This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Quantum Merlin-Arthur and proofs without relative phase

Roozbeh Bassirian roozbeh@uchicago.edu University of Chicago Bill Fefferman wjf@uchicago.edu University of Chicago Kunal Marwaha kmarw@uchicago.edu University of Chicago
Abstract

We study a variant of 𝖰𝖬𝖠{\mathsf{QMA}} where quantum proofs have no relative phase (i.e. non-negative amplitudes, up to a global phase). If only completeness is modified, this class is equal to 𝖰𝖬𝖠{\mathsf{QMA}}Β [GKS14]; but if both completeness and soundness are modified, the class (named 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} by Jeronimo and WuΒ [JW23]) can be much more powerful. We show that 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} with some constant gap is equal to 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}, yet 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} with some other constant gap is equal to 𝖰𝖬𝖠{\mathsf{QMA}}. One interpretation is that Merlin’s ability to β€œdeceive” originates from relative phase at least as much as from entanglement, since 𝖰𝖬𝖠​(2)βŠ†π–­π–€π–·π–―{\mathsf{QMA}}(2)\subseteq{\mathsf{NEXP}}.

1 Introduction

The strangeness of quantum states has at least two fundamental sources: entanglement, the source of β€œspooky action at a distance”; and relative phase, which allows for destructive interference. We use complexity theory to probe these sources of strangeness. Extending the main result of [JW23], we find that 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} (𝖰𝖬𝖠{\mathsf{QMA}} where quantum proofs have no relative phase) is as powerful as 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}.

A 𝖰𝖬𝖠c,s{\mathsf{QMA}}_{c,s} protocol is a verification task for a quantum computer (termed β€œArthur”) when interacting with a dishonest but all-powerful machine (termed β€œMerlin”). If the statement is true (β€œcompleteness”), Merlin sends a quantum state (β€œproof”) that truthfully convinces Arthur. If the statement is false (β€œsoundness”), Merlin will send any quantum state possible to deceive Arthur. A valid protocol distinguishes these cases, succeeding with probability at least cc in completeness and at most s<cs<c in soundness. Canonically, 𝖰𝖬𝖠{\mathsf{QMA}} is the class of all valid 𝖰𝖬𝖠2/3,1/3{\mathsf{QMA}}_{2/3,1/3} protocols.

One could potentially reduce the power of 𝖰𝖬𝖠{\mathsf{QMA}} by restricting Merlin’s proof in completeness. Surprisingly, many restrictions of this type do not reduce the power of the class. For example, this is true even if the quantum state is a subset state (with no relative phase nor relative non-zero amplitude) [GKS14]. The reason behind this is promise gap amplification: there exist techniques to increase the gap cβˆ’sc-s to 1βˆ’2βˆ’p​(n)1-2^{-p(n)} for any polynomial p​(n)p(n). As a result, a subset state with polynomially small overlap with the best completeness proof succeeds. This argument generalizes to any set of states that form an Ο΅n\epsilon_{n}-covering of all nn-qubit quantum states, where Ο΅n\epsilon_{n} is at least inverse polynomial in nn.

By contrast, restricting Merlin’s proof in soundness seems to increase the power of this complexity class, since this reduces Merlin’s ability to β€œdeceive”. For example, if Merlin must send a quantum proof without relative phase, Arthur can ask about its sparsity (β„“1\ell_{1} norm). When a state has no relative phase, a low overlap with |+βŸ©βŠ—n\ket{+}^{\otimes n} actually implies it is sparse, as opposed to a state with destructively interfering phases (i.e. any other Hadamard basis vector).

One popular variant of 𝖰𝖬𝖠{\mathsf{QMA}} restricts Merlin’s entanglement over a fixed barrier; it is named 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2) (as if there are two unentangled Merlins each sending a quantum proof [KMY03]). This complexity class may seem more powerful than 𝖰𝖬𝖠{\mathsf{QMA}}, but despite much studyΒ [BT10, ABD+08, CD10, Per12, HM13, GSS+18, SY22], little is known except the trivial bounds π–°π–¬π– βŠ†π–°π–¬π– β€‹(2)βŠ†π–­π–€π–·π–―{\mathsf{QMA}}\subseteq{\mathsf{QMA}}(2)\subseteq{\mathsf{NEXP}}.

What happens if one restricts both entanglement and relative phase? [JW23] define 𝖰𝖬𝖠c,s+{\mathsf{QMA}}^{+}_{c,s} and 𝖰𝖬𝖠+​(2)c,s{\mathsf{QMA}}^{+}(2)_{c,s}, where quantum proofs are required to have no relative phase (non-negative amplitudes, up to a global phase) in both cases.111As noted before, restricting the state in completeness may not change the complexity class, but restricting the state in soundness can make the class more powerful, since the latter limits Merlin’s adversarial strategies. Surprisingly, [JW23] show the existence of constants 1>c>s>01>c>s>0 such that 𝖰𝖬𝖠+​(2)c,s=𝖭𝖀𝖷𝖯{\mathsf{QMA}}^{+}(2)_{c,s}={\mathsf{NEXP}}, crucially including a protocol to estimate the sparsity of a quantum proof. This hints perhaps at a route to prove 𝖰𝖬𝖠​(2)=𝖭𝖀𝖷𝖯{\mathsf{QMA}}(2)={\mathsf{NEXP}}, since there are other constants 1>cβ€²>sβ€²>01>c^{\prime}>s^{\prime}>0 where 𝖰𝖬𝖠+​(2)cβ€²,sβ€²=𝖰𝖬𝖠​(2){\mathsf{QMA}}^{+}(2)_{c^{\prime},s^{\prime}}={\mathsf{QMA}}(2).222This is because every state has constant overlap with some state without relative phase. See alsoΒ PropositionΒ 29.

In this work, we show that restricting relative phase alone gives the power of 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}; i.e., there exist constants 1>c>s>01>c>s>0 where 𝖰𝖬𝖠c,s+=𝖭𝖀𝖷𝖯{\mathsf{QMA}}^{+}_{c,s}={\mathsf{NEXP}}. Note that assuming 𝖀𝖷𝖯≠𝖭𝖀𝖷𝖯{\mathsf{EXP}}\neq{\mathsf{NEXP}}, this implies 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} cannot be amplified, since as before, there are other constants 1>cβ€²>sβ€²>01>c^{\prime}>s^{\prime}>0 where 𝖰𝖬𝖠cβ€²,sβ€²+=π–°π–¬π– βŠ†π–€π–·π–―{\mathsf{QMA}}^{+}_{c^{\prime},s^{\prime}}={\mathsf{QMA}}\subseteq{\mathsf{EXP}}. As a result, techniques to prove 𝖰𝖬𝖠​(2)=𝖰𝖬𝖠+​(2)=𝖭𝖀𝖷𝖯{\mathsf{QMA}}(2)={\mathsf{QMA}}^{+}(2)={\mathsf{NEXP}} must crucially use the unentanglement promise inherent in 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2). See FigureΒ 1 and FigureΒ 2 for a pictorial description.

Refer to caption
Figure 1: Relationship between 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} and 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2). [JW23] show that for some constants 1>c>s>01>c>s>0, 𝖰𝖬𝖠+​(2)c,s=𝖭𝖀𝖷𝖯{\mathsf{QMA}}^{+}(2)_{c,s}={\mathsf{NEXP}}. We show that the same is true for 𝖰𝖬𝖠+{\mathsf{QMA}}^{+}. Restricting relative phase does not restrict entanglement across a fixed barrier: for example, consider the GHZ state |0βŸ©βŠ—n+|1βŸ©βŠ—n\ket{0}^{\otimes n}+\ket{1}^{\otimes n}, or more generally states where the Schmidt vectors have no relative phase.

1.1 Techniques

Our primary technical contribution is to show a 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} protocol for a 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-complete problem. This directly extends the work of Jeronimo and WuΒ [JW23], who show a 𝖰𝖬𝖠+​(2){\mathsf{QMA}}^{+}(2) protocol for a 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-complete problem. As inΒ [JW23], we study constraint satisfaction problems (CSPs) with constant gap. In (1,Ξ΄)(1,\delta)-GapCSP, either all constraints can be satisfied, or at most a Ξ΄\delta fraction of constraints can be satisfied. These problems are known to be 𝖭𝖯{\mathsf{NP}}-hard or 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-hard (depending on the problem size) using the PCP theoremΒ [AS92, ALM+98, Har04].

Before proving 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} with some constant gap equals 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}, we prove 𝖰𝖬𝖠log+{\mathsf{QMA}}^{+}_{\log} (with some other constant gap) equals 𝖭𝖯{\mathsf{NP}}. This choice (also taken by [JW23]) is pedagogical: it allows us to explain the protocol without worrying about input encoding size, since 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} has a polynomial amount of space and verifier runtime. Here, we consider (1,Ξ΄)(1,\delta)-GapCSP with polynomially many variables and clauses; the quantum proof must certify that there is a satisfying assignment to all clauses.

The 𝖰𝖬𝖠log+​(2){\mathsf{QMA}}^{+}_{\log}(2) protocol of [JW23] crucially relies on an estimate of sparsity (β„“1\ell_{1} norm) of a quantum state without relative phase. The overlap of a mm-qubit quantum state without relative phase |ψ⟩\ket{\psi} with |+βŸ©βŠ—m\ket{+}^{\otimes m} is exactly the value 2βˆ’m/2β‹…β€–|ΟˆβŸ©β€–12^{-m/2}\cdot\|\ket{\psi}\|_{1}. With multiple quantum proofs |ψ1βŸ©βŠ—β€¦β€‹|ψk⟩\ket{\psi_{1}}\otimes\dots\ket{\psi_{k}}, one can estimate the sparsity by repeating this β€œsparsity test” on each |ψi⟩\ket{\psi_{i}}, and using a swap test to ensure that all |ψi⟩\ket{\psi_{i}} are approximately equal. Interestingly, no other part of their protocol requires the no relative phase assumption.333Formally, [JW23] studies states with non-negative amplitudes. Recall that the set of these states, up to global phase, are equivalent to states with no relative phase.

In 𝖰𝖬𝖠log+{\mathsf{QMA}}^{+}_{\log}, we have a single quantum proof, so we cannot use this test to estimate sparsity. Instead, we design a similar test that directly enforces a rigidity property of the proof.444Note that we use the intuition of rigidity in a more general context, where Arthur’s tests, not a non-local game, enforce states of a certain form. The required form is 1Rβ€‹βˆ‘j∈[R]|jβŸ©β€‹|vβ†’j⟩\frac{1}{\sqrt{R}}\sum_{j\in[R]}\ket{j}\ket{\vec{v}_{j}}, where the second register is constant-sized. Using a β€œsparsity test” over the second register, Arthur ensures that the second register has one vβ†’j\vec{v}_{j} per jj; but using the complement of a β€œsparsity test” over the whole proof, Arthur ensures the overall state maximizes β„“1\ell_{1} norm. States of the required form are optimal for this combination of tests. We make use of the no relative phase property in LemmasΒ 6 andΒ 8.

Now we can describe our protocol. For each constraint j∈Rj\in R, Arthur asks for the values vβ†’j\vec{v}_{j} associated with the variables involved in constraint jj. The protocol either enforces rigidity of the quantum proof, or verifies the constraints of the CSP. Note that we need two kinds of constraint checks: the values vβ†’j\vec{v}_{j} must satisfy constraint jj, and the value of a variable must be consistent across the constraints it participates in. For states with the rigidity property, checking satisfiability is simple: measure in the computational basis and verify the measured constraint j,vβ†’jj,\vec{v}_{j}. States with the rigidity property will succeed with probability equal to the satisfying fraction of the CSP assignment.

Checking consistency is done using a technique called β€œregularization” from the PCP literatureΒ [Din07]; for each constraint jj, we verify that each variable participating in jj has the same value in exactly dd other constraints for some constant dd, in a way that the edges form an expander graph. The expansion property guarantees that cheating on this test is as damaging as cheating on the satisfiability test. Jeronimo and WuΒ [JW23] use a swap test to implement these new checks, but this requires multiple quantum proofs. We show how to use a Hadamard test (which requires only one quantum proof) to achieve the same result, building on ideas from previous workΒ [BFM22]. Since there exists a Ξ΄\delta such that (1,Ξ΄)(1,\delta)-GapCSP is 𝖭𝖯{\mathsf{NP}}-hard, this completes the proof of π–­π–―βŠ†π–°π–¬π– log+{\mathsf{NP}}\subseteq{\mathsf{QMA}}^{+}_{\log} with some constant gap.

When scaling up to 𝖰𝖬𝖠+{\mathsf{QMA}}^{+}, one must be careful of how to succinctly encode the input of a 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-complete problem. The PCP theorem allows us to choose (1,Ξ΄)(1,\delta)-GapCSP that is succinct, but we need stronger properties. Following the adjustments taken in [JW23], we choose a PCP system for 𝖭𝖀𝖷𝖯{\mathsf{NEXP}} that is both doubly explicit and strongly uniform. Doubly explicit means that one can efficiently compute the variables participating in a given constraint and the constraints a given variable participates in; using this, we can implement the consistency checks in polynomial time. Strongly uniform means that the number of constraints a variable participates in is efficiently computable, and one of a fixed number of possibilities; using this, we only need to build a fixed number of expander graphs during regularization. Recent work also shows how to construct exponentially-sized expander graphs in polynomial timeΒ [Lub09, Alo21]. Once we are through these input encoding difficulties, our protocol is identical to that for 𝖭𝖯{\mathsf{NP}}.

Fundamentally, the no relative phase property allows Arthur to verify a number of constraints exponential in the number of qubits. Attempts to do this for 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2) gave too small a promise gapΒ [BT10, Per12, GNN12], too many proversΒ [ABD+08, CD10, CF11], or too much space or timeΒ [HM13, NZ23]. Jeronimo and WuΒ [JW23] show that 𝖰𝖬𝖠+​(2){\mathsf{QMA}}^{+}(2) circumvents this difficulty: using no relative phase and unentanglement, Arthur enforces the sparsity of a quantum proof to solve a 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-complete problem. At the center of our work is the insight that no relative phase is enough for Arthur to require constant-sized answers to exponentially many questions, solving a 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-complete problem with a single polynomial-size quantum proof.

1.2 Related work

The complexity class 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2)

The complexity class 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2) is known to have promise gap amplification, and to be equal to 𝖰𝖬𝖠​(k){\mathsf{QMA}}(k) for any kk at most polynomial in nnΒ [HM13]. It is not obvious how to test for entanglement; even determining whether a polynomially-sized vector is entangled is 𝖭𝖯{\mathsf{NP}}-hard [Gha09]. If there exist efficient approximate β€œdisentanglers” that can create any separable state, then 𝖰𝖬𝖠=𝖰𝖬𝖠​(2){\mathsf{QMA}}={\mathsf{QMA}}(2); seeΒ [ABD+08] for some progress. [GSS+18] describe quantum variants of the polynomial hierarchy and connect their properties to bounds on 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2). It is not even known whether there is a quantum oracle separating 𝖰𝖬𝖠{\mathsf{QMA}} and 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2)Β [Aar21].

Refer to caption
Figure 2: Plot of 𝖰𝖬𝖠c,s+{\mathsf{QMA}}^{+}_{c,s} for increasing cs\frac{c}{s}. By our main result, there exist constants c,sc,s where 1<cs<41<\frac{c}{s}<4 and 𝖰𝖬𝖠c,s+=𝖭𝖀𝖷𝖯{\mathsf{QMA}}^{+}_{c,s}={\mathsf{NEXP}}, but by CorollaryΒ 30, 𝖰𝖬𝖠c,s+=𝖰𝖬𝖠{\mathsf{QMA}}^{+}_{c,s}={\mathsf{QMA}} when cs>4\frac{c}{s}>4. Gap amplification of 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} would imply 𝖰𝖬𝖠=𝖭𝖀𝖷𝖯{\mathsf{QMA}}={\mathsf{NEXP}}.

PCPs and expander graphs

Probabilistically checkable proofs (PCPs) show hardness for CSPs with a constant gapΒ [AS92, ALM+98, Har04]. DinurΒ [Din07] proves the PCP theorem using a regularization step, which adds new constraints associated with the edges of a regular expander graph. Polynomial-time regularization for 𝖭𝖀𝖷𝖯{\mathsf{NEXP}} requires an efficient description of exponentially-sized expander graphs. Recent advances in expander graph constructionsΒ [Lub09, Alo21] allow for this type of regularization, first used in [JW23].

Quantum states and relative phase

Up to a global phase, states with non-negative amplitudes are equivalent to states with no relative phase. [JW23] propose the class 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} and 𝖰𝖬𝖠+​(2){\mathsf{QMA}}^{+}(2), and show 𝖰𝖬𝖠+​(2)=𝖭𝖀𝖷𝖯{\mathsf{QMA}}^{+}(2)={\mathsf{NEXP}}. Note that by contrast, 𝖰𝖬𝖠{\mathsf{QMA}} restricted to states with real amplitudes is equal to 𝖰𝖬𝖠{\mathsf{QMA}}Β [McK13]. Relative phase was recently proposed as a quantum resourceΒ [Xu23]. For both 𝖰𝖬𝖠{\mathsf{QMA}} and 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2), restricting Merlin in completeness to send a subset state does not change the power of the complexity class (i.e., 𝖰𝖬𝖠=𝖲𝖰𝖬𝖠{\mathsf{QMA}}={\mathsf{SQMA}} and 𝖰𝖬𝖠​(2)=𝖲𝖰𝖬𝖠​(2){\mathsf{QMA}}(2)={\mathsf{SQMA}}(2)). [GKS14] also shows why their proof strategy fails if Merlin is restricted in both completeness and soundness.

Rigidity and games

Rigidity was first formally introduced in the context of non-local games [MY04], and have been used to prove several complexity class equalities. For example, the CHSH gameΒ [CHSH69] tests for a maximally entangled state on two qubitsΒ [Tsi93], and was used to prove 𝖰𝖬𝖨𝖯=π–¬π–¨π–―βˆ—{\mathsf{QMIP}}={\mathsf{MIP}}^{*} [RUV13]. The Mermin-Peres magic square game tests for two copies of a maximally entangled quantum state, and was used to prove π–¬π–¨π–―βˆ—=𝖱𝖀{\mathsf{MIP}}^{*}={\mathsf{RE}}Β [JNV+21]. Rigidity is known to exist in broader contexts, including some (but not all) linear constraint gamesΒ [CMMN20] and monogamy-of-entanglement gamesΒ [BC23].

2 Our setup

We restate the definition of 𝖰𝖬𝖠+​(k){\mathsf{QMA}}^{+}(k) from [JW23]. When the proof length is not specified, it is allowed to be at most any polynomial in input size. We follow the conventions 𝖰𝖬𝖠+:=𝖰𝖬𝖠+​(1){\mathsf{QMA}}^{+}:={\mathsf{QMA}}^{+}(1), 𝖰𝖬𝖠+​(k):=⋃cβˆ’s=Ω​(1)𝖰𝖬𝖠+​(k)c,s{\mathsf{QMA}}^{+}(k):=\bigcup_{c-s=\Omega(1)}{\mathsf{QMA}}^{+}(k)_{c,s}, and 𝖰𝖬𝖠log+:=𝖰𝖬𝖠+{\mathsf{QMA}}^{+}_{\log}:={\mathsf{QMA}}^{+} with proof length at most O​(log⁑n)O(\log n).

Definition 1 (𝖰𝖬𝖠ℓ+​(k)c,s{\mathsf{QMA}}^{+}_{\ell}(k)_{c,s}).

Let k:β„•β†’β„•k:\mathbb{N}\rightarrow\mathbb{N} and s,c,β„“:ℕ→ℝ+s,c,\ell:\mathbb{N}\rightarrow\mathbb{R}^{+} be polynomial time computable functions. A promise problem β„’yes,β„’noβŠ†{0,1}βˆ—\mathcal{L}_{\text{yes}},\mathcal{L}_{\text{no}}\subseteq\{0,1\}^{*} is in 𝖰𝖬𝖠ℓ+​(k)c,s{\mathsf{QMA}}^{+}_{\ell}(k)_{c,s} if there exists a 𝖑𝖰𝖯{\mathsf{BQP}} verifier VV such that for every nβˆˆβ„•n\in\mathbb{N} and every x∈{0,1}nx\in\{0,1\}^{n}:

  • β€’

    Completeness: if xβˆˆβ„’yesx\in\mathcal{L}_{\text{yes}}, then there exist unentangled states |ψ1⟩,…,|ψk​(n)⟩\ket{\psi_{1}},\ldots,\ket{\psi_{k(n)}}, each on at most ℓ​(n)\ell(n) qubits and with real non-negative amplitudes, s.t.

    𝐏𝐫[V​(x,|ψ1βŸ©βŠ—β€¦βŠ—|ψk​(n)⟩)​ accepts]β‰₯c​(n).\displaystyle\mathop{\bf Pr\/}[V(x,\ket{\psi_{1}}\otimes\ldots\otimes\ket{\psi_{k(n)}})\text{ accepts}]\geq c(n)\,.
  • β€’

    Soundness: If xβˆˆβ„’nox\in\mathcal{L}_{\text{no}}, then for every set of unentangled states |ψ1⟩,…,|ψk​(n)⟩\ket{\psi_{1}},\ldots,\ket{\psi_{k(n)}}, each on at most ℓ​(n)\ell(n) qubits and with real non-negative amplitudes, we have

    𝐏𝐫[V​(x,|ψ1βŸ©βŠ—β€¦βŠ—|ψk​(n)⟩)​ accepts]≀s​(n).\displaystyle\mathop{\bf Pr\/}[V(x,\ket{\psi_{1}}\otimes\ldots\otimes\ket{\psi_{k(n)}})\text{ accepts}]\leq s(n)\,.

We make a few remarks on this complexity class, with extended discussion in SectionΒ 5. First, we stress that the restriction to quantum proofs with non-negative amplitudes is promise-symmetric, i.e. both in completeness and in soundness. This is unlike, for example, the class 𝖲𝖰𝖬𝖠{\mathsf{SQMA}}Β [GKS14]. Although the restriction to subset states is stronger than non-negative amplitudes,555A subset state is a uniform superposition over a subset of all computational basis states. States with non-negative amplitudes are conical combinations of subset states. its use only in completeness allows for 𝖲𝖰𝖬𝖠=𝖰𝖬𝖠{\mathsf{SQMA}}={\mathsf{QMA}}. In fact, our work implies that 𝖰𝖬𝖠{\mathsf{QMA}} with a promise-symmetric subset state restriction also interpolates from 𝖰𝖬𝖠{\mathsf{QMA}} to 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}, depending on the size of the promise gap.

We also explain why the promise gap of 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} cannot obviously be amplified. The first strategy one might try is parallel repetition: an honest Merlin sends multiple copies of the original proof and Arthur verifies each copy of the original proof. For 𝖰𝖬𝖠{\mathsf{QMA}}, entangling the copies in soundness does not help Merlin, since Arthur’s protocol is sound for all quantum states. But perhaps unintuitively, it can help for 𝖰𝖬𝖠+{\mathsf{QMA}}^{+}. (See 28 for a simple example.) This is because partial measurement can destroy the restriction on the quantum proof! For example, Arthur’s first measurement may introduce relative phase in the rest of the proof. This fact also obstructs more clever amplification strategies for 𝖰𝖬𝖠{\mathsf{QMA}} such as the proof-length preserving variantΒ [MW05].

Furthermore, it is not clear how to upper-bound 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} beyond the trivial 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}.666𝖰𝖬𝖠+βŠ†π–­π–€π–·π–―{\mathsf{QMA}}^{+}\subseteq{\mathsf{NEXP}} by directly simulating the quantum proof and verifier. One technique to upper-bound 𝖰𝖬𝖠{\mathsf{QMA}} is to find the optimal proof using a semidefinite program (or a general convex program). This shows that π–°π–¬π– βŠ†π–―π–²π–―π– π–’π–€{\mathsf{QMA}}\subseteq{\mathsf{PSPACE}} (or π–°π–¬π– βŠ†π–€π–·π–―{\mathsf{QMA}}\subseteq{\mathsf{EXP}} with a convex program). But these arguments do not immediately transfer to 𝖰𝖬𝖠+{\mathsf{QMA}}^{+}. Convex optimization over states with non-negative amplitudes is equivalent to optimizing over the copositive coneΒ [Bur11]. Even the weak membership problem over the copositive cone (deciding if the optimal vector is close to a non-negative vector) is 𝖭𝖯{\mathsf{NP}}-hard in polynomially-sized vector spaces; recall that quantum states are in exponentially-sized vector spaces. These are the same reasons that prevent straightforward upper bounds for 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2)Β [Gha09].

3 𝖰𝖬𝖠log+{\mathsf{QMA}}^{+}_{\log} Protocol for 𝖭𝖯{\mathsf{NP}}

We first define the problem we consider:

Definition 2 (CSP system).

A (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP system π’ž\mathcal{C} on NN variables with values in Ξ£\Sigma consists of a set (possibly a multi-set) of RR constraints {π’ž1,…,π’žR}\{\mathcal{C}_{1},\dots,\mathcal{C}_{R}\} where the arity of each constraint is exactly qq.

Definition 3 (Value of CSP).

The value of a (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP system π’ž\mathcal{C} is the maximum fraction of satisfiable constraints over all possible assignments Οƒ:[N]β†’Ξ£\sigma:[N]\to\Sigma. The value of π’ž\mathcal{C} is denoted 𝐯𝐚π₯(π’ž)\mathop{\bf val\/}(\mathcal{C}).

Definition 4 (GapCSP).

The (1,Ξ΄)(1,\delta)-GapCSP problem inputs a CSP system π’ž\mathcal{C}. The task is to distinguish whether π’ž\mathcal{C} is such that (in completeness) 𝐯𝐚π₯(π’ž)=1\mathop{\bf val\/}(\mathcal{C})=1 or (in soundness) 𝐯𝐚π₯(π’ž)≀δ\mathop{\bf val\/}(\mathcal{C})\leq\delta.

Fix the input size nn, and consider (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP systems where NN and RR are polynomials in nn. Deciding whether or not these systems are satisfiable is 𝖭𝖯{\mathsf{NP}}-hard. In fact, there exists Ξ΄<1\delta<1 such that deciding (1,Ξ΄)(1,\delta)-GapCSP on these CSP systems is 𝖭𝖯{\mathsf{NP}}-hard.

Theorem 5 ([Din07]).

There exist constants q>1q>1 and |Ξ£||\Sigma| such that (1,1/2)(1,1/2)-GapCSP is 𝖭𝖯{\mathsf{NP}}-hard.

Our goal in this section is to construct a protocol for (1,Ξ΄)(1,\delta)-GapCSP given any (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP system π’ž\mathcal{C} where N,R=poly​(n)N,R=\mathrm{poly}(n) and q,|Ξ£|=O​(1)q,|\Sigma|=O(1). Let ΞΊ:=|Ξ£|q\kappa:=|\Sigma|^{q}. We first outline the protocol. Arthur asks for a quantum state from β„‚RβŠ—β„‚ΞΊ\mathbb{C}^{R}\otimes\mathbb{C}^{\kappa}; we call the first register the constraint register and the second register the color register. A quantum proof has the following form:

|ψ⟩:=βˆ‘j∈[R],x∈Σqaj,x​|jβŸ©β€‹|x⟩\displaystyle\ket{\psi}:=\sum_{j\in[R],x\in\Sigma^{q}}a_{j,x}\ket{j}\ket{x}

For completeness, consider the satisfying assignment of variables (in [N][N]) to values (in Ξ£\Sigma). Merlin sends the quantum proof 1Rβ€‹βˆ‘j∈[R]|jβŸ©β€‹|vβ†’j⟩\frac{1}{\sqrt{R}}\sum_{j\in[R]}\ket{j}\ket{\vec{v}_{j}}, where each vβ†’j\vec{v}_{j} is the (ordered) list of values associated with the variables participating in π’žj\mathcal{C}_{j}.

Arthur then applies one of two kinds of tests:

  1. 1.

    Rigidity tests: These ensure that the quantum proof is of the form 1Rβ€‹βˆ‘j∈[R]|jβŸ©β€‹|vβ†’j⟩\frac{1}{\sqrt{R}}\sum_{j\in[R]}\ket{j}\ket{\vec{v}_{j}}.

  2. 2.

    Constraint tests: These verify that values in the quantum proof satisfy constraints of the CSP system.

Below, we separately describe the rigidity tests and constraint tests. In each, we analyze the success probability in completeness and prove lemmas to study soundness. We then combine the technical statements to prove the result.

3.1 Rigidity tests

Arthur enforces rigidity of a quantum proof using two tests. The first test is the Density test, which maximizes β„“1\ell_{1} norm. Here, we measure the state in the Hadamard basis and accept if the outcome is |+⟩\ket{+}.777For simplicity, we denote the uniform superposition over all standard basis states by |+⟩\ket{+}. The dimension is clear from the context. Given |ψ⟩\ket{\psi}, the success probability of this test is

D​(|ψ⟩)=|⟨+|ψ⟩|2=1κ​R​|βˆ‘j∈[R],x∈Σqaj,x|2=1κ​R​(β€–|ΟˆβŸ©β€–1)2.\displaystyle D(\ket{\psi})=\left|\bra{+}\ket{\psi}\right|^{2}=\frac{1}{\kappa R}\left|\sum_{j\in[R],x\in\Sigma^{q}}a_{j,x}\right|^{2}=\frac{1}{\kappa R}(\|\ket{\psi}\|_{1})^{2}\,.

Recall that if |ψ⟩\ket{\psi} is a subset state according to subset SS, its sparsity β€–|ΟˆβŸ©β€–1\|\ket{\psi}\|_{1} is exactly |S|\sqrt{|S|}. In completeness, the quantum proof is a subset state with RR elements, so this test passes with probability 1ΞΊ\frac{1}{\kappa}.

The second test is the Validity test, which minimizes β„“1\ell_{1} norm only on the second register. Here, we measure the color register in the Hadamard basis, and reject if the outcome is |+⟩\ket{+}. Given |ψ⟩\ket{\psi}, the success probability of this test is

V​(|ψ⟩)=1βˆ’βŸ¨+|​TrR⁑(|ΟˆβŸ©β€‹βŸ¨Οˆ|)​|+⟩=1βˆ’1ΞΊβ€‹βˆ‘j∈[R]|βˆ‘x∈Σqaj,x|2,\displaystyle V(\ket{\psi})=1-\bra{+}\Tr_{R}(\ket{\psi}\bra{\psi})\ket{+}=1-\frac{1}{\kappa}\sum_{j\in[R]}\left|\sum_{x\in\Sigma^{q}}a_{j,x}\right|^{2}\,,

where TrR\Tr_{R} is partial trace over the constraint register. In completeness, recall that the proof has the form 1Rβ€‹βˆ‘j∈[R]|jβŸ©β€‹|vβ†’j⟩\frac{1}{\sqrt{R}}\sum_{j\in[R]}\ket{j}\ket{\vec{v}_{j}}, so the success probability is

1βˆ’βŸ¨+|​(1Rβ€‹βˆ‘j∈[R]|vβ†’j⟩⟨vβ†’j|)​|+⟩=1βˆ’1ΞΊ.\displaystyle 1-\bra{+}\left(\frac{1}{R}\sum_{j\in[R]}\outerproduct{\vec{v}_{j}}{\vec{v}_{j}}\right)\ket{+}=1-\frac{1}{\kappa}\,.

In fact, no quantum state without relative phase can pass the Validity test with a higher probability:

Lemma 6.

Suppose |ψ⟩\ket{\psi} has no relative phase. Then V​(|ψ⟩)≀1βˆ’1ΞΊV(\ket{\psi})\leq 1-\frac{1}{\kappa}.

Proof.

The success probability V​(|ψ⟩)V(\ket{\psi}) is

1βˆ’1ΞΊβ€‹βˆ‘j∈[R](βˆ‘x∈Σqaj,x)2\displaystyle 1-\frac{1}{\kappa}\sum_{j\in[R]}(\sum_{x\in\Sigma^{q}}a_{j,x})^{2} =1βˆ’1κ​(βˆ‘j∈[R]βˆ‘x,y∈Σqaj,x​aj,y)\displaystyle=1-\frac{1}{\kappa}(\sum_{j\in[R]}\sum_{x,y\in\Sigma^{q}}a_{j,x}a_{j,y}) =1βˆ’1κ​(1+βˆ‘j∈[R]βˆ‘x,y∈Σq;xβ‰ yaj,x​aj,y)\displaystyle=1-\frac{1}{\kappa}(1+\sum_{j\in[R]}\sum_{x,y\in\Sigma^{q};x\neq y}a_{j,x}a_{j,y}) ≀1βˆ’1ΞΊ,\displaystyle\leq 1-\frac{1}{\kappa}\,,

where the second equality follows from βˆ‘j,xaj,x2=1\sum_{j,x}a_{j,x}^{2}=1 and the inequality holds since aj,xβ‰₯0a_{j,x}\geq 0. ∎

It turns out that is impossible to score high on both the Validity test and the Density test. We use this to enforce the rigidity property of |ψ⟩\ket{\psi}.

Lemma 7.

D​(|ψ⟩)+V​(|ψ⟩)≀1D(\ket{\psi})+V(\ket{\psi})\leq 1.

Proof.

By Cauchy-Schwarz,

D​(|ψ⟩)=1κ​R​|βˆ‘j∈[R]βˆ‘x∈Σqaj,x|2≀1ΞΊβ€‹βˆ‘j∈[R]|βˆ‘x∈Σqaj,x|2=1βˆ’V​(|ψ⟩).\displaystyle D(\ket{\psi})=\frac{1}{\kappa R}\left|\sum_{j\in[R]}\sum_{x\in\Sigma^{q}}a_{j,x}\right|^{2}\leq\frac{1}{\kappa}\sum_{j\in[R]}\left|\sum_{x\in\Sigma^{q}}a_{j,x}\right|^{2}=1-V(\ket{\psi})\,. ∎

Why does this help with rigidity? Suppose Arthur inputs a quantum proof (without relative phase) |ψ⟩\ket{\psi} and runs Density test with probability p1p_{1} and Validity test with probability p2p_{2}. Suppose also that p2>p1p_{2}>p_{1}. Then the expected success probability is p1​D​(|ψ⟩)+p2​V​(|ψ⟩)≀p1+(p2βˆ’p1)​V​(|ψ⟩)≀p1+(p2βˆ’p1)​(1βˆ’1ΞΊ)p_{1}D(\ket{\psi})+p_{2}V(\ket{\psi})\leq p_{1}+(p_{2}-p_{1})V(\ket{\psi})\leq p_{1}+(p_{2}-p_{1})(1-\frac{1}{\kappa}). Note that this upper bound is achieved in completeness, and for any state of the form 1Rβ€‹βˆ‘j∈R|jβŸ©β€‹|vβ†’j⟩\frac{1}{\sqrt{R}}\sum_{j\in R}\ket{j}\ket{\vec{v}_{j}}. We show that quantum proofs must have this form to reach the upper bound.

One requirement to get close to the upper bound is near-optimal success probability on Validity test. We prove that any quantum proof that has this property must be close to a state that assigns one color to each constraint.

Lemma 8.

Given |ψ⟩=βˆ‘j,xaj,x​|jβŸ©β€‹|x⟩\ket{\psi}=\sum_{j,x}a_{j,x}\ket{j}\ket{x} with no relative phase (i.e. aj,xβ‰₯0a_{j,x}\geq 0), let

Ξ³:=maxΞ½:[R]β†’Ξ£qβ€‹βˆ‘j∈[R]aj,ν​(j)2\displaystyle\gamma:=\max_{\nu:[R]\to\Sigma^{q}}\sum_{j\in[R]}a_{j,\nu(j)}^{2}

be associated with maximizing function Οƒ\sigma, and let |Ο•βŸ©:=1Ξ³β€‹βˆ‘jaj,σ​(j)​|jβŸ©β€‹|σ​(j)⟩\ket{\phi}:=\frac{1}{\sqrt{\gamma}}\sum_{j}a_{j,\sigma(j)}\ket{j}\ket{\sigma(j)}. Fix any dβ‰₯0d\geq 0. If V​(|ψ⟩)=1βˆ’1+dΞΊV(\ket{\psi})=1-\frac{1+d}{\kappa}, then |⟨ψ|Ο•βŸ©|2β‰₯1βˆ’d\left|\bra{\psi}\ket{\phi}\right|^{2}\geq 1-d.

Proof.

Note that for all x∈Σqx\in\Sigma^{q}, aj,σ​(j)β‰₯aj,xa_{j,\sigma(j)}\geq a_{j,x}; otherwise, Οƒ\sigma is not maximizing. Using the proof of LemmaΒ 6,

d=βˆ‘j∈[R]βˆ‘x,y∈Σq;xβ‰ yaj,x​aj,yβ‰₯βˆ‘j∈[R]βˆ‘y∈Σq;y≠σ​(j)aj,σ​(j)​aj,yβ‰₯βˆ‘j∈[R]βˆ‘y∈Σq;y≠σ​(j)aj,y2.\displaystyle d=\sum_{j\in[R]}\sum_{x,y\in\Sigma^{q};x\neq y}a_{j,x}a_{j,y}\geq\sum_{j\in[R]}\sum_{y\in\Sigma^{q};y\neq\sigma(j)}a_{j,\sigma(j)}a_{j,y}\geq\sum_{j\in[R]}\sum_{y\in\Sigma^{q};y\neq\sigma(j)}a_{j,y}^{2}\,.

So then,

Ξ³=βˆ‘j∈[R]aj,σ​(j)2=(βˆ‘j∈[R]βˆ‘x∈Σqaj,x2)βˆ’(βˆ‘j∈[R]βˆ‘x∈Σq;x≠σ​(j)aj,x2)β‰₯1βˆ’d.\displaystyle\gamma=\sum_{j\in[R]}a_{j,\sigma(j)}^{2}=(\sum_{j\in[R]}\sum_{x\in\Sigma^{q}}a_{j,x}^{2})-(\sum_{j\in[R]}\sum_{x\in\Sigma^{q};x\neq\sigma(j)}a_{j,x}^{2})\geq 1-d\,.

So |⟨ψ|Ο•βŸ©|2=(1Ξ³β€‹βˆ‘jaj,σ​(j)2)2=Ξ³β‰₯1βˆ’d\left|\bra{\psi}\ket{\phi}\right|^{2}=(\frac{1}{\sqrt{\gamma}}\sum_{j}a_{j,\sigma(j)}^{2})^{2}=\gamma\geq 1-d. ∎

Another requirement to get close to the upper bound is near-optimal success probability on Density test, up to LemmaΒ 7. Consider any quantum proof that passes Validity test with probability close to 1βˆ’1ΞΊ1-\frac{1}{\kappa} and Density test with probability close to 1ΞΊ\frac{1}{\kappa}; we show it must be close to a state of the form 1Rβ€‹βˆ‘j∈R|jβŸ©β€‹|vβ†’j⟩\frac{1}{\sqrt{R}}\sum_{j\in R}\ket{j}\ket{\vec{v}_{j}}. Now we can prove the soundness of the rigidity test by relying on the following fact:

Fact 9.

Let 0≀Π≀𝕀0\leq\Pi\leq\mathbb{I} be a positive semi-definite matrix, and let |ψ1⟩\ket{\psi_{1}} and |ψ2⟩\ket{\psi_{2}} be quantum states such that |⟨ψ1|ψ2⟩|2β‰₯1βˆ’d\left|\innerproduct{\psi_{1}}{\psi_{2}}\right|^{2}\geq 1-d. Then |⟨ψ1|​Π​|ψ1βŸ©βˆ’βŸ¨Οˆ2|​Π​|ψ2⟩|≀d\left|\bra{\psi_{1}}\Pi\ket{\psi_{1}}-\bra{\psi_{2}}\Pi\ket{\psi_{2}}\right|\leq\sqrt{d}.

Proof.

The quantity |⟨ψ1|​Π​|ψ1βŸ©βˆ’βŸ¨Οˆ2|​Π​|ψ2⟩|=|Tr⁑(Π​(|ψ1⟩⟨ψ1|βˆ’|ψ2⟩⟨ψ2|))|\left|\bra{\psi_{1}}\Pi\ket{\psi_{1}}-\bra{\psi_{2}}\Pi\ket{\psi_{2}}\right|=\left|\Tr(\Pi\left(\outerproduct{\psi_{1}}{\psi_{1}}-\outerproduct{\psi_{2}}{\psi_{2}}\right))\right| is upper-bounded by the trace distance of |ψ1⟩⟨ψ1|\outerproduct{\psi_{1}}{\psi_{1}} and |ψ2⟩⟨ψ2|\outerproduct{\psi_{2}}{\psi_{2}}, which has value 1βˆ’|⟨ψ1|ψ2⟩|2≀d\sqrt{1-\left|\bra{\psi_{1}}\ket{\psi_{2}}\right|^{2}}\leq\sqrt{d}. ∎

Lemma 10 (Rigidity lemma).

Let d2β‰₯d1β‰₯0d_{2}\geq d_{1}\geq 0 be small constants. Suppose |ψ⟩\ket{\psi}, |Ο•βŸ©\ket{\phi}, and Οƒ\sigma are defined as in LemmaΒ 8, and |Ο‡βŸ©\ket{\chi} is defined as

|Ο‡βŸ©:=1Rβ€‹βˆ‘j∈[R]|jβŸ©β€‹|σ​(j)⟩.\displaystyle\ket{\chi}:=\frac{1}{\sqrt{R}}\sum_{j\in[R]}\ket{j}\ket{\sigma(j)}\,.

If D​(|ψ⟩)=1ΞΊβˆ’d1D(\ket{\psi})=\frac{1}{\kappa}-d_{1} and V​(|ψ⟩)=1βˆ’1ΞΊβˆ’d2V(\ket{\psi})=1-\frac{1}{\kappa}-d_{2}, then |βŸ¨Ο‡|ψ⟩|2β‰₯1βˆ’ΞΊβ€‹d1βˆ’(ΞΊ+1)​κ⋅d2\left|\innerproduct{\chi}{\psi}\right|^{2}\geq 1-\kappa d_{1}-(\kappa+1)\sqrt{\kappa\cdot d_{2}}.

Proof.

By LemmaΒ 8, we know that |⟨ψ|Ο•βŸ©|2β‰₯1βˆ’ΞΊβ‹…d2\left|\innerproduct{\psi}{\phi}\right|^{2}\geq 1-\kappa\cdot d_{2}. So by 9, for any quantum state |μ⟩\ket{\mu}, ||⟨μ|Ο•βŸ©|2βˆ’|⟨μ|ψ⟩|2|≀κ⋅d2\left|\left|\innerproduct{\mu}{\phi}\right|^{2}-\left|\innerproduct{\mu}{\psi}\right|^{2}\right|\leq\sqrt{\kappa\cdot d_{2}}. We use this in two places. First, when |μ⟩=|+⟩\ket{\mu}=\ket{+}. Since D​(|ψ⟩)=|⟨+|ψ⟩|2=1ΞΊβˆ’d1D(\ket{\psi})=\left|\innerproduct{+}{\psi}\right|^{2}=\frac{1}{\kappa}-d_{1}, we have |⟨+|Ο•βŸ©|2β‰₯1ΞΊβˆ’d1βˆ’ΞΊβ‹…d2\left|\innerproduct{+}{\phi}\right|^{2}\geq\frac{1}{\kappa}-d_{1}-\sqrt{\kappa\cdot d_{2}} by triangle inequality. Second, when |μ⟩=|Ο‡βŸ©\ket{\mu}=\ket{\chi}. Notice that

|βŸ¨Ο‡|Ο•βŸ©|2=κ​|⟨+|Ο•βŸ©|2β‰₯1βˆ’ΞΊβ€‹(d1+ΞΊβ‹…d2).\displaystyle\left|\innerproduct{\chi}{\phi}\right|^{2}=\kappa\left|\innerproduct{+}{\phi}\right|^{2}\geq 1-\kappa(d_{1}+\sqrt{\kappa\cdot d_{2}})\,.

Again by triangle inequality,

|βŸ¨Ο‡|ψ⟩|2β‰₯1βˆ’ΞΊβ€‹(d1+ΞΊβ‹…d2)βˆ’ΞΊβ‹…d2.\displaystyle\left|\innerproduct{\chi}{\psi}\right|^{2}\geq 1-\kappa(d_{1}+\sqrt{\kappa\cdot d_{2}})-\sqrt{\kappa\cdot d_{2}}\,. ∎

Intuitively, LemmaΒ 10 allows us to tune the probability of each test in the 𝖭𝖯{\mathsf{NP}} protocol. As we explain in the analysis (SectionΒ 3.3), if the probabilities of running Validity test and Density test are much higher than that for constraint tests, then if d1d_{1} or d2d_{2} is large, these two tests catch a β€œdeceptive” quantum proof in soundness. This allows constraint tests to focus on the case of small d1d_{1} and d2d_{2}; i.e. nearly rigid quantum proofs.

3.2 Constraint tests

We analyze the constraint tests on rigid quantum proofs, i.e. states of the form |ψ⟩=1Rβ€‹βˆ‘j∈[R|jβŸ©β€‹|vβ†’j⟩\ket{\psi}=\frac{1}{\sqrt{R}}\sum_{j\in[R}\ket{j}\ket{\vec{v}_{j}}. The verifier needs to check two properties:

  1. (i)

    (satisfiability) For all j∈[R]j\in[R], the assignment vβ†’j\vec{v}_{j} satisfies π’žj\mathcal{C}_{j}.

  2. (ii)

    (consistency) Each variable is assigned the same value when participating in different constraints.

One may ask why we even need to check for consistency. Couldn’t we ask for the assignment of each variable a:[N]β†’Ξ£a:[N]\to\Sigma, for example as the quantum proof 1Nβ€‹βˆ‘i∈[N]|iβŸ©β€‹|a​(i)⟩\frac{1}{\sqrt{N}}\sum_{i\in[N]}\ket{i}\ket{a(i)}? The problem with this is checking satisfiability becomes difficult, since the assigned values are given in superposition.888There is a way around this limitation for CSP systems consisting of unique game constraints, where each (binary) constraint involving variables i1,i2i_{1},i_{2} accepts exactly one a​(i2)a(i_{2}) for each a​(i1)a(i_{1}). SeeΒ [JW23, Section 6] for more discussion.

Instead, with a state 1Rβ€‹βˆ‘j∈[R|jβŸ©β€‹|vβ†’j⟩\frac{1}{\sqrt{R}}\sum_{j\in[R}\ket{j}\ket{\vec{v}_{j}}, satisfiability is easy to verify: measure the first register (observing some |jβŸ©β€‹|vβ†’j⟩\ket{j}\ket{\vec{v}_{j}}), and compute π’žj​(vβ†’j)\mathcal{C}_{j}(\vec{v}_{j}). Let usu_{s} be the number of unsatisfied constraints. The outcome is 11 with probability 1βˆ’usR1-\frac{u_{s}}{R}.

But this form of quantum proof gives Merlin a new way to β€œdeceive”: for a given variable, send different values depending on the constraint! We prevent this by checking for consistency, similarly to the pre-processing step of [Din07] sometimes called regularization. As in [JW23, Section 7], we add β€œconsistency constraints” to the CSP system π’ž\mathcal{C} as follows:999Note that since NN and RR are polynomially-sized, this process is efficient.

  • β€’

    For each variable i∈[N]i\in[N], let ViV_{i} represent the constraints that ii participates in.

  • β€’

    Fix a constant dd. For each i∈[N]i\in[N], draw a dd-regular graph with vertices ViV_{i} that is expanding.101010For technical reasons of 11, we require that the Cheeger constant is at least 2.

  • β€’

    Each edge (j1,j2)(j_{1},j_{2}) of each expander ViV_{i} represents a β€œconsistency constraint”, where we assert that the value of variable ii sent with constraint j1j_{1} equals that sent with constraint j2j_{2}.

Using expander graphs allows us to prevent this kind of β€œdeceptive” Merlin: either the proof fails many of the original constraints, or it fails many β€œconsistency constraints”. Let ueu_{e} be the number of unsatisfied β€œconsistency constraints” out of R​qβ‹…d2Rq\cdot\frac{d}{2}:

Claim 11 ([Din07, Lemma 4.1]).

Consider a (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP system π’ž\mathcal{C}, and apply regularization. If 𝐯𝐚π₯(π’ž)=1\mathop{\bf val\/}(\mathcal{C})=1, then all β€œconsistency constraints” can be simultaneously satisfied. If 𝐯𝐚π₯(π’ž)≀δ\mathop{\bf val\/}(\mathcal{C})\leq\delta, then the total number of unsatisfied constraints (us+ue)(u_{s}+u_{e}) is at least (1βˆ’Ξ΄)​R(1-\delta)R.

How do we check these β€œconsistency constraints”? Over the next few paragraphs, we construct a unitary related to permutations on the constraint graph. In completeness, the quantum proof is an eigenvector of this unitary, but in soundness, all rigid quantum proofs are detectably far (i.e. using a Hadamard test) from an eigenvector. We study the graph G~\widetilde{G} with Rβ‹…qR\cdot q vertices, where each vertex (j,i)(j,i) corresponds to a clause jj and a variable ii that participates in clause jj. Let G~\widetilde{G} be the union of all consistency edges created during regularization, i.e. (j1,j2)(j_{1},j_{2}) for variable ii becomes the edge ((j1,i),(j2,i))((j_{1},i),(j_{2},i)). Note that G~\widetilde{G} contains a copy of each expander graph, so it is dd-regular.

We now choose dd permutations. It is a classical fact that the adjacency matrix of any dd-regular graph can always be decomposed to dd permutations. Let Ο€1,…,Ο€d\pi_{1},\ldots,\pi_{d} be the decomposition of G~\widetilde{G}; recall that these are permutations on V​(G~)V(\widetilde{G}) where |V​(G~)|=Rβ‹…q|V(\widetilde{G})|=R\cdot q. For each k∈[d]k\in[d], we identify Ο€k\pi_{k} with a permutation on [R]Γ—[N][R]\times[N], where any (j,i)∈[R]Γ—[N](j,i)\in[R]\times[N] that is not a vertex of G~\widetilde{G} (i.e. variable ii does not participate in constraint jj) is mapped to itself.111111These permutations (and their inverses) are all efficient because NN and RR are polynomially-sized. Note that this map always preserves the variable i∈[N]i\in[N]; without loss of generality, we also identify Ο€k\pi_{k} with its restriction [R]Γ—[N]β†’[R][R]\times[N]\to[R]. From here on, we use this last definition of Ο€k\pi_{k}, which maps constraint j1j_{1} that variable ii participates in to another constraint j2j_{2} that variable ii participates in, and identity otherwise.

Now consider a rigid quantum proof, i.e. of the form |ψ⟩=1Rβ€‹βˆ‘j∈[R]|jβŸ©β€‹|vβ†’j⟩\ket{\psi}=\frac{1}{\sqrt{R}}\sum_{j\in[R]}\ket{j}\ket{\vec{v}_{j}}. Since there are a polynomial number of variables and constraints, we can efficiently transform |ψ⟩\ket{\psi} to |Ο•β€²βŸ©\ket{\phi^{\prime}}, where

|Ο•β€²βŸ©:=1qβ‹…Rβ€‹βˆ‘j∈[R]βˆ‘iβˆˆπ’žj|jβŸ©β€‹|vβ†’jβŸ©β€‹|iβŸ©β€‹|vj​(i)⟩.\displaystyle\ket{\phi^{\prime}}:=\frac{1}{\sqrt{q\cdot R}}\sum_{j\in[R]}\sum_{i\in\mathcal{C}_{j}}\ket{j}\ket{\vec{v}_{j}}\ket{i}\ket{v_{j}(i)}\,.

Here, iβˆˆπ’žji\in\mathcal{C}_{j} are the variables participating in π’žj\mathcal{C}_{j}, and vj​(i)v_{j}(i) is the value of this variable according to vβ†’j\vec{v}_{j}.

We now would like to construct a unitary on |Ο•β€²βŸ©\ket{\phi^{\prime}} that maps |jβŸ©β€‹|iβŸ©β€‹|v​a​l​u​e⟩\ket{j}\ket{i}\ket{value} to |jβ€²βŸ©β€‹|iβŸ©β€‹|v​a​l​u​e⟩\ket{j^{\prime}}\ket{i}\ket{value} for some other constraint jβ€²j^{\prime} that ii participates in. In completeness, this unitary would leave the state unchanged. Notice that from the perspective of such a unitary, the second register containing |vβ†’j⟩\ket{\vec{v}_{j}} is β€œjunk”. Fortunately, we can measure out the second register in the Hadamard basis, and reject if the outcome is not |+⟩\ket{+}. All rigid states will observe outcome |+⟩\ket{+} with probability 1ΞΊ\frac{1}{\kappa}; one can see this by writing the second register in the Hadamard basis.

Suppose the observed outcome is |+⟩\ket{+}; let us call the postselected state |Ο•βŸ©\ket{\phi}, where

|Ο•βŸ©:=1qβ‹…Rβ€‹βˆ‘j∈Rβˆ‘iβˆˆπ’žj|jβŸ©β€‹|iβŸ©β€‹|vj​(i)⟩.\displaystyle\ket{\phi}:=\frac{1}{\sqrt{q\cdot R}}\sum_{j\in R}\sum_{i\in\mathcal{C}_{j}}\ket{j}\ket{i}\ket{v_{j}(i)}\,.

For each k∈[d]k\in[d], we now implement the in-place transformation Ξ k\Pi_{k} according to Ο€k:[R]Γ—[N]β†’[R]\pi_{k}:[R]\times[N]\to[R], where

Ξ k:|jβŸ©β€‹|iβŸ©β€‹|vj​(i)βŸ©β†’|Ο€k​(j,i)βŸ©β€‹|iβŸ©β€‹|vj​(i)⟩.\displaystyle\Pi_{k}:\ket{j}\ket{i}\ket{v_{j}(i)}\rightarrow\ket{\pi_{k}(j,i)}\ket{i}\ket{v_{j}(i)}\,.

Recall that the map (j,i)↦(Ο€k​(j,i),i)(j,i)\mapsto(\pi_{k}(j,i),i) is a permutation. Since we have access both to this permutation and its inverse, we can implement Ξ k\Pi_{k}.

Note that in a satisfiable instance, Ξ k​|Ο•βŸ©=|Ο•βŸ©\Pi_{k}\ket{\phi}=\ket{\phi}. By contrast, if vj​(i)β‰ vj′​(i)v_{j}(i)\neq v_{j^{\prime}}(i), |jβ€²βŸ©β€‹|iβŸ©β€‹|vj​(i)⟩\ket{j^{\prime}}\ket{i}\ket{v_{j}(i)} is orthogonal to |Ο•βŸ©\ket{\phi}. Hence, βŸ¨Ο•|​Πk​|Ο•βŸ©\bra{\phi}\Pi_{k}\ket{\phi} is the fraction of satisfied β€œconsistency constraints” observed by Ο€k\pi_{k}. We use the Hadamard test to measure this value, in a similar way to the Spectral test inΒ [BFM22]. Note that unlike the swap test, the Hadamard test only uses one copy of a quantum state.

Definition 12 (Hadamard test).

Let |ψ⟩\ket{\psi} be a quantum state and UU a unitary operator.

  1. 1.

    Prepend a control qubit to |ψ⟩\ket{\psi}, to create |0βŸ©β€‹|ψ⟩\ket{0}\ket{\psi}.

  2. 2.

    Apply a Hadamard on the control qubit, to create 12​(|0⟩+|1⟩)​|ψ⟩\frac{1}{\sqrt{2}}(\ket{0}+\ket{1})\ket{\psi}.

  3. 3.

    Apply UU, controlled by the control qubit, to create 12​(|0βŸ©β€‹|ψ⟩+|1βŸ©β€‹U​|ψ⟩)\frac{1}{\sqrt{2}}\left(\ket{0}\ket{\psi}+\ket{1}U\ket{\psi}\right).

  4. 4.

    Apply a Hadamard on the control qubit, to create 12​|0βŸ©β€‹(|ψ⟩+U​|ψ⟩)+12​|1βŸ©β€‹(|ΟˆβŸ©βˆ’U​|ψ⟩)\frac{1}{2}\ket{0}\left(\ket{\psi}+U\ket{\psi}\right)+\frac{1}{2}\ket{1}\left(\ket{\psi}-U\ket{\psi}\right).

  5. 5.

    Measure the control qubit, and accept if the output is 0.

The success probability is then

14​‖|ψ⟩+U​|ΟˆβŸ©β€–2=12+14β€‹βŸ¨Οˆ|​U+U†​|ψ⟩=12+Re⟨ψ|​U​|ψ⟩2.\displaystyle\frac{1}{4}\left\|\ket{\psi}+U\ket{\psi}\right\|^{2}=\frac{1}{2}+\frac{1}{4}\bra{\psi}U+U^{\dagger}\ket{\psi}=\frac{1}{2}+\frac{\real\bra{\psi}U\ket{\psi}}{2}\,.

We now can describe the constraint tests together:

  1. (i)

    With probability 1q​d​κ+1\frac{1}{qd\kappa+1}, check satisfiability. This succeeds with probability 1βˆ’usR1-\frac{u_{s}}{R}.

  2. (ii)

    With probability q​d​κq​d​κ+1\frac{qd\kappa}{qd\kappa+1}, generate |Ο•β€²βŸ©\ket{\phi^{\prime}}, and measure the second register in the Hadamard basis. If the output state is not |+⟩\ket{+}, reject. Otherwise, choose a random k∈[d]k\in[d], and perform a Hadamard test with Ξ k\Pi_{k}. This succeeds with probability 1κ​(12+12​𝔼k​[ReβŸ¨Ο•|​Πk​|Ο•βŸ©])=1κ​(1βˆ’ueq​d​R)\frac{1}{\kappa}(\frac{1}{2}+\frac{1}{2}\mathbb{E}_{k}[\real\bra{\phi}\Pi_{k}\ket{\phi}])=\frac{1}{\kappa}(1-\frac{u_{e}}{qdR}).121212Note that in our protocol, βŸ¨Ο•|​Πk​|Ο•βŸ©\bra{\phi}\Pi_{k}\ket{\phi} is always real because |Ο•βŸ©\ket{\phi} and Ξ k\Pi_{k} have real values.

The overall success probability of the constraint tests is

1q​d​κ+1​(1βˆ’usR)+q​d​κq​d​κ+1​(1ΞΊβ‹…(1βˆ’ueq​d​R))=q​d+1q​d​κ+1βˆ’ue+usRβ‹…(q​d​κ+1).\displaystyle\frac{1}{qd\kappa+1}(1-\frac{u_{s}}{R})+\frac{qd\kappa}{qd\kappa+1}\left(\frac{1}{\kappa}\cdot(1-\frac{u_{e}}{qdR})\right)=\frac{qd+1}{qd\kappa+1}-\frac{u_{e}+u_{s}}{R\cdot(qd\kappa+1)}\,.

We now show a constant gap between completeness and soundness. In completeness, ue=us=0u_{e}=u_{s}=0, so |ψ⟩\ket{\psi} passes the constraint tests with probability CYES:=q​d+1q​d​κ+1C^{\textnormal{YES}}:=\frac{qd+1}{qd\kappa+1}. In soundness, recall that 𝐯𝐚π₯(π’ž)≀δ\mathop{\bf val\/}(\mathcal{C})\leq\delta, so by 11, any rigid quantum proof passes the constraint tests with probability at most CYESβˆ’1βˆ’Ξ΄q​d​κ+1C^{\textnormal{YES}}-\frac{1-\delta}{qd\kappa+1}. We now apply LemmaΒ 10: any quantum proof that passes Density test and Validity test with probabilities too similar to that in completeness must pass the constraint tests with probability less than CYESC^{\textnormal{YES}}.

Corollary 13.

In soundness, if D​(|ψ⟩)=1ΞΊβˆ’d1D(\ket{\psi})=\frac{1}{\kappa}-d_{1} and V​(|ψ⟩)=1βˆ’1ΞΊβˆ’d2V(\ket{\psi})=1-\frac{1}{\kappa}-d_{2}, then

C​(|ψ⟩)≀CYESβˆ’1βˆ’Ξ΄q​d​κ+1+(κ​d1+(ΞΊ+1)​κ⋅d2)1/2.\displaystyle C(\ket{\psi})\leq C^{\textnormal{YES}}-\frac{1-\delta}{qd\kappa+1}+\left(\kappa d_{1}+(\kappa+1)\sqrt{\kappa\cdot d_{2}}\right)^{1/2}\,.

3.3 Analysis

In the protocol, Arthur applies Density test, Validity test, or constraint tests with probability p1,p2,p3p_{1},p_{2},p_{3}, respectively, where p3=1βˆ’p1βˆ’p2p_{3}=1-p_{1}-p_{2}.

We start by analyzing the success probability of the protocol in completeness. Here, 𝐯𝐚π₯(π’ž)=1\mathop{\bf val\/}(\mathcal{C})=1, and the quantum proof |ψ⟩=1Rβ€‹βˆ‘j|jβŸ©β€‹|vβ†’j⟩\ket{\psi}=\frac{1}{R}\sum_{j}\ket{j}\ket{\vec{v}_{j}} is such that vβ†’j\vec{v}_{j} is a satisfying assignment to the variables that participate in π’žj\mathcal{C}_{j}. The success probability for each test is exactly 1ΞΊ\frac{1}{\kappa}, 1βˆ’1ΞΊ1-\frac{1}{\kappa}, and CYESC^{\textnormal{YES}}, respectively. So the success probability of the protocol in completeness is PYES=p1ΞΊ+p2​(1βˆ’1ΞΊ)+p3​CYESP_{\textnormal{YES}}=\frac{p_{1}}{\kappa}+p_{2}(1-\frac{1}{\kappa})+p_{3}C^{\textnormal{YES}}.

We now choose the probabilities p1,p2,p3p_{1},p_{2},p_{3}. Choose Ξ»:=1βˆ’Ξ΄q​d​κ+1\lambda:=\frac{1-\delta}{qd\kappa+1}.

  1. 1.

    We first set a distance threshold Ξ΅:=λΓ\varepsilon:=\frac{\lambda}{\Gamma} for a large enough constant Γ​(ΞΊ,q,d,Ξ΄)\Gamma(\kappa,q,d,\delta) satisfying

    (κ​Ρ+(ΞΊ+1)​κ⋅Ρ)1/2≀λ2.\displaystyle\left(\kappa\varepsilon+(\kappa+1)\sqrt{\kappa\cdot\varepsilon}\right)^{1/2}\leq\frac{\lambda}{2}\,.
  2. 2.

    Let Z:=12+1+Ξ΅4​(1βˆ’CYES)Z:=\frac{1}{2}+1+\frac{\varepsilon}{4(1-C^{\textnormal{YES}})}. Then let

    p1\displaystyle p_{1} =12β‹…1Z\displaystyle=\frac{1}{2}\cdot\frac{1}{Z} p2\displaystyle p_{2} =1Z\displaystyle=\frac{1}{Z} p3\displaystyle p_{3} =Ξ΅4​(1βˆ’CYES)β‹…1Z.\displaystyle=\frac{\varepsilon}{4(1-C^{\textnormal{YES}})}\cdot\frac{1}{Z}\,.

Now we study soundness, i.e. when 𝐯𝐚π₯(π’ž)≀δ\mathop{\bf val\/}(\mathcal{C})\leq\delta. We again denote the quantum proof as |ψ⟩\ket{\psi}. We divide up the analysis into a few parts:

  1. 1.

    A quantum proof that is β€œtoo sparse” (i.e.Β D​(|ψ⟩)=1ΞΊβˆ’dD(\ket{\psi})=\frac{1}{\kappa}-d for any dβ‰₯Ξ΅d\geq\varepsilon) is detected by Density test.

    PNO\displaystyle P_{\textnormal{NO}} =p1​(1ΞΊβˆ’d)+p2​V​(|ψ⟩)+p3​C​(|ψ⟩)\displaystyle=p_{1}(\frac{1}{\kappa}-d)+p_{2}V(\ket{\psi})+p_{3}C(\ket{\psi})
    ≀PYESβˆ’p1​d+p3​(1βˆ’CYES)\displaystyle\leq P_{\textnormal{YES}}-p_{1}d+p_{3}(1-C^{\textnormal{YES}})
    ≀PYESβˆ’p1​Ρ+p3​(1βˆ’CYES)\displaystyle\leq P_{\textnormal{YES}}-p_{1}\varepsilon+p_{3}(1-C^{\textnormal{YES}})
    =PYESβˆ’Ξ΅2​Z+Ξ΅4​Z=PYESβˆ’Ξ΅4​Z.\displaystyle=P_{\textnormal{YES}}-\frac{\varepsilon}{2Z}+\frac{\varepsilon}{4Z}=P_{\textnormal{YES}}-\frac{\varepsilon}{4Z}\,.
  2. 2.

    A quantum proof that is β€œtoo dense” (i.e.Β D​(|ψ⟩)=1ΞΊ+dD(\ket{\psi})=\frac{1}{\kappa}+d for any dβ‰₯Ξ΅d\geq\varepsilon) is detected by Validity test.

    PNO\displaystyle P_{\textnormal{NO}} =p1​(1ΞΊ+d)+p2​V​(|ψ⟩)+p3​C​(|ψ⟩)\displaystyle=p_{1}(\frac{1}{\kappa}+d)+p_{2}V(\ket{\psi})+p_{3}C(\ket{\psi})
    ≀p1​(1ΞΊ+d)+p2​(1βˆ’1ΞΊβˆ’d)+p3\displaystyle\leq p_{1}(\frac{1}{\kappa}+d)+p_{2}(1-\frac{1}{\kappa}-d)+p_{3}
    =PYESβˆ’(p2βˆ’p1)​d+p3​(1βˆ’CYES)\displaystyle=P_{\textnormal{YES}}-(p_{2}-p_{1})d+p_{3}(1-C^{\textnormal{YES}})
    ≀PYESβˆ’(p2βˆ’p1)​Ρ+p3​(1βˆ’CYES)\displaystyle\leq P_{\textnormal{YES}}-(p_{2}-p_{1})\varepsilon+p_{3}(1-C^{\textnormal{YES}})
    =PYESβˆ’Ξ΅2​Z+Ξ΅4​Z=PYESβˆ’Ξ΅4​Z,\displaystyle=P_{\textnormal{YES}}-\frac{\varepsilon}{2Z}+\frac{\varepsilon}{4Z}=P_{\textnormal{YES}}-\frac{\varepsilon}{4Z}\,,

    where the first inequality follows from LemmaΒ 7.

  3. 3.

    A quantum proof that is β€œthe right density” (i.e. D​(|ψ⟩)=1ΞΊ+d1D(\ket{\psi})=\frac{1}{\kappa}+d_{1} for |d1|≀Ρ|d_{1}|\leq\varepsilon) but far from β€œvalid” (V​(|ψ⟩)=1βˆ’1ΞΊβˆ’d2V(\ket{\psi})=1-\frac{1}{\kappa}-d_{2} for d2β‰₯Ξ΅d_{2}\geq\varepsilon) is detected by Validity test when p2>p1p_{2}>p_{1}.

    PNO\displaystyle P_{\textnormal{NO}} ≀p1​(1ΞΊ+|d1|)+p2​(1βˆ’1ΞΊβˆ’d2)+p3\displaystyle\leq p_{1}(\frac{1}{\kappa}+|d_{1}|)+p_{2}(1-\frac{1}{\kappa}-d_{2})+p_{3}
    ≀PYES+p1​|d1|βˆ’p2​d2+p3​(1βˆ’CYES)\displaystyle\leq P_{\textnormal{YES}}+p_{1}|d_{1}|-p_{2}d_{2}+p_{3}(1-C^{\textnormal{YES}})
    ≀PYESβˆ’(p2βˆ’p1)​Ρ+p3​(1βˆ’CYES)\displaystyle\leq P_{\textnormal{YES}}-(p_{2}-p_{1})\varepsilon+p_{3}(1-C^{\textnormal{YES}})
    =PYESβˆ’Ξ΅4​Z.\displaystyle=P_{\textnormal{YES}}-\frac{\varepsilon}{4Z}\,.
  4. 4.

    Lastly, a quantum proof that is nearly rigid (i.e. D​(|ψ⟩)=1ΞΊ+d1D(\ket{\psi})=\frac{1}{\kappa}+d_{1} and V​(|ψ⟩)=1βˆ’1ΞΊβˆ’d2V(\ket{\psi})=1-\frac{1}{\kappa}-d_{2} for any |d1|,d2≀Ρ|d_{1}|,d_{2}\leq\varepsilon) is detected by the constraint tests.

    PNO\displaystyle P_{\textnormal{NO}} =p1​(1ΞΊ+d1)+p2​(1βˆ’1ΞΊβˆ’d2)+p3​C​(|ψ⟩)\displaystyle=p_{1}(\frac{1}{\kappa}+d_{1})+p_{2}(1-\frac{1}{\kappa}-d_{2})+p_{3}C(\ket{\psi})
    ≀PYES+p1​d1βˆ’p2​d2+p3​(βˆ’1βˆ’Ξ΄q​d​κ+1+(κ​d1+(ΞΊ+1)​κ⋅d2)1/2)\displaystyle\leq P_{\textnormal{YES}}+p_{1}d_{1}-p_{2}d_{2}+p_{3}\left(-\frac{1-\delta}{qd\kappa+1}+\left(\kappa d_{1}+(\kappa+1)\sqrt{\kappa\cdot d_{2}}\right)^{1/2}\right)
    ≀PYES+p1​d1βˆ’p2​d2βˆ’p3​λ2.\displaystyle\leq P_{\textnormal{YES}}+p_{1}d_{1}-p_{2}d_{2}-p_{3}\frac{\lambda}{2}\,.

    The first inequality follows from CorollaryΒ 13, and the second inequality holds by our choice of Ξ΅\varepsilon. Note that d2β‰₯0d_{2}\geq 0 by LemmaΒ 6. By LemmaΒ 7, if d1β‰₯0d_{1}\geq 0, then d1≀d2d_{1}\leq d_{2}; otherwise d1≀d2d_{1}\leq d_{2} trivially. So then

    PNO\displaystyle P_{\textnormal{NO}} ≀PYESβˆ’(p2βˆ’p1)​d2βˆ’p3​λ2≀PYESβˆ’Ξ΅β€‹Ξ»8​(1βˆ’CYES)​Z.\displaystyle\leq P_{\textnormal{YES}}-(p_{2}-p_{1})d_{2}-p_{3}\frac{\lambda}{2}\leq P_{\textnormal{YES}}-\frac{\varepsilon\lambda}{8(1-C^{\textnormal{YES}})Z}\,.

Combining these cases proves the following result:

Theorem 14.

Given an instance of (1,Ξ΄)(1,\delta)-GapCSP, the 𝖰𝖬𝖠log+{\mathsf{QMA}}^{+}_{\log} protocol succeeds with probability PYESP^{\textnormal{YES}} in completeness and at most PYESβˆ’Ξ”P^{\textnormal{YES}}-\Delta in soundness for some constants 1>PYES>Ξ”>01>P^{\textnormal{YES}}>\Delta>0.

Corollary 15.

There exist constants 1>PYES>Ξ”>01>P^{\textnormal{YES}}>\Delta>0 such that π–­π–―βŠ†π–°π–¬π– log+{\mathsf{NP}}\subseteq{\mathsf{QMA}}^{+}_{\log} with completeness PYESP^{\textnormal{YES}} and soundness PYESβˆ’Ξ”P^{\textnormal{YES}}-\Delta.

4 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} protocol for 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}

Our goal in this section is to modify the previous protocol to solve an 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-complete problem. Again by the PCP theorem, the succinct (1,Ξ΄)(1,\delta)-GapCSP problem with exponentially many variables and clauses is 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-complete. The succinctness allows us to efficiently describe the problem input. What remains is to ensure that the verifier’s protocol is efficient. Previously, the unitary transformations were efficient because the verifier handled poly​(n)\mathrm{poly}(n)-size graphs. Furthermore, the expanders used to check the equality constraints for each variable may have different sizes. Now that there can be exponentially many possibilities for the size of each cluster, naively applying the previous technique is not efficient. These challenges were addressed inΒ [JW23] by considering a PCP construction for 𝖭𝖀𝖷𝖯{\mathsf{NEXP}} with strong properties.

Theorem 16 ([JW23]).

There is a 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}-hard (1,Ξ΄)(1,\delta)-GapCSP instance for some (N=2poly​(n),R=2poly​(n),q=O​(1),Ξ£={0,1})(N=2^{\mathrm{poly}(n)},R=2^{\mathrm{poly}(n)},q=O(1),\Sigma=\{0,1\})-CSP system π’ž\mathcal{C} that is both Ο„\tau-strongly uniform for some constant Ο„\tau and polylog​(N​R)\mathrm{polylog}(NR)-doubly explicit.

Informally, every constraint in a succinct CSP system must be computable in polynomial time. The doubly explicit property further requires the existence of efficient maps from variables to constraints and from constraints to variables. Intuitively, these maps allow us to efficiently implement the Hadamard test of the consistency checks.

We include the formal definition of these properties. Define A​d​jπ’ž(j)\mathop{Adj\/}_{\mathcal{C}}(j) to be the list of variables participating in π’žj\mathcal{C}_{j}, and A​d​jV(i)\mathop{Adj\/}_{V}(i) be the list of constraints that depend on variable ii.

Definition 17 (Doubly explicit CSP).

A (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP system π’ž\mathcal{C} is Z​(N,R)Z(N,R)-doubly explicit if for all i∈[N]i\in[N] and j∈[R]j\in[R], the following are computable in time Z​(N,R)Z(N,R):

  1. (i)

    Cardinality of A​d​jV(i)\mathop{Adj\/}_{V}(i) and A​d​jπ’ž(j)\mathop{Adj\/}_{\mathcal{C}}(j) for all i∈[N]i\in[N] and j∈[R]j\in[R].

  2. (ii)

    A​d​jπ’žind:[R]Γ—[N]β†’[q]\mathop{Adj\/}_{\mathcal{C}}^{\text{ind}}:[R]\times[N]\rightarrow[q]; if ii participates in π’žj\mathcal{C}_{j}, then A​d​jπ’žind(j,i)=Δ±\mathop{Adj\/}_{\mathcal{C}}^{\text{ind}}(j,i)=\imath is the index of ii in A​d​jπ’ž(j)\mathop{Adj\/}_{\mathcal{C}}(j).

  3. (iii)

    A​d​jπ’žid:[R]Γ—[q]β†’[N]\mathop{Adj\/}_{\mathcal{C}}^{\text{id}}:[R]\times[q]\rightarrow[N]; A​d​jπ’žid(j,Δ±)=i\mathop{Adj\/}_{\mathcal{C}}^{\text{id}}(j,\imath)=i is the Δ±\imath-th variable of A​d​jπ’ž(j)\mathop{Adj\/}_{\mathcal{C}}(j).

  4. (iv)

    A​d​jVind:[N]Γ—[R]β†’[R]\mathop{Adj\/}_{V}^{\text{ind}}:[N]\times[R]\rightarrow[R]; if ii participates in π’žj\mathcal{C}_{j}, then A​d​jVind(i,j)=Θ·\mathop{Adj\/}_{V}^{\text{ind}}(i,j)=\jmath is the index of jj in A​d​jV(i)\mathop{Adj\/}_{V}(i).

  5. (v)

    A​d​jVid:[N]Γ—[R]β†’[R]\mathop{Adj\/}_{V}^{\text{id}}:[N]\times[R]\rightarrow[R]; A​d​jVid(i,Θ·)=j\mathop{Adj\/}_{V}^{\text{id}}(i,\jmath)=j is the Θ·\jmath-th variable A​d​jV(i)\mathop{Adj\/}_{V}(i).

This property alone is not enough for efficient regularization: the verifier must know how to implement an expander of size |A​d​jV(i)|\left|\mathop{Adj\/}_{V}(i)\right| for all variables ii. The strongly uniform property resolves this complication.

Definition 18 (Strongly uniform CSP).

Let Ο„βˆˆβ„•\tau\in\mathbb{N}. A (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP system π’ž\mathcal{C} is Ο„\tau-strongly uniform if the variable set [N][N] can be partitioned into at most Ο„\tau different subsets ⋃yVy\bigcup_{y}V_{y} such that |A​d​jV(i)|=|A​d​jV(j)|=nk|\mathop{Adj\/}_{V}(i)|=|\mathop{Adj\/}_{V}(j)|=n_{k} if ii and jj belong to the same part VkV_{k}. Furthermore, the part k∈[Ο„]k\in[\tau] can be determined in time polylog​(N​R)\mathrm{polylog}(NR).

A Ο„\tau-strongly uniform CSP system allows the verifier to use Ο„\tau different (possibly exponential size) dd-regular expanders. These can be constructed in polynomial time:

Theorem 19 (Doubly explicit expander graphs [Lub09, Alo21]).

There is a constant dd such that the following explicit constructions of expander graphs exist:

  1. 1.

    For every nn, there is a dd-regular graph on nn vertices.

  2. 2.

    For every prime p>17p>17, there is a dd-regular graph on n=p​(p2βˆ’1)n=p(p^{2}-1) vertices, and the graph can be decomposed into dd permutations Ο€1,…,Ο€d\pi_{1},\dots,\pi_{d} that can each be evaluated in time polylog​(n)\mathrm{polylog}(n).131313In fact, since these graphs are Cayley graphs, both the permutations and their inverses can be evaluated in time polylog​(n)\mathrm{polylog}(n). We use both Ο€k\pi_{k} and Ο€kβˆ’1\pi_{k}^{-1} in the constraint tests to implement the unitary β„³k\mathcal{M}_{k}.

Furthermore, the neighbors of each variable can be listed in polylog​(n)\mathrm{polylog}(n), and the graphs have Cheeger constant at least 2.

With this theorem, the verifier can choose a large constant n0n_{0}, and use Construction 1 if ni≀n0n_{i}\leq n_{0}. Otherwise, the verifier can cover almost all nin_{i} vertices with an explicit expander using Construction 2.

Theorem 20 (Primes in short intervals [Che13]).

There is an absolute constant k0k_{0} such that for any integer k>k0k>k_{0}, there is a prime in the interval [kβˆ’4​k2/3,k][k-4k^{2/3},k].

We modify the protocol to expect the quantum proof |p1,p2,…,pΟ„βŸ©βŠ—1Rβ€‹βˆ‘j∈R|jβŸ©β€‹|vβ†’j⟩\ket{p_{1},p_{2},\dots,p_{\tau}}\otimes\frac{1}{R}\sum_{j\in R}\ket{j}\ket{\vec{v}_{j}} such that each pi∈[⌊ni1/3βŒ‹βˆ’4β€‹βŒŠni1/3βŒ‹2/3,⌊ni1/3βŒ‹]p_{i}\in[\lfloor n_{i}^{1/3}\rfloor-4\lfloor n_{i}^{1/3}\rfloor^{2/3},\lfloor n_{i}^{1/3}\rfloor]. The verifier measures the primes, and can always check that every pip_{i} is a prime number in the required range. The rest of the analysis is similar to the 𝖭𝖯{\mathsf{NP}} protocol, but regularized using these efficient expanders. We first explain how to efficiently implement the constraint tests, and then analyze the 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} protocol.

4.1 Efficient constraint tests

We show how to efficiently implement consistency checks that imply a version of 11. Fix any vertex ii. Let nn be the number of constraints that depend on ii and pp be the corresponding prime. Let n0n_{0} be a large enough constant. If n≀n0n\leq n_{0}, then use Construction 1 dd-regular expander to wire new copies of the vertex together, just as for 𝖭𝖯{\mathsf{NP}}. Otherwise, use Construction 2 to generate a dd-regular expander graph of size p​(p2βˆ’1)∈[nβˆ’O​(n8/9),n]p(p^{2}-1)\in[n-O(n^{8/9}),n] that wires nearly all copies of the vertex together. Then add dd self-loops for the remaining vertices. The number of vertices with self loops is at most some η​n\eta n (for some small constant Ξ·\eta) since p​(p2βˆ’1)β‰₯nβˆ’O​(n8/9)p(p^{2}-1)\geq n-O(n^{8/9}); we can make Ξ·\eta arbitrarily small by choosing a large enough n0n_{0}.

Claim 21 ([JW23]).

Consider a (N,R,q,Ξ£)(N,R,q,\Sigma)-CSP system π’ž\mathcal{C}, and apply efficient regularization. If 𝐯𝐚π₯(π’ž)=1\mathop{\bf val\/}(\mathcal{C})=1, then all β€œconsistency constraints” can be simultaneously satisfied. If 𝐯𝐚π₯(π’ž)≀δ\mathop{\bf val\/}(\mathcal{C})\leq\delta, then the total number of unsatisfied constraints is at least (1βˆ’Ξ΄βˆ’q​η)​R(1-\delta-q\eta)R.

The analysis of 21 is similar to 11. The additional factor of q​ηq\eta comes from the self-loop constraints; these can be satisfied without violating any β€œconsistency constraint”.

After measuring the primes, let the verifier act on the space β„‚RβŠ—β„‚ΞΊβŠ—β„‚NβŠ—β„‚|Ξ£|\mathbb{C}^{R}\otimes\mathbb{C}^{\kappa}\otimes\mathbb{C}^{N}\otimes\mathbb{C}^{|\Sigma|}. We explicitly define the unitary operators that are used in the 𝖭𝖯{\mathsf{NP}} protocol. These definitions exactly matchΒ [JW23]. First, operator π’œ\mathcal{A} expands the values from the list of values of variables involved in each constraint:

π’œ:|jβŸ©β€‹|vβŸ©β€‹|0βŸ©β€‹|0⟩\displaystyle\mathcal{A}:\ket{j}\ket{v}\ket{0}\ket{0} β†’1qβ€‹βˆ‘r=1q|jβŸ©β€‹|vβ†’βŸ©β€‹|irβŸ©β€‹|vr⟩,\displaystyle\rightarrow\frac{1}{q}\sum_{r=1}^{q}\ket{j}\ket{\vec{v}}\ket{i_{r}}\ket{v_{r}}\,,

Here, vv is the list of values of variables involved in constraint jj, iri_{r} is the rr-th variable involved in jj, and vrv_{r} is the value of iri_{r} according to vv. Next, define the permutation operators β„³k\mathcal{M}_{k} for each k∈[d]k\in[d] that implement the dd permutations of each efficiently constructed expander:

β„³k:|jβŸ©β€‹|vβŸ©β€‹|iβŸ©β€‹|vβ€²βŸ©β†’|Ξ k​(j,i)βŸ©β€‹|vβŸ©β€‹|iβŸ©β€‹|vβ€²βŸ©\displaystyle\mathcal{M}_{k}:\ket{j}\ket{v}\ket{i}\ket{v^{\prime}}\rightarrow\ket{\Pi_{k}(j,i)}\ket{v}\ket{i}\ket{v^{\prime}}

The last operation computes the constraints in superposition:

ℬ​|jβŸ©β€‹|vβŸ©β€‹|0βŸ©β†’|jβŸ©β€‹|vβŸ©β€‹|π’žj​(v)⟩\displaystyle\mathcal{B}\ket{j}\ket{v}\ket{0}\rightarrow\ket{j}\ket{v}\ket{\mathcal{C}_{j}(v)}
Theorem 22 ([JW23]).

π’œ,ℬ,β„³k\mathcal{A},\mathcal{B},\mathcal{M}_{k} can be implemented by 𝖑𝖰𝖯{\mathsf{BQP}} circuits.

4.2 Analysis

The analysis is nearly the same as in the 𝖭𝖯{\mathsf{NP}} protocol, with the minor difference that the verifier also receives p1,…,pΟ„p_{1},\ldots,p_{\tau} in the quantum proof. The rigidity tests are unchanged. For the constraint tests, the verifier can use the explicit operators π’œ,ℬ,β„³k\mathcal{A},\mathcal{B},\mathcal{M}_{k}:

  1. (i)

    For satisfiability, the prover computes ℬ​|ΟˆβŸ©β€‹|0⟩\mathcal{B}\ket{\psi}\ket{0} and measures the second qubit in the standard basis.

  2. (ii)

    For consistency, the prover computes π’œβ€‹|ψ⟩\mathcal{A}\ket{\psi}, selects random d∈[k]d\in[k], and uses β„³k\mathcal{M}_{k} in Hadamard test.

We already know that for a quantum proof of the valid form, we can write the success probability as:

C​(|ψ⟩)\displaystyle C(\ket{\psi}) =q​d+1q​d​κ+1βˆ’ue+usRβ‹…(q​d​κ+1)\displaystyle=\frac{qd+1}{qd\kappa+1}-\frac{u_{e}+u_{s}}{R\cdot(qd\kappa+1)}

To be able to analyze soundness, all that is left is to reprove CorollaryΒ 13 to handle the subtle difference between 21 and 11. Let D​(|ψ⟩)=1ΞΊΒ±d1D(\ket{\psi})=\frac{1}{\kappa}\pm d_{1} and V​(|ψ⟩)=1βˆ’1ΞΊβˆ’d2V(\ket{\psi})=1-\frac{1}{\kappa}-d_{2}, then we can write:

C​(|ψ⟩)\displaystyle C(\ket{\psi}) =CYESβˆ’ue+usRβ‹…(q​d​κ+1)\displaystyle=C^{\textnormal{YES}}-\frac{u_{e}+u_{s}}{R\cdot(qd\kappa+1)}
≀CYESβˆ’Rβ‹…(1βˆ’Ξ΄βˆ’q​η)Rβ‹…(q​d​κ+1)+(κ​d1+(ΞΊ+1)​κ⋅d2)1/2.\displaystyle\leq C^{\textnormal{YES}}-\frac{R\cdot(1-\delta-q\eta)}{R\cdot(qd\kappa+1)}+\left(\kappa d_{1}+(\kappa+1)\sqrt{\kappa\cdot d_{2}}\right)^{1/2}\,.

We can choose a small enough Ξ·\eta (via large enough n0n_{0}) so that η​q<1βˆ’Ξ΄2\eta q<\frac{1-\delta}{2}.

Corollary 23.

If D​(|ψ⟩)=1ΞΊΒ±d1D(\ket{\psi})=\frac{1}{\kappa}\pm d_{1} and V​(ψ)=1βˆ’1ΞΊβˆ’d2V(\psi)=1-\frac{1}{\kappa}-d_{2}, then:

C​(|ψ⟩)≀CYESβˆ’1βˆ’Ξ΄2​(q​d​κ+1)+(κ​d1+(ΞΊ+1)​κ⋅d2)1/2C(\ket{\psi})\leq C^{\textnormal{YES}}-\frac{1-\delta}{2\left(qd\kappa+1\right)}+\left(\kappa d_{1}+(\kappa+1)\sqrt{\kappa\cdot d_{2}}\right)^{1/2}

For soundness, the same analysis of SectionΒ 3.3 goes through by reducing Ξ»\lambda by a factor of 22; this change comes from CorollaryΒ 23, which handles the extra q​ηq\eta self-loop constraints. All together:

Theorem 24.

Consider (1,Ξ΄)(1,\delta)-GapCSP with a (N=2poly​(n),R=2poly​(n),q=O​(1),Ξ£={0,1})(N=2^{\mathrm{poly}(n)},R=2^{\mathrm{poly}(n)},q=O(1),\Sigma=\{0,1\})-CSP system that is polylog​(N​R)\mathrm{polylog}(NR)-doubly explicit and O​(1)O(1)-strongly uniform. The 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} protocol solves this problem with completeness cc and soundness ss for some constants 1>c>s>01>c>s>0.

Corollary 25.

There exist constants 1>c>s>01>c>s>0 such that π–­π–€π–·π–―βŠ†π–°π–¬π– c,s+{\mathsf{NEXP}}\subseteq{\mathsf{QMA}}^{+}_{c,s}.

5 Subtle features of 𝖰𝖬𝖠+{\mathsf{QMA}}^{+}

5.1 Promise symmetry matters

One can imagine restricting to proofs with non-negative amplitudes only in completeness. But this class is equal to 𝖰𝖬𝖠{\mathsf{QMA}}:

Fact 26.

Consider the class 𝖰𝖬𝖠+β€²{\mathsf{QMA}}^{+^{\prime}}, where the proof must have non-negative amplitudes only in completeness. Since subset states have non-negative amplitudes, π–²π–°π–¬π– βŠ†π–°π–¬π– +β€²βŠ†π–°π–¬π– {\mathsf{SQMA}}\subseteq{\mathsf{QMA}}^{+^{\prime}}\subseteq{\mathsf{QMA}}. By [GKS14], 𝖲𝖰𝖬𝖠=𝖰𝖬𝖠+β€²=𝖰𝖬𝖠{\mathsf{SQMA}}={\mathsf{QMA}}^{+^{\prime}}={\mathsf{QMA}}.

Instead, 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} also restricts the proof in soundness, which reduces the ways Merlin can β€œdeceive” Arthur. This increases the power of the complexity class:

Corollary 27.

Notice that 𝖰𝖬𝖠c,s+β€²βŠ†π–°π–¬π– c,s+{\mathsf{QMA}}^{+^{\prime}}_{c,s}\subseteq{\mathsf{QMA}}^{+}_{c,s} for any choice of 0≀c,s≀10\leq c,s\leq 1, since any 𝖰𝖬𝖠c,s+β€²{\mathsf{QMA}}^{+^{\prime}}_{c,s} protocol is also a 𝖰𝖬𝖠c,s+{\mathsf{QMA}}^{+}_{c,s} protocol. Since 𝖰𝖬𝖠=𝖰𝖬𝖠+β€²{\mathsf{QMA}}={\mathsf{QMA}}^{+^{\prime}}, π–°π–¬π– βŠ†π–°π–¬π– c,s+{\mathsf{QMA}}\subseteq{\mathsf{QMA}}^{+}_{c,s} whenever c<1c<1 and cβˆ’sβ‰₯1p​(n)c-s\geq\frac{1}{p(n)} for any polynomial p​(n)p(n).

In general, suppose β„›\mathcal{R} is a set of quantum states that approximate all quantum states (i.e. an Ο΅\epsilon-covering) by at least an inverse polynomial in number of qubits. Then 𝖰𝖬𝖠{\mathsf{QMA}} is equal to 𝖰𝖬𝖠{\mathsf{QMA}} restricted to β„›\mathcal{R} in completeness, and at most 𝖰𝖬𝖠{\mathsf{QMA}} restricted to β„›\mathcal{R} in both completeness and soundness.

Furthermore, classes that modify 𝖰𝖬𝖠{\mathsf{QMA}} only in completeness enjoy promise gap amplification through parallel repetition. This does not hold for promise-symmetric modifications. We provide a simple example of how parallel repetition fails to amplify the promise gap of 𝖰𝖬𝖠+{\mathsf{QMA}}^{+}:

Fact 28.

Consider a Hermitian and positive semidefinite matrix MM. Let β€–Mβ€–+:=max|v⟩β‰₯0⁑‖M​|vβŸ©β€–2β€–|vβŸ©β€–2\|M\|_{+}:=\max_{\ket{v}\geq 0}\frac{\|M\ket{v}\|_{2}}{\|\ket{v}\|_{2}} be the maximum value among real non-negative vectors. Then it is possible for β€–MβŠ—Mβ€–+>β€–Mβ€–+2\|M\otimes M\|_{+}>\|M\|_{+}^{2}.

Proof.

Consider two qubits and the projector M=|xβˆ’βŸ©β€‹βŸ¨xβˆ’|M=\ket{x_{-}}\bra{x_{-}}, where MM projects into the Pauli-X basis (i.e. |xβˆ’βŸ©=12​(|0βŸ©βˆ’|1⟩)\ket{x_{-}}=\frac{1}{\sqrt{2}}(\ket{0}-\ket{1})). Then β€–Mβ€–+=12\|M\|_{+}=\frac{1}{\sqrt{2}}, maximized at |0⟩\ket{0} or |1⟩\ket{1}. But using the state |Ο‡βŸ©=12​(|00⟩+|11⟩)\ket{\chi}=\frac{1}{\sqrt{2}}(\ket{00}+\ket{11}), β€–MβŠ—Mβ€–+β‰₯β€–M​|Ο‡βŸ©β€–=12>β€–Mβ€–+2\|M\otimes M\|_{+}\geq\|M\ket{\chi}\|=\frac{1}{\sqrt{2}}>\|M\|_{+}^{2}. ∎

5.2 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} at some constant gap equals 𝖰𝖬𝖠{\mathsf{QMA}}

Perhaps surprisingly, 𝖰𝖬𝖠c,s+{\mathsf{QMA}}^{+}_{c,s} equals 𝖰𝖬𝖠{\mathsf{QMA}} for some constants 1>c>s>01>c>s>0. This is because every quantum state can be approximated (up to a constant) by a quantum state without relative phase:

Proposition 29.

𝖰𝖬𝖠c,s+βŠ†π–°π–¬π– c,4​s{\mathsf{QMA}}^{+}_{c,s}\subseteq{\mathsf{QMA}}_{c,4s}.

Proof.

Consider a problem in 𝖰𝖬𝖠c,s+{\mathsf{QMA}}^{+}_{c,s}, and let Ξ 1\Pi_{1} be its accepting operator. We will use the same circuit in 𝖰𝖬𝖠{\mathsf{QMA}}, and analyze the new completeness and soundness.

  • β€’

    (completeness) The same completeness proof is a valid proof for 𝖰𝖬𝖠{\mathsf{QMA}}, accepting with completeness cc.

  • β€’

    (soundness) Recall that βŸ¨Ο‡|​Π1​|Ο‡βŸ©β‰€s\bra{\chi}\Pi_{1}\ket{\chi}\leq s for any |Ο‡βŸ©\ket{\chi} with non-negative amplitudes.

    Consider any state |ψ⟩\ket{\psi} with real (but possibly negative) amplitudes. Separate and normalize its positive entries and negative entries, i.e. |ψ⟩=p​|ψ+βŸ©βˆ’1βˆ’p​|Οˆβˆ’βŸ©\ket{\psi}=\sqrt{p}\ket{\psi_{+}}-\sqrt{1-p}\ket{\psi_{-}}. Notice that ⟨ψ+|Οˆβˆ’βŸ©=0\bra{\psi_{+}}\ket{\psi_{-}}=0, so |ψ⟩\ket{\psi} is of unit norm. Then

    ⟨ψ|​Π1​|ψ⟩\displaystyle\bra{\psi}\Pi_{1}\ket{\psi} =pβ€‹βŸ¨Οˆ+|​Π1​|ψ+⟩+(1βˆ’p)β€‹βŸ¨Οˆβˆ’|​Π1​|Οˆβˆ’βŸ©βˆ’p​(1βˆ’p)​(βŸ¨Οˆβˆ’|​Π1​|ψ+⟩+⟨ψ+|​Π1​|Οˆβˆ’βŸ©)\displaystyle=p\bra{\psi_{+}}\Pi_{1}\ket{\psi_{+}}+(1-p)\bra{\psi_{-}}\Pi_{1}\ket{\psi_{-}}-\sqrt{p(1-p)}(\bra{\psi_{-}}\Pi_{1}\ket{\psi_{+}}+\bra{\psi_{+}}\Pi_{1}\ket{\psi_{-}})
    ≀pβ€‹βŸ¨Οˆ+|​Π1​|ψ+⟩+(1βˆ’p)β€‹βŸ¨Οˆβˆ’|​Π1​|Οˆβˆ’βŸ©+2​p​(1βˆ’p)β€‹βŸ¨Οˆβˆ’|​Π1​|Οˆβˆ’βŸ©β€‹βŸ¨Οˆ+|​Π1​|ψ+⟩\displaystyle\leq p\bra{\psi_{+}}\Pi_{1}\ket{\psi_{+}}+(1-p)\bra{\psi_{-}}\Pi_{1}\ket{\psi_{-}}+2\sqrt{p(1-p)}\sqrt{\bra{\psi_{-}}\Pi_{1}\ket{\psi_{-}}\bra{\psi_{+}}\Pi_{1}\ket{\psi_{+}}}
    ≀s+2​s​p​(1βˆ’p)≀2​s,\displaystyle\leq s+2s\sqrt{p(1-p)}\leq 2s\,,

    where the first inequality holds by Cauchy-Schwarz because Ξ 1\Pi_{1} is positive semidefinite.

    Similarly, consider any state with arbitrary amplitudes. Separate and normalize its real and imaginary entries, i.e. |Ο•βŸ©=p′​|Ο•β„βŸ©+i​1βˆ’p′​|Ο•iβ€‹β„βŸ©\ket{\phi}=\sqrt{p^{\prime}}\ket{\phi_{\mathbb{R}}}+i\sqrt{1-p^{\prime}}\ket{\phi_{i\mathbb{R}}}. Notice that |Ο•βŸ©\ket{\phi} is still unit norm. By the same calculation, one finds that βŸ¨Ο•|​Π1​|Ο•βŸ©β‰€4​s\bra{\phi}\Pi_{1}\ket{\phi}\leq 4s.

∎

Corollary 30.

For any 0<Ξ΅<0.20<\varepsilon<0.2, 𝖰𝖬𝖠0.8+Ξ΅,0.2+=𝖰𝖬𝖠{\mathsf{QMA}}^{+}_{0.8+\varepsilon,0.2}={\mathsf{QMA}}.

Proof.

𝖰𝖬𝖠0.8+Ξ΅,0.2+βŠ†π–°π–¬π– {\mathsf{QMA}}^{+}_{0.8+\varepsilon,0.2}\subseteq{\mathsf{QMA}} follows from PropositionΒ 29. The other direction follows from CorollaryΒ 27. ∎

This is a strange phenomenon: depending on the choice of constants c>sc>s, 𝖰𝖬𝖠c,s+{\mathsf{QMA}}^{+}_{c,s} could be as small as 𝖰𝖬𝖠{\mathsf{QMA}} and as large as 𝖭𝖀𝖷𝖯{\mathsf{NEXP}}!141414 Note that the same phenomenon holds for 𝖰𝖬𝖠+​(2){\mathsf{QMA}}^{+}(2) and 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2) with nearly the same proof. This is why [JW23] was perceived as β€œjust a constant gap away” from proving 𝖰𝖬𝖠​(2)=𝖭𝖀𝖷𝖯{\mathsf{QMA}}(2)={\mathsf{NEXP}}. See FigureΒ 2 for a pictorial description. An implication of our work is that assuming 𝖀𝖷𝖯≠𝖭𝖀𝖷𝖯{\mathsf{EXP}}\neq{\mathsf{NEXP}}, 𝖰𝖬𝖠+{\mathsf{QMA}}^{+} simply cannot be amplified.

6 Open questions

  1. 1.

    What is the relationship of 𝖰𝖬𝖠{\mathsf{QMA}} and 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2)? Our result does not immediately say anything about 𝖰𝖬𝖠{\mathsf{QMA}} and 𝖰𝖬𝖠​(2){\mathsf{QMA}}(2). It only suggests that for 𝖰𝖬𝖠{\mathsf{QMA}}, the restriction of relative phase is maximally strong. For example, it is possible that 𝖰𝖬𝖠​(2)=𝖭𝖀𝖷𝖯{\mathsf{QMA}}(2)={\mathsf{NEXP}}; i.e. the restriction of entanglement across a fixed barrier may be just as powerful. In fact, showing 𝖰𝖬𝖠​(2)=𝖰𝖬𝖠+​(2){\mathsf{QMA}}(2)={\mathsf{QMA}}^{+}(2) is still an open route to proving 𝖰𝖬𝖠​(2)=𝖭𝖀𝖷𝖯{\mathsf{QMA}}(2)={\mathsf{NEXP}}, but in light of this work, amplification for 𝖰𝖬𝖠+​(2){\mathsf{QMA}}^{+}(2) must crucially rely on the unentanglement promise.

  2. 2.

    Are other complexity classes sensitive to different constant-sized promise gaps? We show that for 𝖰𝖬𝖠c,s+{\mathsf{QMA}}^{+}_{c,s}, the parameter cs\frac{c}{s} can be β€œtuned” to change the power of the class from 𝖰𝖬𝖠{\mathsf{QMA}} to 𝖭𝖀𝖷𝖯{\mathsf{NEXP}} (see also FigureΒ 2). Do other complexity classes drastically change power with different promise gaps? One similar class is 𝖲𝖑𝖰𝖯{\mathsf{SBQP}}Β [Kup15], which equals 𝖑𝖰𝖯c,s{\mathsf{BQP}}_{c,s} when cs=2\frac{c}{s}=2 (but unlike our work, cc and ss are exponentially small). However, when cs\frac{c}{s} is allowed to be any number above 11, 𝖑𝖰𝖯c,s{\mathsf{BQP}}_{c,s} is equal to 𝖯𝖯{\mathsf{PP}}Β [DGF22]. Note that relative to oracles, 𝖲𝖑𝖰𝖯{\mathsf{SBQP}} is not closed under intersection, which was used to separate it from 𝖰𝖬𝖠{\mathsf{QMA}}Β [AKKT20].

  3. 3.

    State complexity vs. decision complexity? Although we prove that there are constants c1,s1,c2,s2c_{1},s_{1},c_{2},s_{2} such that 𝖰𝖬𝖠c1,s1+=𝖰𝖬𝖠+​(2)c2,s2{\mathsf{QMA}}^{+}_{c_{1},s_{1}}={\mathsf{QMA}}^{+}(2)_{c_{2},s_{2}}, we do not prove the existence of any product test (as inΒ [HM13]). In fact, it is possible that no product test exists! This would show a separation between the complexity of decision problems and state synthesis problems; i.e. 𝖰𝖬𝖠+=𝖰𝖬𝖠+​(2){\mathsf{QMA}}^{+}={\mathsf{QMA}}^{+}(2) but π—Œπ—π–Ίπ—π–Ύπ–°π–¬π– +β‰ π—Œπ—π–Ίπ—π–Ύπ–°π–¬π– +​(2){\mathsf{stateQMA}}^{+}\neq{\mathsf{stateQMA}}^{+}(2). In fact, it is even possible that 𝖰𝖬𝖠=𝖰𝖬𝖠​(2){\mathsf{QMA}}={\mathsf{QMA}}(2) but π—Œπ—π–Ίπ—π–Ύπ–°π–¬π– β‰ π—Œπ—π–Ίπ—π–Ύπ–°π–¬π– β€‹(2){\mathsf{stateQMA}}\neq{\mathsf{stateQMA}}(2). This inquiry can help us understand whether (or how) the power of unentanglement is useful when solving decision problems.

Acknowledgements

Thanks to Zachary Remscrim for collaborating on early stages of this project. Thanks to Noam Lifshitz, Dor Minzer, and Kevin Pratt for answering questions about algebraic constructions of expanders. Thanks to Srinivasan Arunachalam, Fernando Granha Jeronimo, Supartha Podder, and Pei Wu for comments on a draft of this manuscript.

BF and RB acknowledge support from AFOSR (award number FA9550-21-1-0008). This material is based upon work partially supported by the National Science Foundation under Grant CCF-2044923 (CAREER) and by the U.S. Department of Energy, Office of Science, National Quantum Information Science Research Centers as well as by DOE QuantISED grant DE-SC0020360. KM acknowledges support from the National Science Foundation Graduate Research Fellowship Program under Grant No. DGE-1746045. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

References

  • [Aar21] Scott Aaronson. Open Problems Related to Quantum Query Complexity, 2021. arXiv:2109.06917.
  • [ABD+08] Scott Aaronson, Salman Beigi, Andrew Drucker, Bill Fefferman, and Peter Shor. The Power of Unentanglement, 2008. arXiv:0804.0802.
  • [AKKT20] Scott Aaronson, Robin Kothari, William Kretschmer, and Justin Thaler. Quantum Lower Bounds for Approximate Counting via Laurent Polynomials, 2020. URL https://drops.dagstuhl.de/opus/volltexte/2020/12559/.
  • [ALM+98] Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. Proof Verification and the Hardness of Approximation Problems. J. ACM, 45(3):501–555, 1998. URL https://doi.org/10.1145/278298.278306.
  • [Alo21] Noga Alon. Explicit expanders of every degree and size. Combinatorica, pages 1–17, 2021. arXiv:2003.11673.
  • [AS92] Sanjeev Arora and Shmuel Safra. Probabilistic Checking of Proofs; A New Characterization of NP. In 33rd Annual Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, USA, 24-27 October 1992, pages 2–13. IEEE Computer Society, 1992. URL https://doi.org/10.1109/SFCS.1992.267824.
  • [BC23] Anne Broadbent and Eric Culf. Rigidity for Monogamy-Of-Entanglement Games, 2023. URL https://drops.dagstuhl.de/opus/volltexte/2023/17531/.
  • [BFM22] Roozbeh Bassirian, Bill Fefferman, and Kunal Marwaha. On the power of nonstandard quantum oracles. 2022. arXiv:2212.00098.
  • [BT10] Hugue Blier and Alain Tapp. A quantum characterization of NP, 2010. arXiv:0709.0738.
  • [Bur11] Samuel Burer. Copositive programming. In Handbook on semidefinite, conic and polynomial optimization, pages 201–218. Springer, 2011. URL https://link.springer.com/chapter/10.1007/978-1-4614-0769-0_8.
  • [CD10] Jing Chen and Andrew Drucker. Short multi-prover quantum proofs for SAT without entangled measurements. 2010. arXiv:1011.0716.
  • [CF11] Alessandro Chiesa and MichaelΒ A Forbes. Improved soundness for QMA with multiple provers. 2011. arXiv:1108.2098.
  • [Che13] YuanyouΒ Furui Cheng. Explicit Estimate on Primes between Consecutive Cubes, 2013. arXiv:0810.2113.
  • [CHSH69] JohnΒ F Clauser, MichaelΒ A Horne, Abner Shimony, and RichardΒ A Holt. Proposed experiment to test local hidden-variable theories. Physical review letters, 23(15):880, 1969. URL https://doi.org/10.1103/PhysRevLett.23.880.
  • [CMMN20] David Cui, Arthur Mehta, Hamoon Mousavi, and SeyedΒ Sajjad Nezhadi. A generalization of CHSH and the algebraic structure of optimal strategies. Quantum, 4:346, oct 2020. arXiv:1911.01593.
  • [DGF22] Abhinav Deshpande, AlexeyΒ V Gorshkov, and Bill Fefferman. Importance of the Spectral gap in Estimating Ground-State Energies. PRX Quantum, 3(4):040327, 2022. arXiv:2007.11582.
  • [Din07] Irit Dinur. The PCP theorem by gap amplification. Journal of the ACM (JACM), 54(3):12–es, 2007. URL https://dl.acm.org/doi/abs/10.1145/1236457.1236459.
  • [Gha09] Sevag Gharibian. Strong NP-Hardness of the Quantum Separability Problem, 2009. arXiv:0810.4507.
  • [GKS14] AlexΒ B. Grilo, Iordanis Kerenidis, and Jamie Sikora. QMA with subset state witnesses, 2014. arXiv:1410.2882.
  • [GNN12] FranΓ§oisΒ Le Gall, Shota Nakagawa, and Harumichi Nishimura. On QMA protocols with two short quantum proofs. Quantum Inf. Comput., 12(7-8):589–600, 2012. URL https://doi.org/10.26421/QIC12.7-8-4.
  • [GSS+18] Sevag Gharibian, Miklos Santha, Jamie Sikora, Aarthi Sundaram, and Justin Yirka. Quantum Generalizations of the Polynomial Hierarchy with Applications to QMA(2), 2018. URL http://drops.dagstuhl.de/opus/volltexte/2018/9640/.
  • [Har04] Prahladh Harsha. Robust PCPs of proximity and shorter PCPs. PhD thesis, Massachusetts Institute of Technology, 2004. URL https://dspace.mit.edu/bitstream/handle/1721.1/26720/59552830-MIT.pdf.
  • [HM13] AramΒ W. Harrow and Ashley Montanaro. Testing product states, quantum Merlin-Arthur games and tensor optimization. Journal of the ACM (JACM), 60(1):1–43, 2013. arXiv:1001.0017.
  • [JNV+21] Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, and Henry Yuen. Mip*= re. Communications of the ACM, 64(11):131–138, 2021. arXiv:2001.04383.
  • [JW23] FernandoΒ Granha Jeronimo and Pei Wu. The Power of Unentangled Quantum Proofs with Non-negative Amplitudes. 55th Annual ACM Symposium on Theory of Computing, 2023. URL https://doi.org/10.1145/3564246.3585248.
  • [KMY03] Hirotada Kobayashi, Keiji Matsumoto, and Tomoyuki Yamakami. Quantum Merlin-Arthur Proof Systems: Are Multiple Merlins More Helpful to Arthur?, 2003. arXiv:quant-ph/0306051.
  • [Kup15] Greg Kuperberg. How hard is it to approximate the Jones polynomial? Theory of Computing, 11(1):183–219, 2015. URL https://doi.org/10.4086/toc.2015.v011a006.
  • [Lub09] Alexander Lubotzky. Finite simple groups of Lie type as expanders, 2009. arXiv:0904.3411.
  • [McK13] Matthew McKague. On the power quantum computation over real Hilbert spaces. International Journal of Quantum Information, 11(01):1350001, feb 2013. arXiv:1109.0795.
  • [MW05] Chris Marriott and John Watrous. Quantum Arthur-Merlin Games, 2005. arXiv:cs/0506068.
  • [MY04] Dominic Mayers and Andrew Yao. Self testing quantum apparatus, 2004. arXiv:quant-ph/0307205.
  • [NZ23] Anand Natarajan and Tina Zhang. Quantum free games. 2023. arXiv:2302.04322.
  • [Per12] Attila PereszlΓ©nyi. Multi-Prover Quantum Merlin-Arthur Proof Systems with Small Gap, 2012. arXiv:1205.2761.
  • [RUV13] BenΒ W Reichardt, Falk Unger, and Umesh Vazirani. Classical command of quantum systems. Nature, 496(7446):456–460, 2013. URL https://doi.org/10.1038/nature12035.
  • [SY22] Adrian She and Henry Yuen. Unitary property testing lower bounds by polynomials, 2022. arXiv:2210.05885.
  • [Tsi93] BorisΒ S Tsirelson. Some results and problems on quantum Bell-type inequalities. Hadronic Journal Supplement, 8(4):329–345, 1993. URL http://www.math.tau.ac.il/~tsirel/download/hadron.pdf.
  • [Xu23] Jianwei Xu. Quantifying the phase of quantum states, 2023. arXiv:2304.09028.