1. Introduction
We consider a multi-party function computation scenario in this work. There are a total of n players in the system numbered . Each player observes her input and players (remote parties) communicate an appropriate number of bits that allows player 1 to finally compute the value of the function. Clearly, this can be accomplished if players communicate their actual values, but in many cases, the function value can be computed with much less information. Thus, a key question is to determine the minimum number of bits the remote parties need to send to player 1.
Such problems are broadly studied under the umbrella of communication complexity [
1,
2] in the literature. In this work, we consider the zero-error version of this problem. Our main goal is to understand the advantage that the availability of quantum entanglement confers on this problem and compare it with classical protocols. Such problems have a long history in the literature [
3,
4].
Background: There are three kinds of quantum protocols within quantum communication complexity (QCC) problems. In the first kind (introduced by Yao [
2]), each player communicates via a quantum channel and the metric is the number of qubits transmitted. We call it the quantum transmission model. The second variation assumes that each player can use entanglement as a free resource, but the communication remains classical; the primary metric here is the number of classical bits transmitted. We refer to this as the entanglement model, which was introduced by Cleve and Buhrman [
5]. The third kind is a combination of the first two. We call it the combined model. It allows free usage of entanglement and works with quantum communication. The work of de Wolf [
6] shows that, in the two-party case, the entanglement model can be reduced to the quantum transmission model with a two-fold penalty, utilizing teleportation [
7].
Buhrman, Cleve, Wigderson [
8] and Cleve, van Dam, Nielsen, and Tapp [
9] considered the case of the two-party function computation with quantum communication and used reduction techniques to connect problems in QCC to other known problems, and derived upper/lower bounds for QCC in this manner. In particular, the first work [
8] showed examples, such as the set disjointness function, where quantum protocols are strictly better than classical ones in the bounded-error setting. Here, the set-disjointness problem is such that each player has a set and wants to decide if their intersection is empty. Buhrman and de Wolf [
10] generalized the two-party "log-rank" lower bound of classical communication complexity to QCC where quantum protocols use both shared entanglement and quantum communication. For other two-party upper/lower bound techniques, see [
11,
12,
13,
14,
15].
Related Work: We will now discuss works in multi-party quantum communication complexity. There are mainly two kinds of models. The number-in-hand (NIH) model assumes each player observes only one variable. The number-on-forehead (NOF) model assumes each player observes all but one variable. François and Shogo [
16] considered the NIH model with quantum communication and provided a quantum protocol for a three-party triangle-finding problem; the formulation considers bounded error. This has a polynomial advantage with respect to any classical protocol. Here, the triangle-finding problem is such that the edge set of a graph is distributed over each user and the task is to find a triangle of the graph.
The results in the following two works apply to both NIH and NOF models. Lee, Schechtman, and Shraibman [
17] proved a Grothendieck-type inequality and subsequently derived a general lower bound for the multi-party QCC for the Boolean function in Yao’s model. Following this work, Briet, Buhrman, Lee, and Vidick [
18] showed a similar inequality for the multi-party XOR game and established that the discrepancy method provides lower bounds for QCC when the combined model is of the third type discussed earlier.
Buhrman, van Dam, Høyer, and Tapp [
19] considered the NIH model with shared entanglement and proposed a three-party problem with a quantum protocol that is better than any classical protocol by a constant factor. Following this work, Xue, Li, Zhang, Guo [
20], and Galv ao [
21] showed similar results under the same function with more restrictions. The work most closely related to ours is by Cleve and Buhrman [
5]. This study involved three players (Alice, Bob, and Carol) who each have
m-bit strings, denoted as
, and
, respectively. The strings are such that
, meaning their binary sum (modulo-2) results in the all-ones vector. The goal is for Alice to compute the following:
using binary arithmetic. We note that the communication from Bob and Carol to Alice is purely classical; however, they can use entanglement in a judicious manner. For this particular function, ref. [
5] shows that a classical protocol (without entanglement) requires three bits of communication, whereas if the parties share
entangled qubits, then two bits of communication are sufficient.
Main Contributions: In this work, we consider a generalization of the original work of [
5]. In particular, we consider a scenario with
n players (for prime
n) that observe values that lie in a higher-order finite field, with a more general promise that is satisfied by the observed values. As we consider more players and higher-order finite fields, the techniques used in the original work are not directly applicable in our setting. For instance, when
, our generalized inner product function is defined over
arithmetic (modulo-3), whereas in the same setting, ref. [
5] considers binary (modulo-2) arithmetic. Thus, even though we consider a similar problem, we highlight that the result of [
5] cannot be recovered as a special case of our result.
Our work provides the following contributions:
We demonstrate a quantum protocol that allows for the function to be computed with bits. We use the quantum Fourier transform as a key ingredient in our method.
On the other hand, we demonstrate a classical protocol that requires the communication of bits.
To obtain a lower bound on the classical communication complexity, we define an appropriate integer linear programming problem that demonstrates that our quantum protocol is strictly better than any classical protocol.
This paper is organized as follows.
Section 2 discusses the problem formulation and
Section 3 discusses our quantum protocol.
Section 4 and
Section 5 discuss our classical protocol and the lower bound on any classical protocol, respectively.
5. Classical Communication Complexity Lower Bound
We now discuss a lower bound on the communication complexity of
any classical protocol that demonstrates a strict separation between our proposed quantum protocol and any classical protocol. Analytically, this seems to be a rather hard problem, and we discuss it as an item for future work. We can show, however, the strict separation numerically using ILPs (see
Section 5.1 below). In addition, we present an analytical argument below that demonstrates that for
, the communication complexity of any classical protocol is at least
.
We assume that Alice, Bob, and Carol are given vectors
,
, and
, respectively, each of length
m. The promise (cf.
Section 2.2) is equivalent to the following:
This implies that the GIP function in this case can be computed if we know any two out of
, and
. We assume that Carol labels her sequences (
) with one of—at most—three possible labels. We denote this label by a mapping
. Recall that Alice knows her sequence
.
Definition 1. We define Bob’s confusion graph as follows. The vertex set corresponds to the sequences . The i-th such sequence is denoted by for , with similar notations applied to the sequences for Alice and Carol.
There exists an edge , for if there exists an Alice sequence and Carol sequences and , such that (i) (note that we allow ), and (ii) .
Note that if
, Bob must assign different labels to
and
; otherwise, Alice has no way to compute the function with zero error. The concept of the confusion graph dates back to the work of Shannon [
22].
The main concept of the argument below is to show that there exists a triangle in . This implies that Bob needs to use at least three labels for Alice to decode with zero error.
Since Carol uses, at most, three labels, the pigeon-hole principle dictates that there must be at least
sequences that share the same Carol label. Let us denote this set by
.
Claim 1. There is a subset of two coordinates where all nine patterns appear within the sequences in .
Proof. Suppose that
m is even. Then, we can partition the coordinates as
. Let us arrange the sequences in
as rows; the number of rows is
. Now, suppose that the projection onto any pair of coordinates has, at most, 8 representatives, then, the size of
can be, at most,
. Now, we have the following:
for large enough
m. □
Without loss of generality, we assume that all nine patterns occur within the first two coordinates of . We pick nine of such representatives from and denote them as ; the subscripts correspond to the values on the first two coordinates.
Let us pick Alice’s sequence
. Corresponding to this
, for the Carol sequences
, using the given promise, we can determine the corresponding Bob sequences
. We note the following:
where
denotes the components of vector
from index 3 onward (basically the MATLAB notation).
Claim 2. In Bob’s confusion graph, , the sequences and form a triangle.
Proof. We need to examine for . Since only the first two coordinates matter, given , the corresponding evaluations are , which are pairwise different. □
This argument shows that Bob must use at least three labels for Alice to decode with zero error. By symmetry, Carol must also use three labels. To summarize, the communication complexity of any classical protocol is at least bits.
Remark 2. It may be possible to use a variant of the above combinatorial argument to establish that the chromatic number of is strictly larger than three. However, this does not seem to follow in a straightforward manner.
5.1. ILP Feasibility Problem for Classical Lower Bound
We now present a lower bound on the communication complexity of any deterministic classical protocol for our problem. To this end, we frame this as an integer linear programming problem (ILP) that can be solved numerically. The primary aim of the ILP is to establish a correspondence between each deterministic classical protocol and a feasible point within the ILP. Therefore, the feasibility of the ILP, which can be numerically verified, implies the existence of a deterministic classical protocol and vice versa (this correspondence between the ILP and classical protocols is valid only for the deterministic case. The ILP does not account for randomized protocols where players may have access to public and/or private randomness).
Suppose, for , the p-th player sends symbols (labels) in for some large enough positive integer . Let and define to be the indicator that the p-th player sends c when it has the vector . As this mapping is unique, we have . Furthermore, for a given set of vectors for , if the p-th player sends label , we have .
Consider two sets of vectors
,
. We denote the following:
if the following conditions are satisfied.
Both
and
satisfy the promise (cf.
Section 2.2).
.
.
This definition applies to distinct inputs with the “same” Alice vector, but different function evaluations. It can be seen that—for two such distinct inputs—the symbols communicated by players 2 to n have to be distinct, otherwise, Alice has no way to decode in a zero-error fashion.
Our proposed ILP works with fixed ’s and a fixed value of m. Due to complexity reasons, m cannot be very large. However, if the ILP is infeasible for a given and a , then our lower bound holds for arbitrary values . Our lower bound would continue to hold even if Alice was provided the values for all players .
Consider the following
integer programming feasibility problemL
The infeasibility of the above integer programming problem corresponds to a lower bound on the classical communication complexity. The proof of the following theorem appears in
Appendix D.
Theorem 3. There exists a deterministic classical protocol computing where each player sends—at most— different labels for iff the above integer programming is feasible.
Remark 3. The above integer program contains constraints that involve the product of variables and equality constraints with sums of absolute values. We show how these constraints can be linearized in Appendix E. The entire code for our ILP is available in this online repository [23]. 5.2. Numerical Experiments
In our numerical experiments, we considered an instance of the ILP involving players, namely Alice, Bob, and Carol. Let m represent the length of each vector, while denote the sets of labels used by Bob and Carol, with denoting the sizes of these sets.
We assume that Alice, Bob, and Carol are given vectors , , and , respectively, each of length m. In this case, the promise is given by the following: (9). It can be observed that swapping the vectors of Bob and Carol still satisfies the promise. Due to this inherent symmetry, a protocol with communication lengths and exhibits the same feasibility as one with and . Consequently, for the ILP we can assume that .
The experimental results under varying settings of
are displayed in
Table 1. For instance, it shows that when
and
, the ILP is infeasible with
. This implies that for a feasible classical protocol, with
, we need at least
bits to be transmitted from Carol. Similarly, the triplets
and
are infeasible. This implies that when
equals 2 or 3, the sum rate is
.
Recalling that our proposed protocol employs
bits of communication, and by the fact that
we conclude that there is a strict separation between our quantum protocol and any classical protocol. We note here that we have expressed the communication complexity of both protocols in terms of bits by converting to base-2 logarithms. However, it is important to interpret the results, e.g., the quantum protocol is feasible if Bob and Carol use ternary communication (one of three possible symbols). Conversely, the classical protocol requires that at least one of Bob or Carol transmit one of four possible symbols. In this sense, the quantum protocol is strictly better.