Mind the : Asymptotically Better, but Still Impractical, Quantum Distributed Algorithms
Abstract
:1. Introduction
2. Background and Setting
2.1. The CONGEST and CONGEST-CLIQUE Models of Distributed Computing
2.2. Quantum Versions of CONGEST and CONGEST-CLIQUE
- Each node may execute unlimited local computation.
- Each node may send a message consisting of either a register of qubits or a string of classical bits to every other node in the network. Each of those messages may be distinct.
- Each node receives and saves the messages the other nodes send it.
2.3. Notation and Problem Definitions
3. Contributions
4. APSP and Routing Tables
4.1. Distance Products and Routing Tables
4.2. Distance Products via Triangle Finding
- Input: An integer-weighted (directed or undirected) graph distributed among the nodes, with each node v knowing , as well as the weights for each .
- Output: For each node v, its output is all the edges that are involved in at least one negative triangle in G.
4.3. Routing Tables via Efficient Computation of Witness Matrices
- (i)
- (ii)
- is a witness matrix for
4.4. Triangle Finding
- Input: An integer-weighted graph distributed among the nodes and a set , with each node v knowing and S.
- Promise: For each
- Output: For each node v, its outputs are the edges that satisfy .
- 1:
- .
- 2:
- WHILE :
- (a):
- Each node samples each of its edges with probability , so that we obtain a distributed subgraph of G consisting of the sampled edges.
- (b):
- Run on . Denote the output by .
- (c):
- 3:
- Run on , and call the output.
- 4:
- Output .
- 1:
- Every node receives the weights , for all and .
- 2:
- Every node constructs the set by selecting every with probability . If for some , abort the algorithm and report failure. Otherwise, keeps all pairs and receives the weights for all of those pairs. Denote those elements of as .
- 3:
- Every node checks for each , whether there is some that contains a node w, such that forms a negative triangle, and outputs all pairs for which a negative triangle was found.
- 1:
- Every node samples each node in with probability , creating a set of sampled vertices. If , abort the algorithm and report a failure. Otherwise, have each node broadcast to all other nodes, and take .
- 2:
- Each computes , such that forms a negative triangle in , then determines its class to be .
- 3.1:
- Each node executes the IdentifyClass procedure.
- 3.2:
- For each , for every , every node in class executes a quantum search to find whether there is a with some forming a negative triangle in G, and then reports all the pairs for which such a is found.
4.5. Distributed Quantum Searches
4.6. Final Steps of the Triangle Finding
- (i):
- (ii):
- for .
- Every node for each routes the list to node .
- Every node for each it received in step 1 sends the truth value of the inequality
4.7. Complexity
- APSP with routing tables needs distance products with witness matrices.
- Step 1 of ComputePairs needs up to rounds and step 2 takes up to rounds.
- Step 1 of IdentifyClass needs up to rounds.
- In step 2 of IdentifyClass, the are up to large and, hence, may range up to .
- Step 0 of the EvaluationB procedure needs rounds. Steps 1 and 2 of EvaluationB (or EvaluationA, in the case) procedure use a total of rounds.
- The procedure, EvaluationB (or EvaluationA), is called up to times for each value of in step 3.2 of ComputePairs.
4.7.1. Memory Requirements
4.7.2. Complexity of the Classical Analog
5. Approximately Optimal Steiner Tree Algorithm
5.1. Algorithm Overview
- Step 1
- —APSP and routing tables: Solve the APSP problem, as in [7], and add an efficient routing table scheme via triangle finding in rounds, with success probability (this step determines the algorithm’s overall success probability).
- Step 2
- —shortest-path forest: Construct a shortest-path forest (SPF), where each tree consists of exactly one source terminal and the shortest paths to the vertices whose closest terminal is that source terminal. This step can be completed in one round and n messages, per ([2] Section 3.1). The messages can be in classical bits.
- Step 3
- —weight modifications: Modify the edge weights depending on whether they belong to a tree (set to 0), connect nodes in the same tree (set to ∞), or connect nodes from different trees (set to the shortest-path distance between root terminals of the trees that use the edge). This uses one round and n messages.
- Step 4
- —minimum spanning tree: Construct a minimum spanning tree (MST) on the modified graph in rounds as in [6], and prune leaves of the MST that do not connect terminal nodes since these are not needed for the Steiner tree.
5.2. Shortest-Path Forest
- (i)
- if and only if , for .
- (ii)
- For each , and a shortest path connecting v to in G is contained in
- (iii)
- The form a partition of V, and
- 1:
- Each node v sets using the APSP information.
- 2:
- Each node v sets , being the routing table of v, and sends a message to to indicate this choice. If v receives such a message from another node u, it registers u as its child in the SPF.
5.3. Weight-Modified MST and Pruning
- (i):
- For
- (ii):
- For
- (iii):
- For ,
5.4. Overall Complexity and Correctness
6. Directed Minimum Spanning Tree Algorithm
6.1. Edmonds’ Centralized DMST Algorithm
- Initialize a subgraph H with the same vertex set as G by subtracting for each node the minimum incoming edge weight from all its incoming edges, and selecting exactly one incoming zero-weight edge for each non-root node of G. Set .
- WHILE is not a tree:
- (a)
- For each cycle of H, contract the nodes on that cycle into a super vertex. Consider all non-contracted nodes as simple super vertices, and obtain a new graph as the resulting minor.
- (b)
- If there is a non-root node of with no incoming edges, report a failure. Otherwise, obtain a subgraph by, for each non-root node of , subtracting the minimum incoming edge weight from all its incoming edges, and selecting exactly one incoming zero-weight edge for each non-root, updating .
- Let . FOR :
- (a)
- Obtain by expanding the non-simple super vertices of and selecting all but one of the edges for each of the previously contracted cycles of to add to .
- Return .
6.2. Lovasz’s Shrinking Iterations
- If there is a non-root node of G with no incoming edges, report a failure. Otherwise, for each non-root node of G, subtract the minimum incoming edge weight from all its incoming edges. Select exactly one incoming zero-weight edge for each non-root node to create a subgraph H of G with those edges.
- Find all cycles of H, and denote them If H has no cycles, abort the iteration and return (SUCCESS, H). For , find the set of nodes reachable by dipaths in H from .
- Compute the all-pairs shortest path distances in G.
- For each node , denote . For each , set and .
- Create a minor by contracting each into a super vertex , considering all other vertices of G as simple super vertices . For each vertex of , let the edge weights in be:
- Return .
6.2.1. Quantum Distributed Implementation
- if
- if and
- otherwise
6.2.2. Quantum Distributed Implementation of Lovasz’s Iteration
- 1:
- Have all nodes learn all edges of H, as well as the current super vertices.
- 2:
- For each connected component , denote by the cycle of . Let be the node with maximal ID in , which each node can locally compute.
- 3:
- Run the quantum algorithm for APSP and routing tables described in Section 4 on this graph, or report a failure if it fails.
- 4:
- For each i, determine an edge , minimizing , and broadcast both to all nodes in .
- 5:
- Each node in each applies the following updates :
- −
- Soft contract at level to soft-contract all super vertices with distance to into one super vertex, with each contracted node updating its super vertex ID to
- −
- Add edge to H, effectively merging with another active component of H
- Initialize a subgraph H with the same vertex set as G by subtracting for each node the minimum incoming edge weight from all its incoming edges, and selecting exactly one incoming zero-weight edge for each non-root node of G. Set , and with annotations to be the identity mapping.
- WHILE: is not a single component
- (a)
- Run QDLSI with inputs , to obtain , as outputs. Increment .
- Return as the distributed minimum spanning tree.
6.3. Complexity
7. Discussion and Future Work
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A
Appendix A.1. Proof of Claim 1
- (i)
- We have
- (ii)
- Next,
Appendix A.2. The α > 0 Case
- (i):
- The algorithm does not abort
- (ii):
- (iii):
- For , , we have .
- (iv):
- for and .
- 3.1:
- Each node executes the IdentifyClass procedure.
- 3.2:
- For each :For every , every node executes a quantum search to find whether there is a with some forming a negative triangle in G, and then reports all the pairs for which such a was found.
- 0.
- Every node broadcasts the edge information loaded in step 1 of ComputePairs to for each .
- 1.
- Every node splits each into smaller sublists for each , with each sublist containing up to elements, and sends each to node along with the relevant edge weights.
- 2.
- Every node returns the truth value
Complexity of the Classical Analog
- Obtaining a witness matrix when witnesses are unique requires distance products.
- The procedure for finding witnesses in the general case calls the procedure to find witnesses in the unique witness case times, or times if is deemed sufficient for the success probability.
- For the APSP algorithm with routing tables, distance products with witnesses are needed.
Appendix A.3. Expanding the DMST in the Distributed Setting
- 1:
- For any , let edge if .
- 2:
- For , which exists since is a DMST for , denote the edge . Add and the shortest path connecting to to .
- 3:
- For any edge outgoing from the contracted super vertex, add the edge
- to .
- 4:
- Add all edges to , where denotes all edges incoming on .
Appendix A.4. Information Access
References
- Korhonen, J.H.; Suomela, J. Towards a complexity theory for the congested clique. In Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, Vienna, Austria, 16–18 July 2018. [Google Scholar] [CrossRef]
- Saikia, P.; Karmakar, S. Distributed Approximation Algorithms for Steiner Tree in the CONGESTED CLIQUE. arXiv 2019, arXiv:1907.12011. [Google Scholar] [CrossRef]
- Fischer, O.; Oshman, R. A distributed algorithm for directed minimum-weight spanning tree. Distrib. Comput. 2021, 36, 57–87. [Google Scholar] [CrossRef]
- Lenzen, C. Optimal Deterministic Routing and Sorting on the Congested Clique; ACM: New York, NY, USA, 2012. [Google Scholar] [CrossRef]
- Dolev, D.; Lenzen, C.; Peled, S. “Tri, Tri Again”: Finding Triangles and Small Subgraphs in a Distributed Setting. In International Symposium on Distributed Computing; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Nowicki, K. A Deterministic Algorithm for the MST Problem in Constant Rounds of Congested Clique. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, Phoenix, AZ, USA, 23–26 June 2019. [Google Scholar] [CrossRef]
- Izumi, T.; Gall, F.L. Quantum Distributed Algorithm for the All-Pairs Shortest Path Problem in the CONGEST-CLIQUE Model. In Proceedings of the 2019 ACM Symposium on PODC, Toronto, ON, Canada, 29 July–2 August 2019. [Google Scholar] [CrossRef] [Green Version]
- Censor-Hillel, K.; Fischer, O.; Le Gall, F.; Leitersdorf, D.; Oshman, R. Quantum Distributed Algorithms for Detection of Cliques. arXiv 2022, arXiv:2201.03000. [Google Scholar] [CrossRef]
- van Apeldoorn, J.; de Vos, T. A Framework for Distributed Quantum Queries in the CONGEST Model. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, Salerno, Italy, 25–29 July 2022. [Google Scholar] [CrossRef]
- Elkin, M.; Klauck, H.; Nanongkai, D.; Pandurangan, G. Can Quantum Communication Speed Up Distributed Computation? In Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing, Madeira, Portugal, 16–18 July 2012. [Google Scholar] [CrossRef]
- Le Gall, F.; Magniez, F. Sublinear-Time Quantum Computation of the Diameter in CONGEST Networks. In Proceedings of the 2018 ACM Symposium on PODC, Egham, UK, 23–27 July 2018. [Google Scholar] [CrossRef] [Green Version]
- Censor-Hillel, K.; Kaski, P.; Korhonen, J.H.; Lenzen, C.; Paz, A.; Suomela, J. Algebraic methods in the congested clique. Distrib. Comput. 2016, 32, 461–478. [Google Scholar] [CrossRef] [Green Version]
- Kou, L.T.; Markowsky, G.; Berman, L. A fast algorithm for Steiner trees. Acta Inform. 1981, 15, 141–145. [Google Scholar] [CrossRef]
- Lovasz, L. Computing ears and branchings in parallel. In Proceedings of the 26th Annual Symposium on Foundations of Computer Science (sfcs 1985), Washington, DC, USA, 21–23 October 1985; pp. 464–467. [Google Scholar] [CrossRef]
- Ghaffari, M. Distributed Graph Algorithms (Lecture Notes). 2020. Available online: https://disco.ethz.ch/courses/fs21/podc/lecturenotes/DGA.pdf (accessed on 15 June 2023).
- Rieffel, E.; Polak, W. Quantum Computing: A Gentle Introduction, 1st ed.; The MIT Press: Cambridge, MA, USA, 2011. [Google Scholar]
- Zwick, U. All Pairs Shortest Paths using Bridging Sets and Rectangular Matrix Multiplication. arXiv, 2000; arXiv:cs/0008011. [Google Scholar]
- Izumi, T.; Le Gall, F.; Magniez, F. Quantum Distributed Algorithm for Triangle Finding in the CONGEST Model. In Proceedings of the 37th International Symposium on Theoretical Aspects of Computer Science (STACS 2020), Montpellier, France, 10–13 March 2020. [Google Scholar] [CrossRef]
- Edmonds, J. Optimum branchings. J. Res. Natl. Bur. Stand. B 1967, 71, 233–240. [Google Scholar] [CrossRef]
- Hauptmann, M.; Karpinski, M. A Compendium on Steiner Tree Problems. 2015. Available online: https://theory.cs.uni-bonn.de/info5/steinerkompendium/ (accessed on 15 June 2023).
- Dinitz, M.; Halldorsson, M.M.; Izumi, T.; Newport, C. Distributed Minimum Degree Spanning Trees. In Proceedings of the Proceedings of the 2019 ACM Symposium on PODC, New York, NY, USA, 29 July–2 August 2019; pp. 511–520. [Google Scholar] [CrossRef]
- Booth, K.E.C.; O’Gorman, B.; Marshall, J.; Hadfield, S.; Rieffel, E. Quantum-accelerated constraint programming. Quantum 2021, 5, 550. [Google Scholar] [CrossRef]
- Giovannetti, V.; Lloyd, S.; Maccone, L. Quantum Random Access Memory. Phys. Rev. Lett. 2008, 100, 160501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kerger, P.; Bernal Neira, D.E.; Gonzalez Izquierdo, Z.; Rieffel, E.G.
Mind the
Kerger P, Bernal Neira DE, Gonzalez Izquierdo Z, Rieffel EG.
Mind the
Kerger, Phillip, David E. Bernal Neira, Zoe Gonzalez Izquierdo, and Eleanor G. Rieffel.
2023. "Mind the
Kerger, P., Bernal Neira, D. E., Gonzalez Izquierdo, Z., & Rieffel, E. G.
(2023). Mind the