem 666Soundness and completeness do not change in the complex setting of quantum proofs [McK13]..

In the definition of the LSD problem, the input precision is infinite. We can define LSD~\mathrm{\widetilde{LSD}} as the finite precision version where m\mathbb{R}^{m} are approximated with O(m2)O(m^{2}) variables and each variable is described with O(logm)O(\log m) bits. The input size of the problem is O(m2logm)O(m^{2}\log m) and the above two results hold for the finite precision analog [RS04]. Therefore we assume that the input size for the LSD problem is O(m2logm)O(m^{2}\log m) without loss of generality.

Using the property of the LSD problem as a 𝖰𝖬𝖠\mathsf{QMA} communication complete problem, we prove that any 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol can be simulated by a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol with some overheads.

Theorem 46.

Suppose f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\to\{0,1\} has a constant-round 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on a path v0,,vrv_{0},\ldots,v_{r}, completeness 23\frac{2}{3}, and soundness 13\frac{1}{3}. Let C:=j[0,r]c(vj)+minj[0,r1]m(vj,vj+1)C:=\sum_{j\in[0,r]}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1}). Then, there exists a 11-round 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol for ff on the path of length rr with completeness 11poly(C2C)1-\frac{1}{\mathrm{poly}(C2^{C})}, soundness 13\frac{1}{3}, using local proof and message of size O~(r2C2)\tilde{O}(r^{2}{C}^{2}).

Proof.

Let us denote j=argmin𝑖m(vi,vi+1)j=\underset{i}{\operatorname{argmin}}\,m(v_{i},v_{i+1}). Let us divide r+1r+1 nodes into the two groups v0,,vjv_{0},\ldots,v_{j} and vj+1,,vrv_{j+1},\ldots,v_{r}. From the original 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol, let us consider Alice simulates the protocols of v0,,vjv_{0},\ldots,v_{j} and she accepts iff all the parties accept, and Bob simulates the protocols of vj+1,,vrv_{j+1},\ldots,v_{r} and he accepts iff all the parties accept. This protocol is a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol whose complexity is at most CC to solve ff. From the inequality (1) in Section 2.2.2, 𝖰𝖬𝖠𝖼𝖼(f)\mathsf{QMAcc}(f) is at most 2C2C. By Lemma 44 and Lemma 45, there exists a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol of complexity O(C)O(C) to solve the LSD problem to which ff reduces. Note that the dimension mm of the subspaces of the LSD instance is m=2O(C)m=2^{O(C)}. Since the input size of the LSD is O(m2logm)=O(C2O(C))O(m^{2}\log m)=O(C2^{O(C)}), Theorem 42 implies that there exists a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol for the LSD problem (and hence for ff) on the path of length rr with 1-round communication, and completeness 11Ω(poly(C2C))1-\frac{1}{\Omega(\mathrm{poly}(C2^{C}))}, soundness 13\frac{1}{3}, using local proof and message sizes O(r2(C)log(2O(Clog(C))+r))=O~(r2C2)O(r^{2}(C)\log(2^{O(C\log(C))}+r))=\tilde{O}(r^{2}{C}^{2}). ∎

We also show that there exists an efficient 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for a function which has an efficient 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol with some overhead costs.

Proposition 47.

Suppose f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\to\{0,1\} has a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol with cost CC, i.e., 𝖰𝖬𝖠𝖼𝖼(f)=C\mathsf{QMAcc}^{*}(f)=C. Then, there exists a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} protocol for ff on the path of length rr with completeness 11poly(n)1-\frac{1}{\mathrm{poly}(n)}, soundness 13\frac{1}{3}, using local proof and message of size O(r2log(r)poly(C))O(r^{2}\log(r)\mathrm{poly}(C)).

Proof.

From the inequality (1) in Section 2.2.2, 𝖰𝖬𝖠𝖼𝖼(f)\mathsf{QMAcc}(f) is at most 2C2C, and from Lemma 44 and Lemma 45, there exist a 𝖰𝖬𝖠\mathsf{QMA} one-way communication protocol of complexity O(poly(C))O(\mathrm{poly}(C)) to solve the LSD problem to which ff reduces, where the dimension mm of the subspaces of the LSD instance is m=2poly(C)m=2^{\mathrm{poly}(C)}. Since the input size of the LSD is O(m2logm)O(m^{2}\log m), Theorem 42 implies the claim described. ∎

8 Lower bounds for 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols

In this section, we will obtain lower bounds for the size of proofs and communication of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols. In this section, we also focus on the case where the verifier v0,,vrv_{0},\ldots,v_{r} are arranged in a row and the two extremities v0v_{0} and vrv_{r} have inputs. Let x{0,1}nx\in\{0,1\}^{n} be the input owned by v0v_{0}, and y{0,1}ny\in\{0,1\}^{n} be the input owned by vrv_{r}.

8.1 By a counting argument over quantum states for fooling inputs

In this subsection, we will obtain a lower bound of the proof size by a counting argument of quantum states for fooling inputs.

A lower bound for the size of quantum fingerprints of nn-bits was shown by a reduction to the lower bound of quantum one-way communication complexity for 𝖤𝖰\mathsf{EQ} [BdW01].

Lemma 48 (Theorem 8.3.2 in [dW01]).

Let δ2n\delta\geq 2^{-n}. Suppose that a family of pure states {|hx}x{0,1}n\{\ket{h_{x}}\}_{x\in\{0,1\}^{n}} of bb-qubit satisfies |hi|hj|δ|\braket{h_{i}}{h_{j}}|\leq\delta for any distinct i,ji,j. Then, b=Ω(log(nδ2))b=\Omega(\log(\frac{n}{\delta^{2}})).

Claim 49.

For any family of sets SnS_{n} where |Sn|s(n)|S_{n}|\geq s(n) and any constant 0δ<10\leq\delta<1, there exist a sufficiently small constant c>0c>0 and large integer nn such that, for any family of cloglogs(n)c\log\log s(n)-qubit pure states {|hx}xSn\{\ket{h_{x}}\}_{x\in S_{n}}, there exist ii and jj such that |hi|hj|>δ|\braket{h_{i}}{h_{j}}|>\delta.

Proof.

Let us choose a family of sets SnS^{\prime}_{n} so that for all nn, each set is an arbitrary subset of the set SnS_{n} and |Sn|=2logs(n)|S_{n}^{\prime}|=2^{\lfloor\log s(n)\rfloor}, and let us correspond an element of SnS_{n}^{\prime} with an element of {0,1}logs(n)\{0,1\}^{\lfloor\log s(n)\rfloor} one by one. Then, from Lemma 48, if there exists a family of pure states {|hx}xSn\{\ket{h_{x}}\}_{x\in S_{n}^{\prime}} of bb-qubit satisfies |hi|hj|δ|\braket{h_{i}}{h_{j}}|\leq\delta for any distinct elements i,jSni,j\in S_{n}^{\prime}, b=Ω(loglogs(n))b=\Omega(\log\log s(n)), i.e., for sufficient large nn and a constant cc^{\prime}, bcloglogs(n)b\geq c^{\prime}\log\log s(n). Then, for a constant c<cc<c^{\prime}, the claim holds. ∎

By a counting argument for fooling inputs, we have a lower bound of the proof size of 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocols.

Proposition 50.

Let p0,δ>0p\geq 0,\delta>0, ν\nu\in\mathbb{N} be constants and ff be a Boolean function with a 11-fooling set of size at least kk. Let 𝒫\mathcal{P} be a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol for ff on the path of length rr with ν\nu-round communication, completeness 1p1-p and soundness error less than 12pδ1-2p-\delta. Then, for any i[ν,rν1]i\in[\nu,r-\nu-1] and a sufficiently small constant cc, j=iν+1i+νc(vj)>cloglogk\sum_{j=i-\nu+1}^{i+\nu}c(v_{j})>c\log\log k.

Proof.

For conciseness, we prove the case that 𝒫\mathcal{P} is a 1-round communication protocol (we can easily modify the following proof to the ν\nu-round case).

Let us denote by SnS_{n} the 1-fooling set for f:{0,1}n×{0,1}n{0,1}f:\{0,1\}^{n}\times\{0,1\}^{n}\to\{0,1\} where |Sn|k|S_{n}|\geq k. For x1,x2{0,1}nx_{1},x_{2}\in\{0,1\}^{n}, let |ψx\ket{\psi_{x}} be a proof with the input x=(x1,x2)x=(x_{1},x_{2}) for all the nodes v0,,vrv_{0},\ldots,v_{r}, where x1x_{1} is owned by v0v_{0} and x2x_{2} is owned by vrv_{r}, and let |ψxj\ket{\psi_{x}}_{j} be a part of the proof for the node vjv_{j} where j=0,,rj=0,\ldots,r.

To reach a contradiction, let us assume that j=ii+1c(vj)cloglogk\sum_{j=i}^{i+1}c(v_{j})\leq c\log\log k for some i[1,r2]i\in[1,r-2]. Let us consider a family of states {|ψxi|ψxi+1}(x1,x2)Sn\{\ket{\psi_{x}}_{i}\otimes\ket{\psi_{x}}_{i+1}\}_{(x_{1},x_{2})\in S_{n}}. From Claim 49, since the qubit size of the family is less than or equal to cloglogkc\log\log k where cc is chosen a sufficiently small constant, there exist y=(y1,y2)y=(y_{1},y_{2}) and z=(z1,z2)z=(z_{1},z_{2}) in SnS_{n} such that f(y1,y2)=f(z1,z2)=1f(y_{1},y_{2})=f(z_{1},z_{2})=1 and |ψy|iψy|i+1|ψzi|ψzi+1|>1δ28|\bra{\psi_{y}}_{i}\otimes\bra{\psi_{y}}_{i+1}\ket{\psi_{z}}_{i}\otimes\ket{\psi_{z}}_{i+1}|>1-\frac{\delta^{2}}{8}. From Fact 1 and Fact 4 and since the partial trace is a quantum operation, we have

D(|ψyi,|ψzi)\displaystyle D(\ket{\psi_{y}}_{i},\ket{\psi_{z}}_{i}) \displaystyle\leq D(|ψyi|ψyi+1,|ψzi|ψzi+1)\displaystyle D(\ket{\psi_{y}}_{i}\otimes\ket{\psi_{y}}_{i+1},\ket{\psi_{z}}_{i}\otimes\ket{\psi_{z}}_{i+1})
\displaystyle\leq 1F(|ψyi|ψyi+1,|ψzi|ψzi+1)2\displaystyle\sqrt{1-F(\ket{\psi_{y}}_{i}\otimes\ket{\psi_{y}}_{i+1},\ket{\psi_{z}}_{i}\otimes\ket{\psi_{z}}_{i+1})^{2}}
=\displaystyle= 1|ψy|iψy|i+1|ψzi|ψzi+1|2\displaystyle\sqrt{1-|\bra{\psi_{y}}_{i}\otimes\bra{\psi_{y}}_{i+1}\ket{\psi_{z}}_{i}\otimes\ket{\psi_{z}}_{i+1}|^{2}}
<\displaystyle< 1(1δ28)2\displaystyle\sqrt{1-\left(1-\frac{\delta^{2}}{8}\right)^{2}}
=\displaystyle= δ24δ416\displaystyle\sqrt{\frac{\delta^{2}}{4}-\frac{\delta^{4}}{16}}
<\displaystyle< δ2.\displaystyle\frac{\delta}{2}.

We also have D(|ψyi+1,|ψzi+1)<δ2D(\ket{\psi_{y}}_{i+1},\ket{\psi_{z}}_{i+1})<\frac{\delta}{2} by the same discussion.

Let LL be a register of a part of the proof for v0,,viv_{0},\ldots,v_{i} and RR be a register of the other part (namely, for vi+1,,vrv_{i+1},\ldots,v_{r}). Let us denote by 𝗈𝗎𝗍j(s,t,|ϕ)\mathsf{out}_{j}(s,t,\ket{\phi}) the output of vjv_{j} when the input is (s,t)(s,t) (where ss is owned by v0v_{0} and tt is owned by vrv_{r}) and the proof is |ϕ\ket{\phi}. From the assumption of the completeness, we have

Pr[j:ji𝗈𝗎𝗍j(y1,y2,|ψyLR)=1j:ji+1𝗈𝗎𝗍j(y1,y2,|ψyLR)=1]1p,\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(y_{1},y_{2},\ket{\psi_{y}}_{LR})=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(y_{1},y_{2},\ket{\psi_{y}}_{LR})=1\big{]}\geq 1-p,
Pr[j:ji𝗈𝗎𝗍j(z1,z2,|ψzLR)=1j:ji+1𝗈𝗎𝗍j(z1,z2,|ψzLR)=1]1p.\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(z_{1},z_{2},\ket{\psi_{z}}_{LR})=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(z_{1},z_{2},\ket{\psi_{z}}_{LR})=1\big{]}\geq 1-p.

We thus have

Pr[j:ji𝗈𝗎𝗍j(y1,y2,|ψyLR)=1]1p,\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(y_{1},y_{2},\ket{\psi_{y}}_{LR})=1\big{]}\geq 1-p,
Pr[j:ji+1𝗈𝗎𝗍j(z1,z2,|ψzLR)=1]1p.\Pr\big{[}\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(z_{1},z_{2},\ket{\psi_{z}}_{LR})=1\big{]}\geq 1-p.

Let us consider the input assignment (y1,z2)(y_{1},z_{2}) combined with the proof assignment |ψyL|ψzR\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R}. By the definition of the 11-fooling set, f(y1,z2)=0f(y_{1},z_{2})=0 without loss of generality. Since the protocol 𝒫\mathcal{P} has 1-round in the verification algorithm and the proofs are separable, we have

Pr[j:ji1𝗈𝗎𝗍j(y1,y2,|ψyLR)=1]=Pr[j:ji1𝗈𝗎𝗍j(y1,z2,|ψyL|ψzR)=1],\Pr\big{[}\bigwedge_{j:j\leq{i-1}}\mathsf{out}_{j}(y_{1},y_{2},\ket{\psi_{y}}_{LR})=1\big{]}=\Pr\big{[}\bigwedge_{j:j\leq{i-1}}\mathsf{out}_{j}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\big{]},
Pr[j:ji+2𝗈𝗎𝗍j(z1,z2,|ψzLR)=1]=Pr[j:ji+2𝗈𝗎𝗍j(y1,z2,|ψyL|ψzR)=1].\Pr\big{[}\bigwedge_{j:j\geq i+2}\mathsf{out}_{j}(z_{1},z_{2},\ket{\psi_{z}}_{LR})=1\big{]}=\Pr\big{[}\bigwedge_{j:j\geq i+2}\mathsf{out}_{j}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\big{]}.

The output of the node viv_{i} can be only affected by |ψyi1|ψyi|ψzi+1\ket{\psi_{y}}_{i-1}\otimes\ket{\psi_{y}}_{i}\otimes\ket{\psi_{z}}_{i+1} and the binary string y1y_{1}. Similarly the output of the node vi+1v_{i+1} can be affected by |ψyi|ψzi+1|ψzi+2\ket{\psi_{y}}_{i}\otimes\ket{\psi_{z}}_{i+1}\otimes\ket{\psi_{z}}_{i+2} and the binary string z2z_{2}. With Fact 3, we thus have

|Pr[𝗈𝗎𝗍i(y1,y2,|ψyLR)=1]Pr[𝗈𝗎𝗍i(y1,z2,|ψyL|ψzR)=1]|\displaystyle|\Pr[\mathsf{out}_{i}(y_{1},y_{2},\ket{\psi_{y}}_{LR})=1\big{]}-\Pr[\mathsf{out}_{i}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1]|
D(|ψyi1|ψyi|ψyi+1,|ψyi1|ψyi|ψzi+1)=D(|ψyi+1,|ψzi+1)<δ2,\displaystyle\leq D(\ket{\psi_{y}}_{i-1}\otimes\ket{\psi_{y}}_{i}\otimes\ket{\psi_{y}}_{i+1},\ket{\psi_{y}}_{i-1}\otimes\ket{\psi_{y}}_{i}\otimes\ket{\psi_{z}}_{i+1})=D(\ket{\psi_{y}}_{i+1},\ket{\psi_{z}}_{i+1})<\frac{\delta}{2},
|Pr[𝗈𝗎𝗍i+1(z1,z2,|ψzLR)=1]Pr[𝗈𝗎𝗍i+1(y1,z2,|ψyL|ψzR)=1]|\displaystyle|\Pr[\mathsf{out}_{i+1}(z_{1},z_{2},\ket{\psi_{z}}_{LR})=1\big{]}-\Pr[\mathsf{out}_{i+1}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1]|
D(|ψyi|ψzi+1|ψzi+2,|ψzi|ψzi+1|ψzi+2)=D(|ψyi,|ψzi)<δ2.\displaystyle\leq D(\ket{\psi_{y}}_{i}\otimes\ket{\psi_{z}}_{i+1}\otimes\ket{\psi_{z}}_{i+2},\ket{\psi_{z}}_{i}\otimes\ket{\psi_{z}}_{i+1}\otimes\ket{\psi_{z}}_{i+2})=D(\ket{\psi_{y}}_{i},\ket{\psi_{z}}_{i})<\frac{\delta}{2}.

Combining the inequalities and the union bound, we have

Pr[j:ji𝗈𝗎𝗍j(y1,z2,|ψyL|ψzR)=1j:ji+1𝗈𝗎𝗍j(y1,z2,|ψyL|ψzR)=1]\displaystyle\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\big{]}
=\displaystyle= Pr[(j:ji1𝗈𝗎𝗍j(y1,y2,|ψy)=1𝗈𝗎𝗍i(y1,z2,|ψyL|ψzR)=1)\displaystyle\Pr\Biggl{[}\left(\bigwedge_{j:j\leq{i-1}}\mathsf{out}_{j}(y_{1},y_{2},\ket{\psi_{y}})=1\wedge\mathsf{out}_{i}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\right)\wedge
(𝗈𝗎𝗍i+1(y1,z2,|ψyL|ψzR)=1j:ji+2𝗈𝗎𝗍j(z1,z2,|ψz)=1)]\displaystyle\hskip 60.0pt\left(\mathsf{out}_{i+1}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\wedge\bigwedge_{j:j\geq i+2}\mathsf{out}_{j}(z_{1},z_{2},\ket{\psi_{z}})=1\right)\Biggr{]}
\displaystyle\geq 1Pr[¬(j:ji1𝗈𝗎𝗍j(y1,y2,|ψy)=1𝗈𝗎𝗍i(y1,z2,|ψyL|ψzR)=1)]\displaystyle 1-\Pr\left[\lnot\left(\bigwedge_{j:j\leq{i-1}}\mathsf{out}_{j}(y_{1},y_{2},\ket{\psi_{y}})=1\wedge\mathsf{out}_{i}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\right)\right]
Pr[¬(𝗈𝗎𝗍i+1(y1,z2,|ψyL|ψzR)=1j:ji+2𝗈𝗎𝗍j(z1,z2,|ψz)=1)]\displaystyle\hskip 20.0pt-\Pr\left[\lnot\left(\mathsf{out}_{i+1}(y_{1},z_{2},\ket{\psi_{y}}_{L}\otimes\ket{\psi_{z}}_{R})=1\wedge\bigwedge_{j:j\geq i+2}\mathsf{out}_{j}(z_{1},z_{2},\ket{\psi_{z}})=1\right)\right]
\displaystyle\geq 1δPr[¬(j:ji1𝗈𝗎𝗍j(y1,y2,|ψy)=1𝗈𝗎𝗍i(y1,y2,|ψy)=1)]\displaystyle 1-\delta-\Pr\left[\lnot\left(\bigwedge_{j:j\leq{i-1}}\mathsf{out}_{j}(y_{1},y_{2},\ket{\psi_{y}})=1\wedge\mathsf{out}_{i}(y_{1},y_{2},\ket{\psi_{y}})=1\right)\right]
Pr[¬(𝗈𝗎𝗍i+1(z1,z2,|ψz)=1j:ji+2𝗈𝗎𝗍j(z1,z2,|ψz)=1)]\displaystyle\hskip 40.0pt-\Pr\left[\lnot\left(\mathsf{out}_{i+1}(z_{1},z_{2},\ket{\psi_{z}})=1\wedge\bigwedge_{j:j\geq i+2}\mathsf{out}_{j}(z_{1},z_{2},\ket{\psi_{z}})=1\right)\right]
\displaystyle\geq 12pδ,\displaystyle 1-2p-\delta,

which contradicts the condition of the soundness. Therefore, we conclude j=ii+1c(vj)>cloglogk\sum_{j=i}^{i+1}c(v_{j})>c\log\log k for any i[1,r2]i\in[1,r-2]. ∎

The proposition above implies that any 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol for 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT} with sufficiently high completeness and low soundness error requires Ω(rlogn)\Omega(r\log n)-qubit quantum proofs.

Theorem 51.

Let p0,δ>0,νp\geq 0,\delta>0,\nu\in\mathbb{N} be constants and f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\rightarrow\{0,1\} be a Boolean function with a 11-fooling set of size 2n2^{n} (including 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT}). Let 𝒫\mathcal{P} be a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}} protocol for ff on the path of length rr with ν\nu-round communication, completeness 1p1-p and soundness error less than 12pδ1-2p-\delta. Then, j=0rc(vj)=Ω(rlogn)\sum_{j=0}^{r}c(v_{j})=\Omega(r\log n).

Proof.

Assume that j=0rc(vj)r12νclogn\sum_{j=0}^{r}c(v_{j})\leq\lfloor\frac{r-1}{2\nu}\rfloor\lfloor c\log n\rfloor for a sufficiently small constant cc. Then, by the pigeonhole principle, there exists i[ν,rν1]i\in[\nu,r-\nu-1] such that j=iν+1i+νc(vj)clogn\sum_{j=i-\nu+1}^{i+\nu}c(v_{j})\leq c\log n, which contradicts Proposition 50. Therefore, j=0rc(vj)=Ω(rlogn)\sum_{j=0}^{r}c(v_{j})=\Omega(r\log n). ∎

Even for entangled proofs, we obtain the following lower bound by combining Theorem 51 with Theorem 46.

Theorem 52.

Let f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\rightarrow\{0,1\} be a Boolean function with a 11-fooling set of size 2n2^{n} (including 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT}). Let 𝒫\mathcal{P} be a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for ff on the path of length rr with constant-round communication, completeness 23\frac{2}{3} and soundness 13\frac{1}{3}. Let C:=jc(vj)+minj[0,r1]m(vj,vj+1)C:=\sum_{j}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1}). Then, 𝒫\mathcal{P} satisfies C=Ω((logn)1/2ϵr1+ϵ)C=\Omega(\frac{(\log n)^{1/2-\epsilon}}{r^{1+\epsilon^{\prime}}}) for any constants ϵ,ϵ>0\epsilon,\epsilon^{\prime}>0.

Proof.

Assume that 𝒫\mathcal{P} satisfies C=o((logn)1/2ϵr1+ϵ)C=o(\frac{(\log n)^{1/2-\epsilon}}{r^{1+\epsilon^{\prime}}}). Then, from Theorem 46, there exists a 𝖽𝖰𝖬𝖠𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep}} (and hence 𝖽𝖰𝖬𝖠𝗌𝖾𝗉,𝗌𝖾𝗉\mathsf{dQMA}^{\mathsf{sep},\mathsf{sep}}) protocol for ff on the path of length rr with 1-round communication, completeness 34\frac{3}{4} and soundness 13\frac{1}{3} and total proof size

j=0rc(vj)=O~(r3((logn)1/2ϵr1+ϵ)2)=O~(r12ϵ(logn)12ϵ)=o(rlogn),\sum_{j=0}^{r}c(v_{j})=\tilde{O}\bigg{(}r^{3}\bigg{(}\frac{(\log n)^{1/2-\epsilon}}{r^{1+\epsilon^{\prime}}}\bigg{)}^{2}\bigg{)}=\tilde{O}(r^{1-2\epsilon^{\prime}}(\log n)^{1-2\epsilon})=o(r\log n),

which contradicts Theorem 51. ∎

For entangled proofs, we can have another lower bound.

Lemma 53.

Let ν\nu\in\mathbb{N} be a constant and ff be a function which has a 11-fooling set of size at least 22. Let 𝒫\mathcal{P} be a ν\nu-round 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for ff on the path of length rr with a proof of size satisfying j=iν+1i+νc(vj)=0\sum_{j=i-\nu+1}^{i+\nu}c(v_{j})=0 for i[ν,rν1]i\in[\nu,r-\nu-1], and completeness 1p1-p. Then, 𝒫\mathcal{P} has soundness error at least 12p1-2p.

Proof.

For conciseness, we prove the case that 𝒫\mathcal{P} is a 1-round communication protocol (we can easily modify the following proof to the ν\nu-round case).

Let (x,y)(x,y) and (x,y)(x^{\prime},y^{\prime}) be in the 1-fooling set for ff, i.e., f(x,y)=1,f(x,y)=1f(x,y)=1,f(x^{\prime},y^{\prime})=1 and f(x,y)=0f(x,y^{\prime})=0 without loss of generality. Let |ψ\ket{\psi} be a proof with the input (x,y)(x,y) for all the nodes v0,,vrv_{0},\ldots,v_{r} and let |ψ\ket{\psi^{\prime}} be a proof with the input (x,y)(x^{\prime},y^{\prime}) for all the nodes v0,,vrv_{0},\ldots,v_{r}.

From the assumption of the completeness, we have

Pr[j:ji𝗈𝗎𝗍j(x,y,|ψLR)=1j:ji+1𝗈𝗎𝗍j(x,y,|ψLR)=1]1p,\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y,\ket{\psi}_{LR})=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x,y,\ket{\psi}_{LR})=1\big{]}\geq 1-p,
Pr[j:ji𝗈𝗎𝗍j(x,y,|ψLR)=1j:ji+1𝗈𝗎𝗍j(x,y,|ψLR)=1]1p.\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x^{\prime},y^{\prime},\ket{\psi^{\prime}}_{LR})=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x^{\prime},y^{\prime},\ket{\psi^{\prime}}_{LR})=1\big{]}\geq 1-p.

From Fact 2, |ψLR=jpj|ψjL|ϕjR\ket{\psi}_{LR}=\sum_{j}\sqrt{p_{j}}\ket{\psi_{j}}_{L}\ket{\phi_{j}}_{R} and |ψLR=jpj|ψjL|ϕjR\ket{\psi^{\prime}}_{LR}=\sum_{j}\sqrt{p_{j}^{\prime}}\ket{\psi^{\prime}_{j}}_{L}\ket{\phi^{\prime}_{j}}_{R}. Let ρ=trR|ψψ|LR=jpj|ψjψj|\rho=\mathrm{tr}_{R}\ket{\psi}\bra{\psi}_{LR}=\sum_{j}p_{j}\ket{\psi_{j}}\bra{\psi_{j}}, σ=trL|ψψ|LR=jpj|ϕjϕj|\sigma=\mathrm{tr}_{L}\ket{\psi}\bra{\psi}_{LR}=\sum_{j}p_{j}\ket{\phi_{j}}\bra{\phi_{j}}, ρ=trR|ψψ|LR=jpj|ψjψj|\rho^{\prime}=\mathrm{tr}_{R}\ket{\psi^{\prime}}\bra{\psi^{\prime}}_{LR}=\sum_{j}p_{j}^{\prime}\ket{\psi^{\prime}_{j}}\bra{\psi^{\prime}_{j}} and σ=trL|ψψ|LR=jpj|ϕjϕj|\sigma^{\prime}=\mathrm{tr}_{L}\ket{\psi^{\prime}}\bra{\psi^{\prime}}_{LR}=\sum_{j}p_{j}^{\prime}\ket{\phi^{\prime}_{j}}\bra{\phi^{\prime}_{j}}. Let us consider the case where the input are distinct xx and yy^{\prime} and the proof ρσ\rho\otimes\sigma^{\prime}. Since j=ii+1c(vj)=0\sum_{j=i}^{i+1}c(v_{j})=0 and the protocol 𝒫\mathcal{P} has only 1-round communication,

Pr[j:ji𝗈𝗎𝗍j(x,y,|ψLR)=1]=Pr[j:ji𝗈𝗎𝗍j(x,y,ρσ)=1]=Pr[j:ji𝗈𝗎𝗍j(x,y,ρσ)=1]\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y,\ket{\psi}_{LR})=1\big{]}=\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y,\rho\otimes\sigma)=1\big{]}=\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y^{\prime},\rho\otimes\sigma^{\prime})=1\big{]}
Pr[j:ji+1𝗈𝗎𝗍j(x,y,|ψLR)=1]=Pr[j:ji+1𝗈𝗎𝗍j(x,y,ρσ)=1]=Pr[j:ji+1𝗈𝗎𝗍j(x,y,ρσ)=1]\Pr\big{[}\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x^{\prime},y^{\prime},\ket{\psi^{\prime}}_{LR})=1\big{]}=\Pr\big{[}\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x^{\prime},y^{\prime},\rho^{\prime}\otimes\sigma^{\prime})=1\big{]}=\Pr\big{[}\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x,y^{\prime},\rho\otimes\sigma^{\prime})=1\big{]}

Therefore, we have

Pr[j:ji𝗈𝗎𝗍j(x,y,ρσ)=1j:ji+1𝗈𝗎𝗍j(x,y,ρσ)=1]\displaystyle\Pr\big{[}\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y^{\prime},\rho\otimes\sigma^{\prime})=1\wedge\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x,y^{\prime},\rho\otimes\sigma^{\prime})=1\big{]}
\displaystyle\geq 1Pr[¬j:ji𝗈𝗎𝗍j(x,y,ρσ)=1]Pr[¬j:ji+1𝗈𝗎𝗍j(x,y,ρσ)=1]\displaystyle 1-\Pr\big{[}\lnot\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y^{\prime},\rho\otimes\sigma^{\prime})=1\big{]}-\Pr\big{[}\lnot\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x,y^{\prime},\rho\otimes\sigma^{\prime})=1\big{]}
=\displaystyle= 1Pr[¬j:ji𝗈𝗎𝗍j(x,y,|ψ)=1]Pr[¬j:ji+1𝗈𝗎𝗍j(x,y,|ψ)=1]\displaystyle 1-\Pr\big{[}\lnot\bigwedge_{j:j\leq i}\mathsf{out}_{j}(x,y,\ket{\psi})=1\big{]}-\Pr\big{[}\lnot\bigwedge_{j:j\geq i+1}\mathsf{out}_{j}(x^{\prime},y^{\prime},\ket{\psi^{\prime}})=1\big{]}
\displaystyle\geq 12p,\displaystyle 1-2p,

as claimed. ∎

Proposition 54.

Let ff be a function which has a 11-fooling set of size at least 22. Let 𝒫\mathcal{P} be a ν\nu-round 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for ff on the path of length rr with a proof of size satisfying j=0rc(vj)r12ν1\sum_{j=0}^{r}c(v_{j})\leq\lfloor\frac{r-1}{2\nu}\rfloor-1, and completeness 1p1-p. Then, 𝒫\mathcal{P} has soundness error at least 12p1-2p.

Proof.

From the pigeonhole principle, if j=ii+1cjr12ν1\sum_{j=i}^{i+1}c_{j}\leq\lfloor\frac{r-1}{2\nu}\rfloor-1, there exists i[1,r2]i\in[1,r-2] such that j=ii+1c(vj)=0\sum_{j=i}^{i+1}c(v_{j})=0. Then, from Lemma 53, we have the claim. ∎

Corollary 55.

Let f+:({0,1}n)2{0,1}f^{+}:(\{0,1\}^{n})^{2}\rightarrow\{0,1\} be any non-constant Boolean function. Let 𝒫\mathcal{P} be a constant-round 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for f+f^{+} on the path of length rr with completeness 1p1-p and soundness error at least 12p1-2p. Then 𝒫\mathcal{P} satisfies j=0rc(vj)=Ω(r)\sum_{j=0}^{r}c(v_{j})=\Omega(r).

Combining the two lower bounds on entangled proofs, we have a lower bound below.

Theorem 56.

Let f:({0,1}n)2{0,1}f:(\{0,1\}^{n})^{2}\rightarrow\{0,1\} be a Boolean function with a 11-fooling set of size 2n2^{n} (including 𝖤𝖰\mathsf{EQ} and 𝖦𝖳\mathsf{GT}). Let 𝒫\mathcal{P} be a constant-round 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol for ff on the path of length rr with completeness 34\frac{3}{4} and soundness 14\frac{1}{4}. Then, 𝒫\mathcal{P} satisfies j=0rc(vj)+minj[0,r1]m(vj,vj+1)=Ω((logn)1/4ϵ)\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})=\Omega((\log n)^{1/4-\epsilon}) for any constant ϵ>0\epsilon>0.

Proof.

From Theorem 52 and Corollary 55, j=0rc(vj)+minj[0,r1]m(vj,vj+1)j=0rc(vj)=Ω(r)\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})\geq\sum_{j=0}^{r}c(v_{j})=\Omega(r) and j=0rc(vj)+minj[0,r1]m(vj,vj+1)=Ω((logn)1/2ϵr1+ϵ)\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})=\Omega(\frac{(\log n)^{1/2-\epsilon}}{r^{1+\epsilon^{\prime}}}) for any constants ϵ,ϵ>0\epsilon,\epsilon^{\prime}>0. Since for any constant ϵ′′>0\epsilon^{\prime\prime}>0, there exist ϵ,ϵ>0\epsilon,\epsilon^{\prime}>0 such that max{r,(logn)1/2ϵr1+ϵ}(logn)1/4ϵ′′\max\{r,\frac{(\log n)^{1/2-\epsilon}}{r^{1+\epsilon^{\prime}}}\}\geq(\log n)^{1/4-\epsilon^{\prime\prime}} for any rr, we have j=0rc(vj)+minj[0,r1]m(vj,vj+1)=Ω((logn)1/4ϵ′′)\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})=\Omega((\log n)^{1/4-\epsilon^{\prime\prime}}) for any constant ϵ′′>0\epsilon^{\prime\prime}>0. ∎

8.2 By a reduction to lower bounds of 𝖰𝖬𝖠\mathsf{QMA} communication protocols

In this subsection, we prove lower bounds of 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocols by a reduction to a lower bound of the two nodes case.

Klauck [Kla11] derived lower bounds on 𝖰𝖬𝖠\mathsf{QMA} communication protocols for some predicates. To prove the lower bounds, he first observed the proof efficient error reduction for 𝖰𝖬𝖠\mathsf{QMA} [MW05] works for the 𝖰𝖬𝖠\mathsf{QMA} communication protocols as well. Then, after the error reduction, he considered to replace a proof with a maximally entangled state (which can be generated by Alice) and have an unbounded error communication protocol. Klauck finally derived a quantum communication lower bound for such the unbounded-error communication protocol exploiting the one-sided smooth discrepancy [Kla11].

Let us denote by 𝗌𝖽𝗂𝗌𝖼1(f)\mathsf{sdisc}^{1}(f) the one-sided smooth discrepancy of a function ff and see Definition 8 and 9 in [Kla11] for the definition of the one-sided smooth discrepancy.

Lemma 57 (Theorem 2 in [Kla11]).

𝖰𝖬𝖠𝖼𝖼(f)=Ω(log𝗌𝖽𝗂𝗌𝖼1(f))\mathsf{QMAcc}(f)=\Omega\bigg{(}\sqrt{\log\mathsf{sdisc}^{1}(f)}\bigg{)}.

Definition 17 (Disjointness).

The disjoint function 𝖣𝖨𝖲𝖩\mathsf{DISJ} receives two nn-bit strings xx and yy as inputs. 𝖣𝖨𝖲𝖩(x,y):=i=1,,n(¬xi¬yi)\mathsf{DISJ}(x,y):=\bigwedge_{i=1,\ldots,n}(\lnot x_{i}\lor\lnot y_{i}).

Corollary 58 (Theorem 1 in [Kla11]).

𝖰𝖬𝖠𝖼𝖼(𝖣𝖨𝖲𝖩)=Ω(n13)\mathsf{QMAcc}(\mathsf{DISJ})=\Omega(n^{\frac{1}{3}}).

Definition 18.

The inner product function receives two nn-bit strings xx and yy as inputs. 𝖨𝖯2(x,y)=i=1,,n(xiyi)\mathsf{IP}_{2}(x,y)=\bigoplus_{i=1,\ldots,n}(x_{i}\land y_{i}).

Lemma 59 (Corollary 1 in [Kla11]).

𝖰𝖬𝖠𝖼𝖼(𝖨𝖯2)=Ω(n12)\mathsf{QMAcc}(\mathsf{IP}_{2})=\Omega(n^{\frac{1}{2}}).

Sherstov [She11] introduced the pattern matrices, which is a method to convert a Boolean function into a hard communication problem.

Definition 19 (Pattern Matrices, Definition 5 in [Kla11]).

For a function f:{0,1}n{0,1}f:\{0,1\}^{n}\to\{0,1\}, the pattern matrix PfP_{f} is the communication matrix of the following problem: Alice receives a bit string xx of length 2n2n, Bob receives two bit strings yy, zz of length nn each. The output of the function described by PfP_{f} on inputs x,y,zx,y,z is f(x(y)z)f(x(y)\oplus z), where \oplus is the bitwise xor, and x(y)x(y) denotes the nn bit string that contains x2iyix_{2i-y_{i}} in position i=1,,ni=1,\ldots,n.

𝖠𝖭𝖣\mathsf{AND} function is defined by 𝖠𝖭𝖣(x1,,xn)=x1xn\mathsf{AND}(x_{1},\ldots,x_{n})=x_{1}\land\cdots\land x_{n}.

Lemma 60 (Corollary 2 in [Kla11]).

𝖰𝖬𝖠𝖼𝖼(P𝖠𝖭𝖣)=Ω(n13)\mathsf{QMAcc}(P_{\mathsf{AND}})=\Omega(n^{\frac{1}{3}}).

We observe that the result and proof strategy of [Kla11] still hold for 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocols. One reason is that a maximally mixed state over Alice and Bob is a separable state between Alice and Bob and it can be produced by Alice and Bob with no communication. Another reason is the proof-efficient error reduction of the 𝖰𝖬𝖠\mathsf{QMA} communication protocols from [MW05] also holds for the 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocols. Moreover, the rest of the proof is the same for such an unbounded-error communication protocol, obtaining a quantum lower bound.

Fact 6.

Assume that there exists a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol with proof length γ1\gamma_{1} and γ2\gamma_{2} and communication length μ\mu with bounded error. Then, there exists a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol with proof length γ1\gamma_{1} and γ2\gamma_{2} and communication length O(μk)O(\mu\cdot k) and error 12k\frac{1}{2^{k}}.

Claim 61.

𝖰𝖬𝖠𝖼𝖼(f)=Ω(log𝗌𝖽𝗂𝗌𝖼1(f))\mathsf{QMAcc}^{*}(f)=\Omega\bigg{(}\sqrt{\log\mathsf{sdisc}^{1}(f)}\bigg{)}.

Corollary 62.

𝖰𝖬𝖠𝖼𝖼(𝖣𝖨𝖲𝖩)=Ω(n13)\mathsf{QMAcc}^{*}(\mathsf{DISJ})=\Omega(n^{\frac{1}{3}}), 𝖰𝖬𝖠𝖼𝖼(𝖨𝖯2)=Ω(n12)\mathsf{QMAcc}^{*}(\mathsf{IP}_{2})=\Omega(n^{\frac{1}{2}}), 𝖰𝖬𝖠𝖼𝖼(P𝖠𝖭𝖣)=Ω(n13)\mathsf{QMAcc}^{*}(P_{\mathsf{AND}})=\Omega(n^{\frac{1}{3}}).

Then, we obtain a lower bound of 𝖽𝖰𝖬𝖠\mathsf{dQMA} by a reduction to the lower bound of Claim 61.

Theorem 63.

Assume that 𝒫\mathcal{P} is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on the path of length rr with arbitrary rounds to solve ff with completeness 23\frac{2}{3} and soundness 13\frac{1}{3}. Then, 𝒫\mathcal{P} satisfies j=0rc(vj)+minj[0,r1]m(vj,vj+1)=Ω(log𝗌𝖽𝗂𝗌𝖼1(f))\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})=\Omega(\sqrt{\log\mathsf{sdisc}^{1}(f)}).

Proof.

Let us consider reductions from a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol to a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol in (slightly) different ways depending on how we split all the nodes into two groups. Let us name each reduction an ii-th reduction when we consider that v0,,viv_{0},\ldots,v_{i} is one set of nodes and vi+1,,vrv_{i+1},\ldots,v_{r} is the other set for i{0,,r1}i\in\{0,\ldots,r-1\} and the reductions can be described as Algorithm 11. The 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol after the reductions has completeness 23\frac{2}{3} and soundness 13\frac{1}{3} and its complexity is j=0rc(vj)+m(vi,vi+1)\sum_{j=0}^{r}c(v_{j})+m(v_{i},v_{i+1}). The complexity must be Ω(log𝗌𝖽𝗂𝗌𝖼1(f))\Omega\bigg{(}\sqrt{\log\mathsf{sdisc}^{1}(f)}\bigg{)} for all ii from Claim 61, which implies the claim.

Algorithm 11 ii-th reduction from a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol to a 𝖰𝖬𝖠\mathsf{QMA}^{*} communication protocol
1:Alice receives a (j=0ic(vj))\biggl{(}\sum_{j=0}^{i}c(v_{j})\biggr{)}-qubit state and Bob receives a (j=i+1rc(vj))\biggl{(}\sum_{j=i+1}^{r}c(v_{j})\biggr{)}-qubit state from a prover (Merlin).
2:Alice simulates the computation and communication of the nodes v0,,viv_{0},\ldots,v_{i} communicating with Bob by m(vi,vi+1)m(v_{i},v_{i+1}) qubits. Bob simulates the computation and communication of the nodes vi+1,,vrv_{i+1},\ldots,v_{r} communicating with Alice by m(vi,vi+1)m(v_{i},v_{i+1}).
3:Alice accepts if and only if all the nodes v0,,viv_{0},\ldots,v_{i} accept. Bob accepts if and only if all the nodes vi+1,,vrv_{i+1},\ldots,v_{r} accept.

For concrete functions, we have lower bounds from Theorem 63.

Corollary 64.

Assume that 𝒫\mathcal{P} is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on the path of length rr with arbitrary rounds to solve 𝖣𝖨𝖲𝖩\mathsf{DISJ} with completeness 23\frac{2}{3} and soundness 13\frac{1}{3}. Then, 𝒫\mathcal{P} satisfies j=0rc(vj)+minj[0,r1]m(vj,vj+1)=Ω(n13)\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})=\Omega(n^{\frac{1}{3}}).

Corollary 65.

Assume that 𝒫\mathcal{P} is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on the path of length rr with arbitrary rounds to solve 𝖨𝖯2\mathsf{IP}_{2} with completeness 23\frac{2}{3} and soundness 13\frac{1}{3}. Then, 𝒫\mathcal{P} satisfies j=0rc(vj)+minj[0,r1]m(vj,vj+1)=Ω(n12)\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})=\Omega(n^{\frac{1}{2}}).

Corollary 66.

Assume that 𝒫\mathcal{P} is a 𝖽𝖰𝖬𝖠\mathsf{dQMA} protocol on the path of length rr with arbitrary rounds to solve P𝖠𝖭𝖣P_{\mathsf{AND}} with completeness 23\frac{2}{3} and soundness 13\frac{1}{3}. Then, 𝒫\mathcal{P} satisfies j=0rc(vj)+minj[0,r1]m(vj,vj+1)=Ω(n13)\sum_{j=0}^{r}c(v_{j})+\min_{j\in[0,r-1]}m(v_{j},v_{j+1})=\Omega(n^{\frac{1}{3}}).

Acknowledgements

Part of the work was done while AH was visiting Nagoya University and the Institute for Quantum Computing, University of Waterloo, and AH is grateful to their hospitality. AH would like to thank Richard Cleve, François Le Gall, Masayuki Miyamoto, Yuki Takeuchi, Seiichiro Tani and Eyuri Wakakuwa for helpful discussions.

AH is supported by JSPS KAKENHI grants Nos. JP22J22563 and NICT Quantum Camp 2023. SK is funded by the Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grants Program and Fujitsu Labs America. Research at the Institute for Quantum Computing (IQC) is supported by Innovation, Science and Economic Development (ISED) Canada. HN is supported by the JSPS KAKENHI grants JP19H04066, JP20H05966, JP21H04879, JP22H00522 and by the MEXT Q-LEAP grants JPMXS0120319794.

References

  • [Aar16] Scott Aaronson. The complexity of quantum states and transformations: from quantum money to black holes. arXiv preprint arXiv:1607.05256, 2016.
  • [AF14] Heger Arfaoui and Pierre Fraigniaud. What can be computed without communications? ACM SIGACT News, 45(3):82–104, 2014.
  • [AKN98] Dorit Aharonov, Alexei Kitaev, and Noam Nisan. Quantum circuits with mixed states. In Proceedings of the 30th annual ACM symposium on Theory of computing (STOC 1998), pages 20–30, 1998.
  • [AN02] Dorit Aharonov and Tomer Naveh. Quantum NP - A Survey. arXiv preprint quant-ph/0210077, 2002.
  • [BBD+97] Adriano Barenco, André Berthiaume, David Deutsch, Artur Ekert, Richard Jozsa, and Chiara Macchiavello. Stabilization of quantum computations by symmetrization. SIAM Journal on Computing, 26(5):1541–1557, 1997.
  • [BC08] Hans-Jurgen Bandelt and Victor Chepoi. Metric graph theory and geometry: a survey. Contemporary Mathematics, 453:49–86, 2008.
  • [BCH06] Dave Bacon, Isaac L. Chuang, and Aram W. Harrow. Efficient Quantum Circuits for Schur and Clebsch-Gordan Transforms. Phys. Rev. Lett., 97:170502, 2006.
  • [BCMdW10] Harry Buhrman, Richard Cleve, Serge Massar, and Ronald de Wolf. Nonlocality and communication complexity. Reviews of Modern Physics, 82(1):665, 2010.
  • [BCWdW01] Harry Buhrman, Richard Cleve, John Watrous, and Ronald de Wolf. Quantum fingerprinting. Phys. Rev. Lett., 87:167902, 2001.
  • [BdW01] Harry Buhrman and Ronald de Wolf. Communication complexity lower bounds by polynomials. In Proceedings 16th Annual IEEE Conference on Computational Complexity (CCC 2001), pages 120–130, 2001.
  • [BOH05] Michael Ben-Or and Avinatan Hassidim. Fast quantum byzantine agreement. In Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (STOC 2005), pages 481–485, 2005.
  • [BT08] Anne Broadbent and Alain Tapp. Can quantum mechanics help distributed computing? ACM SIGACT News, 39(3):67–76, 2008.
  • [Che88] Victor Chepoi. Isometric subgraphs of hamming graphs and d-convexity. Cybernetics, 24(1):6–11, 1988.
  • [Che17] Victor Chepoi. Distance-preserving subgraphs of johnson graphs. Combinatorica, 37(6):1039–1055, 2017.
  • [CHFG+22] Keren Censor-Hillel, Orr Fischer, François Le Gall, Dean Leitersdorf, and Rotem Oshman. Quantum Distributed Algorithms for Detection of Cliques. In Proceedings of 13th Innovations in Theoretical Computer Science Conference (ITCS 2022), volume 215 of LIPIcs, pages 35:1–35:25, 2022.
  • [Chr06] Matthias Christandl. The Structure of Bipartite Quantum States - Insights from Group Theory and Cryptography. PhD thesis, University of Cambridge, 2006.
  • [CHTW04] Richard Cleve, Peter Hoyer, Benjamin Toner, and John Watrous. Consequences and limits of nonlocal strategies. In Proceedings. 19th IEEE Annual Conference on Computational Complexity (CCC 2004), pages 236–249, 2004.
  • [CHW07] Andrew M. Childs, Aram W. Harrow, and Paweł Wocjan. Weak fourier-schur sampling, the hidden subgroup problem, and the quantum collision problem. In Proceedings of 24th Symposium on Theoretical Aspects of Computer Science (STACS 2007), pages 598–609, 2007.
  • [CRdG+23] Xavier Coiteux-Roy, Francesco d’Amore, Rishikesh Gajjala, Fabian Kuhn, François Le Gall, Henrik Lievonen, Augusto Modanese, Marc-Olivier Renou, Gustav Schmid, and Jukka Suomela. No distributed quantum advantage for approximate graph coloring. arXiv preprint arXiv:2307.09444, 2023.
  • [DL97] Michel Marie Deza and Monique Laurent. Geometry of cuts and metrics, volume 15 of Algorithms and combinatorics. Springer, 1997.
  • [DM18] João F Doriguello and Ashley Montanaro. Quantum sketching protocols for hamming distance and beyond. arXiv preprint arXiv:1810.12808, 2018.
  • [DP08] Vasil S Denchev and Gopal Pandurangan. Distributed quantum computing: A new frontier in distributed systems or science fiction? ACM SIGACT News, 39(3):77–95, 2008.
  • [dW01] Ronald de Wolf. Quantum Computing and Communication Complexity. PhD thesis, University of Amsterdam, 2001.
  • [dW02] Ronald de Wolf. Quantum communication and complexity. Theoretical computer science, 287(1):337–353, 2002.
  • [dW19] Ronald de Wolf. Quantum computing: Lecture notes. arXiv preprint arXiv:1907.09415, 2019.
  • [EKNP14] Michael Elkin, Hartmut Klauck, Danupon Nanongkai, and Gopal Pandurangan. Can quantum communication speed up distributed computation? In Proceedings of the 2014 ACM symposium on Principles of distributed computing (PODC 2014), pages 166–175, 2014.
  • [FGNP21] Pierre Fraigniaud, François Le Gall, Harumichi Nishimura, and Ami Paz. Distributed Quantum Proofs for Replicated Data. In Proceedings of 12th Innovations in Theoretical Computer Science Conference (ITCS 2021), volume 185 of LIPIcs, pages 28:1–28:20, 2021.
  • [FPSP19] Pierre Fraigniaud, Boaz Patt-Shamir, and Mor Perry. Randomized proof-labeling schemes. Distributed Computing, 32:217–234, 2019.
  • [Fra10] Pierre Fraigniaud. Distributed computational complexities: are you volvo-addicted or nascar-obsessed? In Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing (PODC 2010), pages 171–172, 2010.
  • [FvdG99] Christopher A Fuchs and Jeroen van de Graaf. Cryptographic distinguishability measures for quantum-mechanical states. IEEE Transactions on Information Theory, 45(4):1216–1227, 1999.
  • [Gha24] Sevag Gharibian. Guest column: The 7 faces of quantum NP. ACM SIGACT News, 54(4):54–91, 2024.
  • [GKdW04] Dmytro Gavinsky, Julia Kempe, and Ronald de Wolf. Quantum communication cannot simulate a public coin. arXiv preprint quant-ph/0411051, 2004.
  • [GKdW06] Dmitry Gavinsky, Julia Kempe, and Ronald de Wolf. Strengths and weaknesses of quantum fingerprinting. In Proceedings of 21st Annual IEEE Conference on Computational Complexity (CCC 2006), pages 288–295, 2006.
  • [GKM09] Cyril Gavoille, Adrian Kosowski, and Marcin Markiewicz. What can be observed locally? round-based models for quantum distributed computing. In Proceedings of International Symposium on Distributed Computing (DISC 2009), pages 243–257, 2009.
  • [GM18] François Le Gall and Frédéric Magniez. Sublinear-time quantum computation of the diameter in CONGEST networks. In Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing (PODC 2018), pages 337–346, 2018.
  • [GMN23a] François Le Gall, Masayuki Miyamoto, and Harumichi Nishimura. Distributed Merlin-Arthur Synthesis of Quantum States and Its Applications. In Proceedings of 48th International Symposium on Mathematical Foundations of Computer Science (MFCS 2023), volume 272 of LIPIcs, pages 63:1–63:15, 2023.
  • [GMN23b] François Le Gall, Masayuki Miyamoto, and Harumichi Nishimura. Distributed Quantum Interactive Proofs. In Proceedings of 40th International Symposium on Theoretical Aspects of Computer Science (STACS 2023), volume 254 of LIPIcs, pages 42:1–42:21, 2023.
  • [GNR19] François Le Gall, Harumichi Nishimura, and Ansis Rosmanis. Quantum Advantage for the LOCAL Model in Distributed Computing. In 36th International Symposium on Theoretical Aspects of Computer Science (STACS 2019), volume 126 of LIPIcs, pages 49:1–49:14, 2019.
  • [GR22] François Le Gall and Ansis Rosmanis. Non-trivial lower bound for 3-coloring the ring in the quantum LOCAL model. arXiv preprint arXiv:2212.02768, 2022.
  • [GS16] Mika Göös and Jukka Suomela. Locally checkable proofs in distributed computing. Theory of Computing, 12(19):1–33, 2016.
  • [Har05] Aram W. Harrow. Applications of coherent classical communication and the Schur transform to quantum information theory. PhD thesis, Massachusetts Institute of Technology, 2005.
  • [IG19] Taisuke Izumi and François Le Gall. Quantum distributed algorithm for the all-pairs shortest path problem in the CONGEST-CLIQUE model. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing (PODC 2019), pages 84–93, 2019.
  • [IGM20] Taisuke Izumi, François Le Gall, and Frédéric Magniez. Quantum Distributed Algorithm for Triangle Finding in the CONGEST Model. In 37th International Symposium on Theoretical Aspects of Computer Science (STACS 2020), volume 154 of LIPIcs, pages 23:1–23:13, 2020.
  • [IV12] Tsuyoshi Ito and Thomas Vidick. A multi-prover interactive proof for NEXP sound against entangled provers. In 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science (FOCS 2012), pages 243–252, 2012.
  • [JL84] William B Johnson and Joram Lindenstrauss. Extensions of lipschitz mappings into a hilbert space. In Conference on Modern Analysis and Probability, volume 26, pages 189–206. American Mathematical Society, 1984.
  • [JNV+21] Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, and Henry Yuen. MIP*= RE. Communications of the ACM, 64(11):131–138, 2021.
  • [KKP10] Amos Korman, Shay Kutten, and David Peleg. Proof labeling schemes. Distributed Computing, 22(4):215–233, 2010.
  • [Kla11] Hartmut Klauck. On Arthur Merlin games in communication complexity. In Proceedings of 26th Annual IEEE Conference on Computational Complexity (CCC 2011), pages 189–199, 2011.
  • [KN96] Eyal Kushilevitz and Noam Nisan. Communication Complexity. Cambridge University Press, 1996.
  • [KNY08] Masaru Kada, Harumichi Nishimura, and Tomoyuki Yamakami. The efficiency of quantum identity testing of multiple states. Journal of Physics A: Mathematical and Theoretical, 41(39):395309, 2008.
  • [KOS18] Gillat Kol, Rotem Oshman, and Raghuvansh R Saxena. Interactive distributed proofs. In Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing (PODC 2018), pages 255–264, 2018.
  • [KP14] Hartmut Klauck and Supartha Podder. Two results about quantum messages. In International Symposium on Mathematical Foundations of Computer Science (MFCS 2014), pages 445–456. Springer, 2014.
  • [KSV02] Alexei Yu Kitaev, Alexander Shen, and Mikhail N Vyalyi. Classical and quantum computation. Number 47. American Mathematical Soc., 2002.
  • [LZ13] Yang Liu and Shengyu Zhang. Quantum and randomized communication complexity of XOR functions in the SMP model. Electronic Colloquium on Computational Complexity (ECCC), TR13-010, 2013.
  • [McK13] Matthew McKague. On the power quantum computation over real Hilbert spaces. International Journal of Quantum Information, 11(01):1350001, 2013.
  • [MdW16] Ashley Montanaro and Ronald de Wolf. A Survey of Quantum Property Testing. Number 7 in Graduate Surveys. Theory of Computing Library, 2016.
  • [MN22] Frédéric Magniez and Ashwin Nayak. Quantum distributed complexity of set disjointness on a line. ACM Transactions on Computation Theory (TOCT), 14(1):1–22, 2022.
  • [MW05] Chris Marriott and John Watrous. Quantum Arthur–Merlin games. computational complexity, 14:122–152, 2005.
  • [NC10] Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, 2010.
  • [NPY20] Moni Naor, Merav Parter, and Eylon Yogev. The power of distributed verifiers in interactive proofs. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2020), pages 1096–1115, 2020.
  • [NW19] Anand Natarajan and John Wright. NEEXP is contained in MIP*. In 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS 2019), pages 510–518, 2019.
  • [Pel00] David Peleg. Distributed computing: a locality-sensitive approach. SIAM, 2000.
  • [Ros08] Bill Rosgen. Distinguishing Short Quantum Computations. In 25th International Symposium on Theoretical Aspects of Computer Science (STACS 2008), volume 1 of LIPIcs, pages 597–608, 2008.
  • [RS04] Ran Raz and Amir Shpilka. On the power of quantum proofs. In Proceedings 19th Annual IEEE Conference on Computational Complexity (CCC 2004), pages 260–274, 2004. Full version is availabie from the following URL: https://www.cs.tau.ac.il/~shpilka/publications/RazShpilka_QMA.pdf. Last visited on 2024/01/03.
  • [RY20] Anup Rao and Amir Yehudayoff. Communication Complexity: and Applications. Cambridge University Press, 2020.
  • [Sco06] Andrew J Scott. Tight informationally complete quantum measurements. Journal of Physics A: Mathematical and General, 39(43):13507, 2006.
  • [She11] Alexander A Sherstov. The pattern matrix method. SIAM Journal on Computing, 40(6):1969–2000, 2011.
  • [Shp93] Sergey V Shpectorov. On scale embeddings of graphs into hypercubes. European Journal of Combinatorics, 14(2):117–130, 1993.
  • [TKM12] Seiichiro Tani, Hirotada Kobayashi, and Keiji Matsumoto. Exact quantum algorithms for the leader election problem. ACM Transactions on Computation Theory (TOCT), 4(1):1–24, 2012.
  • [Uhl76] Armin Uhlmann. The “transition probability” in the state space of a *-algebra. Reports on Mathematical Physics, 9(2):273–279, 1976.
  • [vAdV22] Joran van Apeldoorn and Tijn de Vos. A framework for distributed quantum queries in the congest model. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing (PODC 2022), pages 109–119, 2022.
  • [Wat18] John Watrous. The Theory of Quantum Information. Cambridge University Press, 2018.
  • [WY22] Xudong Wu and Penghui Yao. Quantum complexity of weighted diameter and radius in congest networks. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing (PODC 2022), pages 120–130, 2022.
  • [Yao03] Andrew Chi-Chih Yao. On the power of quantum fingerprinting. In Proceedings of the 34th annual ACM symposium on Theory of computing (STOC 2003), pages 77–81, 2003.
  • [Zha11] Shengyu Zhang. On the power of lower bound methods for one-way quantum communication complexity. In International Colloquium on Automata, Languages, and Programming (ICALP 2011), pages 49–60, 2011.