Polynomial degree vs. quantum query complexity
Abstract
The degree of a polynomial representing (or approximating) a function is a lower bound for the quantum query complexity of . This observation has been a source of many lower bounds on quantum algorithms. It has been an open problem whether this lower bound is tight.
We exhibit a function with polynomial degree and quantum query complexity . This is the first superlinear separation between polynomial degree and quantum query complexity. The lower bound is shown by a generalized version of the quantum adversary method.
1 Introduction
Quantum computing provides speedups for factoring [29], search [15] and many related problems. These speedups can be quite surprising. For example, Grover’s search algorithm [15] solves an arbitrary exhaustive search problem with possibilities in time . Classically, it is obvious that time would be needed.
This makes lower bounds particularly important in the quantum world. If we can search in time , why can we not search in time ? (Among other things, that would have meant .) Lower bound of Bennett et al. [10] shows that this is not possible and Grover’s algorithm is exactly optimal.
Currently, we have good lower bounds on the quantum complexity of many problems. They mainly follow by two methods^{1}^{1}1Other approaches, such as reducing query complexity to communication complexity [11] are known, but have been less successful.: the hybrid/adversary method[10, 4] and the polynomials method [9]. The polynomials method is useful for proving lower bounds both in classical [23] and quantum complexity [9]. It is known that

the number of queries needed to compute a Boolean function by an exact quantum algorithm exactly is at least , where is the degree of the multilinear polynomial representing ,

the number of queries needed to compute by a quantum algorithm with twosided error is at least , where is the smallest degree of a multilinear polynomial approximating .
This reduces proving lower bounds on quantum algorithms to proving lower bounds on degree of polynomials. This is a wellstudied mathematical problem with methods from approximation theory [14] available. Quantum lower bounds shown by polynomials method include a relation for any total Boolean function [9], lower bounds on finding mean and median [22], collisions and element distinctness [2, 18]. Polynomials method is also a key part of recent lower bound on set disjointness which resolved a longstanding open problem in quantum communication complexity [25].
Given the usefulness of polynomials method, it is an important question how tight is the polynomials lower bound. [9, 13] proved that, for all total Boolean functions, and . The second result was recently improved to [21]. Thus, the bound is tight up to polynomial factor.
Even stronger result would be or . Then, determining the quantum complexity would be equivalent to determining the degree of a function as a polynomial. It has been an open problem to prove or disprove either of these two equalities [9, 13].
In this paper, we show the first provable gap between polynomial degree and quantum complexity: and . Since and , this implies a separation both between and and between and .
To prove the lower bound, we use the quantum adversary method of [4]. The quantum adversary method runs a quantum algorithm on different inputs from some set. If every input in this set can be changed in many different ways so that the value of the function changes, many queries are needed.
The previously known version of quantum adversary method gives a weaker lower bound of . While this already gives some gap between polynomial degree and quantum complexity, we can achieve a larger gap by using a new, more general version of the method.
The new component is that we carry out this argument in a very general way. We assign individual weights to every pair of inputs and distribute each weight among the two inputs in an arbitrary way. This allows us to obtain better bounds than with the previous versions of the quantum adversary method.
We apply the new lower bound theorem to three functions for which deterministic query complexity is significantly higher than polynomial degree. The result is that, for all of those functions, quantum query complexity is higher than polynomial degree. The biggest gap is polynomial degree and query complexity .
Spalek and Szegedy [32] have recently shown that our method is equivalent to two other methods, the spectral method of [8] that was known prior to our work and the Kolmogorov complexity method of [19] that appeared after the conference version of our paper was published. Although all three methods are equivalent, they have different intuition. It appears to us that our method is the easiest to use for results in this paper.
2 Preliminaries
2.1 Quantum query algorithms
Let denote .
We consider computing a Boolean function in the quantum query model (for a survey on query model, see [6, 13]). In this model, the input bits can be accessed by queries to an oracle and the complexity of is the number of queries needed to compute . A quantum computation with queries is just a sequence of unitary transformations
The ’s can be arbitrary unitary transformations that do not depend on the input bits . The ’s are query (oracle) transformations which depend on . To define , we represent basis states as where consists of bits and consists of all other bits. Then, maps to itself and to for (i.e., we change phase depending on , unless in which case we do nothing).
The computation starts with a state . Then, we apply , , , , and measure the final state. The result of the computation is the rightmost bit of the state obtained by the measurement.
The quantum computation computes exactly if, for every , the rightmost bit of equals with certainty.
The quantum computation computes with bounded error if, for every , the probability that the rightmost bit of equals is at least for some fixed .
() denotes the minimum number of queries in a quantum algorithm that computes exactly (with bounded error). denotes the minimum number of queries in a deterministic query algorithm computing .
2.2 Polynomial degree and related quantities
For any Boolean function , there is a unique multilinear polynomial such that for all . We say that represents . Let denote the degree of polynomial representing .
A polynomial approximates if whenever and whenever . Let denote the minimum degree of a polynomial approximating . It is known that
Theorem 1
[9]

;

;
Two other relevant quantities are sensitivity and block sensitivity. The sensitivity of on input is just the number of such that changing the value of changes the value of :
We denote it . The sensitivity of is the maximum of over all . We denote it .
The block sensitivity is a similar quantity in which we flip sets of variables instead of single variables. For and , let be the input in which if and if . The block sensitivity of on an input (denoted ) is the maximum number of pairwise disjoint , , such that . The block sensitivity of is the maximum of over all . We denote it .
3 Main results
3.1 Overview
The basis function. is equal to 1 iff is one of the following values: 0011, 0100, 0101, 0111, 1000, 1010, 1011, 1100. This function has the degree of 2, as witnessed by polynomial and the deterministic complexity , as shown in section 4.3 where we discuss the function in more detail.
Iterated function. Define a sequence , , with being a function of variables by
(1) 
Then, , and, on every input , and .
We will show
Theorem 2
.
Thus, the exact degree is but even the quantum complexity with 2sided error is . This implies an vs. gap both between exact degree and exact quantum complexity and between approximate degree and boundederror quantum complexity.
The proof is by introducing a combinatorial quantity with the following properties:
Lemma 1
For any Boolean function , .
Lemma 2
Let be an arbitrary Boolean function. If , , is obtained by iterating as in equation (1), then
Lemma 3
.
3.2 Previous methods
Our approach is a generalization of the quantum adversary method [4].
Theorem 3
[4] Let , , be such that , and

for every , there are at least inputs such that ,

for every , there are at least inputs such that ,

for every and every there are at most inputs such that and ,

for every and every , there are at most inputs such that and .
Then, .
There are several ways to apply this theorem to defined in the previous section. The best lower bound that can be obtained by it seems to be (cf. appendix A). This gives some separation between and but is weaker than our new method that we introduce next.
3.3 New method: weight schemes
Definition 1
Let , , and . A weight scheme for consists of numbers , , for all and satisfying , we have
(2) 
Definition 2
The weight of is , if and if .
Definition 3
Let . The load of variable in assignment is
if and
if .
We are interested in schemes in which the load of each variable is small compared to the weight of .
Let the maximum Aload be . Let the maximum Bload be . The maximum load of a weight scheme is .
Let be the maximum of over all choices of , , and all weight schemes for . We will show in Lemma 1, if we have a weight scheme with maximum load , the query complexity has to be .
3.4 Relation to other methods
Theorem 3 follows from our new Lemma 1 if we set for all and for all . Then, the weight of is just the number of pairs . Therefore, for all and for all . The load of in is just the number of such that . That is, and . Therefore, , and . This gives us the lower bound of Theorem 3.
There are several generalizations of Theorem 3 that have been proposed. Barnum and Saks [7] have a generalization of Theorem 3 that they use to prove a lower bound for any readonce function on variables. This generalization can be shown to be a particular case of our Lemma 1, with a weight scheme constructed in a certain way.
Barnum, Saks and Szegedy [8] have a very general and promising approach. They reduce quantum query complexity to semidefinite programming and show that a query algorithm exists if and only if a certain semidefinite program does not have a solution. Spalek and Szegedy have recently shown [32] that our weighted scheme method is equivalent to Theorem 4 in [8] which is a special case of their general method. Our method is also equivalent [32] to Kolmogorov complexity method by Laplante and Magniez [19].
Hoyer, Neerbek and Shi [16] have shown lower bounds for ordered searching and sorting using a weighted version of the quantum adversary method, before both this paper and [8]. Their argument can be described as a weight scheme for those problems, but it is more natural to think about it in the spectral terminology of [8].
4 Proofs
4.1 Lemma 1
In terms of weights schemes, Lemma 1 becomes
Lemma 1 If a function has a weight scheme with maximum load , then .
Proof: We can assume that . Otherwise, we just multiply all by and all by . Notice that this does not affect the requirement (2). In the new scheme is equal to the old and is equal to the old .
Let be the state of a quantum algorithm after queries on input . We consider
For , . Furthermore, if an algorithm computes in queries with probability at least , [4, 16]. To prove that , it suffices to show
Lemma 4
.
Proof: Let be the state of the algorithm immediately before query . We write
with being the state of qubits not involved in the query. The state after the query is
Notice that all the terms in and are the same, except for those which have . Thus,
and
By the inequality ,
We consider the sum of all first and all second terms separately. The sum of all first terms is
Similarly, the second sum is at most . Finally, implies that .
4.2 Lemma 2
In terms of weight schemes, we have to prove
Lemma 2 Let be a function with a weight scheme with maximum load . Then, the function obtained by iterating as in equation (1) has a weight scheme with maximum load .
The lemma follows by inductively applying
Lemma 5
If has a weight scheme with maximum load and has a weight scheme with maximum load , then has a weight scheme with maximum load .
Proof: Similarly to lemma 1, assume that the schemes for and have .
Let be the number of variables for the base function . We subdivide the variables , , of the function into blocks of variables. Let , , be the block. Furthermore, let be the vector
Then, .
We start by defining , and . Let , , (, , ) be , , in the weight scheme for (, respectively). (, respectively) if

(, respectively), and

for every , if and if .
if and, for every ,

if .

if , .

if , .
Let denote the weights in the scheme for and the weights in the scheme for . We define the weights for as
where is the weight of in the scheme for .
For , let be the index of the block containing and be the index of within this block. Define
The requirement (2) is obviously satisfied. It remains to show that the maximum load is at most . We start by calculating the total weight . First, split the sum of all into sums of over with a fixed .
Claim 1
Proof: Let be such that . Then,
When , can be equal to any such that . Therefore, the sum of all , is
(3) 
Each of sums in brackets is equal to . Therefore, (3) equals
Corollary 1
(4) 
Proof: is the sum of sums from Claim 1 over all . Now, the corollary follows from Claim 1 and (which is just the definition of ).
Next, we calculate the load
in a similar way. We start by fixing and all variables in outside the block. Let be the sum of and be the sum of , over that have and the given values of variables outside .
Claim 2
Proof: Fixing and the variables outside fixes all terms in , except . Therefore, where is fixed. This means . Also,
Property (2) of the scheme for (, , ) implies
If we sum over all possible , we get
Since , we have
We now consider the part of generated by with a fixed . By the argument above, it is at most times the sum of corresponding . By Claim 1, this sum is . By summing over all , we get
(5) 
By property (2), . Therefore,
and (5) is at most
By induction, . This proves lemma 2.
4.3 Lemma 3
We now look at the base function in more detail. The function is shown in Figure 1. The vertices of the two cubes correspond to . Black circles indicate that . Thick lines connect pairs of black vertices that are adjacent (i.e., and differing in exactly one variable with and ).
From the figure, we can observe several properties. Each black vertex () has exactly two black neighbors and two white neighbors. Each white vertex () also has two white and two black neighbors. Thus, for every , there are two variables such that changing changes . We call these two sensitive variables and the other two insensitive. From figure 1 we also see that, for any , flipping both sensitive variables changes