
2
Protocol Hash Quantum FP SupercheQ-EE [§III A, III B, III C] SupercheQ-IE Classical FP Naive
[Example] [SHA-256] [4] [Haar Rdm] [Aprx t-Dsgn] [HW-Eff] [§IV] [3]
FP Size (n) O(1), [256 bits] O(log N ) O(log N ) O(N
1/`
) Empirical
h
∼
√
2N
i
Θ
√
N
,
h
∼
√
3N
i
N
Quantum Cost N/A exp(n) exp(n) poly(n
`
) Empirical O(N ) N/A N/A
Collision-Free? No Yes Yes Yes Yes Yes Yes Yes
Incremental? ?, [No] No No No No Yes No Yes
TABLE I. Comparison of fingerprinting (FP) protocols for files with N classical bits, in ascending order of the fingerprint size.
Quantum cost refers to the gate count needed to produce the quantum fingerprint state. Collision-free refers to whether the
protocol is with high probability safe against worst-case choices of files; in particular, hashing to a constant size (e.g. SHA-256)
is not collision-free because there always exist (many) pairs of files that map to the same hashed value. Incremental refers to
whether fingerprints can be updated in constant time when the underlying file is bit-flipped. We introduce SupercheQ-Efficient
Encoding (EE), which encompasses three subcategories: Haar-Random (§III A), Approximate Unitary t-Design (§III B), and
Hardware-Efficient variant (§III C). We also introduce SupercheQ-Incremental Encoding (IE), which is the only protocol here
that achieves incremental updates.
SupercheQ-EE can be used to check if two 2
O(n)
-bit files
are identical by sending only n qubits, which is an expo-
nential advantage relative to the best-possible classical
protocol. In a nearer-term setting with restricted quan-
tum circuit gate counts and connectivity, SupercheQ-
EE can compare files of size O(n
`
) bits for arbitrarily
large constant `, with quantum circuit cost that scales
as poly(n
`
). For comparison, ` = 2 is known to be the
best that can be achieved classically in the SMP set-
ting [2, 5]. Interestingly, SupercheQ-EE’s core mecha-
nism is random circuit sampling. As such, SupercheQ-EE
endows circuits from quantum supremacy and quantum
volume experiments with the first plausible application
to our knowledge, though current noise rates do not yet
permit a practical advantage.
The second variant, SupercheQ-IE (Incremental En-
coding), matches the ` = 2 quadratic scaling of the best
possible classical protocol, but with the advantage of be-
ing incremental. Specifically, if a bit is flipped in an N-
bit source file, the n = Θ(
√
N)-qubit fingerprint can be
updated in constant time. To our knowledge, no nontriv-
ial classical fingerprinting protocols guarantee this prop-
erty, nor are they likely to achieve this property. The
SupercheQ-IE protocol has two somewhat counterintu-
itive features:
1. The essential ingredient is a Clifford circuit, which
is known to be efficiently classically simulable with
a quadratic memory overhead. However, this
quadratic separation is known to be optimal [6–8]
(i.e. it takes quadratically more classical bits than
qubits to simulate Clifford circuits). As a result,
quantum advantages are known to still persist in
a variety of communication complexity settings, as
recently demonstrated by [7, 8].
2. The protocol does not involve Grover search and
no quantum random access memory (QRAM) is
involved—only an ordinary classical database.
These features are appealing for error-corrected imple-
mentations of SupercheQ-IE. Since only Clifford circuits
are required, SupercheQ-IE avoids the overhead of magic
state distillation for non-Clifford operations [9]. More-
over, no special hardware for classical data loading is
required.
The remainder of this paper is organized as follows.
Sec. II provides background on fingerprinting for check-
ing equivalence of data. Secs. III and IV specify the
SupercheQ-EE (Efficient Encoding) and SupercheQ-IE
(Incremental Encoding) protocols, respectively. Since
our asymptotic bounds for SupercheQ-EE are loose,
we employ GPU-accelerated simulation to elucidate
the real-world advantage achievable with SupercheQ in
Sec. V. Next, we demonstrate experimental results for
SupercheQ, executed on IBM quantum hardware, in
Sec. VI. Finally, we conclude in Sec. VII. Appendix A
presents mathematical proofs for key results, and Ap-
pendix B contains additional plots pertaining to noisy
simulation of SupercheQ-EE.
II. BACKGROUND
A. Notation and Setup
Throughout this paper, N will denote the number of
classical bits composing a file of interest, while n will de-
note the number of qubits in the fingerprint. We focus
exclusively on the simultaneous message passing (SMP)
setting [1]. Under this model, we consider the communi-
cation complexity for Alice and Bob to send the finger-
print to a third-party referee, as depicted in Fig. 1. The
SMP setting allows for both Alice and Bob to have pri-
vate coins (i.e., uncorrelated randomness), but assumes
that Alice and Bob do not share a secure random key
(which would require a secure key exchange protocol).
B. Fingerprinting
The most naive classical procedure for fingerprinting a
file is to send the entire file itself. In this case—which cor-
responds to the right-most column in Table I—we have
that n = N . On the other end of the spectrum, we may
评论