https://papers.cool/arxiv/cs.CCComputational Complexity2024-11-01T00:00:00+00:00python-feedgenCool Papers - Immersive Paper Discoveryhttps://papers.cool/arxiv/2410.23618Learning quantum states prepared by shallow circuits in polynomial time2024-11-01T00:00:00+00:00Zeph LandauYunchao LiuWe give a polynomial time algorithm that, given copies of an unknown quantum state $\vert\psi\rangle=U\vert 0^n\rangle$ that is prepared by an unknown constant depth circuit $U$ on a finite-dimensional lattice, learns a constant depth quantum circuit that prepares $\vert\psi\rangle$. The algorithm extends to the case when the depth of $U$ is $\mathrm{polylog}(n)$, with a quasi-polynomial run-time. The key new idea is a simple and general procedure that efficiently reconstructs the global state $\vert\psi\rangle$ from its local reduced density matrices. As an application, we give an efficient algorithm to test whether an unknown quantum state on a lattice has low or high quantum circuit complexity.https://papers.cool/arxiv/2410.23811UniqueQMA vs QMA: oracle separation and eigenstate thermalization hypothesis2024-11-01T00:00:00+00:00Anurag AnshuJonas HaferkampYeongwoo HwangQuynh T. NguyenWe study the long-standing open question of the power of unique witness in quantum protocols, which asks if UniqueQMA, a variant of QMA whose accepting witness space is 1-dimensional, is equal to QMA. We show a quantum oracle separation between UniqueQMA and QMA via an extension of the Aaronson-Kuperberg's QCMA vs QMA oracle separation. In particular, we show that any UniqueQMA protocol must make $\Omega(\sqrt{D})$ queries to a subspace phase oracle of unknown dimension $\leq D$ to "find" the subspace. This presents an obstacle to relativizing techniques in resolving this question (unlike its classical analogue - the Valiant-Vazirani theorem - which is essentially a black-box reduction) and suggests the need to study the structure of the ground space of local Hamiltonians in distilling a potential unique witness. Our techniques also yield a quantum oracle separation between QXC, the class characterizing quantum approximate counting, and QMA. Very few structural properties are known that place the complexity of local Hamiltonians in UniqueQMA. We expand this set of properties by showing that the ground energy of local Hamiltonians that satisfy the eigenstate thermalization hypothesis (ETH) can be estimated through a UniqueQMA protocol. Specifically, our protocol can be viewed as a quantum expander test in a low energy subspace of the Hamiltonian and verifies a unique entangled state in two copies of the subspace. This allows us to conclude that if UniqueQMA $\neq$ QMA, then QMA-hard Hamiltonians must violate ETH under adversarial perturbations (more accurately, under the quantum PCP conjecture if ETH only applies to extensive energy subspaces). Our results serve as evidence that chaotic local Hamiltonians, such as the SYK model, contain polynomial verifiable quantum states in their low energy regime and may be simpler than general local Hamiltonians if UniqueQMA $\neq$ QMA.https://papers.cool/arxiv/2410.23900An Algorithm for a Modification of the Shortest Common Superstring Problem2024-11-01T00:00:00+00:00Arthur GilfanovThe purpose of this study is to develop an efficient algorithm to solve a variation of the NP-hard Shortest Common Superstring (SCS) problem. In this version of the problem, one string is allowed to have up to K mistakes, meaning it does not match the SCS in at most K places. Also, there is a slight constraint on the problem in that no string can be a substring of another. The algorithm proposed is exact, not an approximation, meaning it finds the best answer in all cases.https://papers.cool/arxiv/2410.23913Efficient Inference and Computation of Optimal Alternatives for Preference Languages Based On Lexicographic Models2024-11-01T00:00:00+00:00Nic WilsonAnne-Marie GeorgeWe analyse preference inference, through consistency, for general preference languages based on lexicographic models. We identify a property, which we call strong compositionality, that applies for many natural kinds of preference statement, and that allows a greedy algorithm for determining consistency of a set of preference statements. We also consider different natural definitions of optimality, and their relations to each other, for general preference languages based on lexicographic models. Based on our framework, we show that testing consistency, and thus inference, is polynomial for a specific preference language LpqT, which allows strict and non-strict statements, comparisons between outcomes and between partial tuples, both ceteris paribus and strong statements, and their combination. Computing different kinds of optimal sets is also shown to be polynomial; this is backed up by our experimental results.https://papers.cool/arxiv/2410.23958Space-bounded quantum interactive proof systems2024-11-01T00:00:00+00:00François Le GallYupan LiuHarumichi NishimuraQisheng WangWe introduce two models of space-bounded quantum interactive proof systems, ${\sf QIPL}$ and ${\sf QIP_{\rm U}L}$. The ${\sf QIP_{\rm U}L}$ model, a space-bounded variant of quantum interactive proofs (${\sf QIP}$) introduced by Watrous (CC 2003) and Kitaev and Watrous (STOC 2000), restricts verifier actions to unitary circuits. In contrast, ${\sf QIPL}$ allows logarithmically many intermediate measurements per verifier action (with a high-concentration condition on yes instances), making it the weakest model that encompasses the classical model of Condon and Ladner (JCSS 1995). We characterize the computational power of ${\sf QIPL}$ and ${\sf QIP_{\rm U}L}$. When the message number $m$ is polynomially bounded, ${\sf QIP_{\rm U}L} \subsetneq {\sf QIPL}$ unless ${\sf P} = {\sf NP}$: - ${\sf QIPL}$ exactly characterizes ${\sf NP}$. - ${\sf QIP_{\rm U}L}$ is contained in ${\sf P}$ and contains ${\sf SAC}^1 \cup {\sf BQL}$, where ${\sf SAC}^1$ denotes problems solvable by classical logarithmic-depth, semi-unbounded fan-in circuits. However, this distinction vanishes when $m$ is constant. Our results further indicate that intermediate measurements uniquely impact space-bounded quantum interactive proofs, unlike in space-bounded quantum computation, where ${\sf BQL}={\sf BQ_{\rm U}L}$. We also introduce space-bounded unitary quantum statistical zero-knowledge (${\sf QSZK_{\rm U}L}$), a specific form of ${\sf QIP_{\rm U}L}$ proof systems with statistical zero-knowledge against any verifier. This class is a space-bounded variant of quantum statistical zero-knowledge (${\sf QSZK}$) defined by Watrous (SICOMP 2009). We prove that ${\sf QSZK_{\rm U}L} = {\sf BQL}$, implying that the statistical zero-knowledge property negates the computational advantage typically gained from the interaction.https://papers.cool/arxiv/2410.23969Interactive proofs for verifying (quantum) learning and testing2024-11-01T00:00:00+00:00Matthias C. CaroJens EisertMarcel HinscheMarios IoannouAlexander NietnerRyan SwekeWe consider the problem of testing and learning from data in the presence of resource constraints, such as limited memory or weak data access, which place limitations on the efficiency and feasibility of testing or learning. In particular, we ask the following question: Could a resource-constrained learner/tester use interaction with a resource-unconstrained but untrusted party to solve a learning or testing problem more efficiently than they could without such an interaction? In this work, we answer this question both abstractly and for concrete problems, in two complementary ways: For a wide variety of scenarios, we prove that a resource-constrained learner cannot gain any advantage through classical interaction with an untrusted prover. As a special case, we show that for the vast majority of testing and learning problems in which quantum memory is a meaningful resource, a memory-constrained quantum algorithm cannot overcome its limitations via classical communication with a memory-unconstrained quantum prover. In contrast, when quantum communication is allowed, we construct a variety of interactive proof protocols, for specific learning and testing problems, which allow memory-constrained quantum verifiers to gain significant advantages through delegation to untrusted provers. These results highlight both the limitations and potential of delegating learning and testing problems to resource-rich but untrusted third parties.https://papers.cool/arxiv/2410.23989Persuading a Credible Agent2024-11-01T00:00:00+00:00Jiarui GanAbheek GhoshNicholas TehHow to optimally persuade an agent who has a private type? When elicitation is feasible, this amounts to a fairly standard principal-agent-style mechanism design problem, where the persuader employs a mechanism to first elicit the agent's type and then plays the corresponding persuasion strategy based on the agent's report. The optimal mechanism design problem in this setting is relatively well-understood in the literature, with incentive compatible (IC) mechanisms known to be optimal and computationally tractable. In this paper, we study this problem given a credible agent, i.e., if the agent claims they are of a certain type in response to the mechanism's elicitation, then they will act optimally with respect to the claimed type, even if they are actually not of that type. We present several interesting findings in this new setting that differ significantly from results in the non-credible setting. In terms of the structure of optimal mechanisms, we show that not only may IC mechanisms fail to be optimal, but all mechanisms following the standard `eliciting-then-persuading' mechanism design structure may be suboptimal. To achieve optimality requires two additional instruments -- pre-signaling and non-binding elicitation -- which naturally result in multi-stage mechanisms. We characterize optimal mechanisms under these design choices. Based on our characterization, we provide a polynomial-time algorithm for computing optimal multi-stage mechanisms. We also discover that in scenarios that allow for it, partial information elicitation can be employed to improve the principal's payoff even further. Though, surprisingly, an unbounded number of rounds of information exchange between the principal and the agent may be necessary to achieve optimality.