skip to main content
research-article
Open Access

MIP* = RE

Published:25 October 2021Publication History
Skip Abstract Section

Abstract

Note from the Research Highlights Co-Chairs: A Research Highlights paper appearing in Communications is usually peer-reviewed prior to publication. The following paper is unusual in that it is still under review. However, the result has generated enormous excitement in the research community, and came strongly nominated by SIGACT, a nomination seconded by external reviewers.

The complexity class NP characterizes the collection of computational problems that have efficiently verifiable solutions. With the goal of classifying computational problems that seem to lie beyond NP, starting in the 1980s complexity theorists have considered extensions of the notion of efficient verification that allow for the use of randomness (the class MA), interaction (the class IP), and the possibility to interact with multiple proofs, or provers (the class MIP). The study of these extensions led to the celebrated PCP theorem and its applications to hardness of approximation and the design of cryptographic protocols.

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement. We prove the surprising result that every problem that is recursively enumerable, including the Halting problem, can be efficiently verified by a classical probabilistic polynomial-time verifier interacting with two all-powerful but noncommunicating provers sharing entanglement. The result resolves long-standing open problems in the foundations of quantum mechanics (Tsirelson's problem) and operator algebras (Connes' embedding problem).

References

  1. Babai, L., Fortnow, L., Lund, C. Non-deterministic exponential time has two-prover interactive protocols. Comput. Complex. 1, 1 (1991), 3--40.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bavarian, M., Vidick, T., Yuen, H. Hardness amplification for entangled games via anchoring. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, ACM, New York, NY, USA, 2017, 303--316.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ben-Sasson, E., Goldreich, O., Harsha, P., Sudan, M., Vadhan, S. Robust PCPs of proximity, shorter PCPs, and applications to coding. SIAM J. Comput. 36, 4 (2006), 889--974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ben-Sasson, E., Sudan, M. Simple PCPs with poly-log rate and query complexity. In Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, ACM, New York, NY, USA, 2005, 266--275.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 15 (1969), 880.Google ScholarGoogle ScholarCross RefCross Ref
  6. Cleve, R., Hoyer, P., Toner, B., Watrous, J. Consequences and limits of nonlocal strategies. In Proceedings. 19th IEEE Annual Conference on Computational Complexity 2004, IEEE, Washington, DC, USA, 2004, 236--249.Google ScholarGoogle ScholarCross RefCross Ref
  7. Colbeck, R. Quantum and relativistic protocols for secure multi-party computation. Ph. D. Thesis, 2009.Google ScholarGoogle Scholar
  8. Connes, A. Classification of injective factors cases II1, II, IIIλ, λ ≠ 1. Ann. Math. 104 (1976), 73--115.Google ScholarGoogle ScholarCross RefCross Ref
  9. Ekert, A.K. Quantum cryptography based on bell's theorem. Phys. Rev. Lett. 67, 6 (1991), 661.Google ScholarGoogle ScholarCross RefCross Ref
  10. Fritz, T., Netzer, T., Thom, A. Can you compute the operator norm? Proc. Am. Math. Soc. 142, 12 (2014), 4265--4276.Google ScholarGoogle ScholarCross RefCross Ref
  11. Gemmel, P., Lipton, R., Rubinfeld, R., Sudan, M., Wigderson, A. Self testing/correcting for polynomials and for approximate functions. In Proceedings of the 23rd STOC. ACM, New York, NY, USA, 1991, 32--42.Google ScholarGoogle Scholar
  12. Goldwasser, S., Kalai, Y.T., Rothblum, G.N. Delegating computation: interactive proofs for muggles. J. ACM 62, 4 (2015), 1--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ito, T., Vidick, T. A multi-prover interactive proof for NEXP sound against entangled provers. In 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, IEEE, Washington, DC, USA, 2012, 243--252.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ji, Z., Natarajan, A., Vidick, T., Wright, J., Yuen, H. Quantum soundness of the classical low individual degree test. arXiv preprint arXiv:2009.12982 (2020).Google ScholarGoogle Scholar
  15. Kleene, S.C. Introduction to Metamathematics. J. Symb. Log. 19, 3 (1954), 215--216.Google ScholarGoogle Scholar
  16. Mermin, D. Simple unified form for the major no-hidden-variables theorems. Phys. Rev. Lett. 65, 27 (1990), 3373.Google ScholarGoogle ScholarCross RefCross Ref
  17. Natarajan, A., Vidick, T. Two-player entangled games are NP-hard. In Proceedings of the 33rd Computational Complexity Conference, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 2018, 20.Google ScholarGoogle Scholar
  18. Natarajan, A., Wright, J. NEEXP ⊆ MIP*. arXiv preprint arXiv:1904.05870v3 (2019).Google ScholarGoogle Scholar
  19. Ozawa, N. About the Connes embedding conjecture. Jpn. J. Math. 8, 1 (2013), 147--183.Google ScholarGoogle ScholarCross RefCross Ref
  20. Peres, A. Incompatible results of quantum measurements. Phys. Lett. A 151, 3-4 (1990), 107--108.Google ScholarGoogle ScholarCross RefCross Ref
  21. Rogers Jr., H. Theory of Recursive Functions and Effective Computability. MIT Press, Cambridge, MA, USA, 1987.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Tsirelson, B.S. Some results and problems on quantum bell-type inequalities. Hadronic J. Suppl. 8, 4 (1993), 329--345.Google ScholarGoogle Scholar
  23. Tsirelson, B.S. Bell inequalities and operator algebras, 2006. Problem statement from website of open problems at TU Braunschweig, 2006. Available at http://web.archive.org/web/20090414083019/ http://www.imaph.tu-bs.de/qi/problems/33.html.Google ScholarGoogle Scholar

Index Terms

  1. MIP* = RE

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 64, Issue 11
          November 2021
          130 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/3494050
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 October 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format