You are on page 1of 12

Quantum Kolmogorov Complexity and its Applications

Caterina E. Mora1, Hans J. Briegel1,2 , and Barbara Kraus2


1
Institut für Quantenoptik und Quanteninformation der Österreichischen Akademie der Wissenschaften, Innsbruck, Austria
2
Institut für Theoretische Physik, Universität Innsbruck, Technikerstraße 25, A-6020 Innsbruck, Austria
(Dated: 16th October 2018)
Kolmogorov complexity is a measure of the information contained in a binary string. We inves-
tigate here the notion of quantum Kolmogorov complexity, a measure of the information required
to describe a quantum state. We show that for any definition of quantum Kolmogorov complexity
measuring the number of classical bits required to describe a pure quantum state, there exists a pure
n-qubit state which requires exponentially many bits of description. This is shown by relating the
classical communication complexity to the quantum Kolmogorov complexity. Furthermore we give
some examples of how quantum Kolmogorov complexity can be applied to prove results in different
arXiv:quant-ph/0610109v1 13 Oct 2006

fields, such as quantum computation and thermodynamics, and we generalize it to the case of mixed
quantum states.

PACS numbers:

I. INTRODUCTION at most by a constant, which becomes negligible in the


limit of very long strings (n → ∞) [4]. For this reason one
In 1948, Shannon [1] laid the foundation of modern usually omits the subscript “U ” and writes simply K(ω),
theory of information and communication by defining or KCl (ω) to underline the fact that we are considering
mathematically the concept of information. In partic- the classical quantity.
ular, Shannon was interested in the amount of informa- Note that this quantity is not computable [5]. How-
tion contained in typical messages emitted from a source ever, it turned out that already upper bounds on the Kol-
(a random variable). The Shannon entropy of a random mogorov complexity of asymptotically long bit strings,
variable X measures, in fact, how much information we where they can be computed, are very fruitful. A trivial
gain on average if we learn the value of X. A differ- upper bound on the Kolmogorov complexity of an n–bit
ent, but related issue, regards the idea of quantifying string ω = ω1 , . . . , ωn is n, since there always exists a
the information contained in a single message (or, more program of the form: ”Print ω1 , . . . , ωn ”. A string ω is
generally, a single object), independently of the statis- said to be compressible by k bits if there exists a pro-
tical properties of the source that emits it. This prob- gram with less than or equal to n − k bits that gives ω
lem has been first considered by Solomonoff in 1960, but as an output. A simple counting argument shows that at
its most relevant developments are due to independent most 2k strings have a complexity smaller than or equal
works by Kolmogorov and Chaitin [2, 3]. The under- to k. Thus, for any n, there exists at least one n-bit
lying idea, common to all these approaches, is that the complex (incompressible) string. Actually, one can show
amount of information contained in a finite object (bit that almost all bit strings are complex [5].
string) is the size of the shortest program that, without The definition of Kolmogorov complexity satisfies the
additional data, computes the string and halts. To give intuition that it is much easier to describe a regular ob-
full credit to all those who made pioneering contributions ject than a random one. Moreover, it is a good measure of
to the subject, one should probably refer to such a mea- the information content of a bit string. A complex object
sure of information as “Solomonoff-Kolmogorov-Chaitin contains a large amount of information (albeit not neces-
complexity”. For brevity we adopt the most common sarily structure [6]) and thus cannot be compressed. On
choice in literature, and refer to it simply as Kolmogorov the contrary, regular strings have a much smaller com-
complexity. plexity: for example, the complexity of a periodic string
The Kolmogorov complexity of a n-bit string, ω, is is at most logarithmic in its length. This logarithmic de-
defined as the length of the shortest binary program that pendency is only due to the fact that one has to specify
computes that string, i.e. the number n, which requires log(n) bits of description.
Notice that this dependency has no deeper meaning than
the mere specification of the length of the output string.
KU (ω) = min{l(p)|U (p) = ω}, (1) One can thus remove it by considering the conditional
p
quantity K(ω|n), which measures the number of bits re-
where U denotes a Turing machine, which computes quired to describe ω given the fact that the computer is
ω, given the program p as input. One can prove that given the length n of the string [32].
the Kolmogorov complexity, also called algorithmic, or The theory developed in the context of Kolmogorov
descriptive complexity, is largely independent of the par- complexity has become very powerful in classical in-
ticular choice of the Turing machine. That is, changing formation theory. It has been successfully employed
Turing machine will change the algorithmic complexity as a general proof method, known as “incompressibil-
2

ity method” [4], in as diverse fields as learning theory, tion III we will relate these two concepts to each other.
complexity theory, and combinatorics, to name just a This section will also serve to introduce our notation.
few. The notion of Kolmogorov complexity has been
used [3] to solve in a simple and elegant way many oth-
erwise difficult problems, such as, e.g., Gödel’s theorem A. Quantum Kolmogorov Complexity
[7]. Recently it has also been used to establish a connec-
tion between classical information and thermodynamics Many classical quantities, e.g the Shannon entropy,
[8, 9, 10, 11]. How to generalize the concept of Kol- have been successfully generalized to quantum informa-
mogorov complexity to the quantum world has become tion and have become useful and powerful tools to under-
a natural question with the development of the theory stand and further develop quantum information theory.
of quantum information. Not only is a good notion of In the case of Kolmogorov complexity, though, the way to
quantum Kolmogorov complexity of deep fundamental do so is not straightforward. Indeed, recently a number
interest, but one also hopes it will allow to develop a of different definitions for quantum Kolmogorov complex-
theory similarly powerful as its classical counterpart. ity have been introduced by Gàcs [12], Berthiaume et al.
In recent years, a number of different definitions of [13], Vitanyi [14], and Mora and Briegel [17]. Contrary
quantum Kolmogorov complexity have been proposed to the classical case, where different definitions have been
[12, 13, 14, 15], each generalizing the classical quantity shown to be equivalent [4], in the quantum setting they
in a different way. Some measure the number of qubits are not. The definition proposed in [12] differs from the
required to describe a quantum state, while others count others in that it is a generalization of an alternative def-
instead the number of classical bits. The aim of this pa- inition of algorithmic complexity, introduced by Levin
per is to shed new light on the different definitions of [18]. The general idea of such approach is not to search
quantum Kolmogorov complexity. In particular the re- for the shortest program that reproduces the string x (as
sults presented here will allow us to better understand one does in the definition proposed by Kolmogorov), but
the physical meaning of some of the definitions. Further- rather to look at the probability of obtaining x when a
more we will show how Kolmogorov complexity can, also random program (that is, a sequence of 0 and 1 gener-
in the quantum scenario, be used as a proof method. ated, e.g., by coin tosses) is given as input to a Turing
The paper is organized as follows. In Section II we machine. It has been shown that the negative logarithm
review some of the existing definitions of quantum Kol- of such a probability coincides with the Kolmogorov com-
mogorov complexity of pure states. Then we review the plexity of the string x. The probability distribution over
notion of communication complexity. We will focus on the set of binary strings generated by running random
the equality problem and, more precisely, on its solution programs on a Turing machine is called universal proba-
by means of the fingerprinting protocol studied in [16]. In bility, and it can be characterized by precise mathemat-
Section III we relate the number of classical bits required ical properties. In his work, Gàcs proposes a universal
to describe a quantum state (as a general definition) to a density matrix, µ, that can be viewed as a generalization
problem in communication complexity. This allows us to of the universal probability distribution. The definition
prove that there exist quantum states of n qubits whose of the Komogorov complexity of a quantum state follows,
description require exponentially many classical bits. In thus, quite naturally from the classical theory. The two
Section IV we use the relation studied in Section III to possible choices, whose properties are analyzed in detail
derive some implications for any definition of Kolmogorov in [12], are
complexity, including a natural generalization to mixed
states. Furthermore we will provide a non-trivial relation H(|ϕi) = −hϕ| log µ|ϕi and H(|ϕi) = − loghϕ|µ|ϕi .
between the so–called network Komogorov complexity of (2)
a class of pure quantum states [17] and the classical Kol- It is easy to see that, given an n-qubit state |ϕi, both
mogorov complexity of bit strings. In the last section we quantities are upper bounded by n.
apply the notion of quantum Kolmogorov complexity to The other definitions mentioned above are, instead,
a number of problems, including computation complexity based on a generalization of complexity, as introduced by
and thermodynamics. Kolmogorov and Chaitin. In [13] the Kolmogorov com-
plexity of a quantum state ρ is defined as the size of the
smallest quantum program (state) that, given as input to
a quantum Turing machine, yields ρ as output. In this
II. REVIEW OF QUANTUM KOLMOGOROV
work, the “length of a quantum state” is defined as the
COMPLEXITY AND COMMUNICATION
logarithm of the dimension of the smallest Hilbert space
COMPLEXITY
that contains the state itself. One can then define the
complexity of ρ as
In this section we first review the different definitions
ε
of quantum Kolmogorov complexity and their properties. KBLV (ρ) = min{l(π)|F (U (π), ρ) > 1 − ε} , (3)
π
Second, we review the notion of communication complex-
ity. In particular we will describe the fingerprinting pro- where 1 − ε measures the fidelity, F , with which the state
tocol studied in [16] to solve the equality problem. In Sec- ρ must be reproduced. It is clear from the definition, that
3

this quantity is a measure of the quantum information one needs at most 2n log 1ε gates in order to prepare an
contained in a state. One can prove that the complexity n-qubit state, and that the length of ω B,ε (|ϕi) is up-
of an n-qubit state is upper bounded by n. per bounded by the number of gates, one obtains that
In [14], on the contrary, the author proposes a defini- B,ε
KNet (|ϕi) is upper bounded by 2n log 1ε , up to terms of
tion of quantum Kolmogorov complexity based on the smaller order. From now on we will refer to this definition
classical description of the state. More precisely, the as “network” complexity.
complexity of a state |ϕi is defined as Assuming that we restrict the choice of the set of basis
KVit (|ϕi) = min{l(p) − log |hψ|ϕi|2 |U(p) = |ψi}. (4) gates to 1- and 2-qubit gates (differing from the original
p definition presented in [17]), one can show that the net-
The idea here is to compute |ψi which approximates the work complexity is independent (up to a constant) of the
desired state |ϕi, and the term − log |hψ|ϕi|2 penalizes actual choice of basis. Keeping this in mind, we will thus
ε
for a bad approximation of the state. Analogously to the simply write KNet (|ϕi).
definition of Berthiaume et al., the complexity of a state It should be noted here that the network complexity
|ϕi can grow at most linearly with the number of qubits has not only a clear physical meaning, since it gives a
whose state is described by |ϕi. measure of how hard it is to describe a way to prepare the
Another approach, which is related to Vitanyi’s one state, but furthermore it was also shown that there exists
has been introduced by Zurek, first, and later by Caves a connection between this definition of Kolmogorov com-
and Schack [10, 11, 19, 20]. Since we will discuss this plexity and entanglement [15]. In order for a state to have
approach in more detail in the last section of this pa- maximal complexity (that is, exponential in the number
per, we also want to briefly review it here. Suppose of qubits) it is in fact necessary that it is highly entan-
that on is given a set of possible states, S = {|Ψi i} and gled: more precisely, a complex state must have maxi-
an associated probability distribution P = {pi }i , with mum Schmidt measure [21]. On the contrary, a product
pi = P (|Ψi i). In order to specify a particular element state has complexity at most linear in the number of
of this set, one just has to specify the index, which is a qubits.
purely classical task. It is well known that the so–called Another possibility to describe a pure state classi-
Shannon-Fano code can be used to obtain a (almost op- cally is simply to describe the coefficients of the state
timal) description [5]. In order to explain the code, let us in a certain basis, e.g. the computational basis. We
assume that p1 ≥ p2 , . . . and define Fi = ik=1 pk . The
P will refer to this complexity as computational-basis-
codeword ci for index i is r(Fi ), which is Fi rounded off to expansion complexity, or, more briefely, CBE complex-
li = ⌊log2 (1/pi )⌋, i.e. the floor of log2 (1/pi ), bits. Thus, ity.
P The CBE complexity of a n-qubit state |Ψi =
if the information of the set S, also called the background i1 ,...,in ci1 ,...,in |i1 , . . . , in i, with ij ∈ {0, 1} and complex
information [20] is given, then only li bits are addition- coefficients ci1 ,...,in is then
ally required to describe the state |Ψi i [33]. Note that ε
KCBE (|Ψi) = KCl [(c0,...0 , . . . , c1,...1 )]. (6)
the logarithmic term in the definition before, can be un-
derstood in this way [14]. In general, the coefficients ci1 ,...,in are computed only
A completely different approach, based on the identifi- with a finite precision ε, i.e. each of them is approximated
cation of a state with its abstract preparation procedure, by a number c̃i1 ,...,in such that |ci1 ,...,in − c̃i1 ,...,in | ≤ ε.
was investigated in [15, 17]. In this case the Kolmogorov This implies that theP state that has been described in
complexity of a state |ϕi is defined as the amount of the this way, i.e. |Ψ̃i = i1 ,...,in c̃i1 ,...,in |i1 , . . . , in i, fulfills
classical information required to describe a circuit that the inequality k|Ψ̃i − |Ψik2 ≤ 2n ε2 . Thus, 1 − |hΨΨ̃i|2 ≤
prepares |ϕi with the required precision ε from a fixed 2n−1 ε2 , which implies that the precision ε must scale like
⊗n
initial state, e.g. |0i . To be more precise, first a com- 1/2n/2 , similarly as the precision with which one must
plete and finite gate basis B is fixed. Any state |ϕi can describe each gate occurring in the definition of the net-
then be prepared, with arbitrary finite precision, ε, by a work complexity.
circuit, C B,ε (|ϕi), built with gates from such a basis [34]. Yet another possibility is to use a measurement and de-
Furthermore, as the basis is finite, it is possible to define scribe the state by the outcome probability of this mea-
a finite code and to encode any circuit in a classical se- surement. One might for instance choose an “algorith-
quence. Thus it is possible to associate to each state |ϕi mically simple” measurement, i.e. a POVM that can be
a set of strings ω B,ε (|ϕi), each of which encodes a cir- described with only a few bits, and describe the state by
cuit that prepares |ϕi with the required accuracy. The the outcome probability of this measurement.
Kolmogorov complexity of |ϕi is then defined as the mini- As we have already mentioned, in classical information
mum among the classical Kolmogorov complexities of the theory the different definitions of complexity are provably
strings ω(C B,ε )(|ϕi) equivalent, while this does not hold in quantum theory.
B,ε
Indeed some of the definitions described here have qual-
KNet (|ϕi) = min K(ω(C B,ε (|ϕi))). (5) itatively different behaviors, e.g. the scaling with n. In
C B,ε (|ϕi)
this paper we aim to shed new light on the notion of
Here, the minimum is taken over all circuits, C B,ε , such quantum Kolmogorov complexity and to better under-
that |hϕ|C B,ε (|0i⊗n )|2 ≥ 1 − ε. Taking into account that stand its physical meaning.
4

One of the main drawbacks of Kolmogorov complex- are usually solved (see e.g. [23] for an overview). We
ity is the fact that it is not computable. Despite of this, will focus here on the so–called worst case scenario. In
though, it is possible to give upper bounds for it, and this case, one is interested in the amount of communica-
these are sufficient and instrumental for many applica- tion needed to compute f (x, y) correctly with probability
tions. Furthermore, we recall that even in the case of larger or equal to 1 − δ, for any x and y.
computable quantities, such as, e.g., communication or Of course, any function f can be exactly evaluated if
computation complexities, one is often not interested in both Alice and Bob send their full input to the referee,
the exact value, since it might be very hard to compute. who can then compute f (x, y). It follows thus that 2n is
In these cases too, one is mainly concerned with the scal- an upper bound for any communication problem in the
ing of these quantities as a function of the input size, n. simultaneous message passing model [35]. To improve
Owing to this fact, the following notation is widely used. such a protocol, one might consider the case in which
One says that a function, g(n), is O(f (n)) if there exist Alice and Bob send to the referee a compressed version
two constants, c ∈ R and n0 ∈ N such that g(n) ≤ cf (n) of their input. In this case, the communication required
for all n ≥ n0 . That is, for sufficiently large n, g is upper depends on the Kolmogorov complexity of the two inputs.
bounded by f . Similarly one says that a function g(n) is If one considers the worst–case scenario and does not
Ω(f (n)) if there exist two constants, c and n0 such that allow any error, this does not help to improve the upper
g(n) ≥ cf (n) for all n ≥ n0 . If the behavior of two func- bound. By considering the case in which the inputs are
tions, g, f is asymptotically the same, up to a constant incompressible n–bit strings, in fact, it is easy to see that
factor, i.e. if g is both O(f (n)) and Ω(f (n)) then we say 2n bits of communication are still needed [36]. However,
that g is Θ(f (n)). if a certain failure
√ probability is tolerated, one can show
From now on, we will call a bit string (a state) algo- that only O( n) bits of communication are required (see
rithmically simple when its Kolmogorov complexity is at below).
most O(log(n)) (at most O(n)). Even though Holevo’s Theorem states that by sending
m qubits one cannot convey more than m classical bits
of information, it has been shown that there are cases in
B. Communication complexity which the quantum setting is significantly more power-
ful than the classical one (see e.g. [23] for an overview).
In fact, there are functions for which the classical com-
The theory of communication complexity deals with
munication complexity is exponentially larger than the
the following type of problem. Two distant parties, Alice
quantum one. One such instance, which we will con-
and Bob, hold each an input, x and y respectively (usu-
sider in the following, is the equality problem. This is a
ally one has x, y ∈ {0, 1}n). The common goal of the par-
worst–case simultaneous message passing – model where
ties is to compute the value f (x, y) for a given function
the function to be evaluated is
f known to both parties. The communication complex-
ity of a function f , CCl (f ), is defined as the minimum

1, if x = y
number of bits that Alice and Bob need to communicate EQn (x, y) = (7)
0, if x 6= y ,
in order to evaluate f (x, y).
In the quantum setting, the communication between with x, y ∈ {0, 1}n.
Alice and Bob takes place through a quantum channel.
Analogous to the classical case, the quantum communi- It has been proved [24, 25]
√ that, allowing a small prob-
cation complexity of f , CQ (f ), is the minimum number ability of failure, only O( n) bits of classical communi-
of qubits that Alice and Bob need to communicate to cation are needed to compute EQn (x, y). Furthermore,
evaluate f (x, y). this amount of communication has been shown to be both
A slightly different communication model is the so– necessary and sufficient for the solution of the equality
called simultaneous message passing model, first intro- problem.
duced by Yao [22]. In this model there is a third party Let us now briefly recall one optimal classical proto-
–the referee– in addition to Alice and Bob. As before, the col here. It is known that for every n ∈ N and for a
common aim of the parties is to compute f (x, y), where fixed c > 1, and 0 < ∆ < 1, there exists an error cor-
f is a given function and x and y are the input strings recting code E : {0, 1}n → {0, 1}m, with m = cn, such
held by Alice and Bob respectively. In this case, how- that the distance between code words E(x) and E(y) is
ever, no direct communication between Alice and Bob at least (1 − ∆)m [37]. Alice and Bob apply a given er-
is allowed. They can only send messages to the referee, ror correcting code (where the specification of the code
who will then compute f (x, y) based on the information is independent of n) to x, y respectively. Then they
he has received. choose randomly an index i, j ∈ {1, . . . , m}, respectively.
There are many cases in which one does not require Alice (Bob) sends i and the i–th bit value of E(x), i.e.
the function f to be computed with certainty, but al- Ei (x), (j, and Ej (y)) to the referee. If i 6= j the ref-
lows a certain failure probability, δ. The conditions on eree cannot conclude anything and tells Alice and Bob
this error, as well as other factors, distinguish different to restart the protocol. However, if i = j, the referee
scenarios in which communication complexity problems checks whether Ei (x) equals Ej (y). If this is the case
5

he concludes that x = y else he concludes x 6= y. The problem, this consideration leads to a lower bound to the
probability of having a collision, i.e. that the random number of bits required to describe those states, i.e. to
indices i, j coincide, is 1/m. The probability of making their quantum Kolmogorov complexity. We show now
an error is Perror = P (Ei (x) = Ei (y) | x 6= y)/m < ∆. that this lower bound is exponential in the number of
Thus, in order to make the error probability independent qubits.
of m ε
√ (i.e. independent of n), Alice and Bob have to send Let KQ be an arbitrary definition of the quantum Kol-
O( n) bits. Note that the error can be reduced to any mogorov complexity with the following physical meaning:
δ > 0 if Alice and Bob send O(log(1/δ)) random bits of ε
given KQ (|ϕi) classical bits one can prepare the state
the code words, which implies that the communication |ψi with precision ε. Now and in the following, we say
complexity √ of the equality problem, with error probabil- that KQ ε
(|ϕi) bits of information allow to prepare |ϕi
ity δ, is O( n log(1/δ)). with precision ε if it contains all the information that is
In [16], the case in which Alice and Bob’s fingerprints needed to prepare a state ε-close to |ϕi with a perfect
can consist of quantum information is studied and it is apparatus. Or, equivalently, given KQ ε
(|ϕi) bits of infor-
shown that O(log2 n)-qubit fingerprints are sufficient to mation, we can write down a state, ε-close to |ϕi. At the
solve the equality problem (with arbitrarily small error same time we imply that such a task is impossible with
probability). Let us briefly review also this protocol here. a smaller amount of information. We show now that for
Using the same notation as before one defines, for each any such definition there exists a n–qubit state |ψi such
x ∈ {0, 1}n the following (log2 m + 1)-qubit state that KQ ε
(|ψi) is exponential in n, ruling out some of the
m definitions reviewed in Section II.
1 X Let KQ ε
(|hx i) and KQε
(|hy i) be the Kolmogorov com-
|hx i = √ |ii|Ei (x)i , (8)
m i=1 plexities of the two fingerprints used in the protocol.
Then a possible classical communication protocol is the
where, as above, Ei (x) is the i-th bit of the word E(x). following:
Since the two words, E(x) and E(y) can be equal for at
most m∆ positions, for any x 6= y we have |hhx |hy i| ≤ 1. Given x and y, respectively, Alice and Bob send the
∆. The simultaneous message passing protocol for the description of the (log2 m+1)-qubit states |hx i and
ε ε
equality problem is the following. |hy i to the referee, requiring KQ (|hx i) + KQ (|hy i)
bits of communication.
1. Alice and Bob, holding x and y respectively, pre-
pare a quantum system in the states |hx i and |hy i 2. In order to distinguish between the case where
respectively and send it to the referee. |hx i = |hy i or |hx i 6= |hy i, the referee could e.g.
simulate (on a classical computer) the circuit de-
2. The referee uses an auxiliary qubit, R and pre- scribed in the quantum fingerprinting protocol.
pares the state (HR ⊗ IAB )(C-SWAPR,AB )(HR ⊗
IAB )|0iR (|hx i|hy i)AB = 1/2[|0iR (|hx , hy i + The precision with which the referee is able to simulate
|hy , hx i)AB + |1iR (|hx , hy i − |hy , hx i)AB ]. Then the quantum circuit, and thus the probability with which
he measures the auxiliary system in the computa- he can obtain the correct answer, depends on the preci-
tional basis and associates x = y with the outcome sion with which the two quantum states are described. It
“0”, and x 6= y with the outcome “1”. is straightforward to show that a final error probability
(such as in the quantum fingerprinting protocol) ∆, is√ ob-
With this test, the referee can determine the value of
EQn (x, y) with error probability (1 + ∆2 )/2. Such a tained if the states are described with precision ε ≤ ∆
probability can be reduced to any δ > 0 by considering [38].
the fingerprint |hx i⊗k , with k = O(log2 1δ ). In this case The number of bits of communication of this proto-
ε ε
the length of each fingerprint is O(log2 n log2 1/δ). col is KQ (|hx i) + KQ (|hy i). As we know that the op-
timal bound for the classical communication complex-
ity of the equality
√ problem, in the simultaneous passing
III. RELATION BETWEEN CLASSICAL model, is n, it follows that there must be√at least a
ε ε
COMMUNICATION COMPLEXITY AND case for which KQ (|hx i) + KQ (|hy i) ≥ O( n). Con-
QUANTUM KOLMOGOROV COMPLEXITY sidering that m = nc, it follows that there must exist
an M -qubit state |ΨCompl
M i, with M = log2 m such that
ε Compl M/2
In this section we establish a relation between Kol- KQ (|ΨM i) ≥ O(2 /c). This shows that any defini-
mogorov complexity and communication complexity. To tion of the quantum Kolmogorov complexity that counts
this end, we consider a classical protocol that simu- the number of classical bits required to prepare a state
lates the quantum fingerprinting protocol. That is, in- must grow exponentially with the number of qubits.
stead of sending quantum systems (prepared in the states One of the definitions presented in Sec II that fulfills
|hx i , |hy i), Alice and Bob send to the referee a classi- the necessary requirement of growing exponentially with
cal description of these states. Since there exists a lower the number of qubits is the network complexity [15]. Note
bound on the classical communication complexity for this that also the CBE complexity fulfills this condition.
6

IV. IMPLICATIONS FOR CLASSICAL AND Kolmogorov complexities:


QUANTUM KOLMOGOROV COMPLEXITY
ε ε
KQ (|Ψi) = KQ (ρ) ≤ Kcl (P ), for ε → 0 (9)
The considerations of the previous section allow us to
derive some implications regarding the Kolmogorov com- ε
where KQ is any definition of the quantum Kolmogorov
plexity. The result, that the complexity of a pure n–qubit complexity which allows us to describe the states in such
state can be 2n , holds for any definition of the quan- a way that they can be prepared.
tum Kolmogorov complexity that measures the amount Obviously, an arbitrary purification of a mixed state
of classical bits required to prepare the state. Since a ρ, plus the additional information of which systems are
state can also be described by a outcome–probability dis- auxiliary systems allows one to describe ρ. Therefore,
tribution of local measurements, this bound leads also to for a general definition of the Kolmogorov complexity it
a bound on a classical Kolmogorov complexity of a prob- must hold that
ability distribution. This consideration then guides us
how to define the quantum Kolmogorov complexity for ε
KQ ε
(ρ) ≤ min{KQ (|ψiAR )|TrR (|ψiAR hψ|) = ρ}. (10)
mixed state. Furthermore, we show that the Kolmogorov |ψi
complexity of the states |hx i is essentially equal to the
classical Kolmogorov complexity of the classical bit string On the other hand, it is clear that there exists at least
x. one purification of the state ρ, whose complexity is the
same as the one of ρ, namely the state whose Schmidt-
basis is the same for both subsystems and equals the
eigenbasis of ρ. These considerations strongly suggest
A. Classical Kolmogorov complexity of a that the generalization of the Kolmogorov complexity to
probability distribution and quantum Kolmogorov
mixed states should be
complexity of mixed states
ε ε
KQ (ρ) := min{KQ (|ψiAR )|TrR (|ψiAR hψ|) = ρ}. (11)
One possible description of a state is a complete mea-
surement and the probability distribution of the out-
comes of this measurement. Let us choose the measure- Let us show now that the precision with which the
ment itself to be algorithmically simple, e.g. a local mea- mixed state is described is exactly the same as the one
ε
surement. Thus, the POVM we consider consists of at with which its purification is described. If KQ (|ψiAR )
2
most 22n elements, which can be easily described (the bits describe the state |ψ̃iAR , then |hψ̃|ψi| ≥ 1 −
length of the description depends at most logarithmically ε. Let us now use Uhlmanns theorem, which states
√ √
on n). Since we consider a complete measurement, the that F (ρ, σ) = tr[( ρσ ρ)1/2 ] = max|Ψi,|ϕi | hΨ| ϕi|,
complexity of the quantum state is upper bounded by where the maximization is over all purifications |Ψi of
the classical Kolmogorov complexity of its outcome prob- ρ and |ϕi of σ [27]. Therefore the reduced states ρ̃ =
ε TrR (|ψ̃iAR hψ̃|) and ρ = TrR (|ψiAR hψ|) fulfill the inequal-
abilities, PΨ , i.e KQ (|Ψi) ≤ Kcl (PΨ ), for ε → 0. Note
that the length of PΨ is upper bounded by 22n . As we ity F (ρ, ρ̃)2 ≥ | hΨ| ϕ̃i|2 = 1 − ε. Thus, if the description
know that there exists a complex pure state, |Ψi, this of the purification of the mixed state leads to a state
implies that there exists a complex probability distribu- which is ε close to the actual purification, then the cor-
tion PΨ , with Ω(2n ) ≤ Kcl (PΨ ) ≤ O(4n ). Furthermore, responding reduced states are also ε close.
any probability distribution describing a complex state As an example we can consider the (very simple) case
fulfills these inequalities. of the maximally mixed state of n qubits IA . We will
We now find some constraints on the quantum Kol- choose the network complexity here. In this case it is
mogorov complexity of mixed states. Let us consider the easy to see that its complexity is at most logarithmic in
P √ P the number of qubits. The 2n-qubit state (|00i + |11i)⊗n
pure state |Ψi = i pi |i, ii, with pi ≥ 0 and i pi = 1 AR
and where |ii = |i1 , . . . in i with ij ∈ {0, 1} denotes the is a purification of the maximally mixed state on A. To
computational basis. This state prepare such a state it is sufficient to divide the 2n qubits
P is a so-called purifica-
tion of the mixed state ρ = i pi |ii hi|. ρ can be eas- into couples, apply to the first qubit of each couple a
ily computed from |Ψi and vice versa, requiring only Hadamard gate and then apply a C-NOT gate between
the additional information: ”|Ψi is a purification of ρ, the two. The description of the circuit is extremely easy,
where the auxiliary system comprises the second set of and depends on n only in the specification of the total
qubits. Furthermore the Schmidt-basis is the same for number of qubits required. We have thus
both subsystems.” Thus, the quantum Kolmogorov com-
plexity of these two states must be the same. One possi- ε I 1
KNet ( ) ≤ log n + 2 log .
ble description of ρ (or |Ψi) is a description of the vector n ε
P = (p1 , . . . , p2n ), containing all the eigenvalues of ρ plus
the information that ρ is diagonal in the computational The term in ε is separated from that in n as there are
basis. This implies the following relation between the only two different types of gates required.
7

B. Quantum complex states from algorithmically generating the state ((|0i + |1i)/2)⊗ log m ⊗ |0i. Then,
complex strings one applies the unitary Ei (such that Ei |0i = |Ei (x)i)
to the last qubit, conditional on the state of the
From the analysis of the fingerprinting protocol, first qubits being |ii, i.e. the total operation being
we have seen that there must exist a complex (and |ii|0i 7→ |ii|Ei (x)i. This operation can be performed
therefore highly entangled) state of the form |hx i = by a circuit composed of single-qubit and CNOT gates,
m n whose description requires at most O((log m)2 ) bits
P
i=1 |ii|Ei (x)i, where x ∈ {0, 1} and Ei (x) is the i-
th bit of the encoding E(x) ∈ {0, 1}m of x ∈ {0, 1}n [39]. The state generated by this circuit is |hx i. The
using code E (of the type described in section II B). complexity of the state |hx i is of course bounded by the
While it is not necessarily true in general, there are complexity of the circuit just described.
cases in which the codes E have the additional property
ε 1 1
of being algorithmically simple, i.e. such that KCl (E) = KNet (|hx i) ≤ 2 log+ (log m)2 log + KCl (E(x))
O(log(n)). This is true, e.g., for Justesen codes [26]. ε ε
When such additional condition is satisfied, it is possible = O(KCl (E(x))),
to prove an important relationship between the classical (12)
Kolmogorov complexities of x, E(x), and the quantum
(network) complexity of the states |hx i. More precisely, when regarded as a function of m. The first term takes
B,ε into account the possibility that the Hadamard and the
one finds that KCl (x) = Θ(KCl (E(x))) = Θ(KNet (|hx i)).
NOT gates might not be included in the gate basis B.
The proof of this statement consists of two parts. In the
Note that this contribution is constant in m. The second
first part (Observation 1) we show that the complexity
term takes into account the description of the subcircuit
of the encoded word E(x) coincides (up to a constant)
in which each gate Ei is applied conditional on the state
with that of x. In the second part (Proposition 1) we
of the first log m qubits. The term KCl (E(x)) is the one
prove that the network complexity of the quantum state
that specifies when Ei = I and when, instead, Ei = NOT.
|hx i is essentially the same as the classical Kolmogorov
Note that this proof remains valid even if the code E is
complexity of E(x).
not algorithmically simple. In the following we see that
Observation 1. If E is an algorithmically simple code, this property of the code is needed in order to prove the
and E(x) ∈ {0, 1}m is the encoding of x ∈ {0, 1}n , then reverse statement.
ε
KCl (E(x)) = Θ(KCl (x)) We show now that KCl (E(x)) = O(KNet (|hx i))
Let ω h be the classical description of the circuit that
ε
Proof. To prove the statement, we show that prepares |hx i, such that KCl (ωh ) = KNet (|hx i), and con-
KCl (E(x)) = O(KCl (x)) and KCl (x) = O(KCl (E(x))). sider the following program.
The first of the two equalities follows immediately
by the fact that the code E is algorithmically sim- 1. Read ωh .
ple. To describe E(x), in fact, it is sufficient to give 2. Simulate the circuit and compute the approximate
the program for E, and a description of x. Thus, state |h̃x i.
KCl (E(x)) ≤ KCl (E) + KCl (x) = O(KCl (x)).
In order to prove the reverse statement, we consider that 3. For i from 1 to m, compute hi|h̃x i .
x can be described as the string whose encoding is E(x).
Thus it is possible to prepare x by allowing a computer This is a purely classical program that, simulating the
to generate all possible strings E(y) (for y ∈ {0, 1}n) (exact) creation of the quantum state |hx i and a num-
and compare each of them with E(x), halting when ber of operations on it, allows to prepare the classical
E(y) = E(x), i.e., when y = x. This implies that bit string E(x). The length of this program can be esti-
KCl (x) ≤ KCl (E(x)) + KCl (E) = O(KCl (E(x))).  mated as follows. The first step requires O(KCl (ω h )) +
log KCl (ω h ) bits; the second contributes a quantity that
Proposition 1. Let E be an algorithmically simple is constant in m and depends only on the precision with
error-correcting code, such that d(E(x), E(y)) ≥ (1 − which we require the simulation to be effectuated. The
∆)m, where E(x), E(y) ∈ {0, 1}m are the encodings last step gives a contribution that is O(log m). As this
of x ∈ {0, 1}n, y ∈ {0, 1}n respectively. Then, the will not in general be an optimal program, its length is
Pm
(log m + 1)-qubit state |hx i = i=1 |ii|Ei (x)i, where
an upper bound to the complexity of E(x).
ε
hi|ji = δij , has complexity KNet (|hx i) = Θ(KCl (E(x)))
for sufficiently small ε. KCl (E(x)) ≤ O(KCl (ω h )) + O(log n) + O(1) =
ε (13)
= O(KCl (ω h )) = O(KNet (|hx i)).
Proof. In order to prove the statement we
ε
will show that KNet (|hx i) = O(KCl (E(x))) and In the analysis of the program given above, we have
ε
KCl (E(x)) = O(KNet (|hx i)). Let us first prove that not yet taken into account the effect of the error ε in
ε
KNet (|hx i) = O(KCl (E(x))). Consider the following cir- the preparation of the quantum state |hx i. We do so
cuit, that acts on the initial state |0i⊗(log m+1) . Initially a now, assuming that the circuit described by ωh does
Hadamard gate is applied to each of the first log m qubits, not prepare |hx i, but rather some state |h̃x i such that
8

|hhx |h̃x i|2 ≥ 1 − ε. Without loss of generality we write can clearly see how it follows from basic considerations
√ P
|h̃x i = (1/ m) m i=1 αij |ji|Ẽi (x)i. As a consequence,
related to the known properties of Kolmogorov complex-
the program described above will yield as √ final output ity.
a string Ẽ(x), with hE(x), Ẽ(x)i ≥ m 1 − ε, where
Proposition 2. For any function f : {0, 1}n → {0, 1},
hE(x), Ẽ(x)i is the scalar product between the two m-
the gain in communication complexity that one can obtain
dimensional vectors whose coefficients (in an orthonor-
by using quantum instead of classical communication, if
mal basis) are given by E(x) and Ẽ(x) respectively. only one-way communication is allowed, is at most expo-
Since E is chosen to be algorithmically simple, it is nential, i.e.
possible to verify whether or not the final string Ẽ(x)
is part of the code. If it is not so, then it follows CCl (f ) ≤ O(2CQ (f ) ). (14)
immediately that there has been an error somewhere,
which, if ε is sufficiently small (depending on the er- Proof. The idea of the proof is to simulate the optimal
ror correcting code) can be corrected. The only case quantum protocol classically. Consider an optimal quan-
in which the program described above cannot correct it- tum communication protocol to evaluate f (x, y), and
self is when the output word Ẽ(x) is a codeword, but suppose that a single state of q qubits is sent. Such a
different from E(x). We show now that this event can state can be described by a classical sequence of at most
be excluded by choosing ε small enough. For any two O(2q ) bits, and any operation on the quantum state can
words F, G we have m − hF, Gi ≥ d(F, G). If F, G are be simulated. In this case, thus, CCl (f ) ≤ O(2CQ (f ) ). If
codewords we also have d(F, G) ≥ (1 − ∆)m, which im- instead of a single q-qubit state, k states of q ′ qubits
plies then that hF,√Gi ≤ m∆. As we have seen earlier, are sent (with kq ′ = q), they can be described by
hE(x), Ẽ(x)i ≥ m 1 − ε. Thus, choosing ε ≤ 1 − ∆2

classical sequences of at most O(2q ) qubits each, thus

ensures that Ẽ(x) cannot be a codeword.  CCl (f ) ≤ O(k2q ) ≤ O(2q ) = O(2CQ (f ) ). 
This property has two main consequences. The first is Note that a similar argument can be used to consider
that the existence of a complex state of the form |hx i fol- the more general case where also two-way communica-
lows immediately from the existence of a complex string. tion between Alice and Bob is allowed. Similarly as be-
The second is the fact that there exists a “recipe” that fore, one only has to consider the classical simulation of a
allows us to prepare complex states, or would allow us to quantum protocol. However, here it could be that Alice
do so if we could have a classical complex string. does not send all the qubits to Bob which she uses to
solve the problem.
Corollary 1. For any m ≥ 1 there exists Pam (log m + 1)- An exponential quantum/classical gap in a quantum
qubit complex state of the form |hx i = i=1 |ii|Ei (x)i, communication problem, is obtained only when in Eq.
where hi|ji = δij , xi ∈ {0, 1}, and E is an error- (14) we have an equality (an exponential gap, in fact,
correcting code of the type introduced above. requires CQ (f ) ≤ O(log CCl (f ))). This can be obtained
only when at least one of the states that appear in the
quantum protocol is complex (that is, its classical de-
scription grows exponentially with the number of qubits).
V. APPLICATIONS FOR QUANTUM This implies that the power of quantum communication
KOLMOGOROV COMPLEXITY can be explained (mainly) by quantum entanglement. To
see this, let us use for instance the network complexity
In the following we apply the results on quantum Kol- (Eq.(5)). In [15] it has been proved that the entanglement
mogorov complexity to prove some statements from the of a quantum state, in terms of its Schmidt measure, is
theory of communication and computation complexity. an upper bound for its complexity. This implies that in
While some of the results are known, we underline that all communication complexity problems where one sees
the proofs are simpler than those found in literature. Fi- an exponential classical/quantum gap, maximally entan-
nally we see how the definition of network complexity can gled states must be created. This seems to imply that the
be applied to some aspects in thermodynamics, allowing source of the quantum advantage is in fact entanglement.
us to generalize existing results.

B. Computation complexity
A. Communication complexity
Quantum Kolmogorov complexity can also be used as
Let us first show that the exponential upper bound on a powerful tool to gain insight on some issues related to
the Kolmogorov complexity of quantum states implies computation complexity theory. We use it here to de-
that any quantum communication protocol in the SMP termine some properties of the states that appear during
model, requiring q qubits of communication, can be sim- the computation.
ulated using at most O(2q ) classical bits of communica- Let us describe a quantum algorithm by a sequence of
tion. Such result was already known [28], but here we single- and two-qubit operations, Ait ,jt , where it and jt
9

denote the two qubits on which the operation is acting undoubtfully a fundamental resource, it is not sufficient:
during the t-th time step (if it = jt Ait ,jt denotes a single only particular types of entanglement are, in fact, useful.
qubit operation acting on qubit it ). In the t-th step of
the algorithm, the state |Φt−1 i is transformed to |Φt i =
⊗n
Ait ,jt |Φt−1 i, with |Φ0 i = |0i . We have the following C. Kolmogorov complexity and thermodynamics

Observation 2. If A = (Ai1 ,j1 , Ai2 ,j2 , · · · , AiT ,jT ) is a


quantum algorithm with running time T = O(poly(n)), As a last application of the notion of quantum Kol-
then all the states |Φt i = Ait ,jt |Φt−1 i must have network mogorov complexity investigated in this paper let us re-
Kolmogorov complexity that grows at most polynomially consider some aspects of thermodynamics [40]. First of
with n. all we recall how the Kolmogorov complexity became im-
portant in the context of thermodynamics and review
Proof. Since the quantum circuit model is universal, any some results presented by Caves [10, 11] in this context.
algorithm with running time T can be simulated effi- Then we show how these results can be further developed
ciently by a circuit. In particular this implies that, for by taking the notion of quantum Kolmogorov complexity
each step t, there exists a quantum circuit that prepares into account.
|Φt i requiring at most O(poly(t)) gates. As the network The second law of thermodynamics states that the en-
complexity of a state is trivially bounded from above by tropy of a closed system, defined as the logarithm of the
the size of the circuit, that is, the number of gates re- number of microstates populated by a system, can never
quired to prepare it, and t ≤ T = O(poly(n)), it follows decrease. In his famous argument, Maxwell introduced a
ε ficticious machine where this law seemed to be violated.
that, for all t, KNet (|Φt i) ≤ O(poly(n)).
 This machine consists of a gas cylinder initially at equi-
librium, and a hypothetical demon which could open and
On the other hand, one can show that if the complexi- close a shutter between two parts of the cylinder. If the
ties of the states occurring in the algorithm are indepen- demon was able to separate the the fast molecules from
dent of n, then the quantum algorithm cannot have an the slow ones, the entropy of the system could decrease,
exponential speed–up compared to a classical algorithm. thus violating the second law of thermodynamics. The
ε
Similarly to the classical case, we define KQ (|Ψi |n) to be resolution to this paradox lies in the fact that the demon
the number of bits required to prepare the n–qubit state must measure the velocity of the molecules and, more
|Ψi given the number n. importantly, that he must store this information in some
memory. As this memory has to be finite, the demon
Proposition 3. Let A = (Ai1 ,j1 , Ai2 ,j2 , · · · , AiT ,jT ) be a
must erase the measurement outcomes at some point in
quantum algorithm with running time T = O(poly(n)),
order to have space to store the new ones. It could be
and let |Φt i = Ait ,jt |Φt−1 i denote the state at the t-th
ε shown from a physical point of view that this erasure in-
step of the computation. If for all t KNet (|Φt i|n) ≤ rt ,
creases the entropy of the total system, ensuring that the
where rt is independent of n, then A can be simulated
second law of thermodynamics is valid. Landauer formal-
classically with only a polynomial overhead of operations.
ized this fact in his famous principle, which states that
Proof. If KNet ε ⊗n
(|Φt i|n) ≤ rt then |Φt i = Mt |0i , where the process of erasing n bits of information from a reg-
the dimension of the operator Mt is some function of ister increases the entropy of the environment by log2 n
rt , ft (rt ), but independent of n. Thus, the number of [31]. Thus, sequences with large Kolmogorov complex-
operations required to compute |Φt i classically is inde- ity cannot be erased, except with an irreversible process,
pendent of n. Therefore, the classical algorithm: com- which can provide the required energy. Somehow inverse
pute for each t the state |Φt i and print it solves the to the process of erasure is the process of randomization.
same problem as the quantum algorithm and requires Whenever a computer makes a randomizing step (such
only RT = RO(poly(n)) computational steps, where R as, e.g., tossing a coin) it is possible to increase the in-
is the maximum of all ft (rt ).  formation contained in the computer register and thus,
if used appropriately, a similar procedure can be used to
In [29] it was proved that in order for a quantum al- lower the entropy of the environment.
gorithm to be exponentially faster than a classical one Bennett [8] and later Zurek [19] showed that the Ko-
that solves the same task, it is necessary that at least mogorov complexity of the microstates of a system is a
one of the states |Φt i must describe an entangled state fundamental quantity in the thermodynamics analysis of
of l qubits, where l grows with the input size n. To- such problems. If the demon finds out a way to com-
gether with the results above, this means that, in or- press the bit string he wants to erase, he might use a
der to find algorithms that actually allow an exponential much lower thermodynamic cost for the erasure. This
quantum/classical gap, we must look for states that are deep connection between thermodynamic entropy and
both (a) highly entangled and (b) have a non-constant Kolmogorov complexity has been formalized by Zurek
Kolmogorov complexity that grows at most polynomially in [19], who has defined the total entropy S of a system
with the input size. We underline the relevance of this as the sum of the thermodynamic entropy and the Kol-
consideration which implies that, while entanglement is mogorov complexity.
10

Caves continued the investigation of the Maxwell‘s de- mation required to fully describe the system [20]. In the
mon in the quantum setting [10, 11]. He studied the example considered above, the background information
change of the total entropy, defined by Zurek as S = S+I, is the list of states S ≡ {cos θk |0i + sin θk |1i | θk =
2m −1
where S denotes the statistical entropy and I the al- k 2πm }k=0 together with the uniform probability distri-
gorithmic information. Here, the algorithmic informa- bution [42].
tion is composed of two parts, the background informa-
tion, which is sufficient to generate a list of all states In the following we shall choose a different point of
(up to a certain precision), and the additional informa- view, for two main reasons. First, while it is clear that a
tion, needed to describe a particular element of this list state can always be described with the background infor-
of states (see Section II). In his considerations, Caves mation and the conditional information, this might not
chooses the background information to be negligible, im- always be the most convenient description. Second, we
plying that only the conditional algorithmic information see that with this approach it is very hard to go from
contributes to the total entropy. one system to composite systems. Consider the example
In order to demonstrate that it is indeed possible to studied above for the case where the demon tries to mea-
conceive situations in which an intelligent demon could sure n photons. A possible generalization of the back-
extract work from a system (i.e. increase the system’s ground information in the case of n systems is the set
total entropy) Caves considered the following situation. S ⊗n . In this case one would still be allowed to consider
A demon, whose system is prepared in some standard the background information negligible. At the same time,
product state denoted by |si = |s, . . . , si, is acting on a though, the demon does not have the possibility to choose
single photon, which is initially prepared in equilibrium, an arbitrary measurement direction with arbitrary good
ρs = 1l/2. The total entropy of the initial state is there- precision, but is instead forced to project the global sys-
fore S in = S(ρs ) + S(|si hs|) = S(ρs ) + I((|si hs|) = 1 tem onto product states. The only situation in which the
[41]. The main idea to increase the total entropy of demon could measure along arbitrary directions would
the closed system is to project the state of the photon be if the set of its available states increased with the di-
onto an algorithmically complex state. To this aim the mension of the system. In fact, as seen before, only if
demon randomizes his register (apart from one bit) to his background information increased exponentially with
obtain a complex string, r, of m bits. He associates the number of qubits the demon could indeed have the
to the bit string r the angle θ, where 0.0r is the bi- freedom to measure an arbitrary state. In this case it
nary representation (first m bits) of θ/π. The preci- seems to be impossible to neglect the contribution due
sion with which he can choose one of the 2m angles, to the background information.
m
{θk = k 2πm }2k=0−1 is therefore εθ = 2−m π. For any choice
of k (that is, r) he sets a polarizing beam splitter to mea- If the demon can only measure each single photon in-
sure the polarization of the photon in the basis {|Ψθk i ≡ dependently from all the others, the increase in total en-
cos(θk ) |0i + sin θk |1i , |Ψ̂θk i ≡ sin(θk ) |0i − cos θk |1i}. tropy is simply n times the one that we have in the case
Thus,P the state describing the system and the demon is of the single photon, i.e. ∆S = nm. However, if the de-
ρ = mon projects the system onto maximally complex (and
k (ρθk ⊗ |0i h0|s ⊗ |Ψθk i hΨθk | + ρ̂θk ⊗ |1i h1|s ⊗
thus necessarily fully entangled) states the increase of
|Ψ̂θk ihΨ̂θk |) ⊗ |ek i hek |d , where we have introduced an
the total entropy can be exponentially larger. The max-
auxiliary system, s that keeps track of information about
imum possible increase in the total entropy is given by
which arm the photon left the beam splitter and is avail- (Max)
able to the system. The auxiliary system d keeps track ∆S = Ifin − N Hin = 2n log 1ε − n, where ε gives the
of all the possible measurement choices. Here, the states precision with which the demon prepares its states.
|ek i denote a orthonormal basis, and ρθk = hΨθk |ρS |Ψθk i
and ρ̂θk = hΨ̂θk |ρS |Ψ̂θk i are not normalized. Thus, the Note that for a general definition of the quantum Kol-
final state describing the photon is given by the reduced mogorov complexity the background information is im-
state of ρ, i.e. by tracing over system D, d. Observing the plicitely accounted for. This is why then it is no problem
measurement outcome the demon stores this additional to consider the projection onto complex states. For in-
bit of information and thus holds the bit string 0.0r (or stance using the network definition, the background in-
0.1r) respectively. From the demons point of view, the formation is a basis consisting of single-qubit and two–
system is after the measurement in a pure state, |Ψθk i, qubit gates, together with an initial tensor-product state.
In this case the background information remains the
or |Ψ̂θk i. The total entropy of the whole system (w.l.o.g.
same, and therefore negligible, when increasing the num-
we assume that 0.0r has been measured) is therefore
ber of considered qubits. In the case of the CBE complex-
S fin = S(|Ψθk i) + I(θk = 0.0r) = I((0.0r)) = m + 1.
ity, instead, the background information consists with the
Therefore, the total entropy is increased by ∆S = m,
specification of the computational basis: which is indeed
which implies that the work W (+) = mkB T ln 2 has been
algorithmically simple. This is why e.g. the network, or
extracted.
the CBE, complexity of a state |Ψi is indeed the number
An important point in these considerations is the pres- of bits required to describe the state and no additional
ence of the background information, which is the infor- information is required.
11

VI. CONCLUSIONS ready known, the proofs based on quantum Kolmogorov


complexity are extremely simple, and encourage us to
In this paper we investigated the generalization of the look for other possible applications to related fields (such
concept of Kolmogorov complexity to the quantum case. as query complexity and oracle models for computation).
We have shown how this quantity can be related to Referring to the concept of total entropy, first introduced
other fundamental concepts of quantum information the- by Zurek [9], and in particular to works by Caves [10, 11],
ory, such as communication and computation complex- we continued the study of the relation between quantum
ity. More precisely by analyzing a particular protocol complexity and thermodynamics. In particular, by ap-
of communication complexity we found a condition that plying the concept of quantum Kolmogorov complexity,
allows us to discriminate among the different proposals we were able to extend their analysis to a full quantum
for quantum Kolmogorov complexity. In particular we setting, including a first study of the effects of entangle-
have proven that any definition of quantum Kolmogorov ment.
complexity that measures, in bits, the amount of infor-
mation needed to prepare a n–qubit state must scale
exponentially with n. We have also shown how some VII. ACKNOWLEDGEMENTS
of the existing definitions indeed satisfy such a condi-
tion. Furthermore, it has been possible to use properties We would like to thank C. M. Caves for useful discus-
of the quantum Kolmogorov complexity to prove state- sions. We acknowledge support by the Austrian Science
ments about communication and computation complex- Foundation (FWF), the EU (OLAQUI, SCALA, QICS),
ity. While some of the results we have obtained were al- and the Elise Richter Program.

[1] C. E. Shannon, A mathematical theory of communication, [16] H. Buhrman, R. Cleve, J. Watrous and R. de Wolf, Quan-
Bell Sys. Tech. Journal 27, 379 (1948). tum Fingerprinting, Phys. Rev. Lett. 87, 16 (2001).
[2] A. N. Kolmogorov, Three Approaches to the Quantitative [17] C. Mora and H. Briegel, Algorithmic complexity of quan-
Definition of Information, Probl. Inf. Transmission, 1, 1 tum states, quant-ph/0412172, to appear in IJQI.
(1965). [18] L. A. Levin, On the notion of a random sequence, Soviet
[3] G. J. Chaitin, On the length of programs for computing Mathematics Doklady 14, 1413 (1973).
finite binary sequences, J. ACM 13, 547 (1966). [19] W. H. Zurek Algorithmic randomness and physical en-
[4] M. Li, and P. Vitanyi, An Introduction to Kolmogorov tropy, Phys. Rev. A 40, 4731 (1989).
Complexity and Its Applications, Springer (1997). [20] C. M. Caves and R. Schack, Unpredictability, informa-
[5] T. M. Cover, and J. A. Thomas, Elements of Information tion, and chaos, Complexity 3, 4657 (1997).
Theory, John Wiley and Sons (1991). [21] J. Eisert and H. J. Briegel, Phys. Rev. A 64 (2001).
[6] C. H. Bennett, Complexity in the universe, in “Physical [22] A. C.-C. Yao, in Proceedings of the 11th Annual ACM
origins of time asymmetry”, Cambridge university press Symposium on Theory of Computing (ACM, New York,
(1994). 1979), p. 209.
[7] K. Gödel, ber formal unentscheidbare Stze der Principia [23] R. de Wolf Quantum computing and communication com-
Mathematica und verwandter Systeme, I, Monatshefte fr plexity, PhD thesis.
Mathematik und Physik 38, 173 (1931). [24] A. Ambainis, Algorithmica 16, 298 (1996).
[8] C. H. Bennett, The thermodynamics of computation – a [25] I. Newman and M. Szegedy, in Proceedings of the
review, Int. J. Theor. Phys. 21, 305 (1982). 28th Annual ACM Symposium on Theory of Computing
[9] W. H. Zurek, Thermodynamic cost of computation, algo- (ACM, New York, 1996), p. 596.
rithmic complexity and the information metric, Nature [26] J. Justesen, A class of constructive asymptotically good
341 119 (1989). algebraic codes, IEEE Trans. Inform. Theory 18, 652
[10] C. M. Caves, Information and entropy, Phys. Rev. E 47, (1972)
6 (1993). [27] M. A. Nielsen and I. L. Chuang, Quantum computation
[11] C. M. Caves, Information, Entropy and Chaos, in “Phys- and quantum information, Cambridge university press
ical origins of time asymmetry”, Cambridge university (2000).
press (1994). [28] Y. Shi and Y. Zhu, Proc. of the 37th ACM Symposium
[12] P. Gács, Quantum Algorithmic Entropy, arXiv: quant- on Theory of Computing, p.460 (2005)
ph/0011046 v2 (2001). [29] R. Jozsa and N. Linden, Soc. Lond. A, 459, 2011 (2003).
[13] A. Berthiaume, W. van Dam, and S. Laplante, Quantum [30] Maxwell’s demon, 2: entropy, classical and quantum in-
Kolmogorov Complexity, arXiv: quant-ph/005018 (2000). formation, edited by H.S.Leff and A.F. Rex, IOP pub-
[14] P. Vitanyi, Three Approaches to the Quantitative Def- lishing (2003).
inition of Information in an Individual Pure Quantum [31] R. Landauer, Irreversibility and heat generation in the
State, arXiv: quant-ph/9907035 (2000). computing process, IBM Journal of Research and Devel-
[15] C. Mora and H. Briegel, Algorithmic complexity and en- opment 5, 183 (1961).
tanglement of quantum states, Phys. Rev. Lett. 95, 20 [32] Analogously, any definition of the quantum Kolmogorov
(2005). complexity of an n-qubit state will have a log n term that
12

specifies the number of qubits of the states and that can correcting code are almost orthogonal.
be removed by considering the conditional complexity. [39] This second part of the circuit can be described as fol-
[33] Note that this is usually the approach taken in classical lows. For i that goes from 0 to m − 1, repeat the fol-
theory, where the background information of S is always lowing instructions. First apply a NOT gate to all the
small. qubits whose position corresponds to a zero in the binary
[34] As in [17], here and in the following we will say that description of i. Second, apply the controlled-unitary
circuit C B,ε prepares |ϕi with precision (or accuracy) ε if C log m (Ei ) (as defined in [27]): this controlled unitary
hϕ|C B,ε (|0i⊗n )|2 ≥ 1 − ε has a very simple description (see, e.g., [27]). Finally ap-
[35] Note that the same argument holds when direct commu- ply NOT gates to all the qubits that were modified in the
nication between Alice and Bob is allowed. In this case, first step (and reset all work qubits to zero)
though, the bound is n, and not 2n, since only one of the [40] For a comprehensive analysis of the problem, and issues
parties need to communicate his/her input related to it, we refer to [30] and references therein.
[36] Such a compression, though, might be useful if one is [41] Here it is assumed, as mentioned above, that the algo-
interested in other scenarios, or if the domain of x and y rithmic information of the equilibrium state is 0.
is restricted in some way. [42] Equivalently, one might consider as background informa-
[37] An example, for instance, is given by Justesen codes. In tion the two basis states {|0i, |1i} and the set of an-
π
this case one may choose any c > 2 and ∆ < 9/10 + gles {θk = k m }k , where one agrees that the specifica-
1/(15c) tion of an angle θk implies preparing a state of the form
[38] This is clear as all the states coded by the same word cos θk |0i + sin θk |1i.
are almost parallel, while those who appear in the error

You might also like