Quantum Computational Complexity: John Watrous
Quantum Computational Complexity: John Watrous
John Watrous
Institute for Quantum Computing and School of Computer Science
University of Waterloo, Waterloo, Ontario, Canada.
arXiv:0804.3401v1 [quant-ph] 21 Apr 2008
Article outline
I. Definition of the subject and its importance
II. Introduction
III. The quantum circuit model
IV. Polynomial-time quantum computations
V. Quantum proofs
VI. Quantum interactive proof systems
VII. Other selected notions in quantum complexity
VIII. Future directions
IX. References
Glossary
Quantum circuit.
A quantum circuit is an acyclic network of quantum gates connected by wires: the gates represent
quantum operations and the wires represent the qubits on which these operations are performed.
The quantum circuit model is the most commonly studied model of quantum computation.
Quantum proof.
A quantum proof is a quantum state that plays the role of a witness or certificate to a quan-
tum computer that runs a verification procedure. The quantum complexity class QMA is defined
by this notion: it includes all decision problems whose yes-instances are efficiently verifiable by
means of quantum proofs.
1
I Definition of the subject and its importance
The inherent difficulty, or hardness, of computational problems is a fundamental concept in com-
putational complexity theory. Hardness is typically formalized in terms of the resources required
by different models of computation to solve a given problem, such as the number of steps of a
deterministic Turing machine. A variety of models and resources are often considered, including
deterministic, nondeterministic and probabilistic models; time and space constraints; and inter-
actions among models of differing abilities. Many interesting relationships among these different
models and resource constraints are known.
One common feature of the most commonly studied computational models and resource con-
straint is that they are physically motivated. This is quite natural, given that computers are physical
devices, and to a significant extent it is their study that motivates and directs research on compu-
tational complexity. The predominant example is the class of polynomial-time computable func-
tions, which ultimately derives its relevance from physical considerations; for it is a mathematical
abstraction of the class of functions that can be efficiently computed without error by physical
computing devices.
In light of its close connection to the physical world, it seems only natural that modern physical
theories should be considered in the context of computational complexity. In particular, quantum
mechanics is a clear candidate for a physical theory to have the potential for implications, if not to
computational complexity then at least to computation more generally. Given the steady decrease
in the size of computing components, it is inevitable that quantum mechanics will become increas-
ingly relevant to the construction of computers—for quantum mechanics provides a remarkably
accurate description of extremely small physical systems (on the scale of atoms) where classical
physical theories have failed completely. Indeed, an extrapolation of Moore’s Law predicts sub-
atomic computing components within the next two decades [83, 78]; a possibility inconsistent with
quantum mechanics as it is currently understood.
That quantum mechanics should have implications to computational complexity theory, how-
ever, is much less clear. It is only through the remarkable discoveries and ideas of several re-
searchers, including Richard Feynman [50], David Deutsch [41, 42], Ethan Bernstein and Umesh
Vazirani [30, 31], and Peter Shor [93, 94], that this potential has become evident. In particular,
Shor’s polynomial-time quantum factoring and discrete-logarithm algorithms [94] give strong
support to the conjecture that quantum and classical computers yield differing notions of compu-
tational hardness. Other quantum complexity-theoretic concepts, such as the efficient verification
of quantum proofs, suggest a wider extent to which quantum mechanics influences computational
complexity.
It may be said that the principal aim of quantum computational complexity theory is to un-
derstand the implications of quantum physics to computational complexity theory. To this end, it
considers the hardness of computational problems with respect to models of quantum computa-
tion, classifications of problems based on these models, and their relationships to classical models
and complexity classes.
II Introduction
This article surveys quantum computational complexity, with a focus on three fundamental no-
tions: polynomial-time quantum computations, the efficient verification of quantum proofs, and
quantum interactive proof systems. Based on these notions one defines quantum complexity
classes, such as BQP, QMA, and QIP, that contain computational problems of varying hardness.
2
Properties of these complexity classes, and the relationships among these classes and classical
complexity classes, are presented. As these notions and complexity classes are typically defined
within the quantum circuit model, this article includes a section that focuses on basic properties
of quantum circuits that are important in the setting of quantum complexity. A selection of other
topics in quantum complexity, including quantum advice, space-bounded quantum computation,
and bounded-depth quantum circuits, is also presented.
Two different but closely related areas of study are not discussed in this article: quantum query
complexity and quantum communication complexity. Readers interested in learning more about these
interesting and active areas of research may find the surveys of Brassard [35], Cleve [36], and
de Wolf [107] to be helpful starting points.
It is appropriate that brief discussions of computational complexity theory and quantum in-
formation precede the main technical portion of the article. These discussions are intended only
to highlight the aspects of these topics that are non-standard, require clarification, or are of partic-
ular importance in quantum computational complexity. In the subsequent sections of this article,
the reader is assumed to have basic familiarity with both topics, which are covered in depth by
several text books [14, 44, 61, 68, 84, 87].
3
P A promise problem A = ( Ayes , Ano ) is in P if and only if there exists a polynomial-
time deterministic Turing machine M that accepts every string x ∈ Ayes and rejects
every string x ∈ Ano .
BPP A promise problem A = ( Ayes , Ano ) is in BPP if and only if there exists a
polynomial-time probabilistic Turing machine M that accepts every string x ∈ Ayes
with probability at least 2/3, and accepts every string x ∈ Ano with probability at
most 1/3.
SZK A promise problem A = ( Ayes , Ano ) is in SZK if and only if it has a statistical zero-
knowledge interactive proof system.
PSPACE A promise problem A = ( Ayes , Ano ) is in PSPACE if and only if there exists a
deterministic Turing machine M running in polynomial space that accepts every
string x ∈ Ayes and rejects every string x ∈ Ano .
EXP A promise problem A = ( Ayes , Ano ) is in EXP if and only if there exists a determin-
istic Turing machine M running in exponential time (meaning time bounded by 2 p ,
for some polynomial-bounded function p), that accepts every string x ∈ Ayes and
rejects every string x ∈ Ano .
NEXP A promise problem A = ( Ayes , Ano ) is in NEXP if and only if there exists an
exponential-time non-deterministic Turing machine N for A.
4
NEXP
EXP
PSPACE
AM PP
SZK MA
BPP NP
NC
PL
Figure 1: A diagram illustrating known inclusions among most of the classical complexity classes
discussed in this paper. Lines indicate containments going upward; for example, AM is contained
in PSPACE.
For most of the complexity classes listed above, there is a standard way to attach an oracle
to the machine model that defines the class, which provides a subroutine for solving instances
of a chosen problem B = ( Byes , Bno ). One then denotes the existence of such an oracle with a
superscript—for example, PB is the class of promise problems that can be solved in polynomial
time by a deterministic Turing machine equipped with an oracle that solves instances of B (at unit
cost). When classes of problems appear as superscripts, one takes the union, as in the following
example:
PNP = PB .
[
B ∈NP
5
II.2 Quantum information
The standard general description of quantum information is used in this article: mixed states of
systems are represented by density matrices and operations are represented by completely pos-
itive trace-preserving linear maps. The choice to use this description of quantum information is
deserving of a brief discussion, for it will likely be less familiar to many non-experts than the
simplified picture of quantum information where states are represented by unit vectors and op-
erations are represented by unitary matrices. This simplified picture is indeed commonly used in
the study of both quantum algorithms and quantum complexity theory; and it is often adequate.
However, the general picture has major advantages: it unifies quantum information with classical
probability theory, brings with it powerful mathematical tools, and allows for simple and intuitive
descriptions in many situations where this is not possible with the simplified picture.
Classical simulations of quantum computations, which are discussed below in Section IV.5,
may be better understood through a fairly straightforward representation of quantum operations
by matrices. This representation begins with a representation of density matrices as vectors based
on the function defined as vec(| xihy|) = | xi |yi for each choice of n ∈ N and x, y ∈ Σn , and
extended by linearity to all matrices indexed by Σn . The effect of this mapping is to form a column
vector by reading the entries of a matrix in rows from left to right, starting at the top. For example,
α
α β β
vec =γ .
γ δ
δ
Now, the effect of a general quantum operation Φ, represented in the typical Kraus form as
k
Φ( ρ) = ∑ A j ρA∗j ,
j =1
The matrix
k
KΦ = ∑ Aj ⊗ Aj
j =1
is sometimes called the natural representation (or linear representation) of the operation Φ. Although
this matrix could have negative or complex entries, one can reasonably view it as being analogous
to a stochastic matrix that describes a probabilistic computation.
For example, the complete phase-damping channel for a single qubit can be written
D ( ρ ) = |0i h 0| ρ |0 i h 0| + |1i h 1| ρ |1 i h 1| .
The effect of this mapping is to zero-out the off-diagonal entries of a density matrix:
α β α 0
D = .
γ δ 0 δ
6
Φ1
Y1
X1 Φ2 Φ4
X2 Y2
Φ3 Φ5
X3 Φ6
X4 Y3
Figure 2: An example of a quantum circuit. The input qubits are labelled X1 , . . . , X4 , the output
qubits are labelled Y1 , . . . , Y3 , and the gates are labelled by (hypothetical) quantum operations
Φ1 , . . . , Φ6 .
1 0 0 0
0 0 0 0
KD = .
0 0 0 0
0 0 0 1
7
Toffoli gate Hadamard gate
| ai | ai
(− a
| ai H √1 |0i + √1) |1i
|bi |bi 2 2
|ci |c ⊕ ab i
| ai P i a | ai |0i |0i
Erasure gate
ρ Tr
Figure 3: A universal collection of quantum gates: Toffoli, Hadamard, phase-shift, ancillary, and
erasure gates.
2. Hadamard gates. Hadamard gates are single-qubit unitary gates defined by the following
action on standard basis states:
1 (−1) a
H : | a i 7 → √ |0i + √ |1i .
2 2
3. Phase-shift gates. Phase-shift gates are single-qubit unitary gates defined by the following
action on standard basis states:
P : | ai 7→ i a | ai .
4. Ancillary gates. Ancillary gates are non-unitary gates that take no input and produce a single
qubit in the state |0i as output.
5. Erasure gates. Erasure gates are non-unitary gates that take a single qubit as input and pro-
duce no output. Their effect is represented by the partial trace on the space corresponding
to the qubit they take as input.
The symbols used to denote these gates in quantum circuit diagrams are shown in Figure 3. Some
additional useful gates are illustrated in Figure 4, along with their realizations as circuits with
gates from the chosen basis set.
8
≡ H P P H |1 i ≡ |0 i
≡ |1 i Tr D ≡
|0 i Tr
Figure 4: Four additional quantum gates, together with their implementations as quantum cir-
cuits. Top left: a NOT gate. Top right: a constant |1i ancillary gate. Bottom left: a controlled-NOT
gate. Bottom right: a phase-damping (or decoherence) gate.
The above gate set is universal in a strong sense: every quantum operation can be approximated
to within any desired degree of accuracy by some quantum circuit. Moreover, the size of the
approximating circuit scales well with respect to the desired accuracy. Theorem 1, stated below,
expresses this fact in more precise terms, but requires a brief discussion of a specific sense in which
one quantum operation approximates another.
A natural and operationally meaningful way to measure the distance between two given quan-
tum operations Φ and Ψ is given by
1
δ(Φ, Ψ) = k Φ − Ψ k⋄ ,
2
where k·k⋄ denotes a norm usually known as the diamond norm [66, 68]. A technical discussion
of this norm is not necessary for the purposes of this article and is beyond its scope. Instead, an
intuitive description of the distance measure δ(Φ, Ψ) will suffice.
When considering the distance between quantum operations Φ and Ψ, it must naturally be as-
sumed that these operations agree on their numbers of input qubits and output qubits; so assume
that Φ and Ψ both map n qubits to m qubits for nonnegative integers n and m. Now, suppose that
an arbitrary quantum state on n or more qubits is prepared, one of the two operations Φ or Ψ is
applied to the first n of these qubits, and then a general measurement of all of the resulting qubits
takes place (including the m output qubits and the qubits that were not among the inputs to the
chosen quantum operation). Two possible probability distributions on measurement outcomes
arise: one corresponding to Φ and the other corresponding to Ψ. The quantity δ(Φ, Ψ) is simply
the maximum possible total variation distance between these distributions, ranging over all pos-
sible initial states and general measurements. This is a number between 0 and 1 that intuitively
represents the observable difference between quantum operations. In the special case that Φ and Ψ
take no inputs, the quantity δ(Φ, Ψ) is simply one-half the trace norm of the difference between the
two output states; a common and useful ways to measure the distance between quantum states.
Now the Universality Theorem, which represents an amalgamation of several results that suits
the needs of this article, may be stated. In particular, it incorporates the Solovay–Kitaev Theorem,
which provides a bound on the size of an approximating circuit as a function of the accuracy.
Theorem 1 (Universality Theorem). Let Φ be an arbitrary quantum operation from n qubits to m
qubits. Then for every ε > 0 there exists a quantum circuit Q with n input qubits and m output
qubits such that δ(Φ, Q) < ε. Moreover, for fixed n and m, the circuit Q may be taken to satisfy
size( Q) = poly(log(1/ε)).
9
X1 Y1 X1 Y1
X2 H Y2 X2 H Y2
X3 Tr X3 W1
| 0i Tr Z1 W2
Figure 5: A general quantum circuit (left) and its unitary purification (right).
Note that it is inevitable that the size of Q is exponential in n and m in the worst case [70]. Further
details on the facts comprising this theorem can be found in Nielsen and Chuang [84] and Kitaev,
Shen, and Vyalyi [68].
{ Rn : n ∈ N }
10
| xi | xi
H R6 H
|yi H H |y ⊕ f ( x)i
H H
|1i H Tr
of quantum gates, one for each possible query length. Each gate Rn is a unitary gate acting on
n + 1 qubits, with the effect on computational basis states given by
Rn | x, ai = | x, a ⊕ A( x)i (1)
for all x ∈ Σn and a ∈ Σ, where A is some predicate that represents the particular oracle under
consideration. When quantum computations relative to such an oracle are to be studied, quantum
circuits composed of ordinary quantum gates as well as the oracle gates { Rn } are considered; the
interpretation being that each instance of Rn in such a circuit represents one oracle query.
It is critical to many results concerning quantum oracles, as well as most results in the area
of quantum query complexity, that the above definition (1) takes each Rn to be unitary, thereby
allowing these gates to make queries “in superposition”. In support of this seemingly strong def-
inition is the fact, discussed in the next section, that any efficient algorithm (quantum or classical)
can be converted to a quantum circuit that closely approximates the action of these gates.
Finally, one may consider a more general situation in which the predicate A is replaced by
a function that outputs multiple bits. The definition of each gate Rn is adapted appropriately.
Alternately, one may restrict their attention to single-bit queries as discussed above, and use the
Bernstein–Vazirani algorithm [31] to simulate one multiple-bit query with one single-bit query as
illustrated in Figure 6.
11
IV.1 Polynomial-time generated circuit families and BQP
To define the class BQP using the quantum circuit model, it is necessary to briefly discuss encod-
ings of circuits and the notion of a polynomial-time generated circuit family.
It is clear that any quantum circuit formed from the gates described in the previous section
could be encoded as a binary string using any number of different encoding schemes. Such an
encoding scheme must be chosen, but its specifics are not important so long as the following
simple restrictions are satisfied:
1. The encoding is sensible: every quantum circuit is encoded by at least one binary string, and
every binary string encodes at most one quantum circuit.
2. The encoding is efficient: there is a fixed polynomial-bounded function p such that every
circuit of size N has an encoding with length at most p( N ). Specific information about the
structure of a circuit must be computable in polynomial time from an encoding of the circuit.
3. The encoding disallows compression: it is not possible to work with encoding schemes that
allow for extremely short (e.g., polylogarithmic-length) encodings of circuits; so for simplic-
ity it is assumed that the length of every encoding of a quantum circuit is at least the size of
the circuit.
Now, as any quantum circuit represents a finite computation with some fixed number of input
and output qubits, quantum algorithms are modelled by families of quantum circuits. The typical
assumption is that a quantum circuit family that describes an algorithm contains one circuit for
each possible input length. Precisely the same situation arises here as in the classical setting, which
is that it should be possible to efficiently generate the circuits in a given family in order for that
family to represent an efficient, finitely specified algorithm. The following definition formalizes
this notion.
This definition is slightly more general than what is needed to define BQP, but is convenient
for other purposes. For instance, it allows one to easily consider the situation in which the input,
or some part of the input, for some problem is hard-coded into a collection of circuits; or where
a computation for some input may be divided among several circuits. In the most typical case
that a polynomial-time generated family of the form {Qn : n ∈ N } is referred to, it should
be interpreted that this is a shorthand for {Q1n : n ∈ N }. Notice that every polynomial-time
generated family {Q x : x ∈ S} has the property that each circuit Q x has size polynomial in
| x |. Intuitively speaking, the number of quantum and classical computation steps required to
implement such a computation is polynomial; and so operations induced by the circuits in such a
family are viewed as representing polynomial-time quantum computations.
The complexity class BQP, which contains those promise problems abstractly viewed to be effi-
ciently solvable using a quantum computer, may now be defined. More precisely, BQP is the class
of promise problems that can be solved by polynomial-time quantum computations that may have
some small probability to make an error. For decision problems, the notion of a polynomial-time
quantum computation is equated with the computation of a polynomial-time generated quantum
circuit family Q = {Qn : n ∈ N }, where each circuit Qn takes n input qubits, and produces one
output qubit. The computation on a given input string x ∈ Σ∗ is obtained by first applying the
12
circuit Q| x | to the state | xih x|, and then measuring the output qubit with respect to the standard
basis. The measurement results 0 and 1 are interpreted as yes and no (or accept and reject), respec-
tively. The events that Q accepts x and Q rejects x are understood to have associated probabilities
determined in this way.
BQP Let A = ( Ayes , Ano ) be a promise problem and let a, b : N → [0, 1] be functions.
Then A ∈ BQP( a, b) if and only if there exists a polynomial-time generated family of
quantum circuits Q = {Qn : n ∈ N }, where each circuit Qn takes n input qubits and
produces one output qubit, that satisfies the following properties:
Similar to BPP, there is nothing special about the particular choice of error probability 1/3, other
than that it is a constant strictly smaller than 1/2. This is made clear in the next section.
There are several problems known to be in BQP but not known (and generally not believed)
to be in BPP. Decision-problem variants of the integer factoring and discrete logarithm problems,
shown to be in BQP by Shor [94], are at present the most important and well-known examples.
Proposition 3 (Error reduction for BQP). Suppose that a, b : N → [0, 1] are polynomial-time com-
putable functions and p : N → N is a polynomial-bounded function such that a(n) − b(n) ≥ 1/p(n)
for all but finitely many n ∈ N. Then for every choice of a polynomial-bounded function q : N → N
satisfying q(n) ≥ 2 for all but finitely many n ∈ N, it holds that
The above proposition may be proved in the same standard way that similar statements are
proved for classical probabilistic computations: by repeating a given computation some large (but
still polynomial) number of times, overwhelming statistical evidence is obtained so as to give the
correct answer with an extremely small probability of error. It is straightforward to represent this
sort of repeated computation within the quantum circuit model in such a way that the require-
ments of the definition of BQP are satisfied.
13
NAND gate FANOUT gate
X1 Tr
X D Y1
X2 Tr |0 i Y2
|1 i Y
Random bit
|0 i H D Y
Figure 7: Quantum circuit implementations of a NAND gate, a FANOUT gate, and a random bit.
The phase-damping gates, denoted by D, are only included for aesthetic reasons: they force the
purely classical behavior that would be expected of classical gates, but are not required for the
quantum simulation of BPP.
Observe first that the complexity class P may be defined in terms of Boolean circuit families
in a similar manner to BQP. In particular, a given promise problem A = ( Ayes , Ano ) is in P if and
only if there exists a polynomial-time generated family C = {Cn : n ∈ N } of Boolean circuits,
where each circuit Cn takes n input bits and outputs 1 bit, such that
1. C ( x) = 1 for all x ∈ Ayes , and
2. C ( x) = 0 for all x ∈ Ano .
A Boolean circuit-based definition of BPP may be given along similar lines: a given promise prob-
lem A = ( Ayes , Ano ) is in BPP if and only if there exists a polynomial-bounded function r and a
polynomial-time generated family C = {Cn : n ∈ N } of Boolean circuits, where each circuit Cn
takes n + r(n) input bits and outputs 1 bit, such that
1. Pr[C ( x, y) = 1] ≥ 2/3 for all x ∈ Ayes , and
2. Pr[C ( x, y) = 1] ≤ 1/3 for all x ∈ Ano ,
where y ∈ Σr (| x |) is chosen uniformly at random in both cases.
In both definitions, the circuit family C includes circuits composed of constant-size Boolean
logic gates—which for the sake of brevity may be assumed to be composed of NAND gates and
FANOUT gates. (FANOUT operations must be modelled as gates for the sake of the simulation.)
For the randomized case, it may be viewed that the random bits y ∈ Σr (| x |) are produced by gates
that take no input and output a single uniform random bit. As NAND gates, FANOUT gates,
and random bits are easily implemented with quantum gates, as illustrated in Figure 7, the circuit
family C can be simulated gate-by-gate to obtain a quantum circuit family Q = {Qn : n ∈ N } for
A that satisfies the definition of BQP. It follows that BPP ⊆ BQP.
14
Suppose that it is established that a particular promise problem A is in BQP, which by def-
inition means that there must exist an efficient quantum algorithm (represented by a family of
quantum circuits) for A. It is then natural to consider the use of that algorithm as a subroutine in
other quantum algorithms for more complicated problems, and one would like to be able to do
this without worrying about the specifics of the original algorithm. Ideally, the algorithm for A
should function as an oracle for A, as defined in Section III.4.
A problem arises, however, when queries to an algorithm for A are made in superposition.
Whereas it is quite common and useful to consider quantum algorithms that query oracles in
superposition, a given BQP algorithm for A is only guaranteed to work correctly on classical
inputs. It could be, for instance, that some algorithm for A begins by applying phase-damping
gates to all of its input qubits, or perhaps this happens inadvertently as a result of the computation.
Perhaps it is too much to ask that the existence of a BQP algorithm for A admits a subroutine
having the characteristics of an oracle for A?
The BQP subroutine theorem establishes that, up to exponentially small error, this is not too
much to ask: the existence of an arbitrary BQP algorithm for A implies the existence of a “clean”
subroutine for A with the characteristics of an oracle. A precise statement of the theorem follows.
Theorem 4 (BQP subroutine theorem). Suppose A = ( Ayes , Ano ) is a promise problem in BQP. Then
for any choice of a polynomial-bounded function p there exists a polynomial-bounded function q and a
polynomial-time generated family of unitary quantum circuits { Rn : n ∈ N } with the following proper-
ties:
h x, 0m , a ⊕ 1|Un | x, 0m , ai ≥ 1 − 2− p(n)
h x, 0m , a|Un | x, 0m , ai ≥ 1 − 2− p(n)
The proof of this theorem is remarkably simple: given a BQP algorithm for A, one first uses
Proposition 3 to obtain a circuit family Q having exponentially small error for A. The circuit
illustrated in Figure 8 then implements a unitary operation with the desired properties. This is
essentially a bounded-error quantum adaptation of a classic construction that allows arbitrary
deterministic computations to be performed reversibly [27, 97].
The following corollary expresses the main implication of the BQP subroutine theorem in
complexity-theoretic terms.
15
| xi
Qn Q−
n
1
|0m i
| ai
some insight into the limitations of quantum computers may be gained by establishing contain-
ments of BQP in the smallest classical complexity classes where this is possible.
The strongest containment known at this time is given by counting complexity. Counting com-
plexity began with Valiant’s work [99] on the complexity of computing the permanent, and was
further developed and applied in many papers (including [22, 48, 96], among many others).
The basic notion of counting complexity that is relevant to this article is as follows. Given
a polynomial-time nondeterministic Turing machine M and input string x ∈ Σ∗ , one denotes by
#M ( x) the number of accepting computation paths of M on x, and by #M ( x) the number of rejecting
computation paths of M on x. A function f : Σ∗ → Z is then said to be a GapP function if there
exists a polynomial-time nondeterministic Turing machine M such that f ( x) = #M ( x) − #M ( x)
for all x ∈ Σ∗ .
A variety of complexity classes can be specified in terms of GapP functions. For example, a
promise problem A = ( Ayes , Ano ) is in PP if and only if there exists a function f ∈ GapP such
that f ( x) > 0 for all x ∈ Ayes and f ( x) ≤ 0 for all x ∈ Ano . The remarkable closure properties of
GapP functions allows many interesting facts to be proved about such classes. Fortnow’s survey
[51] on counting complexity explains many of these properties and gives several applications of
the theory of GapP functions. The following closure property is used below.
GapP–multiplication of matrices. Let p, q : N → N be polynomial-bounded functions. Suppose
that for each n ∈ N a sequence of p(n) complex-valued matrices is given:
An,1 , An,2 , . . . , An,p(n),
each having rows and columns indexed by strings in Σq(n) . Suppose further that there exist func-
tions f , g ∈ GapP such that
f (1n , 1k , x, y) = Re ( An,k [ x, y])
g(1n , 1k , x, y) = Im ( An,k [ x, y])
for all n ∈ N, k ∈ {1, . . . , p(n)}, and x, y ∈ Σq(n) . Then there exist functions F, G ∈ GapP such that
F (1n , x, y) = Re ( An,p(n) · · · An,1 )[ x, y]
G (1n , x, y) = Im ( An,p(n) · · · An,1 )[ x, y]
for all n ∈ N and x, y ∈ Σq(n) . In other words, if there exist two GapP functions describing the real
and imaginary parts of the entries of a polynomial sequence of matrices, then the same is true of
the product of these matrices.
16
Now, suppose that Q = {Qn : n ∈ N } is a polynomial-time generated family of quantum
circuits. For each n ∈ N, let us assume the quantum circuit Qn consists of gates Gn,1 , . . . , Gn,p(n)
for some polynomial bounded function p, labelled in an order that respects the topology of the
circuit. By tensoring these gates with the identity operation on qubits they do not touch, and
using the natural matrix representation of quantum operations, it is possible to obtain matrices
Mn,1 , . . . , Mn,p(n) with the property that
Mn,p(n) · · · Mn,1 vec(ρ) = vec( Qn (ρ))
for every possible input density matrix ρ to the circuit. The probability that Qn accepts a given
input x is then
h1, 1| Mn,p(n) · · · Mn,1 | x, x i ,
which is a single entry in the product of the matrices.
By padding matrices with rows and columns of zeroes, it may be assumed that each matrix
Mn,k has rows and columns indexed by strings of length q(n) for some polynomial-bounded func-
tion q. The assumption that the family Q is polynomial-time generated then allows one to easily
conclude that there exist GapP functions f and g so that
1
f (1n , 1k , x, y) =ℜ ( Mn,k [ x, y])
2
1
g(1n , 1k , x, y) = ℑ ( Mn,k [ x, y])
2
for all n ∈ N, k ∈ {1, . . . , p(n)}, and x, y ∈ Σq(n) . (Note that his fact makes use of the observation
that the natural matrix representation of all of the gates listed in Section III.2 have entries whose
real and imaginary parts come from the set {−1, −1/2, 0, 1/2, 1}. The numbers ±1/2 are only
needed for the Hadamard gates.) By the property of GapP functions above, it follows that there
exists a GapP function F such that
F ( x)
Pr[Q accepts x] = .
2 p(| x |)
The containment BQP ⊆ PP follows easily. This containment was first proved by Adleman,
DeMarrais, and Huang [8] using a different method, and was first argued using counting com-
plexity along similar lines to the above proof by Fortnow and Rogers [52]. There are two known
ways that this upper bound can be improved. Using the fact that BQP algorithms have bounded
error, Fortnow and Rogers [52] proved that BQP is contained in a (somewhat obscure) counting
complexity class called AWPP, which implies the following theorem.
Theorem 6. PPBQP = PP.
Another improvement comes from the observation that the above proof that BQP ⊆ PP makes no
use of the bounded-error assumption of BQP. It follows that an unbounded error variant of BQP
is equal to PP.
PQP Let A = ( Ayes , Ano ) be a promise problem. Then A ∈ PQP if and only if there exists
a polynomial-time generated family of quantum circuits Q = {Qn : n ∈ N }, where
each circuit Qn takes n input qubits and produces one output qubit, that satisfies the
following properties. If x ∈ Ayes then Pr[Q accepts x] > 1/2; and if x ∈ Ano then
Pr[Q accepts x] ≤ 1/2.
Theorem 7. PQP = PP.
17
IV.6 Oracle results involving BQP
It is difficult to prove separations among quantum complexity classes for apparently the same rea-
sons that this is so for classical complexity classes. For instance, one clearly cannot hope to prove
BPP 6= BQP when major collapses such as NC = PP or P = PSPACE are still not disproved. In
some cases, however, separations among quantum complexity classes can be proved in relativized
settings, meaning that the separation holds in the presence of some cleverly defined oracle. The
following oracle results are among several that are known:
1. There exists an oracle A such that BQP A 6⊆ MA A [18, 31, 101]. Such an oracle A intuitively
encodes a problem that is solvable using a quantum computer but is not even efficiently
verifiable with a classical computer. As the containment BPP ⊆ BQP holds relative to every
oracle, this implies that BPP A ( BQP A for this particular choice of A.
2. There is an oracle A such that NP A 6⊆ BQP A [28]. In less formal terms: a quantum computer
cannot find a needle in an exponentially large haystack in polynomial time. This result
formalizes a critically important idea, which is that a quantum computer can only solve a
given search problem efficiently if it is able to exploit that problem’s structure. It is easy to
define an oracle search problem represented by A that has no structure whatsoever, which
allows the conclusion NP A 6⊆ BQP A to be drawn. It is not currently known whether the NP-
complete problems, in the absence of an oracle, have enough structure to be solved efficiently
by quantum computers; but there is little hope and no indication whatsoever that this should
be so. It is therefore a widely believed conjecture that NP 6⊆ BQP.
3. There is an oracle A such that SZK A 6⊆ BQP A [1, 6]. This result is similar in spirit to the
previous one, but is technically more difficult and rules out the existence of quantum algo-
rithms for unstructured collision detection problems. The graph isomorphism problem and
various problems that arise in cryptography are examples of collision detection problems.
Once again, it follows that quantum algorithms can only solve such problems if their struc-
ture can be exploited. It is a major open question in quantum computing whether the graph
isomorphism problem is in BQP.
V Quantum proofs
There are many quantum complexity classes of interest beyond BQP. This section concerns one
such class, which is a quantum computational analogue of NP. The class is known as QMA, short
for quantum Merlin–Arthur, and is based on the notion of a quantum proof: a quantum state that
plays the role of a certificate or witness to a quantum computer that functions as a verification
procedure. Interest in both the class QMA and the general notion of quantum proofs is primarily
based on the fundamental importance of efficient verification in computational complexity. The
notion of a quantum proof was first proposed by Knill [71] and consider more formally by Kitaev
(presented at a talk in 1999 [67] and later published in [68]).
18
quantum computing. In the definition of NP from Section II.1, the machine M functions as a
verification procedure that treats each possible string y ∈ Σ p(| x |) as a potential proof that x ∈ Ayes .
The conditions on M are known as the completeness and soundness conditions, which derive their
names from logic: completeness refers to the condition that true statements have proofs, while
soundness refers to the condition that false statements do not.
To define QMA, the set of possible proofs is extended to include quantum states, which of
course presumes that the verification procedure is quantum. As quantum computations are inher-
ently probabilistic, a bounded probability of error is allowed in the completeness and soundness
conditions. (This is why the class is called QMA rather than QNP, as it is really MA and not NP
that is the classical analogue of QMA.)
1. Completeness. For all x ∈ Ayes , there exists a p(| x |)-qubit quantum state ρ such
that Pr[Q accepts ( x, ρ)] ≥ a(| x |).
2. Soundness. For all x ∈ Ano and all p(| x |)-qubit quantum states ρ it holds that
Pr[Q accepts ( x, ρ)] ≤ b(| x |).
M = Pπ ( A ⊗ I ) Pπ−1
Pπ | x1 · · · xn i = | xπ (1) · · · xπ (n) i
19
for some permutation π ∈ Sn , and I denoting the identity matrix indexed by Σn−k . In less formal
terms, M is a matrix that arises from a “gate” on k qubits, but where the gate is described by a
2k × 2k Hermitian matrix A rather than a unitary matrix. It is possible to express such a matrix
compactly by specifying A along with the bit-positions on which A acts.
Intuitively, a k-local matrix assigns a real number (typically thought of as representing energy)
to any quantum state on n qubits. This number depends only on the reduced state of the k qubits
where M acts nontrivially, and can be thought of as a locally defined penalty on a given quantum
state. Loosely speaking, the k-local Hamiltonian problem asks whether there exists a quantum
state that can significantly avoid a collection of such penalties.
Yes: There exists an n-qubit quantum state |ψi such that hψ| H1 + · · · + Hm |ψ i ≤ −1.
No: For every n-qubit quantum state |ψi it holds that hψ| H1 + · · · + Hm |ψ i ≥ 1.
Theorem 8. The 2-local Hamiltonian problem is complete for QMA with respect to Karp reductions.
The completeness of this problem has been shown to be closely related to the universality of
the so-called adiabatic model of quantum computation [12].
1. Several Variants of the local Hamiltonian problem. For example, the 2-local Hamiltonian
problem remains QMA-complete when the local Hamiltonians are restricted to nearest-
neighbor interactions on a two-dimensional array of qubits [86]. The hardness of the lo-
cal Hamiltonian problem with nearest-neighbor interactions on one-dimensional systems is
known to be QMA-complete for 12 dimensional particles in place of qubits [9], but is open
for smaller systems including qubits.
2. The density matrix consistency problem. Here, the input is a collection of density matrices rep-
resenting the reduced states of a hypothetical n-qubit state. The input is a yes-instance of the
problem if there exists a state of the n-qubit system that is consistent with the given reduced
density matrices, and is a no-instance if every state of the n-qubit system has reduced states
that have significant disagreement from one or more of the input density matrices. This
problem is known to be complete for QMA with respect to Cook reductions [76], but is not
known to be complete for Karp reductions. A different problem with similar properties was
considered in [77].
3. The quantum clique problem. Beigi and Shor [23] have proved that a promise version of the
following problem is QMA-complete for any constant k ≥ 2. Given a quantum operation
Φ, are there k different inputs to Φ that are perfectly distinguishable after passing through
Φ? They name this the quantum clique problem because there is a close connection between
computing the zero-error capacity of a classical channel and computing the size of the largest
clique in the complement of a graph representing the channel; and this is a quantum variant
of that problem.
20
4. Several problems about quantum circuits. All of the problems mentioned above are proved
to be QMA-hard through reductions from the local Hamiltonian problem. Other problems
concerning properties of quantum circuits can be proved QMA-complete by more direct
means, particularly when the problem itself concerns the existence of a quantum state that
causes an input circuit to exhibit a certain behavior. An example in this category is the non-
identity check problem [60] that asks whether a given unitary circuit implements an operation
that is close to some scalar multiple of the identity.
Like most group-theoretic computational problems, there are many specific variants of the
group non-membership problem that differ in the way that group elements are represented. For
example, group elements could be represented by permutations in cycle notation, invertible ma-
trices over a finite field, or any number of other possibilities. The difficulty of the problem clearly
varies depending the representation. The framework of black-box groups, put forth by Babai and
Szemerédi [21], simplifies this issue by assuming that group elements are represented by mean-
ingless labels that can only be multiplied or inverted by means of a black box, or group oracle. Any
algorithm or protocol that solves a problem in this framework can then be adapted to any specific
group provided that an efficient implementation of the group operations exists that can replace
the group oracle.
Theorem 9. The group non-membership problem is in QMA for every choice of a group oracle.
21
Qx
Qx
accept
ξ Qx F or
reject
Qx
Qx
Figure 9: An illustration of the weak error reduction procedure for QMA. The circuits Q x represent
the original verification procedure, and the circuit labelled F outputs acceptance or rejection based
on the frequency of accepts among its inputs (which can be adjusted depending on a and b). It
cannot be assumed that the input state ξ takes the form of a product state ρ ⊗ · · · ⊗ ρ; but it is not
difficult to prove that there will always be at least one such state among the states maximizing the
acceptance probability of the procedure.
Suppose that A = ( Ayes , Ano ) is a given promise problem for which a QMA-type quantum ver-
ification procedure exists. To describe both error reduction procedures, it is convenient to assume
that the input to the problem is hard-coded into each circuit in the family representing the verifi-
cation procedure. The verification procedure therefore takes the form Q = {Q x : x ∈ Σ∗ }, where
each circuit Q x takes a p(| x |)-qubit quantum state as input, for some polynomial-bounded func-
tion p representing the quantum proof length, and produces one output qubit. The completeness
and soundness probabilities are assumed to be given by polynomial-time computable functions a
and b as usual.
The natural approach to error reduction is repetition: for a given input x the verification circuit
Q x is evaluated multiple times, and a decision to accept or reject based on the frequency of accepts
and rejects among the outcomes of the repetitions is made. Assuming a(| x |) and b(| x |) are not
too close together, this results in a decrease in error that is exponential in the number of repeti-
tions [68]. The problem that arises, however, is that each repetition of the verification procedure
apparently destroys the quantum proof it verifies, which necessitates the composite verification
procedure receiving p(| x |) qubits for each repetition of the original procedure as illustrated in Fig-
ure 9. The form of error reduction implemented by this procedure is called weak error reduction,
given that the length of the quantum proof must grow as the error decreases. (Of course one may
view that it also has a strength, which is that it does not require a significant increase in circuit
depth over the original procedure.)
The second error reduction procedure for QMA was described in [80]. Like weak error reduc-
tion it gives an exponential reduction in error for roughly a linear increase in circuit size, but has
the advantage that it does not require any increase in the length of the quantum proof. This form
of error reduction is called strong error reduction because of this advantage, which turns out to be
quite handy in some situations. The procedure is illustrated in Figure 10. The following theorem
follows from an analysis of this procedure.
22
ρ
Qx Q−
x
1 Qx Q−
x
1 Qx Q−
x
1
Tr
|0k + m i
C output
Figure 10: Illustration of the strong error reduction procedure for QMA. The circuit Q x represents
a unitary purification of a given QMA verification procedure on an input x, while the circuit C
determines whether to accept or reject based on the number of alternations of its input qubits. The
quantum proof is denoted by ρ.
Theorem 10. Suppose that a, b : N → [0, 1] are polynomial-time computable functions and q : N → N
is a polynomial-bounded function such that a(n) − b(n) ≥ 1/q(n) for all but finitely many n ∈ N. Then
for every choice of polynomial-bounded functions p, r : N → N such that r(n) ≥ 2 for all but finitely
many n, it holds that
QMA p ( a, b) = QMA p 1 − 2−r , 2−r .
for some polynomial-bounded function p. What is important here is that the soundness proba-
bility is smaller than the reciprocal of the dimension of the space corresponding to the quantum
proof (which is why strong error reduction is needed).
Now, consider an algorithm that does not receive any quantum proof, but instead just ran-
domly guesses a quantum proof on p qubits and feeds this proof into a verification procedure
having completeness and soundness probabilities consistent with the above inclusion (2). To be
more precise, the quantum proof is substituted by the totally mixed state on p qubits. A sim-
ple analysis shows that this algorithm accepts every string x ∈ Ayes with probability at least
2−( p(| x |)+1) and accepts every string x ∈ Ano with probability at most 2−( p(| x |)+2) . Both of these
probabilities are exponentially small, but the separation between them is enough to establish that
A ∈ PQP = PP.
23
MQA Let A = ( Ayes , Ano ) be a promise problem. Then A ∈ MQA if and only if there
exists a polynomial-bounded function p and a polynomial-time generated family of
circuits Q = {Qn : n ∈ N }, where each circuit Qn takes n + p(n) input qubits and
produces one output qubit, with the following properties. For all x ∈ Ayes , there
exists a string y ∈ Σ p(| x |) such that Pr[Q accepts ( x, y)] ≥ 2/3; and for all x ∈ Ano
and all strings y ∈ Σ p(| x |) it holds that Pr[Q accepts ( x, y)] ≤ 1/3.
(This class was originally named QCMA, and is more commonly known by that name—but it is
not too late to give this interesting class a better name.)
When considering the power of quantum proofs, it is the question of whether MQA is prop-
erly contained in QMA that arguably cuts to the heart of the issue. Aaronson and Kuperberg [5]
studied this question, and based on a reasonable group-theoretic conjecture argued that the group
non-membership problem is likely to be in MQA.
24
accept
x V1 V2 V3 V4 or
reject
1 2 3 4 5 6
P1 P2 P3
x
Figure 11: A quantum interactive proof system. There are six messages in this example, labelled
1, . . . , 6. (There may be polynomially many messages in general.) The arrows each represent a
collection of qubits, rather than single qubits as in previous figures. The superscript n is omitted
in the names of the prover and verifier circuits (which can safely be done when the input length n
is determined by context).
and so the verifier must be specified in such a way that it is not convinced that false statements
are true.
Quantum interactive proof systems [104, 69] are interactive proof systems in which the prover
and verifier may exchange and process quantum information. This ability of both the prover and
verifier to exchange and process quantum information endows quantum interactive proofs with
interesting properties that distinguish them from classical interactive proofs, and illustrate unique
features of quantum information.
that interface with a given verifier in the natural way (assuming the number and sizes of the
message spaces are compatible). Again, this is as suggested by Figure 11.
25
Now, on a given input string x, the prover P and verifier V have an interaction by composing
their circuits as described above, after which the verifier measures an output qubit to determine
acceptance or rejection. In direct analogy to the classes NP, MA, and QMA, one defines quantum
complexity classes based on the completeness and soundness properties of such interactions.
1. Completeness. For all x ∈ Ayes , there exists a quantum prover P that causes V
to accept x with probability at least a(| x |).
2. Soundness. For all x ∈ Ano , every quantum prover P causes V to accept x with
probability at most b(| x |).
Also define QIP(m) = QIP(m, 2/3, 1/3) for each polynomial-bounded function m
and define QIP = m QIP(m), where the union is over all polynomial-bounded
S
functions m.
Quantum interactive proofs, like ordinary classical interactive proofs, are quite robust with
respect to the choice of completeness and soundness probabilities. In particular, the following
facts hold [69, 58].
1. Every quantum interactive proof can be transformed into an equivalent quantum interactive
proof with perfect completeness: the completeness probability is 1 and the soundness proba-
bility is bounded away from 1. The precise bound obtained for the soundness probability
depends on the completeness and soundness probabilities of the original proof system. This
transformation to a perfect-completeness proof system comes at the cost of one additional
round (i.e., two messages) of communication.
2. Parallel repetition of quantum interactive proofs with perfect completeness gives an expo-
nential reduction in soundness error. An exponential reduction in completeness and sound-
ness error is also possible for quantum interactive proofs not having perfect completeness,
but the procedure is slightly more complicated than for the perfect completeness case.
One of the major differences between quantum and classical interactive proof systems is that
quantum interactive proofs can be parallelized: every quantum interactive proof system, possi-
bly having polynomially many rounds of communication, can be transformed into an equivalent
quantum interactive proof system with three messages [69]. This transformation comes at the cost
of weakening the error bounds. However, it preserves perfect completeness, and the soundness
26
error can subsequently be reduced by parallel repetition without increasing the number of mes-
sages beyond three. If classical interactive proof systems could be parallelized in this way, then it
would follow that AM = PSPACE; a collapse that would surprise most complexity theorists and
have major implications to the theory.
The following theorem summarizes the implications of the facts just discussed to the complex-
ity classes QIP(m, a, b) defined above.
Theorem 12. Let a, b : N → [0, 1] be polynomial-time computable functions and let p be a polynomial-
bounded function such that a(n) − b(n) ≥ p(1n) for all but finitely many n ∈ N. Also let m and r be
polynomial-bounded functions. Then QIP(m, a, b) ⊆ QIP(3, 1, 2−r ).
For a wide range of completeness and soundness probabilities this leaves just four complexity
classes among those defined above: QIP(0) = BQP, QIP(1) = QMA, QIP(2), and QIP(3) = QIP.
The final property of quantum interactive proofs that will be discussed in this section is the
existence of an interesting complete promise problem [90]. The problem is to determine whether
the operations induced by two quantum circuits are significantly different, or are approximately
the same, with respect to the same metric on quantum operations discussed in Section III.2.
Theorem 13. The quantum circuit distinguishability problem is QIP-complete with respect to Karp reduc-
tions.
27
ρ Φ x ( ρ)
V1′ V2′ V3′ V4′
x
P1 P2 P3
x
Figure 12: A cheating verifier V ′ performs a quantum operation Φx with the unintentional help of
the honest prover.
Now, the proof system (V, P) is said to be quantum statistical zero-knowledge if, for any choice of
a polynomial-time cheating verifier V ′ , the quantum operation Φx can be efficiently approximated
for all x ∈ Ayes . More precisely, the assumption that V ′ is described by polynomial-time generated
quantum circuits must imply that there exists a polynomial-time generated family {Q x : x ∈ Σ∗ }
of quantum circuits for which δ(Φx , Q x ) is negligible for every x ∈ Ayes . Intuitively this definition
captures the notion of learning nothing—for anything that the cheating verifier could compute in
polynomial time with the help of the prover could equally well have been computed in polynomial
time without the prover’s help.
The class of promise problems having statistical zero-knowledge quantum interactive proofs
is denoted QSZK.
QSZK A promise problem A = ( Ayes , Ano ) is in QSZK if and only if it has a statistical
zero-knowledge quantum interactive proof system.
Although it has not been proved, it is reasonable to conjecture that QSZK is properly contained in
QIP; for the zero-knowledge property seems to be quite restrictive. Indeed, it was only recently
established that there exist non-trivial quantum interactive proof systems that are statistical zero-
knowledge [105]. The following facts [102, 105] are among those known about QSZK.
2. The class QSZK is closed under complementation: a given promise problem A has a quan-
tum statistical zero-knowledge proof if and only if the same is true for the problem obtained
by exchanging the yes- and no-instances of A.
Classical analogues to the first and second facts in this list were shown first [91]. (The classical
analogue to the third fact is SZK ⊆ PSPACE, which follows trivially from IP ⊆ PSPACE.) A key
step toward proving the above properties (which is also similar to the classical case) is to establish
that the following promise problem is complete for QSZK. The problem is a restricted version of
the QIP-complete quantum circuit distinguishability problem.
28
T HE QUANTUM STATE DISTINGUISHABILITY PROBLEM
Input: Quantum circuits Q0 and Q1 , both taking no input qubits and producing m output qubits.
Let ρ0 and ρ1 be the density matrices corresponding to the outputs of these circuits.
Yes: δ(ρ0 , ρ1 ) ≥ 2/3.
No: δ(ρ0 , ρ1 ) ≤ 1/3.
Theorem 14. The quantum state distinguishability problem is QSZK-complete with respect to Karp re-
ductions.
A quantum analogue of a different SZK-complete problem known as the entropy difference problem
[54] has recently been shown to be complete for QSZK [26].
Kobayashi [72] has recently proved several interesting properties of quantum computational
zero-knowledge proof systems.
MIP∗ A promise problem A = ( Ayes , Ano ) is in MIP∗ if and only if there exists a
multiple-prover interactive proof system for A wherein the verifier is classical
and the provers may share an arbitrary entangled state.
One may also consider fully quantum variants of multiple-prover interactive proofs, which were
first studied by Kobayashi and Matsumoto [73].
QMIP A promise problem A = ( Ayes , Ano ) is in QMIP if and only if there exists a
multiple-prover quantum interactive proof system for A.
Various refinements on these classes have been studied, where parameters such as the number
of provers, number of rounds of communication, completeness and soundness probabilities, and
bounds on the amount of entanglement shared between provers are taken into account.
The results proved in both [37] and [73] support the claim that it is entanglement shared be-
tween provers that is the key issue in multiple-prover quantum interactive proofs. Both models
29
are equivalent in power to MIP when provers are forbidden to share entanglement before the
proof system is executed.
At the time of the writing of this article, research into these complexity classes and general
properties of multiple-prover quantum interactive proofs is highly active and has led to several
interesting results (such as [38, 65, 63, 64], among others). Despite this effort, little can be said
at this time about the relationship among the above classes and other known complexity classes.
For instance, only the trivial lower bounds PSPACE ⊆ MIP∗ and QIP ⊆ QMIP, and no good
upper bounds, are known. It has not even been ruled out that non-computable languages could
have multiple-prover quantum interactive proof systems. These difficulties seem to stem from two
issues: (i) no bounds are known for the size of entangled states needed for provers to perform well
in an interactive proof, and (ii) the possible correlations that can be induced with entanglement
are not well-understood.
One highly restricted variant of MIP∗ that has been studied, along with its unentangled coun-
terpart, is as follows.
⊕MIP∗ A promise problem A = ( Ayes , Ano ) is in ⊕MIP∗ if and only if there exists a
one-round two-prover interactive proof system for A wherein the provers each
send a single bit to the verifier, and the verifier’s decision to accept or reject is
determined by the questions asked along with the XOR of these bits. The verifier
is classical and the provers are quantum and share an arbitrary entangled state.
⊕MIP This class is similar to ⊕MIP∗ , except that the provers may not share entangle-
ment (and therefore can be assumed to be classical without loss of generality).
It holds that ⊕MIP = NEXP for some choices of completeness and soundness probabilities [59, 25].
On the other hand, it has been proved [106] that ⊕MIP∗ ⊆ QIP(2) and therefore ⊕MIP∗ ⊆ EXP.
30
It is clear that QAM ⊆ QIP(2), but unlike the classical case [57] equality is not known in the quan-
tum setting. It is straightforward to prove the upper bound QAM ⊆ PSPACE, while containment
QIP(2) ⊆ PSPACE is not known.
The class QMAM may be defined through a similar analogy with classical Arthur–Merlin
games. Here, Merlin sends the first message, Arthur responds with a selection of random bits,
and then Merlin sends a second message.
QMAM A promise problem A = ( Ayes , Ano ) is in QMAM if and only if it has a quan-
tum interactive proof system of the following restricted form. Merlin sends a
polynomial-bounded number of qubits to Arthur. Without performing any com-
putations, Arthur uniformly chooses some polynomial-bounded number of clas-
sical random bits, and sends a copy of these bits to Merlin. Merlin responds with
a second collection of qubits. Arthur then performs a polynomial-time quantum
computation on the input, the random bits, and the quantum information sent by
Merlin in order to determine acceptance or rejection.
Even when Arthur is restricted to a single random bit, this class has the full power of QIP [80].
RG A promise problem A = ( Ayes , Ano ) is in RG (short for refereed games) if and only
if it has a classical interactive proof system with two competing provers. The
completeness and soundness conditions for such a proof system are replaced by
the following conditions:
1. For every x ∈ Ayes , there exists a yes-prover Pyes that convinces the referee
to accept with probability at least 2/3, regardless of the strategy employed
by the no-prover Pno .
2. For every x ∈ Ano , there exists a no-prover Pno that convinces the referee to
reject with probability at least 2/3, regardless of the strategy employed by
the yes-prover Pyes .
QRG A promise problem A = ( Ayes , Ano ) is in QRG (quantum refereed games) if and only
if it has a quantum interactive proof system with two competing provers. The
completeness and soundness conditions for such a proof system are analogous to
RG.
31
Classical refereed games have the computational power of deterministic exponential time [46],
and the same is true in the quantum setting [58]: RG = QRG = EXP. The containment EXP ⊆ RG
represents an application of the arithmetization technique, while QRG ⊆ EXP exemplifies the
power of semidefinite programming.
BQP/qpoly A promise problem A = ( Ayes , Ano ) is in BQP/qpoly if and only if there exists
a polynomial-bounded function p, a collection of quantum states {ρn : n ∈ N }
where each ρn is a p(n)-qubit state, and a polynomial-time generated family of
quantum circuits Q = {Qn : n ∈ N } with the following properties. For all
x ∈ Ayes , Q accepts ( x, ρ| x | ) with probability at least 2/3; and for all x ∈ Ano , Q
accepts ( x, ρ| x | ) with probability at most 1/3.
Similar to BQP without advice, it is straightforward to shown that the constants 2/3 and 1/3 in
this definition can be replaced by a wide range of functions a, b : N → [0, 1].
As the notation suggests, BQP/qpoly is a quantum analogue of the class P/poly. This analogy
may be used as the basis for several relevant points about BQP/qpoly, quantum advice, and their
relationship to classical complexity classes and notions.
1. As is well-known, P/poly may be defined either in a manner similar to the above definition
for BQP/qpoly, or more simply as the class of promise problems solvable by polynomial-
size Boolean circuit families with no uniformity restrictions. Based on similar ideas, the class
BQP/qpoly does not change if the circuit family {Qn : n ∈ N } is taken to be an arbitrary
polynomial-size circuit family without uniformity constraints.
2. There is a good argument to be made that quantum advice is better viewed as a quantum
analogue of randomized advice rather than deterministic advice. That is, BQP/qpoly can equally
32
well be viewed as a quantum analogue of the (suitably defined) complexity class BPP/rpoly.
It happens to be the case, however, that BPP/rpoly = P/poly. (The situation is rather dif-
ferent for logarithmic-length advice, where randomized advice is strictly more powerful than
ordinary deterministic advice.)
The principle behind these equalities is that nonuniformity is stronger than randomness [7].
Although in all likelihood the class PP/poly is enormous, containing many interesting problems
that one can have little hope of being able to solve in practice, the upper-bound represented by
this theorem is far from obvious. The most important thing to notice is that the power of quantum
advice (to a BQP machine) is simulated by deterministic advice (to a PP machine). This means
that no matter how complex, a polynomial-size quantum advice state can never encode more
information accessible to a polynomial-time quantum computer than a polynomial-length string
can, albeit to an unbounded error probabilistic machine.
Quantum advice has also been considered for other quantum complexity classes such as QMA
and QIP. For instance, the following bound is known on the power of QMA with quantum ad-
vice [3].
Generally speaking, the study of both quantum and randomized advice is reasonably de-
scribed as a sticky business when unbounded error machines or interactive protocols are involved.
In these cases, complexity classes defined by both quantum and randomized advice can be highly
non-intuitive and dependent on specific interpretations of models. For example, Raz [88] has
shown that both QIP/qpoly and IP/rpoly contain all languages, provided that the advice is not
accessible to the prover. Likewise, Aaronson [2] has observed that both PP/rpoly and PQP/qpoly
contain all languages. These results are quite peculiar, given that significantly more powerful
models can become strictly less powerful in the presence of quantum or randomized advice. For
instance, even a Turing machine running in exponential space cannot decide all languages with
bounded error given randomized advice.
33
finite
control
input tape (read-only)
qubit tape
Figure 13: A quantum Turing machine. This variant of quantum Turing machine is classical with
the exception of a quantum work tape, each square of which contains a qubit. Quantum operations
and measurements can be performed on the qubits scanned by the quantum tape heads.
time. Quantum complexity classes may also be defined by bounds on space rather than time, but
here a different computational model is required to reasonably compare with classical models of
space-bounded computation. One simple choice of a suitable model is a hybrid between quantum
circuits and classical Turing machines—and although this model is different from the variants
of quantum Turing machines that were originally studied in the theory of quantum computing
[41, 31], the term quantum Turing machine (QTM for short) is nevertheless appropriate. A different
quantum Turing machine model that is suitable for studying time-space trade-offs has recently
been proposed in [81].
Figure 13 illustrates a quantum Turing machine. A quantum Turing machine has a read-only
classical input tape, a classical work tape, and a quantum tape consisting of an infinite sequence
of qubits each initialized to the zero-state. Three tape heads scan the quantum tape, allowing
quantum operations to be performed on the corresponding qubits. (It would be sufficient to have
just two, but allowing three tape heads parallels the choice of a universal gate set that allows
three-qubit operations.) A single step of a QTM’s computation may involve ordinary moves by
the classical parts of the machine and quantum operations on the quantum tape: Toffoli gates,
Hadamard gates, phase-shift gates, or single-qubit measurements in the computational basis.
The running time of a quantum Turing machine is defined as for ordinary Turing machines.
The space used by such a machine is the number of squares on the classical work tape plus the
number of qubits on the quantum tape that are ever visited by one of the tape heads. Similar to
the classical case, the input tape does not contribute to the space used by the machine because it
is a read-only tape.
The following complexity classes are examples of classes that can be defined using this model.
34
PQL A promise problem A = ( Ayes , Ano ) is in PQL (unbounded-error quantum
logarithmic space) if and only if there exists a quantum Turing machine M
running in polynomial time and logarithmic space that accepts every string
x ∈ Ayes with probability strictly greater than 1/2 and accepts every string
x ∈ Ano with probability at most 1/2.
BQPSPACE A promise problem A = ( Ayes , Ano ) is in BQPSPACE (bounded-error quan-
tum polynomial space) if and only if there exists a quantum Turing machine
M running in polynomial space that accepts every string x ∈ Ayes with prob-
ability at least 2/3 and accepts every string x ∈ Ano with probability at most
1/3.
PQPSPACE A promise problem A = ( Ayes , Ano ) is in PQPSPACE (unbounded-error
quantum polynomial space) if and only if there exists a quantum Turing ma-
chine M running in polynomial space that accepts every string x ∈ Ayes with
probability strictly greater than 1/2 and accepts every string x ∈ Ano with
probability at most 1/2.
Unlike polynomial-time computations, it is known that quantum information does not give a
significant increase in computational power in the space-bounded case [100, 103].
The key relationship in the above theorem, from the perspective of quantum complexity, is PQL ⊆
PL, which can be shown using space-bounded counting complexity. In particular, the proof relies
on a theory of GapL functions [13] that parallels the theory of GapP functions, and allows for a
variety of matrix computations to be performed in PL.
The above theorem, together with the containment PL ⊆ NC [34], implies that both BQL
and PQL are contained in NC. An interpretation of this fact is that logarithmic-space quantum
computations can be very efficiently simulated in parallel.
35
Many other complexity classes based on bounded-depth quantum circuits have been studied as
well. The survey of Bera, Green, and Homer [29] discusses several examples.
In the classical case there is a very close relationship between space-bounded and depth-
bounded computation [33, 34]. This close relationship is based on two main ideas: the first is
that space-bounded computations can be simulated efficiently by bounded-depth circuits using
parallel algorithms for matrix computations, and the second is that bounded-depth Boolean cir-
cuits can be efficiently simulated by space-bounded computations via depth-first traversals of the
circuit to be simulated.
For quantum computation this close relationship is not known to exist. One direction indeed
holds, as was discussed in the previous subsection: space-bounded quantum computations can be
efficiently simulated by depth-bounded circuits. The other direction, which is an efficient space-
bounded simulation of bounded-depth quantum circuits, is not known to hold and is arguably
quite unlikely. Informally speaking, bounded-depth quantum circuits are computationally pow-
erful, whereas space-bounded quantum Turing machines are not. Three facts that support this
claim are as follows.
1. Computing the acceptance probability for even constant-depth quantum circuits is as hard
as computing acceptance probabilities for arbitrary polynomial-size quantum circuits [49].
3. The quantum circuit distinguishability problem remains complete for QIP when restricted
to logarithmic-depth quantum circuits [89].
It is reasonable to conjecture that QNC is incomparable with BPP and properly contained in BQP.
1. The power of multiple-prover quantum interactive proofs, for both quantum and classi-
cal verifiers, is very poorly understood. In particular: (i) no interesting upper-bounds are
known for either MIP∗ or QMIP, and (ii) neither the containment NEXP ⊆ MIP∗ nor NEXP ⊆
QMIP is known to hold.
2. The containment NP ⊆ BQP would be a very powerful incentive to build a quantum com-
puter, to say the least. While there is little reason to hope that this containment holds, there
is at the same time little evidence against it aside from the fact that it fails relative to an
oracle [28]. A better understanding of the relationship between BQP and NP, including pos-
sible consequences of one being contained in the other, is an interesting direction for further
research in quantum complexity.
3. Along similar lines to the previous item, an understanding of the relationship between BQP
and the polynomial-time hierarchy has remained elusive. It is not known whether BQP is
contained in the polynomial-time hierarchy, whether there is an oracle relative to which this
is false, or even whether there is an oracle relative to which BQP is not contained in AM.
36
NEXP
QIP
QIP(2) PSPACE
QSZK PP QAM
QMA AM
BQP SZK MA
BPP NP
QNC P
NC
PL
BQL
Figure 14: A diagram of inclusions among most of the complexity classes discussed in this article.
4. Interest in complexity classes is ultimately derived from the problems that they contain. An
important future direction in quantum complexity theory is to prove the inclusion of inter-
esting computational problems in the quantum complexity classes for which this is possible.
Of the many problems that have been considered, one of the most perplexing from the per-
spective of quantum complexity is the graph isomorphism problem. It is a long-standing
open problem whether the graph isomorphism problem is in BQP. A seemingly easier task
than showing the inclusion of this problem in BQP is proving that its complement is con-
tained in QMA. In other words, can Merlin prepare a quantum state that convinces Arthur
that two graphs are not isomorphic?
37
References
[1] S. Aaronson. Quantum lower bound for the collision problem. In Proceedings of the Thirty-
Fourth Annual ACM Symposium on Theory of Computing, 2002.
[2] S. Aaronson. Limitations of quantum advice and one-way communication. Theory of Com-
puting, 1:1–28, 2005.
[4] S. Aaronson, S. Beigi, A. Drucker, B. Fefferman, and P. Shor. The power of unentanglement.
Available as arXiv.org e-print 0804.0802, 2008.
[5] S. Aaronson and G. Kuperberg. Quantum versus classical proofs and advice. Theory of
Computing, 3:129–157, 2007.
[6] S. Aaronson and Y. Shi. Quantum lower bounds for the collision and the element distinct-
ness problems. Journal of the ACM, 51(4):595–605, 2004.
[7] L. Adleman. Two theorems on random polynomial time. In Proceeding of the 19th Annual
IEEE Symposium on Foundations of Computer Science, pages 75–83, 1978.
[8] L. Adleman, J. DeMarrais, and M. Huang. Quantum computability. SIAM Journal on Com-
puting, 26(5):1524–1540, 1997.
[9] D. Aharonov, D. Gottesman, S. Irani, and J. Kempe. The power of quantum systems on a
line. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science,
pages 373–383, 2007.
[10] D. Aharonov, A. Kitaev, and N. Nisan. Quantum circuits with mixed states. In Proceedings
of the Thirtieth Annual ACM Symposium on Theory of Computing, pages 20–30, 1998.
[12] D. Aharonov, W. van Dam, J. Kempe, Z. Landau, S. Lloyd, and O. Regev. Adiabatic quantum
computation is equivalent to standard quantum computation. SIAM Journal on Computing,
37(1):166–194, 2007.
[13] E. Allender and M. Ogihara. Relationships among PL, #L, and the determinant. RAIRO –
Theoretical Informatics and Applications, 30:1–21, 1996.
[14] S. Arora and B. Barak. Complexity Theory: A Modern Approach (Preliminary web draft), 2006.
[15] S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hard-
ness of approximation problems. Journal of the ACM, 45(3):501–555, 1998.
[16] S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. Journal
of the ACM, 45(1):70–122, 1998.
[17] L. Babai. Trading group theory for randomness. In Proceedings of the Seventeenth Annual
ACM Symposium on Theory of Computing, pages 421–429, 1985.
38
[18] L. Babai. Bounded round interactive proofs in finite groups. SIAM Journal on Discrete Math,
5(1):88–111, 1992.
[19] L. Babai, L. Fortnow, and C. Lund. Non-deterministic exponential time has two-prover
interactive protocols. Computational Complexity, 1(1):3–40, 1991.
[20] L. Babai and S. Moran. Arthur-Merlin games: a randomized proof system, and a hierarchy
of complexity classes. Journal of Computer and System Sciences, 36(2):254–276, 1988.
[21] L. Babai and E. Szemerédi. On the complexity of matrix group problems I. In Proceedings of
the 25th Annual IEEE Symposium on Foundations of Computer Science, pages 229–240, 1984.
[22] R. Beigel, N. Reingold, and D. Spielman. PP is closed under intersection. Journal of Computer
and System Sciences, 50(2):191–202, 1995.
[23] S. Beigi and P. Shor. On the complexity of computing zero-error and Holevo capacity of
quantum channels. Available as arXiv.org e-Print 0709.2090, 2007.
[25] M. Bellare, O. Goldreich, and M. Sudan. Free bits, PCPs, and non-approximability – towards
tight results. SIAM Journal on Computing, 27(3):804–915, 1998.
[26] A. Ben-Aroya and A. Ta-Shma. Quantum expanders and the quantum entropy difference
problem. Available as arXiv.org e-print quant-ph/0702129, 2007.
[27] C. Bennett. Logical reversibility of computation. IBM Journal of Research and Development,
17:525–532, 1973.
[28] C. Bennett, E. Bernstein, G. Brassard, and U. Vazirani. Strengths and weaknesses of quantum
computing. SIAM Journal on Computing, 26(5):1510–1523, 1997.
[29] D. Bera, F. Green, and S. Homer. Small depth quantum circuits. ACM SIGACT News,
38(2):35–50, 2007.
[30] E. Bernstein and U. Vazirani. Quantum complexity theory (preliminary abstract). In Proceed-
ings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, pages 11–20, 1993.
[31] E. Bernstein and U. Vazirani. Quantum complexity theory. SIAM Journal on Computing,
26(5):1411–1473, 1997.
[32] H. Blier and A. Tapp. All languages in NP have very short quantum proofs. Available as
arXiv.org e-print 0709.0738, 2007.
[33] A. Borodin. On relating time and space to size and depth. SIAM Journal on Computing,
6:733–744, 1977.
[34] A. Borodin, S. Cook, and N. Pippenger. Parallel computation for well-endowed rings and
space-bounded probabilistic machines. Information and Control, 58:113–136, 1983.
39
[36] R. Cleve. An introduction to quantum complexity theory. In C. Macchiavello, G.M. Palma,
and A. Zeilinger, editors, Collected Papers on Quantum Computation and Quantum Information
Theory, pages 103–127. World Scientific, 2000.
[37] R. Cleve, P. Høyer, B. Toner, and J. Watrous. Consequences and limits of nonlocal strategies.
In Proceedings of the 19th Annual IEEE Conference on Computational Complexity, pages 236–249,
2004.
[38] R. Cleve, W. Slofstra, F. Unger, and S. Upadhyay. Perfect parallel repetition theorem for
quantum XOR proof systems. In Proceedings of the 22nd Annual IEEE Conference on Computa-
tional Complexity, pages 109–114, 2007.
[39] R. Cleve and J. Watrous. Fast parallel circuits for the quantum Fourier transform. In Proceed-
ings of the 41st Annual IEEE Symposium on Foundations of Computer Science, pages 526–536,
2000.
[40] S. Cook. The complexity of theorem proving procedures. In Proceedings of the Third Annual
ACM Symposium on Theory of Computing, pages 151–158, 1972.
[41] D. Deutsch. Quantum theory, the Church–Turing principle and the universal quantum com-
puter. Proceedings of the Royal Society of London, A400:97–117, 1985.
[42] D. Deutsch. Quantum computational networks. Proceedings of the Royal Society of London,
A425:73–90, 1989.
[43] I. Dinur. The PCP theorem by gap amplification. Journal of the ACM, 54(3), 2007.
[44] D.-Z. Du and K.-I. Ko. Theory of Computational Complexity. John Wiley & Sons, 2000.
[45] S. Even, A. Selman, and Y. Yacobi. The complexity of promise problems with applications
to public-key cryptography. Information and Control, 61:159–173, 1984.
[46] U. Feige and J. Kilian. Making games short. In Proceedings of the Twenty-Ninth Annual ACM
Symposium on Theory of Computing, pages 506–516, 1997.
[47] U. Feige and L. Lovász. Two-prover one-round proof systems: their power and their prob-
lems. In Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing,
pages 733–744, 1992.
[48] S. Fenner, L. Fortnow, and S. Kurtz. Gap-definable counting classes. Journal of Computer and
System Sciences, 48:116–148, 1994.
[49] S. Fenner, F. Green S. Homer, and Y. Zhang. Bounds on the power of constant-depth quan-
tum circuits. In Proceedings of the 15th International Symposium on Fundamentals of Computation
Theory, volume 3623 of Lecture Notes in Computer Science, pages 44–55. Springer, 2005.
[50] R. Feynman. Simulating physics with computers. International Journal of Theoretical Physics,
21(6/7):467–488, 1983.
40
[53] O. Goldreich. On promise problems (a survey in memory of Shimon Even [1935–2004]).
Electronic Colloquium on Computational Complexity, Report TR05-018, 2005.
[54] O. Goldreich and S. Vadhan. Comparing entropies in statistical zero-knowledge with appli-
cations to the structure of SZK. In Proceedings of the 14th Annual IEEE Conference on Compu-
tational Complexity, pages 54–73, 1999.
[55] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof
systems. In Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing,
pages 291–304, 1985.
[56] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof
systems. SIAM Journal on Computing, 18(1):186–208, 1989.
[57] S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems.
In S. Micali, editor, Randomness and Computation, volume 5 of Advances in Computing Research,
pages 73–90. JAI Press, 1989.
[58] G. Gutoski and J. Watrous. Toward a general theory of quantum games. In Proceedings of the
39th ACM Symposium on Theory of Computing, pages 565–574, 2007.
[59] J. Håstad. Some optimal inapproximability results. Journal of the ACM, 48(4):798–859, 2001.
[61] P. Kaye, R. Laflamme, and M. Mosca. An Introduction to Quantum Computing. Oxford Uni-
versity Press, 2007.
[62] J. Kempe, A. Kitaev, and O. Regev. The complexity of the local Hamiltonian problem. SIAM
Journal on Computing, 35(5):1070–1097, 2006.
[63] J. Kempe, H. Kobayashi, K. Matsumoto, B. Toner, and T. Vidick. Entangled games are hard
to approximate. Available as arXiv.org e-Print 0704.2903, 2007.
[65] J. Kempe, O. Regev, and B. Toner. The unique games conjecture with entangled provers is
false. Available as arXiv.org e-Print 0710.0655, 2007.
[66] A. Kitaev. Quantum computations: algorithms and error correction. Russian Mathematical
Surveys, 52(6):1191–1249, 1997.
[67] A. Kitaev. “Quantum NP”. Talk at AQIP’99: Second Workshop on Algorithms in Quantum
Information Processing, DePaul University, January 1999.
[68] A. Kitaev, A. Shen, and M. Vyalyi. Classical and Quantum Computation, volume 47 of Graduate
Studies in Mathematics. American Mathematical Society, 2002.
[69] A. Kitaev and J. Watrous. Parallelization, amplification, and exponential time simulation of
quantum interactive proof system. In Proceedings of the 32nd ACM Symposium on Theory of
Computing, pages 608–617, 2000.
41
[70] E. Knill. Approximation by quantum circuits. Technical Report LAUR-95-2225, Los Alamos
National Laboratory, 1995. Available as arXiv.org e-Print quant-ph/9508006.
[71] E. Knill. Quantum randomness and nondeterminism. Technical Report LAUR-96-2186, Los
Alamos National Laboratory, 1996. Available as arXiv.org e-Print quant-ph/9610012.
[73] H. Kobayashi and K. Matsumoto. Quantum multi-prover interactive proof systems with
limited prior entanglement. Journal of Computer and System Sciences, 66(3), 2003.
[75] L. Levin. Universal search problems (English translation). Problems of Information Transmis-
sion, 9(3):265–266, 1973.
[76] Y.-K. Liu. Consistency of local density matrices is QMA-complete. In Approximation, Ran-
domization, and Combinatorial Optimization. Algorithms and Techniques, volume 4110 of Lecture
Notes in Computer Science, pages 438–449. Springer, 2006.
[77] Y.-K. Liu, M. Christandl, and F. Verstraete. Quantum computational complexity of the n-
representability problem: QMA complete. Physical Review Letters, 98(11):110503, 2007.
[79] C. Lund, L. Fortnow, H. Karloff, and N. Nisan. Algebraic methods for interactive proof
systems. Journal of the ACM, 39(4):859–868, 1992.
[81] D. van Melkebeek and T. Watson. A quantum time-space lower bound for the counting
hierarchy. Available as arXiv.org e-print 0712.2545, 2007.
[82] C. Moore and M. Nilsson. Parallel quantum computation and quantum codes. SIAM Journal
on Computing, 31(3):799–815, 2002.
[83] G. Moore. Cramming more components onto integrated circuits. Electronics, 38(8), 1965.
[84] M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum Information. Cambridge
University Press, 2000.
[85] H. Nishimura and T. Yamakami. Polynomial time quantum computation with advice. In-
formation Processing Letters, 90(4):195–204, 2004.
[86] R. Oliveira and B. Terhal. The complexity of quantum spin systems on a two-dimensional
square lattice. Available as arXiv.org e-Print quant-ph/0504050, 2005.
42
[88] R. Raz. Quantum information and the PCP theorem. In 46th Annual IEEE Symposium on
Foundations of Computer Science, pages 459–468, 2005.
[89] B. Rosgen. Distinguishing short quantum computations. In Proceedings of the 25th Interna-
tional Symposium on Theoretical Aspects of Computer Science, pages 597–608, 2008.
[90] B. Rosgen and J. Watrous. On the hardness of distinguishing mixed-state quantum com-
putations. In Proceedings of the 20th Annual Conference on Computational Complexity, pages
344–354, 2005.
[91] A. Sahai and S. Vadhan. A complete promise problem for statistical zero-knowledge. Journal
of the ACM, 50(2):196–249, 2003.
[93] P. Shor. Algorithms for quantum computation: discrete logarithms and factoring. In Pro-
ceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, pages 124–134,
1994.
[94] P. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a
quantum computer. SIAM Journal on Computing, 26(5):1484–1509, 1997.
[97] T. Toffoli. Reversible computing. Technical Report MIT/LCS/TM-151, Laboratory for Com-
puter Science, Massachusetts Institute of Technology, 1980.
[98] S. Vadhan. The complexity of zero knowledge. In 27th International Conference on Founda-
tions of Software Technology and Theoretical Computer Science,, volume 4855 of Lecture Notes in
Computer Science, pages 52–70, 2007.
[99] L. Valiant. The complexity of computing the permanent. Theoretical Computer Science, 8:189–
201, 1979.
[100] J. Watrous. Space-bounded quantum complexity. Journal of Computer and System Sciences,
59(2):281–326, 1999.
[101] J. Watrous. Succinct quantum proofs for properties of finite groups. In Proceedings of the 41st
Annual IEEE Symposium on Foundations of Computer Science, pages 537–546, 2000.
[102] J. Watrous. Limits on the power of quantum statistical zero-knowledge. In Proceedings of the
43rd Annual IEEE Symposium on Foundations of Computer Science, pages 459–468, 2002.
[104] J. Watrous. PSPACE has constant-round quantum interactive proof systems. Theoretical
Computer Science, 292(3):575–588, 2003.
43
[105] J. Watrous. Zero-knowledge against quantum attacks. In Proceedings of the 38th ACM Sym-
posium on Theory of Computing, pages 296–305, 2006.
[106] S. Wehner. Entanglement in interactive proof systems with binary answers. In Proceedings of
the 23rd Annual Symposium on Theoretical Aspects of Computer Science, volume 3884 of Lecture
Notes in Computer Science, pages 162–171. Springer, 2006.
44