id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
quant-ph/0501151
Juliana Vizzotto Mrs
J. K. Vizzotto, T. Altenkirch and A. Sabry
Structuring quantum effects: superoperators as arrows
21 pages, 4 figures
null
null
null
quant-ph cs.PL
null
We show that the model of quantum computation based on density matrices and superoperators can be decomposed in a pure classical (functional) part and an effectful part modeling probabilities and measurement. The effectful part can be modeled using a generalization of monads called arrows. We express the resulting executable model of quantum computing in the programming language Haskell using its special syntax for arrow computations. The embedding in Haskell is however not perfect: a faithful model of quantum computing requires type capabilities which are not directly expressible in Haskell.
[ { "version": "v1", "created": "Tue, 25 Jan 2005 21:42:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Vizzotto", "J. K.", "" ], [ "Altenkirch", "T.", "" ], [ "Sabry", "A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
quant-ph/0501152
Shigeru Furuichi Dr.
Kenjiro Yanagi, Shigeru Furuichi and Ken Kuriyama
A generalized skew information and uncertainty relation
to appear in IEEE TIT
IEEE Trans. on Information Theory,Vol.51(2005),pp.4401-4404
10.1103/PhysRevA.72.022302
null
quant-ph cs.IT math.IT
null
A generalized skew information is defined and a generalized uncertainty relation is established with the help of a trace inequality which was recently proven by J.I.Fujii. In addition, we prove the trace inequality conjectured by S.Luo and Z.Zhang. Finally we point out that Theorem 1 in {\it S.Luo and Q.Zhang, IEEE Trans.IT, Vol.50, pp.1778-1782 (2004)} is incorrect in general, by giving a simple counter-example.
[ { "version": "v1", "created": "Wed, 26 Jan 2005 00:36:45 GMT" }, { "version": "v2", "created": "Tue, 16 Aug 2005 02:29:55 GMT" } ]
2013-05-29T00:00:00
[ [ "Yanagi", "Kenjiro", "" ], [ "Furuichi", "Shigeru", "" ], [ "Kuriyama", "Ken", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0502009
Karin Rietjens
Karin Rietjens, Berry Schoenmakers, Pim Tuyls
Quantum Information Theoretical Analysis of Various Constructions for Quantum Secret Sharing
5 pages
null
null
null
quant-ph cs.CR
null
Recently, an information theoretical model for Quantum Secret Sharing (QSS) schemes was introduced. By using this model, we prove that pure state Quantum Threshold Schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a constructive proof of their relation with QTS. Furthermore, we reformulate the Monotone Span Program (MSP) construction according to the information theoretical model and check the recoverability and secrecy requirement. Finally, we consider QSS schemes which are based on quantum teleportation.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 13:43:58 GMT" } ]
2018-02-13T00:00:00
[ [ "Rietjens", "Karin", "" ], [ "Schoenmakers", "Berry", "" ], [ "Tuyls", "Pim", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0502031
Martin Roetteler
Andreas Klappenecker (Texas A&M University) and Martin Roetteler (NEC Laboratories America, Inc.)
Mutually Unbiased Bases are Complex Projective 2-Designs
5 pages; minor corrections, two remarks on previous work added, submitted to 2005 IEEE International Symposium on Information Theory
Proceedings 2005 IEEE International Symposium on Information Theory (ISIT 2005), Adelaide, Australia, pp. 1740-1744, 2005
null
null
quant-ph cs.ET
null
Mutually unbiased bases (MUBs) are a primitive used in quantum information processing to capture the principle of complementarity. While constructions of maximal sets of d+1 such bases are known for systems of prime power dimension d, it is unknown whether this bound can be achieved for any non-prime power dimension. In this paper we demonstrate that maximal sets of MUBs come with a rich combinatorial structure by showing that they actually are the same objects as the complex projective 2-designs with angle set {0,1/d}. We also give a new and simple proof that symmetric informationally complete POVMs are complex projective 2-designs with angle set {1/(d+1)}.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 02:10:30 GMT" }, { "version": "v2", "created": "Fri, 11 Feb 2005 14:51:31 GMT" } ]
2023-11-27T00:00:00
[ [ "Klappenecker", "Andreas", "", "Texas A&M University" ], [ "Roetteler", "Martin", "", "NEC\n Laboratories America, Inc." ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
quant-ph/0502072
Scott Aaronson
Scott Aaronson
NP-complete Problems and Physical Reality
23 pages, minor corrections
ACM SIGACT News, March 2005
null
null
quant-ph cs.CC gr-qc
null
Can NP-complete problems be solved efficiently in the physical universe? I survey proposals including soap bubbles, protein folding, quantum computing, quantum advice, quantum adiabatic algorithms, quantum-mechanical nonlinearities, hidden variables, relativistic time dilation, analog computing, Malament-Hogarth spacetimes, quantum gravity, closed timelike curves, and "anthropic computing." The section on soap bubbles even includes some "experimental" results. While I do not believe that any of the proposals will let us solve NP-complete problems efficiently, I argue that by studying them, we can learn something not only about computation but also about physics.
[ { "version": "v1", "created": "Sat, 12 Feb 2005 15:14:11 GMT" }, { "version": "v2", "created": "Mon, 21 Feb 2005 10:19:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Aaronson", "Scott", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" } ]
quant-ph/0502101
Marcus Silva
Marcus Silva, Martin Roetteler, Christof Zalka
Thresholds for Linear Optics Quantum Computing with Photon Loss at the Detectors
7 pages, 6 figures
Phys. Rev. A 72, 032307 (2005)
10.1103/PhysRevA.72.032307
null
quant-ph cs.ET
null
We calculate the error threshold for the linear optics quantum computing proposal by Knill, Laflamme and Milburn [Nature 409, pp. 46--52 (2001)] under an error model where photon detectors have efficiency <100% but all other components -- such as single photon sources, beam splitters and phase shifters -- are perfect and introduce no errors. We make use of the fact that the error model induced by the lossy hardware is that of an erasure channel, i.e., the error locations are always known. Using a method based on a Markov chain description of the error correction procedure, our calculations show that, with the 7 qubit CSS quantum code, the gate error threshold for fault tolerant quantum computation is bounded below by a value between 1.78% and 11.5% depending on the construction of the entangling gates.
[ { "version": "v1", "created": "Wed, 16 Feb 2005 16:21:04 GMT" } ]
2023-11-27T00:00:00
[ [ "Silva", "Marcus", "" ], [ "Roetteler", "Martin", "" ], [ "Zalka", "Christof", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
quant-ph/0502138
Martin Roetteler
Andreas Klappenecker (Texas A&M University) and Martin Roetteler (NEC Laboratories America, Inc.)
New Tales of the Mean King
20 pages, 1 figure, uses yfonts
null
null
null
quant-ph cs.ET
null
The Mean King's problem asks to determine the outcome of a measurement that is randomly selected from a set of complementary observables. We review this problem and offer a combinatorial solution. More generally, we show that whenever an affine resolvable design exists, then a state reconstruction problem similar to the Mean King's problem can be defined and solved. As an application of this general framework we consider a problem involving three qubits in which the outcome of nine different measurements can be determined without using ancillary qubits. The solution is based on a measurement derived from Hadamard designs.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 19:56:28 GMT" } ]
2023-11-27T00:00:00
[ [ "Klappenecker", "Andreas", "", "Texas A&M University" ], [ "Roetteler", "Martin", "", "NEC\n Laboratories America, Inc." ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
quant-ph/0502185
Jaros{\l}aw Miszczak
J. A. Miszczak, P. Gawron
Quantum Implementation of Parrondo's Paradox
6 figures, revtex4
Fluctuation and Noise Letters, Vol. 5, No. 4 (2005)
10.1142/S0219477505002902
null
quant-ph cs.GT
null
We propose a quantum implementation of a capital-dependent Parrondo's paradox that uses $O(\log_2(n))$ qubits, where $n$ is the number of Parrondo games. We present its implementation in the quantum computer language (QCL) and show simulation results.
[ { "version": "v1", "created": "Mon, 28 Feb 2005 13:16:48 GMT" }, { "version": "v2", "created": "Wed, 7 Dec 2005 10:24:51 GMT" } ]
2008-09-16T00:00:00
[ [ "Miszczak", "J. A.", "" ], [ "Gawron", "P.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
quant-ph/0503027
Subhash Kak
Subhash Kak
A Three-Stage Quantum Cryptography Protocol
5 pages, 2 figures
Foundations of Physics Letters 19 (2006), 293-296.
10.1007/s10702-006-0520-9
null
quant-ph cs.CR
null
We present a three-stage quantum cryptographic protocol guaranteeing security in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.
[ { "version": "v1", "created": "Wed, 2 Mar 2005 20:21:56 GMT" }, { "version": "v2", "created": "Wed, 2 Mar 2005 22:27:22 GMT" } ]
2012-08-07T00:00:00
[ [ "Kak", "Subhash", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0503114
Martin Roetteler
Jaikumar Radhakrishnan, Martin Roetteler, and Pranab Sen
On the Power of Random Bases in Fourier Sampling: Hidden Subgroup Problem in the Heisenberg Group
22 pages, LaTeX
Proceedings 32nd International Conference on Automata, Languages, and Programming (ICALP 2005), Lisbon, Portugal, Springer LNCS, pp. 1399-1411, 2005
null
null
quant-ph cs.ET
null
The hidden subgroup problem (HSP) provides a unified framework to study problems of group-theoretical nature in quantum computing such as order finding and the discrete logarithm problem. While it is known that Fourier sampling provides an efficient solution in the abelian case, not much is known for general non-abelian groups. Recently, some authors raised the question as to whether post-processing the Fourier spectrum by measuring in a random orthonormal basis helps for solving the HSP. Several negative results on the shortcomings of this random strong method are known. In this paper however, we show that the random strong method can be quite powerful under certain conditions on the group G. We define a parameter r(G) for a group G and show that O((\log |G| / r(G))^2) iterations of the random strong method give enough classical information to identify a hidden subgroup in G. We illustrate the power of the random strong method via a concrete example of the HSP over finite Heisenberg groups. We show that r(G) = \Omega(1) for these groups; hence the HSP can be solved using polynomially many random strong Fourier samplings followed by a possibly exponential classical post-processing without further queries. The quantum part of our algorithm consists of a polynomial computation followed by measuring in a random orthonormal basis. This gives the first example of a group where random representation bases do help in solving the HSP and for which no explicit representation bases are known that solve the problem with (\log G)^O(1) Fourier samplings. As an interesting by-product of our work, we get an algorithm for solving the state identification problem for a set of nearly orthogonal pure quantum states.
[ { "version": "v1", "created": "Fri, 11 Mar 2005 20:43:59 GMT" } ]
2023-11-27T00:00:00
[ [ "Radhakrishnan", "Jaikumar", "" ], [ "Roetteler", "Martin", "" ], [ "Sen", "Pranab", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
quant-ph/0503139
Adam D. Smith
Claude Crepeau and Daniel Gottesman and Adam Smith
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
14 pages, no figures
Preliminary version in proceedings of "Advances in Cryptology -- EUROCRYPT 2005"
null
null
quant-ph cs.CR
null
It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and encoded Hilbert spaces. However, this bound only applies to codes which recover the message exactly. Naively, one might expect that correcting errors to very high fidelity would only allow small violations of this bound. This intuition is incorrect: in this paper we describe quantum error-correcting codes capable of correcting up to (n-1)/2 arbitrary errors with fidelity exponentially close to 1, at the price of increasing the size of the registers (i.e., the coding alphabet). This demonstrates a sharp distinction between exact and approximate quantum error correction. The codes have the property that any $t$ components reveal no information about the message, and so they can also be viewed as error-tolerant secret sharing schemes. The construction has several interesting implications for cryptography and quantum information theory. First, it suggests that secret sharing is a better classical analogue to quantum error correction than is classical error correction. Second, it highlights an error in a purported proof that verifiable quantum secret sharing (VQSS) is impossible when the number of cheaters t is n/4. More generally, the construction illustrates a difference between exact and approximate requirements in quantum cryptography and (yet again) the delicacy of security proofs and impossibility results in the quantum model.
[ { "version": "v1", "created": "Tue, 15 Mar 2005 17:43:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Crepeau", "Claude", "" ], [ "Gottesman", "Daniel", "" ], [ "Smith", "Adam", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0503157
Saied Hosseini-Khayat
Saied Hosseini-Khayat, Iman Marvian
Secure Communication Using Qubits
13 pages, submitted to the the 25th Annual International Cryptology Conference (Crypto 2005), dated 14/02/2005
The Sixth IEEE International Conference on Computer and Information Technology, 2006. Seoul, South Korea
10.1109/CIT.2006.164
null
quant-ph cs.CR
null
A two-layer quantum protocol for secure transmission of data using qubits is presented. The protocol is an improvement over the BB84 QKD protocol. BB84, in conjunction with the one-time pad algorithm, has been shown to be unconditionally secure. However it suffers from two drawbacks: (1) Its security relies on the assumption that Alice's qubit source is perfect in the sense that it does not inadvertently emit multiple copies of the same qubit. A multi-qubit emission attack can be launched if this assumption is violated. (2) BB84 cannot transfer predetermined keys; the keys it can distribute are generated in the process. Our protocol does not have these drawbacks. As in BB84, our protocol requires an authenticated public channel so as to detect an intruder's interaction with the quantum channel, but unlike in symmetric-key cryptography, the confidentiality of transmitted data does not rely on a shared secret key.
[ { "version": "v1", "created": "Thu, 17 Mar 2005 15:33:11 GMT" } ]
2010-05-03T00:00:00
[ [ "Hosseini-Khayat", "Saied", "" ], [ "Marvian", "Iman", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0503230
Alexander Yu. Vlasov
Alexander Yu. Vlasov
Programmable Quantum Networks with Pure States
LaTeX, 12pt, 34 pages, 21 eps files, quality of ray-traced figures is reduced to make files smaller; it is slightly modified preprint version of invited chapter submitted to Nova Science
null
null
null
quant-ph cs.OH
null
Modern classical computing devices, except of simplest calculators, have von Neumann architecture, i.e., a part of the memory is used for the program and a part for the data. It is likely, that analogues of such architecture are also desirable for the future applications in quantum computing, communications and control. It is also interesting for the modern theoretical research in the quantum information science and raises challenging questions about an experimental assessment of such a programmable models. Together with some progress in the given direction, such ideas encounter specific problems arising from the very essence of quantum laws. Currently are known two different ways to overcome such problems, sometime denoted as a stochastic and deterministic approach. The presented paper is devoted to the second one, that is also may be called the programmable quantum networks with pure states. In the paper are discussed basic principles and theoretical models that can be used for the design of such nano-devices, e.g., the conditional quantum dynamics, the Nielsen-Chuang "no-programming theorem, the idea of deterministic and stochastic quantum gates arrays. Both programmable quantum networks with finite registers and hybrid models with continuous quantum variables are considered. As a basic model for the universal programmable quantum network with pure states and finite program register is chosen a "Control-Shift" quantum processor architecture with three buses introduced in earlier works. It is shown also, that quantum cellular automata approach to the construction of an universal programmable quantum computer often may be considered as the particular case of such design.
[ { "version": "v1", "created": "Wed, 30 Mar 2005 14:48:27 GMT" } ]
2010-05-12T00:00:00
[ [ "Vlasov", "Alexander Yu.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
quant-ph/0503236
Lars Eirik Danielsen
Lars Eirik Danielsen (University of Bergen)
On Self-Dual Quantum Codes, Graphs, and Boolean Functions
Master's thesis. 105 pages, 33 figures
null
null
null
quant-ph cs.IT math.IT
null
A short introduction to quantum error correction is given, and it is shown that zero-dimensional quantum codes can be represented as self-dual additive codes over GF(4) and also as graphs. We show that graphs representing several such codes with high minimum distance can be described as nested regular graphs having minimum regular vertex degree and containing long cycles. Two graphs correspond to equivalent quantum codes if they are related by a sequence of local complementations. We use this operation to generate orbits of graphs, and thus classify all inequivalent self-dual additive codes over GF(4) of length up to 12, where previously only all codes of length up to 9 were known. We show that these codes can be interpreted as quadratic Boolean functions, and we define non-quadratic quantum codes, corresponding to Boolean functions of higher degree. We look at various cryptographic properties of Boolean functions, in particular the propagation criteria. The new aperiodic propagation criterion (APC) and the APC distance are then defined. We show that the distance of a zero-dimensional quantum code is equal to the APC distance of the corresponding Boolean function. Orbits of Boolean functions with respect to the {I,H,N}^n transform set are generated. We also study the peak-to-average power ratio with respect to the {I,H,N}^n transform set (PAR_IHN), and prove that PAR_IHN of a quadratic Boolean function is related to the size of the maximum independent set over the corresponding orbit of graphs. A construction technique for non-quadratic Boolean functions with low PAR_IHN is proposed. It is finally shown that both PAR_IHN and APC distance can be interpreted as partial entanglement measures.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 13:00:39 GMT" } ]
2008-01-09T00:00:00
[ [ "Danielsen", "Lars Eirik", "", "University of Bergen" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0503238
Vladimir Korepin
Vladimir Korepin
Optimization of Partial Search
5 pages
Journal of Physics A: Math. Gen. vol 38, pages L731-L738, 2005
10.1088/0305-4470/38/44/L02
YITP-SB-05-08
quant-ph cs.DS
null
Quantum Grover search algorithm can find a target item in a database faster than any classical algorithm. One can trade accuracy for speed and find a part of the database (a block) containing the target item even faster, this is partial search. A partial search algorithm was recently suggested by Grover and Radhakrishnan. Here we optimize it. Efficiency of the search algorithm is measured by number of queries to the oracle. The author suggests new version of Grover-Radhakrishnan algorithm which uses minimal number of queries to the oracle. The algorithm can run on the same hardware which is used for the usual Grover algorithm.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 13:50:47 GMT" }, { "version": "v2", "created": "Mon, 5 Sep 2005 23:28:57 GMT" } ]
2015-06-26T00:00:00
[ [ "Korepin", "Vladimir", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
quant-ph/0503239
Martin Roetteler
Andreas Klappenecker, Martin Roetteler, Igor Shparlinski, Arne Winterhof
On Approximately Symmetric Informationally Complete Positive Operator-Valued Measures and Related Systems of Quantum States
29 pages, LaTeX
Journal of Mathematical Physics, 46:082104, 2005
10.1063/1.1998831
null
quant-ph cs.ET
null
We address the problem of constructing positive operator-valued measures (POVMs) in finite dimension $n$ consisting of $n^2$ operators of rank one which have an inner product close to uniform. This is motivated by the related question of constructing symmetric informationally complete POVMs (SIC-POVMs) for which the inner products are perfectly uniform. However, SIC-POVMs are notoriously hard to construct and despite some success of constructing them numerically, there is no analytic construction known. We present two constructions of approximate versions of SIC-POVMs, where a small deviation from uniformity of the inner products is allowed. The first construction is based on selecting vectors from a maximal collection of mutually unbiased bases and works whenever the dimension of the system is a prime power. The second construction is based on perturbing the matrix elements of a subset of mutually unbiased bases. Moreover, we construct vector systems in $\C^n$ which are almost orthogonal and which might turn out to be useful for quantum computation. Our constructions are based on results of analytic number theory.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 16:03:35 GMT" } ]
2023-11-27T00:00:00
[ [ "Klappenecker", "Andreas", "" ], [ "Roetteler", "Martin", "" ], [ "Shparlinski", "Igor", "" ], [ "Winterhof", "Arne", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
quant-ph/0504007
Nikolaos Papanikolaou
Simon Gay, Rajagopal Nagarajan, Nikolaos Papanikolaou
Probabilistic Model--Checking of Quantum Protocols
15 pages + 2 page appendix
null
null
null
quant-ph cs.LO
null
We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniques by modelling a selection of quantum protocols (namely superdense coding, quantum teleportation, and quantum error correction) and verifying their basic correctness properties. Our results provide a foundation for further work on modelling and analysing larger systems such as those used for quantum cryptography, in which basic protocols are used as components.
[ { "version": "v1", "created": "Fri, 1 Apr 2005 23:09:29 GMT" }, { "version": "v2", "created": "Wed, 5 Oct 2005 14:26:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Gay", "Simon", "" ], [ "Nagarajan", "Rajagopal", "" ], [ "Papanikolaou", "Nikolaos", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
quant-ph/0504012
Andris Ambainis
Andris Ambainis
Quantum search algorithms
12 pages, short survey on selected topics for SIGACT News Complexity Column, published in June 2004
SIGACT News, 35 (2):22-35, 2004.
null
null
quant-ph cs.CC cs.DS
null
We review some of quantum algorithms for search problems: Grover's search algorithm, its generalization to amplitude amplification, the applications of amplitude amplification to various problems and the recent quantum algorithms based on quantum walks.
[ { "version": "v1", "created": "Sun, 3 Apr 2005 19:03:49 GMT" } ]
2008-05-12T00:00:00
[ [ "Ambainis", "Andris", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
quant-ph/0504021
Andr\'es Sicard
Andr\'es Sicard, Juan Ospina, Mario V\'elez
Numerical Simulations of a Possible Hypercomputational Quantum Algorithm
4 pages, 3 figures, uses icannga05.sty
In "Adaptive and Natural Computing Algorithms. Proc. of the International Conference in Coimbra, Portugal". Bernardete Ribeiro et al. (eds.). SpringerWienNewYork, 2005. p. 272--275
null
null
quant-ph cs.LO
null
The hypercomputers compute functions or numbers, or more generally solve problems or carry out tasks, that cannot be computed or solved by a Turing machine. Several numerical simulations of a possible hypercomputational algorithm based on quantum computations previously constructed by the authors are presented. The hypercomputability of our algorithm is based on the fact that this algorithm could solve a classically non-computable decision problem, Hilbert's tenth problem. The numerical simulations were realized for three types of Diophantine equations: with and without solutions in non-negative integers, and without solutions by way of various traditional mathematical packages.
[ { "version": "v1", "created": "Tue, 5 Apr 2005 00:41:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Sicard", "Andrés", "" ], [ "Ospina", "Juan", "" ], [ "Vélez", "Mario", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
quant-ph/0504207
G Gordon Worley III
G Gordon Worley III
Applications of quantum message sealing
Presented as SPIE paper 5815-25 at Quantum Information and Computation III, part of the SPIE Defense & Security Symposium 2005
null
10.1117/12.598260
null
quant-ph cs.CR
null
In 2003, Bechmann-Pasquinucci introduced the concept of quantum seals, a quantum analogue to wax seals used to close letters and envelopes. Since then, some improvements on the method have been found. We first review the current quantum sealing techniques, then introduce and discuss potential applications of quantum message sealing, and conclude with some discussion of the limitations of quantum seals.
[ { "version": "v1", "created": "Wed, 27 Apr 2005 19:10:09 GMT" } ]
2009-11-11T00:00:00
[ [ "Worley", "G Gordon", "III" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0505088
Dmytro Gavinsky
Dmytro Gavinsky (U Calgary)
A Note on Shared Randomness and Shared Entanglement in Communication
Stronger separation, minor changes and fixes
null
null
null
quant-ph cs.CC
null
We consider several models of 1-round classical and quantum communication, some of these models have not been defined before. We "almost separate" the models of simultaneous quantum message passing with shared entanglement and the model of simultaneous quantum message passing with shared randomness. We define a relation which can be efficiently exactly solved in the first model but cannot be solved efficiently, either exactly or in 0-error setup in the second model. In fact, our relation is exactly solvable even in a more restricted model of simultaneous classical message passing with shared entanglement. As our second contribution we strengthen a result by Yao that a "very short" protocol from the model of simultaneous classical message passing with shared randomness can be simulated in the model of simultaneous quantum message passing: for a boolean function f, QII(f) \in exp(O(RIIp(f))) log n. We show a similar result for protocols from a (stronger) model of 1-way classical message passing with shared randomness: QII(f) \in exp(O(RIp(f))) log n. We demonstrate a problem whose efficient solution in the model of simultaneous quantum message passing follows from our result but not from Yao's.
[ { "version": "v1", "created": "Thu, 12 May 2005 02:12:54 GMT" }, { "version": "v2", "created": "Thu, 26 May 2005 10:03:08 GMT" }, { "version": "v3", "created": "Sat, 6 Aug 2005 03:39:22 GMT" } ]
2022-03-29T00:00:00
[ [ "Gavinsky", "Dmytro", "", "U Calgary" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0505089
H. Bechmann-Pasquinucci
H. Bechmann-Pasquinucci and A. Pasquinucci
Quantum key distribution with trusted quantum relay
13 pages, Latex, one figure
null
null
null
quant-ph cs.CR cs.NI
null
A trusted quantum relay is introduced to enable quantum key distribution links to form the basic legs in a quantum key distribution network. The idea is based on the well-known intercept/resend eavesdropping. The same scheme can be used to make quantum key distribution between several parties. No entanglement is required.
[ { "version": "v1", "created": "Thu, 12 May 2005 08:55:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bechmann-Pasquinucci", "H.", "" ], [ "Pasquinucci", "A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
quant-ph/0505188
Ronald de Wolf
Ronald de Wolf (CWI Amsterdam)
Lower Bounds on Matrix Rigidity via a Quantum Argument
10 pages LaTeX, 2nd version: some discussion added. This version to appear in ICALP 2006 conference
null
null
null
quant-ph cs.CC
null
The rigidity of a matrix measures how many of its entries need to be changed in order to reduce its rank to some value. Good lower bounds on the rigidity of an explicit matrix would imply good lower bounds for arithmetic circuits as well as for communication complexity. Here we reprove the best known bounds on the rigidity of Hadamard matrices, due to Kashin and Razborov, using tools from quantum computing. Our proofs are somewhat simpler than earlier ones (at least for those familiar with quantum) and give slightly better constants. More importantly, they give a new approach to attack this longstanding open problem.
[ { "version": "v1", "created": "Wed, 25 May 2005 09:35:38 GMT" }, { "version": "v2", "created": "Tue, 25 Apr 2006 18:08:54 GMT" } ]
2007-05-23T00:00:00
[ [ "de Wolf", "Ronald", "", "CWI Amsterdam" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0506080
Markus Mueller
Fabio Benatti, Tyll Krueger, Markus Mueller, Rainer Siegmund-Schultze, Arleta Szkola
Entropy and Quantum Kolmogorov Complexity: A Quantum Brudno's Theorem
26 pages, no figures. Reference to publication added: published in the Communications in Mathematical Physics (http://www.springerlink.com/content/1432-0916/)
Communications in Mathematical Physics, Vol. 265, No.2 / July 2006, 437-461
10.1007/s00220-006-0027-z
null
quant-ph cs.IT math-ph math.DS math.IT math.MP
null
In classical information theory, entropy rate and Kolmogorov complexity per symbol are related by a theorem of Brudno. In this paper, we prove a quantum version of this theorem, connecting the von Neumann entropy rate and two notions of quantum Kolmogorov complexity, both based on the shortest qubit descriptions of qubit strings that, run by a universal quantum Turing machine, reproduce them as outputs.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 14:27:43 GMT" }, { "version": "v2", "created": "Mon, 19 Dec 2005 16:00:10 GMT" }, { "version": "v3", "created": "Tue, 17 Oct 2006 17:03:47 GMT" } ]
2007-07-16T00:00:00
[ [ "Benatti", "Fabio", "" ], [ "Krueger", "Tyll", "" ], [ "Mueller", "Markus", "" ], [ "Siegmund-Schultze", "Rainer", "" ], [ "Szkola", "Arleta", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
quant-ph/0506200
Wenjin Mao
Wenjin Mao
Solving Satisfiability Problems by the Ground-State Quantum Computer
Extended version of quant-ph/0411194. 8 pages, 7 figures
Phys. Rev. A 72, 052316 (2005)
10.1103/PhysRevA.72.052316
null
quant-ph cond-mat.mes-hall cs.CC
null
A quantum algorithm is proposed to solve the Satisfiability problems by the ground-state quantum computer. The scale of the energy gap of the ground-state quantum computer is analyzed for the 3-bit Exact Cover problem. The time cost of this algorithm on the general SAT problems is discussed.
[ { "version": "v1", "created": "Thu, 23 Jun 2005 22:35:59 GMT" } ]
2009-11-11T00:00:00
[ [ "Mao", "Wenjin", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.mes-hall", "description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures", "span": "(Mesoscale and Nanoscale Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0506265
Ashwin Nayak
Frederic Magniez (CNRS-LRI) and Ashwin Nayak (U. Waterloo and Perimeter Inst.)
Quantum Complexity of Testing Group Commutativity
10 pages, requires fullpage,amsthm,amsfonts,amsmath; To appear in Algorithmica; earlier version appeared in ICALP 2005; corrects minor typos, results are unchanged
null
null
null
quant-ph cs.DS
null
We consider the problem of testing the commutativity of a black-box group specified by its k generators. The complexity (in terms of k) of this problem was first considered by Pak, who gave a randomized algorithm involving O(k) group operations. We construct a quite optimal quantum algorithm for this problem whose complexity is in O (k^{2/3}). The algorithm uses and highlights the power of the quantization method of Szegedy. For the lower bound of Omega(k^{2/3}), we give a reduction from a special case of Element Distinctness to our problem. Along the way, we prove the optimality of the algorithm of Pak for the randomized model.
[ { "version": "v1", "created": "Thu, 30 Jun 2005 12:23:10 GMT" }, { "version": "v2", "created": "Thu, 4 Aug 2005 20:57:09 GMT" }, { "version": "v3", "created": "Thu, 22 Jun 2006 22:04:49 GMT" }, { "version": "v4", "created": "Tue, 8 May 2007 02:33:02 GMT" } ]
2018-03-22T00:00:00
[ [ "Magniez", "Frederic", "", "CNRS-LRI" ], [ "Nayak", "Ashwin", "", "U. Waterloo and\n Perimeter Inst." ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
quant-ph/0507155
Paola Zizzi
Paola Zizzi
Theoretical Setting of Inner Reversible Quantum Measurements
11 pages. More concise, shortened version for submission to journal. References added
Mod. Phys. Lett. A, Vol.21, No. 36 (2006) pp. 2717-2727
10.1142/S0217732306021827
null
quant-ph cs.LO math-ph math.LO math.MP
null
We show that any unitary transformation performed on the quantum state of a closed quantum system, describes an inner, reversible, generalized quantum measurement. We also show that under some specific conditions it is possible to perform a unitary transformation on the state of the closed quantum system by means of a collection of generalized measurement operators. In particular, given a complete set of orthogonal projectors, it is possible to implement a reversible quantum measurement that preserves the probabilities. In this context, we introduce the concept of "Truth-Observable", which is the physical counterpart of an inner logical truth.
[ { "version": "v1", "created": "Sat, 16 Jul 2005 15:58:41 GMT" }, { "version": "v2", "created": "Thu, 26 Jan 2006 07:20:31 GMT" } ]
2009-11-11T00:00:00
[ [ "Zizzi", "Paola", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
quant-ph/0507231
Daniel Lehmann
Daniel Lehmann, Kurt Engesser and Dov M. Gabbay
Algebras of Measurements: the logical structure of Quantum Mechanics
Submitted, 30 pages
International Journal of Theoretical Physics, 45(4) April 2006, pages 698-723
10.1007/s10773-006-9062-y
TR 2005-91 Leibniz Center for Research in Computer Science, Hebrew Un. Jerusalem
quant-ph cs.AI
null
In Quantum Physics, a measurement is represented by a projection on some closed subspace of a Hilbert space. We study algebras of operators that abstract from the algebra of projections on closed subspaces of a Hilbert space. The properties of such operators are justified on epistemological grounds. Commutation of measurements is a central topic of interest. Classical logical systems may be viewed as measurement algebras in which all measurements commute. Keywords: Quantum measurements, Measurement algebras, Quantum Logic. PACS: 02.10.-v.
[ { "version": "v1", "created": "Sun, 24 Jul 2005 12:33:58 GMT" }, { "version": "v2", "created": "Thu, 8 Dec 2005 13:50:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Lehmann", "Daniel", "" ], [ "Engesser", "Kurt", "" ], [ "Gabbay", "Dov M.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
quant-ph/0507234
Itamar Pitowsky
Shahar Dolev, Itamar Pitowsky, and Boaz Tamir
Grover's Quantum Search Algorithm and Diophantine Approximation
8 pages, revtex, Title changed
Physical Review A 73 022308 (2006)
10.1103/PhysRevA.73.022308
null
quant-ph cs.CC
null
In a fundamental paper [Phys. Rev. Lett. 78, 325 (1997)] Grover showed how a quantum computer can find a single marked object in a database of size N by using only O(N^{1/2}) queries of the oracle that identifies the object. His result was generalized to the case of finding one object in a subset of marked elements. We consider the following computational problem: A subset of marked elements is given whose number of elements is either M or K, M<K, our task is to determine which is the case. We show how to solve this problem with a high probability of success using only iterations of Grover's basic step (and no other algorithm). Let m be the required number of iterations; we prove that under certain restrictions on the sizes of M and K the estimation m < (2N^{1/2})/(K^{1/2}-M^{1/2}) obtains. This bound sharpens previous results and is known to be optimal up to a constant factor. Our method involves simultaneous Diophantine approximations, so that Grover's algorithm is conceptualized as an orbit of an ergodic automorphism of the torus. We comment on situations where the algorithm may be slow, and note the similarity between these cases and the problem of small divisors in classical mechanics.
[ { "version": "v1", "created": "Mon, 25 Jul 2005 08:51:06 GMT" }, { "version": "v2", "created": "Mon, 1 Aug 2005 14:51:06 GMT" }, { "version": "v3", "created": "Thu, 9 Feb 2006 21:42:08 GMT" } ]
2009-11-11T00:00:00
[ [ "Dolev", "Shahar", "" ], [ "Pitowsky", "Itamar", "" ], [ "Tamir", "Boaz", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0507270
Tomoyuki Yamakami
Harumichi Nishimura and Tomoyuki Yamakami
Quantum Minimal One Way Information: Relative Hardness and Quantum Advantage of Combinatorial Tasks
2 pages. This abstract will appear in the Proceedings of the ERATO conference on Quantum Information Science, Tokyo, August 26-30, 2005
null
null
null
quant-ph cs.CC
null
Two-party one-way quantum communication has been extensively studied in the recent literature. We target the size of minimal information that is necessary for a feasible party to finish a given combinatorial task, such as distinction of instances, using one-way communication from another party. This type of complexity measure has been studied under various names: advice complexity, Kolmogorov complexity, distinguishing complexity, and instance complexity. We present a general framework focusing on underlying combinatorial takes to study these complexity measures using quantum information processing. We introduce the key notions of relative hardness and quantum advantage, which provide the foundations for task-based quantum minimal one-way information complexity theory.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 08:57:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Nishimura", "Harumichi", "" ], [ "Yamakami", "Tomoyuki", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0508070
Andreas Klappenecker
Avanti Ketkar, Andreas Klappenecker, Santosh Kumar, Pradeep Kiran Sarvepalli
Nonbinary stabilizer codes over finite fields
58 pages, LaTeX
null
null
null
quant-ph cs.IT math.IT
null
One formidable difficulty in quantum communication and computation is to protect information-carrying quantum states against undesired interactions with the environment. In past years, many good quantum error-correcting codes had been derived as binary stabilizer codes. Fault-tolerant quantum computation prompted the study of nonbinary quantum codes, but the theory of such codes is not as advanced as that of binary quantum codes. This paper describes the basic theory of stabilizer codes over finite fields. The relation between stabilizer codes and general quantum codes is clarified by introducing a Galois theory for these objects. A characterization of nonbinary stabilizer codes over GF(q) in terms of classical codes over GF(q^2) is provided that generalizes the well-known notion of additive codes over GF(4) of the binary case. This paper derives lower and upper bounds on the minimum distance of stabilizer codes, gives several code constructions, and derives numerous families of stabilizer codes, including quantum Hamming codes, quadratic residue codes, quantum Melas codes, quantum BCH codes, and quantum character codes. The puncturing theory by Rains is generalized to additive codes that are not necessarily pure. Bounds on the maximal length of maximum distance separable stabilizer codes are given. A discussion of open problems concludes this paper.
[ { "version": "v1", "created": "Mon, 8 Aug 2005 21:09:07 GMT" }, { "version": "v2", "created": "Wed, 17 Aug 2005 20:42:19 GMT" } ]
2007-07-13T00:00:00
[ [ "Ketkar", "Avanti", "" ], [ "Klappenecker", "Andreas", "" ], [ "Kumar", "Santosh", "" ], [ "Sarvepalli", "Pradeep Kiran", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0508072
Karin Poels
Karin Poels, Pim Tuyls, Berry Schoenmakers
Generic Security Proof of Quantum Key Exchange using Squeezed States
5 pages, 7 figures, accepted at IEEE ISIT 2005
null
10.1109/ISIT.2005.1523617
null
quant-ph cs.CR
null
Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol. The method used for this generic security proof is based on recent work by Christiandl, Renner and Ekert.
[ { "version": "v1", "created": "Tue, 9 Aug 2005 08:08:55 GMT" } ]
2018-02-13T00:00:00
[ [ "Poels", "Karin", "" ], [ "Tuyls", "Pim", "" ], [ "Schoenmakers", "Berry", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0508116
Marie Lalire
Marie Lalire
A probabilistic branching bisimulation for quantum processes
25 pages, 3 figures, submitted to a special issue of MSCS
null
null
null
quant-ph cs.PL
null
Full formal descriptions of algorithms making use of quantum principles must take into account both quantum and classical computing components and assemble them so that they communicate and cooperate.Moreover, to model concurrent and distributed quantum computations, as well as quantum communication protocols, quantum to quantum communications which move qubits physically from one place to another must also be taken into account. Inspired by classical process algebras, which provide a framework for modeling cooperating computations, a process algebraic notation is defined, which provides a homogeneous style to formal descriptions of concurrent and distributed computations comprising both quantum and classical parts.Based upon an operational semantics which makes sure that quantum objects, operations and communications operate according to the postulates of quantum mechanics, a probabilistic branching bisimulation is defined among processes considered as having the same behavior.
[ { "version": "v1", "created": "Tue, 16 Aug 2005 09:37:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lalire", "Marie", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
quant-ph/0508149
Roger Colbeck
Roger Colbeck and Adrian Kent (Centre for Quantum Computation, DAMTP, University of Cambridge)
Variable Bias Coin Tossing
14 pages, minor corrections
Phys. Rev. A 73, 032320 (2006)
10.1103/PhysRevA.73.032320
null
quant-ph cs.CR
null
Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signalling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT.
[ { "version": "v1", "created": "Fri, 19 Aug 2005 15:14:52 GMT" }, { "version": "v2", "created": "Thu, 10 Nov 2005 14:29:45 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2005 11:44:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Colbeck", "Roger", "", "Centre for Quantum Computation, DAMTP,\n University of Cambridge" ], [ "Kent", "Adrian", "", "Centre for Quantum Computation, DAMTP,\n University of Cambridge" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0508200
Andris Ambainis
Andris Ambainis
A new quantum lower bound method, with an application to strong direct product theorem for quantum search
20 pages, v2 typos corrected
null
null
null
quant-ph cs.CC
null
We present a new method for proving lower bounds on quantum query algorithms. The new method is an extension of adversary method, by analyzing the eigenspace structure of the problem. Using the new method, we prove a strong direct product theorem for quantum search. This result was previously proven by Klauck, Spalek and de Wolf (quant-ph/0402123) using polynomials method. No proof using adversary method was known before.
[ { "version": "v1", "created": "Fri, 26 Aug 2005 16:28:57 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2005 15:34:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Ambainis", "Andris", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0508201
Stephanie Wehner
Stephanie Wehner (CWI, Amsterdam)
Entanglement in Interactive Proof Systems with Binary Answers
10 pages, LaTeX, To appear at STACS 2006
Proc. of 23rd STACS, 2006, LNCS 3884, pages 162-171.
10.1007/11672142_12
null
quant-ph cs.CC
null
If two classical provers share an entangled state, the resulting interactive proof system is significantly weakened [quant-ph/0404076]. We show that for the case where the verifier computes the XOR of two binary answers, the resulting proof system is in fact no more powerful than a system based on a single quantum prover: +MIP*[2] is contained in QIP(2). This also implies that +MIP*[2] is contained in EXP which was previously shown using a different method [Presentation of Cleve et al. at CCC'04]. This contrasts with an interactive proof system where the two provers do not share entanglement. In that case, +MIP[2] = NEXP for certain soundness and completeness parameters [quant-ph/0404076].
[ { "version": "v1", "created": "Fri, 26 Aug 2005 18:42:25 GMT" }, { "version": "v2", "created": "Sat, 14 Jan 2006 19:19:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Wehner", "Stephanie", "", "CWI, Amsterdam" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0508222
Christian Schaffner
Ivan Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
Cryptography In the Bounded Quantum-Storage Model
26 pages, full version of a paper appeared in 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 449-458, 2005
Proceedings of the 46th IEEE Symposium on Foundations of Computer Science - FOCS 2005, pages 449-458
null
null
quant-ph cs.CR
null
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least n/2 in order to break the protocol, where n is the number of qubits transmitted. This is in sharp contrast to the classical bounded-memory model, where we can only tolerate adversaries with memory of size quadratic in honest players' memory size. Our protocols are efficient, non-interactive and can be implemented using today's technology. On the technical side, a new entropic uncertainty relation involving min-entropy is established.
[ { "version": "v1", "created": "Tue, 30 Aug 2005 18:54:19 GMT" }, { "version": "v2", "created": "Fri, 14 Jul 2006 10:23:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Damgaard", "Ivan", "" ], [ "Fehr", "Serge", "" ], [ "Salvail", "Louis", "" ], [ "Schaffner", "Christian", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0510031
Latorre
Jose I. Latorre
Image compression and entanglement
4 pages, 5 figures
null
null
null
quant-ph cs.MM
null
The pixel values of an image can be casted into a real ket of a Hilbert space using an appropriate block structured addressing. The resulting state can then be rewritten in terms of its matrix product state representation in such a way that quantum entanglement corresponds to classical correlations between different coarse-grained textures. A truncation of the MPS representation is tantamount to a compression of the original image. The resulting algorithm can be improved adding a discrete Fourier transform preprocessing and a further entropic lossless compression.
[ { "version": "v1", "created": "Tue, 4 Oct 2005 14:54:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Latorre", "Jose I.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
quant-ph/0510230
Scott Aaronson
Scott Aaronson
QMA/qpoly Is Contained In PSPACE/poly: De-Merlinizing Quantum Protocols
13 pages. Final version to appear in Complexity 2006; fills in some gaps in the proofs
null
null
null
quant-ph cs.CC
null
This paper introduces a new technique for removing existential quantifiers over quantum states. Using this technique, we show that there is no way to pack an exponential number of bits into a polynomial-size quantum state, in such a way that the value of any one of those bits can later be proven with the help of a polynomial-size quantum witness. We also show that any problem in QMA with polynomial-size quantum advice, is also in PSPACE with polynomial-size classical advice. This builds on our earlier result that BQP/qpoly is contained in PP/poly, and offers an intriguing counterpoint to the recent discovery of Raz that QIP/qpoly = ALL. Finally, we show that QCMA/qpoly is contained in PP/poly and that QMA/rpoly = QMA/poly.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 00:55:54 GMT" }, { "version": "v2", "created": "Mon, 7 Nov 2005 13:12:18 GMT" }, { "version": "v3", "created": "Sun, 2 Apr 2006 04:10:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Aaronson", "Scott", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0511013
Julia Kempe
Dmytro Gavinsky, Julia Kempe, Oded Regev and Ronald de Wolf
Bounded-Error Quantum State Identification and Exponential Separations in Communication Complexity
20 pages, no figures
null
null
null
quant-ph cs.CC
null
We consider the problem of bounded-error quantum state identification: given either state \alpha_0 or state \alpha_1, we are required to output `0', `1' or `?' ("don't know"), such that conditioned on outputting `0' or `1', our guess is correct with high probability. The goal is to maximize the probability of not outputting `?'. We prove a direct product theorem: if we're given two such problems, with optimal probabilities a and b, respectively, and the states in the first problem are pure, then the optimal probability for the joint bounded-error state identification problem is O(ab). Our proof is based on semidefinite programming duality and may be of wider interest. Using this result, we present two exponential separations in the simultaneous message passing model of communication complexity. Both are shown in the strongest possible sense. First, we describe a relation that can be computed with O(log n) classical bits of communication in the presence of shared randomness, but needs Omega(n^{1/3}) communication if the parties don't share randomness, even if communication is quantum. This shows the optimality of Yao's recent exponential simulation of shared-randomness protocols by quantum protocols without shared randomness. Second, we describe a relation that can be computed with O(log n) classical bits of communication in the presence of shared entanglement, but needs Omega((n/log n)^{1/3}) communication if the parties share randomness but no entanglement, even if communication is quantum. This is the first example in communication complexity of a situation where entanglement buys you much more than quantum communication does.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 16:01:30 GMT" } ]
2022-03-29T00:00:00
[ [ "Gavinsky", "Dmytro", "" ], [ "Kempe", "Julia", "" ], [ "Regev", "Oded", "" ], [ "de Wolf", "Ronald", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0511016
G David Forney Jr.
G. David Forney, Jr., Markus Grassl, and Saikat Guha
Convolutional and tail-biting quantum error-correcting codes
30 pages. Submitted to IEEE Transactions on Information Theory. Minor revisions after first round of reviews
IEEE Transactions on Information Theory, vol. 53, no. 3, March 2007, pp. 865-880
10.1109/TIT.2006.890698
null
quant-ph cs.IT math.IT
null
Rate-(n-2)/n unrestricted and CSS-type quantum convolutional codes with up to 4096 states and minimum distances up to 10 are constructed as stabilizer codes from classical self-orthogonal rate-1/n F_4-linear and binary linear convolutional codes, respectively. These codes generally have higher rate and less decoding complexity than comparable quantum block codes or previous quantum convolutional codes. Rate-(n-2)/n block stabilizer codes with the same rate and error-correction capability and essentially the same decoding algorithms are derived from these convolutional codes via tail-biting.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 21:23:21 GMT" }, { "version": "v2", "created": "Tue, 7 Nov 2006 17:59:18 GMT" } ]
2012-08-27T00:00:00
[ [ "Forney,", "G. David", "Jr." ], [ "Grassl", "Markus", "" ], [ "Guha", "Saikat", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0511025
Francois Le Gall
Francois Le Gall
Quantum Weakly Nondeterministic Communication Complexity
12 pages. v3: minor corrections
Theoretical Computer Science, Vol. 486, pp. 43-49, 2013
10.1016/j.tcs.2012.12.015
null
quant-ph cs.CC
null
We study the weakest model of quantum nondeterminism in which a classical proof has to be checked with probability one by a quantum protocol. We show the first separation between classical nondeterministic communication complexity and this model of quantum nondeterministic communication complexity for a total function. This separation is quadratic.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 13:44:27 GMT" }, { "version": "v2", "created": "Mon, 7 Nov 2005 10:27:29 GMT" }, { "version": "v3", "created": "Tue, 4 Apr 2006 08:36:58 GMT" } ]
2021-10-05T00:00:00
[ [ "Gall", "Francois Le", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0511145
Wolfgang Mauerer
Wolfgang Mauerer
Semantics and simulation of communication in quantum programming
Master's thesis, 101 pages
null
null
null
quant-ph cs.PL
null
We present the quantum programming language cQPL which is an extended version of QPL [P. Selinger, Math. Struct. in Comp. Sci. 14(4):527-586, 2004]. It is capable of quantum communication and it can be used to formulate all possible quantum algorithms. Additionally, it possesses a denotational semantics based on a partial order of superoperators and uses fixed points on a generalised Hilbert space to formalise (in addition to all standard features expected from a quantum programming language) the exchange of classical and quantum data between an arbitrary number of participants. Additionally, we present the implementation of a cQPL compiler which generates code for a quantum simulator.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 18:05:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Mauerer", "Wolfgang", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
quant-ph/0511148
Pranab Sen
Sean Hallgren, Martin Roetteler, and Pranab Sen
Limitations of Quantum Coset States for Graph Isomorphism
25 pages
J. ACM 57(6): 34 (2010)
null
null
quant-ph cs.ET
null
It has been known for some time that graph isomorphism reduces to the hidden subgroup problem (HSP). What is more, most exponential speedups in quantum computation are obtained by solving instances of the HSP. A common feature of the resulting algorithms is the use of quantum coset states, which encode the hidden subgroup. An open question has been how hard it is to use these states to solve graph isomorphism. It was recently shown by Moore, Russell, and Schulman that only an exponentially small amount of information is available from one, or a pair of coset states. A potential source of power to exploit are entangled quantum measurements that act jointly on many states at once. We show that entangled quantum measurements on at least \Omega(n log n) coset states are necessary to get useful information for the case of graph isomorphism, matching an information theoretic upper bound. This may be viewed as a negative result because highly entangled measurements seem hard to implement in general. Our main theorem is very general and also rules out using joint measurements on few coset states for some other groups, such as GL(n, F_{p^m}) and G^n where G is finite and satisfies a suitable property.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 21:08:35 GMT" } ]
2023-11-27T00:00:00
[ [ "Hallgren", "Sean", "" ], [ "Roetteler", "Martin", "" ], [ "Sen", "Pranab", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
quant-ph/0511172
Tal Mor
Tal Mor
On Classical Teleportation and Classical Nonlocality
8 pages, Version 2 is using the term "quantum remote steering" to describe HJW idea, and "classical remote steering" is the main new result of this current paper. Version 2 also has an additional citation (to Gisin's 89 paper)
Int. J. of Quantum Information 4, 161-172 (2006)
10.1063/1.2165638
null
quant-ph cs.IT math.IT
null
An interesting protocol for classical teleportation of an unknown classical state was recently suggested by Cohen, and by Gour and Meyer. In that protocol, Bob can sample from a probability distribution P that is given to Alice, even if Alice has absolutely no knowledge about P. Pursuing a similar line of thought, we suggest here a limited form of nonlocality - "classical nonlocality". Our nonlocality is the (somewhat limited) classical analogue of the Hughston-Jozsa-Wootters (HJW) quantum nonlocality. The HJW nonlocality tells us how, for a given density matrix rho, Alice can generate any rho-ensemble on the North Star. This is done using surprisingly few resources - one shared entangled state (prepared in advance), one generalized quantum measurement, and no communication. Similarly, our classical nonlocality presents how, for a given probability distribution P, Alice can generate any P-ensemble on the North Star, using only one correlated state (prepared in advance), one (generalized) classical measurement, and no communication. It is important to clarify that while the classical teleportation and the classical non-locality protocols are probably rather insignificant from a classical information processing point of view, they significantly contribute to our understanding of what exactly is quantum in their well established and highly famous quantum analogues.
[ { "version": "v1", "created": "Thu, 17 Nov 2005 14:23:44 GMT" }, { "version": "v2", "created": "Tue, 13 Mar 2007 16:09:24 GMT" } ]
2015-06-26T00:00:00
[ [ "Mor", "Tal", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0511175
Tal Mor
Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor and Vwani Roychowdhury
A Proof of the Security of Quantum Key Distribution
64 pages; Accepted for publication in J. of Cryptology; replaces quant-ph/9912053; short version appeared in STOC'2000 pages 715-724
Journal of cryptology 19, 381-439 (2006)
null
null
quant-ph cs.CR cs.IT math.IT
null
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.
[ { "version": "v1", "created": "Thu, 17 Nov 2005 15:11:25 GMT" } ]
2007-07-16T00:00:00
[ [ "Biham", "Eli", "" ], [ "Boyer", "Michel", "" ], [ "Boykin", "P. Oscar", "" ], [ "Mor", "Tal", "" ], [ "Roychowdhury", "Vwani", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0511200
Ronald de Wolf
Andris Ambainis (U Waterloo), Robert Spalek (CWI), Ronald de Wolf (CWI)
A New Quantum Lower Bound Method, with Applications to Direct Product Theorems and Time-Space Tradeoffs
16 pages LaTeX. Version 2: title changed, proofs significantly cleaned up and made selfcontained. This version to appear in the proceedings of the STOC 06 conference
null
null
null
quant-ph cs.CC
null
We give a new version of the adversary method for proving lower bounds on quantum query algorithms. The new method is based on analyzing the eigenspace structure of the problem at hand. We use it to prove a new and optimal strong direct product theorem for 2-sided error quantum algorithms computing k independent instances of a symmetric Boolean function: if the algorithm uses significantly less than k times the number of queries needed for one instance of the function, then its success probability is exponentially small in k. We also use the polynomial method to prove a direct product theorem for 1-sided error algorithms for k threshold functions with a stronger bound on the success probability. Finally, we present a quantum algorithm for evaluating solutions to systems of linear inequalities, and use our direct product theorems to show that the time-space tradeoff of this algorithm is close to optimal.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 10:56:29 GMT" }, { "version": "v2", "created": "Tue, 9 May 2006 12:35:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Ambainis", "Andris", "", "U Waterloo" ], [ "Spalek", "Robert", "", "CWI" ], [ "de Wolf", "Ronald", "", "CWI" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0511272
Dan Kenigsberg
Dan Kenigsberg, Tal Mor and Gil Ratsaby
Quantum Advantage without Entanglement
10 pages
Quantum Information and Computation 6(7), 606--615 (2006)
10.1117/12.617175
null
quant-ph cs.CC
null
We study the advantage of pure-state quantum computation without entanglement over classical computation. For the Deutsch-Jozsa algorithm we present the maximal subproblem that can be solved without entanglement, and show that the algorithm still has an advantage over the classical ones. We further show that this subproblem is of greater significance, by proving that it contains all the Boolean functions whose quantum phase-oracle is non-entangling. For Simon's and Grover's algorithms we provide simple proofs that no non-trivial subproblems can be solved by these algorithms without entanglement.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 16:12:47 GMT" } ]
2009-11-11T00:00:00
[ [ "Kenigsberg", "Dan", "" ], [ "Mor", "Tal", "" ], [ "Ratsaby", "Gil", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0512114
Ross Duncan
Samson Abramsky, Ross Duncan
A Categorical Quantum Logic
23 pages, 15 figures; presented at QPL 2004
null
10.1017/S0960129506005275
null
quant-ph cs.LO
null
We define a strongly normalising proof-net calculus corresponding to the logic of strongly compact closed categories with biproducts. The calculus is a full and faithful representation of the free strongly compact closed category with biproducts on a given category with an involution. This syntax can be used to represent and reason about quantum processes.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 03:37:38 GMT" } ]
2013-06-20T00:00:00
[ [ "Abramsky", "Samson", "" ], [ "Duncan", "Ross", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
quant-ph/0601115
Chi-Hang Fred Fung
Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, and Hoi-Kwong Lo (Center for Quantum Information and Quantum Control, University of Toronto, and NTT Basic Research Laboratories, NTT Corporation)
Phase-Remapping Attack in Practical Quantum Key Distribution Systems
13 pages, 8 figures
Phys. Rev. A 75, 032314 (2007)
10.1103/PhysRevA.75.032314
null
quant-ph cs.IT math.IT
null
Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.
[ { "version": "v1", "created": "Tue, 17 Jan 2006 21:39:48 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 22:32:03 GMT" }, { "version": "v3", "created": "Thu, 23 Nov 2006 20:28:29 GMT" }, { "version": "v4", "created": "Sun, 7 Jan 2007 08:40:13 GMT" }, { "version": "v5", "created": "Wed, 24 Jan 2007 23:00:41 GMT" }, { "version": "v6", "created": "Tue, 6 Mar 2007 03:34:22 GMT" } ]
2007-07-13T00:00:00
[ [ "Fung", "Chi-Hang Fred", "", "Center\n for Quantum Information and Quantum Control, University of Toronto, and NTT\n Basic Research Laboratories, NTT Corporation" ], [ "Qi", "Bing", "", "Center\n for Quantum Information and Quantum Control, University of Toronto, and NTT\n Basic Research Laboratories, NTT Corporation" ], [ "Tamaki", "Kiyoshi", "", "Center\n for Quantum Information and Quantum Control, University of Toronto, and NTT\n Basic Research Laboratories, NTT Corporation" ], [ "Lo", "Hoi-Kwong", "", "Center\n for Quantum Information and Quantum Control, University of Toronto, and NTT\n Basic Research Laboratories, NTT Corporation" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0602063
Miguel Angel Martin-Delgado
H. Bombin, M.A. Martin-Delgado
Topological Quantum Error Correction with Optimal Encoding Rate
REVTEX4 file, 5 figures
Phys.Rev.A73:062303,2006
10.1103/PhysRevA.73.062303
null
quant-ph cond-mat.str-el cs.GR hep-th math-ph math.AT math.CO math.MP
null
We prove the existence of topological quantum error correcting codes with encoding rates $k/n$ asymptotically approaching the maximum possible value. Explicit constructions of these topological codes are presented using surfaces of arbitrary genus. We find a class of regular toric codes that are optimal. For physical implementations, we present planar topological codes.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 10:43:50 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 17:10:49 GMT" } ]
2016-09-08T00:00:00
[ [ "Bombin", "H.", "" ], [ "Martin-Delgado", "M. A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.str-el", "description": "Quantum magnetism, non-Fermi liquids, spin liquids, quantum criticality, charge density waves, metal-insulator transitions", "span": "(Strongly Correlated Electrons)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
quant-ph/0602087
Itamar Pitowsky
Shahar Dolev, Itamar Pitowsky, Boaz Tamir
A quantum secret ballot
RevReX, 7 pages, minor revisions, small additions
null
null
null
quant-ph cs.CC
null
The paper concerns the protection of the secrecy of ballots, so that the identity of the voters cannot be matched with their vote. To achieve this we use an entangled quantum state to represent the ballots. Each ballot includes the identity of the voter, explicitly marked on the "envelope" containing it. Measuring the content of the envelope yields a random number which reveals no information about the vote. However, the outcome of the elections can be unambiguously decided after adding the random numbers from all envelopes. We consider a few versions of the protocol and their complexity of implementation.
[ { "version": "v1", "created": "Thu, 9 Feb 2006 21:03:35 GMT" }, { "version": "v2", "created": "Sat, 18 Mar 2006 17:20:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Dolev", "Shahar", "" ], [ "Pitowsky", "Itamar", "" ], [ "Tamir", "Boaz", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0602088
Tomoyuki Yamakami
Akinori Kawachi and Tomoyuki Yamakami
Quantum Hardcore Functions by Complexity-Theoretical Quantum List Decoding
25 pages, 10 point, letter size. This is a revised version of the complete version of a conference paper that appeared in the Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP 2006), Lecture Notes in Computer Science, Vol.4052 (Part II), pp.216-227. Venice, Italy. July 10-14, 2006
(journal version) SIAM Journal on Computing, Vol.39, pp.2941-2969, 2010
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hardcore functions have been used as a technical tool to construct secure cryptographic systems; however, little is known on their quantum counterpart, called quantum hardcore functions. With a new insight into fundamental properties of quantum hardcores, we present three new quantum hardcore functions for any (strong) quantum one-way function. We also give a "quantum" solution to Damgard's question (CRYPTO'88) on a classical hardcore property of his pseudorandom generator, by proving its quantum hardcore property. Our major technical tool is the new notion of quantum list-decoding of "classical" error-correcting codes (rather than "quantum" error-correcting codes), which is defined on the platform of computational complexity theory and computational cryptography (rather than information theory). In particular, we give a simple but powerful criterion that makes a polynomial-time computable classical block code (seen as a function) a quantum hardcore for all quantum one-way functions. On their own interest, we construct efficient quantum list-decoding algorithms for classical block codes whose associated quantum states (called codeword states) form a nearly phase-orthogonal basis.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 04:59:41 GMT" }, { "version": "v2", "created": "Wed, 26 Mar 2008 11:12:09 GMT" }, { "version": "v3", "created": "Mon, 29 Jun 2009 16:04:20 GMT" } ]
2010-07-20T00:00:00
[ [ "Kawachi", "Akinori", "" ], [ "Yamakami", "Tomoyuki", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0602114
R. Srikanth
R. Srikanth
The quantum measurement problem and physical reality: a computation theoretic perspective
Talk presented at "Quantum Computing: Back Action 2006", IIT Kanpur, India, March 2006
AIP Conference Proceedings 864, pp. 178-193 (2006)
10.1063/1.2400889
null
quant-ph cs.CC
null
Is the universe computable? If yes, is it computationally a polynomial place? In standard quantum mechanics, which permits infinite parallelism and the infinitely precise specification of states, a negative answer to both questions is not ruled out. On the other hand, empirical evidence suggests that NP-complete problems are intractable in the physical world. Likewise, computational problems known to be algorithmically uncomputable do not seem to be computable by any physical means. We suggest that this close correspondence between the efficiency and power of abstract algorithms on the one hand, and physical computers on the other, finds a natural explanation if the universe is assumed to be algorithmic; that is, that physical reality is the product of discrete sub-physical information processing equivalent to the actions of a probabilistic Turing machine. This assumption can be reconciled with the observed exponentiality of quantum systems at microscopic scales, and the consequent possibility of implementing Shor's quantum polynomial time algorithm at that scale, provided the degree of superposition is intrinsically, finitely upper-bounded. If this bound is associated with the quantum-classical divide (the Heisenberg cut), a natural resolution to the quantum measurement problem arises. From this viewpoint, macroscopic classicality is an evidence that the universe is in BPP, and both questions raised above receive affirmative answers. A recently proposed computational model of quantum measurement, which relates the Heisenberg cut to the discreteness of Hilbert space, is briefly discussed. A connection to quantum gravity is noted. Our results are compatible with the philosophy that mathematical truths are independent of the laws of physics.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 17:50:31 GMT" }, { "version": "v2", "created": "Wed, 15 Feb 2006 16:54:03 GMT" }, { "version": "v3", "created": "Tue, 7 Nov 2006 14:58:04 GMT" } ]
2009-11-13T00:00:00
[ [ "Srikanth", "R.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0602129
Martin Roetteler
Markus Grassl and Martin Roetteler
Non-catastrophic Encoders and Encoder Inverses for Quantum Convolutional Codes
6 pages, 1 figure, submitted to 2006 IEEE International Symposium on Information Theory
Proceedings 2006 IEEE International Symposium on Information Theory, pp. 1109-1113
10.1109/ISIT.2006.261956
null
quant-ph cs.IT math.IT
null
We present an algorithm to construct quantum circuits for encoding and inverse encoding of quantum convolutional codes. We show that any quantum convolutional code contains a subcode of finite index which has a non-catastrophic encoding circuit. Our work generalizes the conditions for non-catastrophic encoders derived in a paper by Ollivier and Tillich (quant-ph/0401134) which are applicable only for a restricted class of quantum convolutional codes. We also show that the encoders and their inverses constructed by our method naturally can be applied online, i.e., qubits can be sent and received with constant delay.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 18:24:05 GMT" } ]
2008-01-15T00:00:00
[ [ "Grassl", "Markus", "" ], [ "Roetteler", "Martin", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0602156
Anya Tafliovich
Anya Tafliovich, E.C.R. Hehner
Quantum Predicative Programming
null
null
null
null
quant-ph cs.PL
null
The subject of this work is quantum predicative programming -- the study of developing of programs intended for execution on a quantum computer. We look at programming in the context of formal methods of program development, or programming methodology. Our work is based on probabilistic predicative programming, a recent generalisation of the well-established predicative programming. It supports the style of program development in which each programming step is proven correct as it is made. We inherit the advantages of the theory, such as its generality, simple treatment of recursive programs, time and space complexity, and communication. Our theory of quantum programming provides tools to write both classical and quantum specifications, develop quantum programs that implement these specifications, and reason about their comparative time and space complexity all in the same framework.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 20:43:06 GMT" } ]
2008-02-19T00:00:00
[ [ "Tafliovich", "Anya", "" ], [ "Hehner", "E. C. R.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
quant-ph/0603031
Masahito Hayashi
Masahito Hayashi
Channel capacities of classical and quantum list decoding
null
null
null
null
quant-ph cs.IT math.IT
null
We focus on classical and quantum list decoding. The capacity of list decoding was obtained by Nishimura in the case when the number of list does not increase exponentially. However, the capacity of the exponential-list case is open even in the classical case while its converse part was obtained by Nishimura. We derive the channel capacities in the classical and quantum case with an exponentially increasing list. The converse part of the quantum case is obtained by modifying Nagaoka's simple proof for strong converse theorem for channel capacity. The direct part is derived by a quite simple argument.
[ { "version": "v1", "created": "Sat, 4 Mar 2006 06:04:55 GMT" }, { "version": "v2", "created": "Mon, 13 Mar 2006 04:42:25 GMT" }, { "version": "v3", "created": "Tue, 21 Mar 2006 05:44:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Hayashi", "Masahito", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0603034
Shengyu Zhang
Shengyu Zhang
New upper and lower bounds for randomized and quantum Local Search
25 pages, 3 figures. Full version of the paper in STOC 2006. Subsume quant-ph/0504085 by generalizing both main theorems
null
null
null
quant-ph cs.CC
null
Local Search problem, which finds a local minimum of a black-box function on a given graph, is of both practical and theoretical importance to combinatorial optimization, complexity theory and many other areas in theoretical computer science. In this paper, we study the problem in the randomized and quantum query models and give new lower and upper bound techniques in both models. The lower bound technique works for any graph that contains a product graph as a subgraph. Applying it to the Boolean hypercube {0,1}^n and the constant dimensional grids [n]^d, two particular product graphs that recently drew much attention, we get the following tight results: RLS({0,1}^n) = \Theta(2^{n/2}n^{1/2}), QLS({0,1}^n) = \Theta(2^{n/3}n^{1/6}), RLS([n]^d) = \Theta(n^{d/2}) for d \geq 4, QLS([n]^d) = \Theta(n^{d/3}) for d \geq 6. Here RLS(G) and QLS(G) are the randomized and quantum query complexities of Local Search on G, respectively. These improve the previous results by Aaronson [STOC'04], Ambainis (unpublished) and Santha and Szegedy [STOC'04]. Our new algorithms work well when the underlying graph expands slowly. As an application to [n]^2, a new quantum algorithm using O(\sqrt{n}(\log\log n)^{1.5}) queries is given. This improves the previous best known upper bound of O(n^{2/3}) (Aaronson, [STOC'04]), and implies that Local Search on grids exhibits different properties in low dimensions.
[ { "version": "v1", "created": "Mon, 6 Mar 2006 00:21:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Shengyu", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0603098
Jon Yard
Jon Yard, Patrick Hayden, Igor Devetak
Quantum broadcast channels
15 pages; IEEE Trans. Inform. Theory, vol. 57, no. 10, October 2011
null
10.1109/TIT.2011.2165811
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider quantum channels with one sender and two receivers, used in several different ways for the simultaneous transmission of independent messages. We begin by extending the technique of superposition coding to quantum channels with a classical input to give a general achievable region. We also give outer bounds to the capacity regions for various special cases from the classical literature and prove that superposition coding is optimal for a class of channels. We then consider extensions of superposition coding for channels with a quantum input, where some of the messages transmitted are quantum instead of classical, in the sense that the parties establish bipartite or tripartite GHZ entanglement. We conclude by using state merging to give achievable rates for establishing bipartite entanglement between different pairs of parties with the assistance of free classical communication.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 20:30:37 GMT" }, { "version": "v2", "created": "Sun, 23 Oct 2011 22:03:08 GMT" } ]
2011-10-25T00:00:00
[ [ "Yard", "Jon", "" ], [ "Hayden", "Patrick", "" ], [ "Devetak", "Igor", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0603135
Ashwin Nayak
Hartmut Klauck, Ashwin Nayak, Amnon Ta-Shma and David Zuckerman
Interaction in Quantum Communication
35 pages. Uses IEEEtran.cls, IEEEbib.bst. Submitted to IEEE Transactions on Information Theory. Strengthens results in quant-ph/0005106, quant-ph/0004100 and an earlier version presented in STOC 2001
null
10.1109/TIT.2007.896888
null
quant-ph cs.CC cs.IT math.IT
null
In some scenarios there are ways of conveying information with many fewer, even exponentially fewer, qubits than possible classically. Moreover, some of these methods have a very simple structure--they involve only few message exchanges between the communicating parties. It is therefore natural to ask whether every classical protocol may be transformed to a ``simpler'' quantum protocol--one that has similar efficiency, but uses fewer message exchanges. We show that for any constant k, there is a problem such that its k+1 message classical communication complexity is exponentially smaller than its k message quantum communication complexity. This, in particular, proves a round hierarchy theorem for quantum communication complexity, and implies, via a simple reduction, an Omega(N^{1/k}) lower bound for k message quantum protocols for Set Disjointness for constant k. Enroute, we prove information-theoretic lemmas, and define a related measure of correlation, the informational distance, that we believe may be of significance in other contexts as well.
[ { "version": "v1", "created": "Wed, 15 Mar 2006 12:45:08 GMT" } ]
2018-03-22T00:00:00
[ [ "Klauck", "Hartmut", "" ], [ "Nayak", "Ashwin", "" ], [ "Ta-Shma", "Amnon", "" ], [ "Zuckerman", "David", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0603173
Julia Kempe
Dmytro Gavinsky, Julia Kempe, Ronald de Wolf
Strengths and Weaknesses of Quantum Fingerprinting
13 pages, no figures, to appear in CCC'06
Proc. 21st CCC (Complexity), p. 288-295 (2006)
null
null
quant-ph cs.CC
null
We study the power of quantum fingerprints in the simultaneous message passing (SMP) setting of communication complexity. Yao recently showed how to simulate, with exponential overhead, classical shared-randomness SMP protocols by means of quantum SMP protocols without shared randomness ($Q^\parallel$-protocols). Our first result is to extend Yao's simulation to the strongest possible model: every many-round quantum protocol with unlimited shared entanglement can be simulated, with exponential overhead, by $Q^\parallel$-protocols. We apply our technique to obtain an efficient $Q^\parallel$-protocol for a function which cannot be efficiently solved through more restricted simulations. Second, we tightly characterize the power of the quantum fingerprinting technique by making a connection to arrangements of homogeneous halfspaces with maximal margin. These arrangements have been well studied in computational learning theory, and we use some strong results obtained in this area to exhibit weaknesses of quantum fingerprinting. In particular, this implies that for almost all functions, quantum fingerprinting protocols are exponentially worse than classical deterministic SMP protocols.
[ { "version": "v1", "created": "Mon, 20 Mar 2006 16:13:53 GMT" } ]
2022-03-29T00:00:00
[ [ "Gavinsky", "Dmytro", "" ], [ "Kempe", "Julia", "" ], [ "de Wolf", "Ronald", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0603199
Lawrence Ioannou
Lawrence M. Ioannou
Computational complexity of the quantum separability problem
null
Quantum Information and Computation, Vol. 7, No. 4 (2007) 335-370
null
null
quant-ph cs.CC
null
Ever since entanglement was identified as a computational and cryptographic resource, researchers have sought efficient ways to tell whether a given density matrix represents an unentangled, or separable, state. This paper gives the first systematic and comprehensive treatment of this (bipartite) quantum separability problem, focusing on its deterministic (as opposed to randomized) computational complexity. First, I review the one-sided tests for separability, paying particular attention to the semidefinite programming methods. Then, I discuss various ways of formulating the quantum separability problem, from exact to approximate formulations, the latter of which are the paper's main focus. I then give a thorough treatment of the problem's relationship with the complexity classes NP, NP-complete, and co-NP. I also discuss extensions of Gurvits' NP-hardness result to strong NP-hardness of certain related problems. A major open question is whether the NP-contained formulation (QSEP) of the quantum separability problem is Karp-NP-complete; QSEP may be the first natural example of a problem that is Turing-NP-complete but not Karp-NP-complete. Finally, I survey all the proposed (deterministic) algorithms for the quantum separability problem, including the bounded search for symmetric extensions (via semidefinite programming), based on the recent quantum de Finetti theorem; and the entanglement-witness search (via interior-point algorithms and global optimization). These two algorithms have the lowest complexity, with the latter being the best under advice of asymptotically optimal point-coverings of the sphere.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 18:54:54 GMT" }, { "version": "v2", "created": "Mon, 27 Mar 2006 17:44:43 GMT" }, { "version": "v3", "created": "Tue, 28 Mar 2006 10:02:20 GMT" }, { "version": "v4", "created": "Tue, 18 Jul 2006 10:06:50 GMT" }, { "version": "v5", "created": "Fri, 21 Jul 2006 15:09:55 GMT" }, { "version": "v6", "created": "Thu, 18 Jan 2007 16:42:31 GMT" }, { "version": "v7", "created": "Wed, 31 Jan 2007 13:20:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Ioannou", "Lawrence M.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0604013
Garry Bowen
Garry Bowen and Nilanjana Datta
Beyond i.i.d. in Quantum Information Theory
6 Pages, requires IEEEtran.cls, updated and corrected proofs
null
null
null
quant-ph cs.IT math.IT
null
The information spectrum approach gives general formulae for optimal rates of codes in many areas of information theory. In this paper the quantum spectral divergence rates are defined and properties of the rates are derived. The entropic rates, conditional entropic rates, and spectral mutual information rates are then defined in terms of the spectral divergence rates. Properties including subadditivity, chain rules, Araki-Lieb inequalities, and monotonicity are then explored.
[ { "version": "v1", "created": "Tue, 4 Apr 2006 11:11:47 GMT" }, { "version": "v2", "created": "Mon, 16 Oct 2006 11:07:08 GMT" } ]
2007-07-13T00:00:00
[ [ "Bowen", "Garry", "" ], [ "Datta", "Nilanjana", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0604052
Dmytro Gavinsky
Dmytro Gavinsky
On the Role of Shared Entanglement
null
null
null
null
quant-ph cs.CC
null
Despite the apparent similarity between shared randomness and shared entanglement in the context of Communication Complexity, our understanding of the latter is not as good as of the former. In particular, there is no known "entanglement analogue" for the famous theorem by Newman, saying that the number of shared random bits required for solving any communication problem can be at most logarithmic in the input length (i.e., using more than O(log n) shared random bits would not reduce the complexity of an optimal solution). In this paper we prove that the same is not true for entanglement. We establish a wide range of tight (up to a polylogarithmic factor) entanglement vs. communication tradeoffs for relational problems. The low end is: for any t>2, reducing shared entanglement from log^t(n) to o(log^{t-2}(n)) qubits can increase the communication required for solving a problem almost exponentially, from O(log^t(n)) to \Omega(\sqrt n). The high end is: for any \eps>0, reducing shared entanglement from n^{1-\eps}log(n) to o(n^{1-\eps}/log(n)) can increase the required communication from O(n^{1-\eps}log(n)) to \Omega(n^{1-\eps/2}/log(n)). The upper bounds are demonstrated via protocols which are exact and work in the \e{simultaneous message passing model}, while the lower bounds hold for \e{bounded-error protocols}, even in the more powerful \e{model of 1-way communication}. Our protocols use shared EPR pairs while the lower bounds apply to any sort of prior entanglement. We base the lower bounds on a strong direct product theorem for communication complexity of a certain class of relational problems. We believe that the theorem might have applications outside the scope of this work.
[ { "version": "v1", "created": "Sat, 8 Apr 2006 02:44:26 GMT" }, { "version": "v2", "created": "Tue, 22 Aug 2006 06:48:38 GMT" } ]
2022-03-29T00:00:00
[ [ "Gavinsky", "Dmytro", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0604056
Greg Kuperberg
Scott Aaronson and Greg Kuperberg
Quantum Versus Classical Proofs and Advice
20 pages, now includes a definition of an explicit group that is in the journal version
Theory Comput. 3 (2007), 129-157
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies whether quantum proofs are more powerful than classical proofs, or in complexity terms, whether QMA=QCMA. We prove three results about this question. First, we give a "quantum oracle separation" between QMA and QCMA. More concretely, we show that any quantum algorithm needs $\Omega(\sqrt{2^n/(m+1)})$ queries to find an $n$-qubit "marked state" $\lvert\psi\rangle$, even if given an $m$-bit classical description of $\lvert\psi\rangle$ together with a quantum black box that recognizes $\lvert\psi\rangle$. Second, we give an explicit QCMA protocol that nearly achieves this lower bound. Third, we show that, in the one previously-known case where quantum proofs seemed to provide an exponential advantage, classical proofs are basically just as powerful. In particular, Watrous gave a QMA protocol for verifying non-membership in finite groups. Under plausible group-theoretic assumptions, we give a QCMA protocol for the same problem. Even with no assumptions, our protocol makes only polynomially many queries to the group oracle. We end with some conjectures about quantum versus classical oracles, and about the possibility of a classical oracle separation between QMA and QCMA.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 02:29:16 GMT" }, { "version": "v2", "created": "Tue, 11 Apr 2006 17:33:49 GMT" }, { "version": "v3", "created": "Thu, 27 Jul 2006 18:21:58 GMT" }, { "version": "v4", "created": "Mon, 28 Sep 2020 21:47:50 GMT" } ]
2020-09-30T00:00:00
[ [ "Aaronson", "Scott", "" ], [ "Kuperberg", "Greg", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0604161
Andreas Klappenecker
Andreas Klappenecker and Pradeep Kiran Sarvepalli
Clifford Code Constructions of Operator Quantum Error Correcting Codes
11 pages of character theory; minor changes, theorem 6 added
null
null
null
quant-ph cs.IT math.IT
null
Recently, operator quantum error-correcting codes have been proposed to unify and generalize decoherence free subspaces, noiseless subsystems, and quantum error-correcting codes. This note introduces a natural construction of such codes in terms of Clifford codes, an elegant generalization of stabilizer codes due to Knill. Character-theoretic methods are used to derive a simple method to construct operator quantum error-correcting codes from any classical additive code over a finite field.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 05:24:07 GMT" }, { "version": "v2", "created": "Wed, 18 Oct 2006 20:46:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Klappenecker", "Andreas", "" ], [ "Sarvepalli", "Pradeep Kiran", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0605030
Markus Mueller
Markus Mueller
Strongly Universal Quantum Turing Machines and Invariance of Kolmogorov Complexity
18 pages, 1 figure. The operation R is now really a quantum operation (it was not before); corrected some typos, III.B more readable, Conjecture 3.15 is now a theorem
IEEE Trans. Inf. Th., Vol. 54/2 pp. 763-780 (2008)
10.1109/TIT.2007.913263
null
quant-ph cs.IT math-ph math.IT math.MP
null
We show that there exists a universal quantum Turing machine (UQTM) that can simulate every other QTM until the other QTM has halted and then halt itself with probability one. This extends work by Bernstein and Vazirani who have shown that there is a UQTM that can simulate every other QTM for an arbitrary, but preassigned number of time steps. As a corollary to this result, we give a rigorous proof that quantum Kolmogorov complexity as defined by Berthiaume et al. is invariant, i.e. depends on the choice of the UQTM only up to an additive constant. Our proof is based on a new mathematical framework for QTMs, including a thorough analysis of their halting behaviour. We introduce the notion of mutually orthogonal halting spaces and show that the information encoded in an input qubit string can always be effectively decomposed into a classical and a quantum part.
[ { "version": "v1", "created": "Tue, 2 May 2006 20:27:34 GMT" }, { "version": "v2", "created": "Fri, 11 Aug 2006 14:35:05 GMT" }, { "version": "v3", "created": "Sat, 11 Aug 2007 17:00:35 GMT" } ]
2016-11-18T00:00:00
[ [ "Mueller", "Markus", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
quant-ph/0605041
Ashwin Nayak
Ashwin Nayak (1), Pranab Sen (2) ((1) U. Waterloo & Perimeter, (2) TIFR)
Invertible Quantum Operations and Perfect Encryption of Quantum States
9 pages. Version 3 has minor edits, a correction to Theorem 2.2, and a proof sketch.Author affiliation updated.Version 4 has an additional reference. To appear in QIC
null
null
null
quant-ph cs.CR cs.IT math.IT
null
In this note, we characterize the form of an invertible quantum operation, i.e., a completely positive trace preserving linear transformation (a CPTP map) whose inverse is also a CPTP map. The precise form of such maps becomes important in contexts such as self-testing and encryption. We show that these maps correspond to applying a unitary transformation to the state along with an ancilla initialized to a fixed state, which may be mixed. The characterization of invertible quantum operations implies that one-way schemes for encrypting quantum states using a classical key may be slightly more general than the ``private quantum channels'' studied by Ambainis, Mosca, Tapp and de Wolf (FOCS 2000). Nonetheless, we show that their results, most notably a lower bound of 2n bits of key to encrypt n quantum bits, extend in a straightforward manner to the general case.
[ { "version": "v1", "created": "Wed, 3 May 2006 17:29:56 GMT" }, { "version": "v2", "created": "Thu, 20 Jul 2006 16:03:24 GMT" }, { "version": "v3", "created": "Thu, 21 Sep 2006 05:22:20 GMT" }, { "version": "v4", "created": "Thu, 2 Nov 2006 18:15:14 GMT" } ]
2018-03-22T00:00:00
[ [ "Nayak", "Ashwin", "" ], [ "Sen", "Pranab", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0605096
Subhash Kak
Subhash Kak
Quantum Information and Entropy
21 pages, 3 figures
International Journal of Theoretical Physics, vol. 46, pp. 860-876, 2007.
10.1007/s10773-006-9245-6
null
quant-ph cs.IT math.IT
null
Thermodynamic entropy is not an entirely satisfactory measure of information of a quantum state. This entropy for an unknown pure state is zero, although repeated measurements on copies of such a pure state do communicate information. In view of this, we propose a new measure for the informational entropy of a quantum state that includes information in the pure states and the thermodynamic entropy. The origin of information is explained in terms of an interplay between unitary and non-unitary evolution. Such complementarity is also at the basis of the so-called interaction-free measurement.
[ { "version": "v1", "created": "Wed, 10 May 2006 15:40:09 GMT" } ]
2015-06-26T00:00:00
[ [ "Kak", "Subhash", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0605150
Maciej Liskiewicz
Andreas Jakoby, Maciej Liskiewicz, and Aleksander Madry
Using quantum oblivious transfer to cheat sensitive quantum bit commitment
12 pages
null
null
null
quant-ph cs.CR
null
It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independently by Aharonov et al. [STOC, 2000] and Hardy and Kent [Phys. Rev. Lett. 92 (2004)] is investigated. In this variant, the parties require some nonzero probability of detecting a cheating, i.e. if Bob, who commits a bit b to Alice, changes his mind during the revealing phase then Alice detects the cheating with a positive probability (we call this property binding); and if Alice gains information about the committed bit before the revealing phase then Bob discovers this with positive probability (sealing). In our paper we give quantum bit commitment scheme that is simultaneously binding and sealing and we show that if a cheating gives epsilon advantage to a malicious Alice then Bob can detect the cheating with a probability Omega(epsilon^2). If Bob cheats then Alice's probability of detecting the cheating is greater than some fixed constant lambda>0. This improves the probabilities of cheating detections shown by Hardy and Kent and the scheme by Aharonov et al. who presented a protocol that is either binding or sealing, but not simultaneously both. To construct a cheat sensitive quantum bit commitment scheme we use a protocol for a weak quantum one-out-of-two oblivious transfer.
[ { "version": "v1", "created": "Wed, 17 May 2006 06:30:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Jakoby", "Andreas", "" ], [ "Liskiewicz", "Maciej", "" ], [ "Madry", "Aleksander", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0605181
Itai Arad
Dorit Aharonov and Itai Arad
The BQP-hardness of approximating the Jones Polynomial
36 pages, 8 figures. A much improved and revised version, updated to Feb 2011, which includes discussions and implications of related results published after the original 2006 version of this paper
New J. Phys. 13 (2011) 035019
10.1088/1367-2630/13/3/035019
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A celebrated important result due to Freedman, Larsen and Wang states that providing additive approximations of the Jones polynomial at the k'th root of unity, for constant k=5 and k>6, is BQP-hard. Together with the algorithmic results of Freedman et al and Aharonov et al, this gives perhaps the most natural BQP-complete problem known today and motivates further study of the topic. In this paper we focus on the universality proof; we extend the universality result of Freedman et al to k's that grow polynomially with the number of strands and crossings in the link, thus extending the BQP-hardness of Jones polynomial approximations to all values for which the AJL algorithm applies, proving that for all those values, the problems are BQP-complete. As a side benefit, we derive a fairly elementary proof of the Freedman et al density result, without referring to advanced results from Lie algebra representation theory, making this important result accessible to computer science audience. We make use of two general lemmas we prove, the Bridge lemma and the Decoupling lemma, which provide tools for establishing density of subgroups in SU(n). Those tools seem to be of independent interest in more general contexts of proving quantum universality. Our result also implies a completely classical statement, that the_multiplicative_ approximations of the Jones polynomial, at exactly the same values, are #P-hard, via a recent result due to Kuperberg. Since the first publication of those results in their preliminary form (arXiv:quant-ph/0605181v2), the methods we present here were used in several other contexts. This paper is an improved and extended version of the original results, and also includes discussions of the developments since then.
[ { "version": "v1", "created": "Sun, 21 May 2006 21:39:38 GMT" }, { "version": "v2", "created": "Tue, 17 Oct 2006 10:28:24 GMT" }, { "version": "v3", "created": "Mon, 13 Dec 2010 20:57:34 GMT" }, { "version": "v4", "created": "Tue, 14 Dec 2010 19:25:11 GMT" }, { "version": "v5", "created": "Sat, 19 Feb 2011 16:06:43 GMT" } ]
2011-03-28T00:00:00
[ [ "Aharonov", "Dorit", "" ], [ "Arad", "Itai", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0605182
Jonathan Barrett
Jonathan Barrett, Adrian Kent and Stefano Pironio
Maximally Non-Local and Monogamous Quantum Correlations
5 pages, no figures
Phys. Rev. Lett. 97, 170409 (2006).
10.1103/PhysRevLett.97.170409
null
quant-ph cs.CR
null
We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes, and use it to give a simple proof that the maximally entangled state of two d dimensional quantum systems has no local component. That is, if we write its quantum correlations as a mixture of local correlations and general (not necessarily quantum) correlations, the coefficient of the local correlations must be zero. This suggests an experimental programme to obtain as good an upper bound as possible on the fraction of local states, and provides a lower bound on the amount of classical communication needed to simulate a maximally entangled state in dxd dimensions. We also prove that the quantum correlations violating the inequality are monogamous among non-signalling correlations, and hence can be used for quantum key distribution secure against post-quantum (but non-signalling) eavesdroppers.
[ { "version": "v1", "created": "Sun, 21 May 2006 22:57:16 GMT" } ]
2011-04-08T00:00:00
[ [ "Barrett", "Jonathan", "" ], [ "Kent", "Adrian", "" ], [ "Pironio", "Stefano", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0605219
Alexander Yu. Vlasov
Alexander Yu. Vlasov
Classical simulators of quantum computers and no-go theorems
LaTeX, 22 pp, 7 fig, v2: small changes in text, refs, figs. Comments are welcome
null
null
null
quant-ph cs.OH
null
It is discussed, why classical simulators of quantum computers escape from some no-go claims like Kochen-Specker, Bell, or recent Conway-Kochen "Free Will" theorems.
[ { "version": "v1", "created": "Thu, 25 May 2006 15:47:52 GMT" }, { "version": "v2", "created": "Tue, 13 Jun 2006 12:44:57 GMT" } ]
2010-05-11T00:00:00
[ [ "Vlasov", "Alexander Yu.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
quant-ph/0606049
Lluis Masanes
Ll. Masanes, R. Renner, M. Christandl, A. Winter, J. Barrett
Full security of quantum key distribution from no-signaling constraints
15 pages, 2 figure
IEEE Transactions on Information Theory, Volume 60, Issue 8, pages 4973-4986, year 2014
10.1109/TIT.2014.2329417
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle. The claim holds with respect to the state-of-the-art security definition used in cryptography, known as universally-composable security. The non-signaling assumption only refers to the statistics of measurement outcomes depending on the choices of measurements; hence security is independent of the internal workings of the devices --- they do not even need to follow the laws of quantum theory. This is relevant for practice as a correct and complete modeling of realistic devices is generally impossible. The techniques developed are general and can be applied to other Bell inequality-based protocols. In particular, we provide a scheme for estimating Bell-inequality violations when the samples are not independent and identically distributed.
[ { "version": "v1", "created": "Tue, 6 Jun 2006 17:42:34 GMT" }, { "version": "v2", "created": "Mon, 14 Jul 2008 14:01:13 GMT" }, { "version": "v3", "created": "Sun, 27 Jul 2008 08:31:16 GMT" }, { "version": "v4", "created": "Thu, 10 Dec 2009 13:58:31 GMT" }, { "version": "v5", "created": "Wed, 24 Sep 2014 09:54:18 GMT" } ]
2014-12-02T00:00:00
[ [ "Masanes", "Ll.", "" ], [ "Renner", "R.", "" ], [ "Christandl", "M.", "" ], [ "Winter", "A.", "" ], [ "Barrett", "J.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0606066
Francois Le Gall
Francois Le Gall
Exponential Separation of Quantum and Classical Online Space Complexity
13 pages. v3: minor changes
Theory of Computing Systems 45(2): 188-202 (2009)
10.1007/s00224-007-9097-3
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although quantum algorithms realizing an exponential time speed-up over the best known classical algorithms exist, no quantum algorithm is known performing computation using less space resources than classical algorithms. In this paper, we study, for the first time explicitly, space-bounded quantum algorithms for computational problems where the input is given not as a whole, but bit by bit. We show that there exist such problems that a quantum computer can solve using exponentially less work space than a classical computer. More precisely, we introduce a very natural and simple model of a space-bounded quantum online machine and prove an exponential separation of classical and quantum online space complexity, in the bounded-error setting and for a total language. The language we consider is inspired by a communication problem (the set intersection function) that Buhrman, Cleve and Wigderson used to show an almost quadratic separation of quantum and classical bounded-error communication complexity. We prove that, in the framework of online space complexity, the separation becomes exponential.
[ { "version": "v1", "created": "Thu, 8 Jun 2006 04:27:30 GMT" }, { "version": "v2", "created": "Tue, 12 Dec 2006 08:16:34 GMT" }, { "version": "v3", "created": "Tue, 11 Nov 2008 06:35:49 GMT" } ]
2009-06-18T00:00:00
[ [ "Gall", "Francois Le", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0607111
P. G. L. Porta Mana
P. G. L. Porta Mana, A. M{\aa}nsson, G. Bj\"ork
`Plausibilities of plausibilities': an approach through circumstances
30 pages, 3 figures. V2: clarified some points and corrected some typos. V3: corrected typos and added references
null
null
null
quant-ph cs.AI
null
Probability-like parameters appearing in some statistical models, and their prior distributions, are reinterpreted through the notion of `circumstance', a term which stands for any piece of knowledge that is useful in assigning a probability and that satisfies some additional logical properties. The idea, which can be traced to Laplace and Jaynes, is that the usual inferential reasonings about the probability-like parameters of a statistical model can be conceived as reasonings about equivalence classes of `circumstances' - viz., real or hypothetical pieces of knowledge, like e.g. physical hypotheses, that are useful in assigning a probability and satisfy some additional logical properties - that are uniquely indexed by the probability distributions they lead to.
[ { "version": "v1", "created": "Mon, 17 Jul 2006 17:14:19 GMT" }, { "version": "v2", "created": "Mon, 31 Jul 2006 17:48:45 GMT" }, { "version": "v3", "created": "Sun, 29 Apr 2007 12:09:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Mana", "P. G. L. Porta", "" ], [ "Månsson", "A.", "" ], [ "Björk", "G.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
quant-ph/0607173
Iordanis Kerenidis
Iordanis Kerenidis, Ran Raz
The one-way communication complexity of the Boolean Hidden Matching Problem
null
null
null
null
quant-ph cs.CC
null
We give a tight lower bound of Omega(\sqrt{n}) for the randomized one-way communication complexity of the Boolean Hidden Matching Problem [BJK04]. Since there is a quantum one-way communication complexity protocol of O(\log n) qubits for this problem, we obtain an exponential separation of quantum and classical one-way communication complexity for partial functions. A similar result was independently obtained by Gavinsky, Kempe, de Wolf [GKdW06]. Our lower bound is obtained by Fourier analysis, using the Fourier coefficients inequality of Kahn Kalai and Linial [KKL88].
[ { "version": "v1", "created": "Tue, 25 Jul 2006 10:07:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Kerenidis", "Iordanis", "" ], [ "Raz", "Ran", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0607174
Julia Kempe
Dmytro Gavinsky, Julia Kempe, Ronald de Wolf
Exponential Separation of Quantum and Classical One-Way Communication Complexity for a Boolean Function
8 pages, no figures
null
null
null
quant-ph cs.CC
null
We give an exponential separation between one-way quantum and classical communication complexity for a Boolean function. Earlier such a separation was known only for a relation. A very similar result was obtained earlier but independently by Kerenidis and Raz [KR06]. Our version of the result gives an example in the bounded storage model of cryptography, where the key is secure if the adversary has a certain amount of classical storage, but is completely insecure if he has a similar amount of quantum storage.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 10:08:07 GMT" } ]
2022-03-29T00:00:00
[ [ "Gavinsky", "Dmytro", "" ], [ "Kempe", "Julia", "" ], [ "de Wolf", "Ronald", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0608026
J\'er\'emie Roland
Fr\'ed\'eric Magniez, Ashwin Nayak, J\'er\'emie Roland and Miklos Santha
Search via Quantum Walk
21 pages. Various modifications and improvements, especially in Section 4
SIAM Journal on Computing, 40(1):142-164, 2011
10.1137/090745854
null
quant-ph cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new method for designing quantum search algorithms for finding a "marked" element in the state space of a classical Markov chain. The algorithm is based on a quantum walk \'a la Szegedy (2004) that is defined in terms of the Markov chain. The main new idea is to apply quantum phase estimation to the quantum walk in order to implement an approximate reflection operator. This operator is then used in an amplitude amplification scheme. As a result we considerably expand the scope of the previous approaches of Ambainis (2004) and Szegedy (2004). Our algorithm combines the benefits of these approaches in terms of being able to find marked elements, incurring the smaller cost of the two, and being applicable to a larger class of Markov chains. In addition, it is conceptually simple and avoids some technical difficulties in the previous analyses of several algorithms based on quantum walk.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 18:43:09 GMT" }, { "version": "v2", "created": "Mon, 7 Aug 2006 18:09:10 GMT" }, { "version": "v3", "created": "Tue, 28 Nov 2006 08:57:20 GMT" }, { "version": "v4", "created": "Mon, 14 Feb 2011 21:10:39 GMT" } ]
2018-03-22T00:00:00
[ [ "Magniez", "Frédéric", "" ], [ "Nayak", "Ashwin", "" ], [ "Roland", "Jérémie", "" ], [ "Santha", "Miklos", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
quant-ph/0609028
Dan Kenigsberg
Dan Kenigsberg and Tal Mor
Secure Controlled Teleportation
3 pages, presented as a poster in AQIS'06, where A. Winter suggested considerable improvements to the main result (these suggestions are not included in this version)
null
null
null
quant-ph cs.CR
null
Several protocols for controlled teleportation were suggested by Yang, Chu, and Han [PRA 70, 022329 (2004)]. In these protocols, Alice teleports qubits (in an unknown state) to Bob iff a controller allows it. We view this problem in the perspective of secure multi-party quantum computation. We show that the suggested entanglement-efficient protocols for $m$-qubit controlled teleportation are open to cheating; Alice and Bob may teleport $(m-1)$-qubits of quantum information, out of the controllers' control. We conjecture that the straightforward protocol for controlled teleportation, which requires each controller to hold $m$ entangled qubits, is optimal. We prove this conjecture for a limited, but interesting, subset of protocols.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 03:53:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenigsberg", "Dan", "" ], [ "Mor", "Tal", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0609117
Carlo A. Trugenberger
M.Cristina Diamantini and Carlo A. Trugenberger
Quantum Pattern Retrieval by Qubit Networks with Hebb Interactions
To appear in Physical Review Letters
null
10.1103/PhysRevLett.97.130503
null
quant-ph cond-mat.dis-nn cs.NE
null
Qubit networks with long-range interactions inspired by the Hebb rule can be used as quantum associative memories. Starting from a uniform superposition, the unitary evolution generated by these interactions drives the network through a quantum phase transition at a critical computation time, after which ferromagnetic order guarantees that a measurement retrieves the stored memory. The maximum memory capacity p of these qubit networks is reached at a memory density p/n=1.
[ { "version": "v1", "created": "Fri, 15 Sep 2006 15:19:31 GMT" } ]
2009-11-13T00:00:00
[ [ "Diamantini", "M. Cristina", "" ], [ "Trugenberger", "Carlo A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
quant-ph/0609138
Cristopher Moore
Cristopher Moore and Alexander Russell
On the Impossibility of a Quantum Sieve Algorithm for Graph Isomorphism
null
null
null
null
quant-ph cs.CC math.RT
null
It is known that any quantum algorithm for Graph Isomorphism that works within the framework of the hidden subgroup problem (HSP) must perform highly entangled measurements across Omega(n log n) coset states. One of the only known models for how such a measurement could be carried out efficiently is Kuperberg's algorithm for the HSP in the dihedral group, in which quantum states are adaptively combined and measured according to the decomposition of tensor products into irreducible representations. This ``quantum sieve'' starts with coset states, and works its way down towards representations whose probabilities differ depending on, for example, whether the hidden subgroup is trivial or nontrivial. In this paper we give strong evidence that no such approach can succeed for Graph Isomorphism. Specifically, we consider the natural reduction of Graph Isomorphism to the HSP over the the wreath product S_n \wr Z_2. We show, modulo a group-theoretic conjecture regarding the asymptotic characters of the symmetric group, that no matter what rule we use to adaptively combine quantum states, there is a constant b > 0 such that no algorithm in this family can solve Graph Isomorphism in e^{b sqrt{n}} time. In particular, such algorithms are essentially no better than the best known classical algorithms, whose running time is e^{O(sqrt{n \log n})}.
[ { "version": "v1", "created": "Mon, 18 Sep 2006 20:01:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Moore", "Cristopher", "" ], [ "Russell", "Alexander", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
quant-ph/0609205
Vladimir Korepin
Vladimir E. Korepin and Brenno C. Vallilo
Group Theoretical Formulation of Quantum Partial Search Algorithm
12 pages
Prog. Theor. Phys. Vol. 116, No. 5 (2006), p. 783
10.1143/PTP.116.783
YIPT-SB-06-41
quant-ph cs.DS math.GR
null
Searching and sorting used as a subroutine in many important algorithms. Quantum algorithm can find a target item in a database faster than any classical algorithm. One can trade accuracy for speed and find a part of the database (a block) containing the target item even faster, this is partial search. An example is the following: exact address of the target item is given by a sequence of many bits, but we need to know only some of them. More generally partial search considers the following problem: a database is separated into several blocks. We want to find a block with the target item, not the target item itself. In this paper we reformulate quantum partial search algorithm in terms of group theory.
[ { "version": "v1", "created": "Wed, 27 Sep 2006 00:32:33 GMT" } ]
2009-11-13T00:00:00
[ [ "Korepin", "Vladimir E.", "" ], [ "Vallilo", "Brenno C.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
quant-ph/0609229
Igor Bjelakovic
Igor Bjelakovic, Holger Boche
Ergodic Classical-Quantum Channels: Structure and Coding Theorems
19 pages, no figures. Final version
IEEE Transactions on Information Theory Vol. 54, No. 2, pp. 723-742, February 2008
10.1109/TIT.2007.913232
null
quant-ph cs.IT math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider ergodic causal classical-quantum channels (cq-channels) which additionally have a decaying input memory. In the first part we develop some structural properties of ergodic cq-channels and provide equivalent conditions for ergodicity. In the second part we prove the coding theorem with weak converse for causal ergodic cq-channels with decaying input memory. Our proof is based on the possibility to introduce joint input-output state for the cq-channels and an application of the Shannon-McMillan theorem for ergodic quantum states. In the last part of the paper it is shown how this result implies coding theorem for the classical capacity of a class of causal ergodic quantum channels.
[ { "version": "v1", "created": "Fri, 29 Sep 2006 11:35:07 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2009 11:52:46 GMT" } ]
2016-11-18T00:00:00
[ [ "Bjelakovic", "Igor", "" ], [ "Boche", "Holger", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
quant-ph/0610153
Andreas Klappenecker
Salah A. Aly, Andreas Klappenecker, Pradeep Kiran Sarvepalli
Subsystem Codes
8 pages; 44th Allerton Conference
null
null
null
quant-ph cs.IT math.IT
null
We investigate various aspects of operator quantum error-correcting codes or, as we prefer to call them, subsystem codes. We give various methods to derive subsystem codes from classical codes. We give a proof for the existence of subsystem codes using a counting argument similar to the quantum Gilbert-Varshamov bound. We derive linear programming bounds and other upper bounds. We answer the question whether or not there exist [[n,n-2d+2,r>0,d]]<sub>q</sub> subsystem codes. Finally, we compare stabilizer and subsystem codes with respect to the required number of syndrome qudits.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 21:19:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Klappenecker", "Andreas", "" ], [ "Sarvepalli", "Pradeep Kiran", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0610200
Tomoyuki Yamakami
Tomoyuki Yamakami
Quantum List Decoding of Classical Block Codes of Polynomially Small Rate from Quantumly Corrupted Codewords
(A4 size, 10 pt, 25 pages) A complete version of an extended abstract that appeared in the Proceedings of the 13th Computing: The Australasian Theory Symposium (CATS 2007), pp.153-162, Ballarat, Australia, January 30-February 2, 2007
Baltic Journal of Modern Computing, Vol. 4 (2016), No. 4, pp. 753-788
10.22364/bjmc.2016.4.4
null
quant-ph cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a classical error-correcting block code, the task of quantum list decoding is to produce from any quantumly corrupted codeword a short list containing all messages whose codewords exhibit high "presence" in the quantumly corrupted codeword. Efficient quantum list decoders have been used to prove a quantum hardcore property of classical codes. However, the code rates of all known families of efficiently quantum list-decodable codes are, unfortunately, too small for other practical applications. To improve those known code rates, we prove that a specific code family of polynomially small code rate over a fixed code alphabet, obtained by concatenating generalized Reed-Solomon codes as outer codes with Hadamard codes as inner codes, has an efficient quantum list-decoding algorithm if its codewords have relatively high codeword presence in a given quantumly corrupted codeword. As an immediate application, we use the quantum list decodability of this code family to solve a certain form of quantum search problems in polynomial time. When the codeword presence becomes smaller, in contrast, we show that the quantum list decodability of generalized Reed-Solomon codes with high confidence is closely related to the efficient solvability of the following two problems: the noisy polynomial interpolation problem and the bounded distance vector problem. Moreover, assuming that NP is not included in BQP, we also prove that no efficient quantum list decoder exists for the generalized Reed-Solomon codes.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 14:57:40 GMT" }, { "version": "v2", "created": "Wed, 25 Oct 2006 10:18:44 GMT" }, { "version": "v3", "created": "Wed, 7 Sep 2011 02:52:01 GMT" }, { "version": "v4", "created": "Thu, 13 Oct 2016 19:50:03 GMT" }, { "version": "v5", "created": "Fri, 14 Oct 2016 16:38:13 GMT" } ]
2017-09-15T00:00:00
[ [ "Yamakami", "Tomoyuki", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0611021
Sergey Bravyi
Sergey Bravyi, Arvid J. Bessen, and Barbara M. Terhal
Merlin-Arthur Games and Stoquastic Complexity
20 pages, 2 figures (proof of AM-hardness is simplified in Section 5)
null
null
null
quant-ph cs.CC
null
MA is a class of decision problems for which `yes'-instances have a proof that can be efficiently checked by a classical randomized algorithm. We prove that MA has a natural complete problem which we call the stoquastic k-SAT problem. This is a matrix-valued analogue of the satisfiability problem in which clauses are k-qubit projectors with non-negative matrix elements, while a satisfying assignment is a vector that belongs to the space spanned by these projectors. Stoquastic k-SAT is the first non-trivial example of a MA-complete problem. We also study the minimum eigenvalue problem for local stoquastic Hamiltonians that was introduced in quant-ph/0606140, stoquastic LH-MIN. A new complexity class StoqMA is introduced so that stoquastic LH-MIN is StoqMA-complete. Lastly, we consider the average LH-MIN problem for local stoquastic Hamiltonians that depend on a random or `quenched disorder' parameter, stoquastic AV-LH-MIN. We prove that stoquastic AV-LH-MIN is contained in the complexity class \AM, the class of decision problems for which yes-instances have a randomized interactive proof with two-way communication between prover and verifier.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 01:20:42 GMT" }, { "version": "v2", "created": "Tue, 19 Dec 2006 06:31:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Bravyi", "Sergey", "" ], [ "Bessen", "Arvid J.", "" ], [ "Terhal", "Barbara M.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0611033
Ashwin Nayak
Paul A. Dickinson (1) and Ashwin Nayak (1,2) ((1) C&O and IQC, U. Waterloo, (2) Perimeter Institute)
Approximate Randomization of Quantum States With Fewer Bits of Key
18 pages, Quantum Computing Back Action, IIT Kanpur, March 2006, volume 864 of AIP Conference Proceedings, pages 18--36. Springer, New York
null
10.1063/1.2400876
null
quant-ph cs.CR
null
Randomization of quantum states is the quantum analogue of the classical one-time pad. We present an improved, efficient construction of an approximately randomizing map that uses O(d/epsilon^2) Pauli operators to map any d-dimensional state to a state that is within trace distance epsilon of the completely mixed state. Our bound is a log d factor smaller than that of Hayden, Leung, Shor, and Winter (2004), and Ambainis and Smith (2004). Then, we show that a random sequence of essentially the same number of unitary operators, chosen from an appropriate set, with high probability form an approximately randomizing map for d-dimensional states. Finally, we discuss the optimality of these schemes via connections to different notions of pseudorandomness, and give a new lower bound for small epsilon.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 17:30:51 GMT" } ]
2018-03-22T00:00:00
[ [ "Dickinson", "Paul A.", "" ], [ "Nayak", "Ashwin", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0611167
Stefano Pirandola
Stefano Pirandola, Stefano Mancini, Seth Lloyd, and Samuel L. Braunstein
Continuous Variable Quantum Cryptography using Two-Way Quantum Communication
12 pages, 7 figures, REVTeX
Nature Physics 4, 726 - 730 (2008)
10.1038/nphys1018
null
quant-ph cs.CR cs.IT math.IT physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret-key rates, even in the presence of strong losses in the quantum communication channel. Despite this robustness to loss, their security can be affected by more general attacks where extra Gaussian noise is introduced by the eavesdropper. In this general scenario we show a "hardware solution" for enhancing the security thresholds of these protocols. This is possible by extending them to a two-way quantum communication where subsequent uses of the quantum channel are suitably combined. In the resulting two-way schemes, one of the honest parties assists the secret encoding of the other with the chance of a non-trivial superadditive enhancement of the security thresholds. Such results enable the extension of quantum cryptography to more complex quantum communications.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 19:00:58 GMT" }, { "version": "v2", "created": "Sat, 1 Sep 2007 01:12:41 GMT" }, { "version": "v3", "created": "Wed, 3 Dec 2008 00:58:40 GMT" } ]
2008-12-03T00:00:00
[ [ "Pirandola", "Stefano", "" ], [ "Mancini", "Stefano", "" ], [ "Lloyd", "Seth", "" ], [ "Braunstein", "Samuel L.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.optics", "description": "Adaptive optics. Astronomical optics. Atmospheric optics. Biomedical optics. Cardinal points. Collimation. Doppler effect. Fiber optics. Fourier optics. Geometrical optics (Gradient index optics. Holography. Infrared optics. Integrated optics. Laser applications. Laser optical systems. Lasers. Light amplification. Light diffraction. Luminescence. Microoptics. Nano optics. Ocean optics. Optical computing. Optical devices. Optical imaging. Optical materials. Optical metrology. Optical microscopy. Optical properties. Optical signal processing. Optical testing techniques. Optical wave propagation. Paraxial optics. Photoabsorption. Photoexcitations. Physical optics. Physiological optics. Quantum optics. Segmented optics. Spectra. Statistical optics. Surface optics. Ultrafast optics. Wave optics. X-ray optics.", "span": "(Optics)" } ]
quant-ph/0611234
Gus Gutoski
Gus Gutoski and John Watrous
Toward a general theory of quantum games
23 pages, 12pt font, single-column compilation of STOC 2007 final version
Proceedings of STOC 2007, pages 565-574
10.1145/1250790.1250873
null
quant-ph cs.CC cs.GT
null
We study properties of quantum strategies, which are complete specifications of a given party's actions in any multiple-round interaction involving the exchange of quantum information with one or more other parties. In particular, we focus on a representation of quantum strategies that generalizes the Choi-Jamio{\l}kowski representation of quantum operations. This new representation associates with each strategy a positive semidefinite operator acting only on the tensor product of its input and output spaces. Various facts about such representations are established, and two applications are discussed: the first is a new and conceptually simple proof of Kitaev's lower bound for strong coin-flipping, and the second is a proof of the exact characterization QRG = EXP of the class of problems having quantum refereed games.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 21:05:24 GMT" }, { "version": "v2", "created": "Mon, 2 Apr 2007 19:43:20 GMT" } ]
2013-10-16T00:00:00
[ [ "Gutoski", "Gus", "" ], [ "Watrous", "John", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
quant-ph/0612014
Christian Schaffner
Ivan B. Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
21 pages; editorial changes, additional application
full version of CRYPTO 2007, LNCS 4622
null
null
quant-ph cs.CR
null
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quantum 1-out-of-2 Oblivious Transfer and quantum Bit Commitment are presented and the uncertainty relation is used to prove the security of these protocols in the bounded quantum-storage model according to new strong security definitions. As another application, we consider the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers. The uncertainty relation allows to prove the security of QKD protocols in this setting while tolerating considerably higher error rates compared to the standard model with unbounded adversaries. For instance, for the six-state protocol with one-way communication, a bit-flip error rate of up to 17% can be tolerated (compared to 13% in the standard model). Our uncertainty relation also yields a lower bound on the min-entropy key uncertainty against known-plaintext attacks when quantum ciphers are composed. Previously, the key uncertainty of these ciphers was only known with respect to Shannon entropy.
[ { "version": "v1", "created": "Sat, 2 Dec 2006 20:07:48 GMT" }, { "version": "v2", "created": "Sun, 19 Aug 2007 18:33:28 GMT" } ]
2007-08-19T00:00:00
[ [ "Damgaard", "Ivan B.", "" ], [ "Fehr", "Serge", "" ], [ "Renner", "Renato", "" ], [ "Salvail", "Louis", "" ], [ "Schaffner", "Christian", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
quant-ph/0612052
Jaeweon Lee Dr.
Jae-Weon Lee, DoYong Kwon, Jaewan Kim
Deciding whether a quantum state has secret correlations is an NP-complete problem
3 pages, revtex, no fig, typos corrected
null
null
null
quant-ph cs.IT math.IT
null
From the NP-hardness of the quantum separability problem and the relation between bipartite entanglement and the secret key correlations, it is shown that the problem deciding whether a given quantum state has secret correlations in it or not is in NP-complete.
[ { "version": "v1", "created": "Thu, 7 Dec 2006 06:54:07 GMT" }, { "version": "v2", "created": "Fri, 15 Dec 2006 05:14:56 GMT" } ]
2015-10-30T00:00:00
[ [ "Lee", "Jae-Weon", "" ], [ "Kwon", "DoYong", "" ], [ "Kim", "Jaewan", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0612107
Dave Bacon
Dave Bacon
How a Clebsch-Gordan Transform Helps to Solve the Heisenberg Hidden Subgroup Problem
30 pages, uses qic.sty
null
null
null
quant-ph cs.CC
null
It has recently been shown that quantum computers can efficiently solve the Heisenberg hidden subgroup problem, a problem whose classical query complexity is exponential. This quantum algorithm was discovered within the framework of using pretty-good measurements for obtaining optimal measurements in the hidden subgroup problem. Here we show how to solve the Heisenberg hidden subgroup problem using arguments based instead on the symmetry of certain hidden subgroup states. The symmetry we consider leads naturally to a unitary transform known as the Clebsch-Gordan transform over the Heisenberg group. This gives a new representation theoretic explanation for the pretty-good measurement derived algorithm for efficiently solving the Heisenberg hidden subgroup problem and provides evidence that Clebsch-Gordan transforms over finite groups are a new primitive in quantum algorithm design.
[ { "version": "v1", "created": "Wed, 13 Dec 2006 18:37:08 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2007 17:08:30 GMT" } ]
2007-09-20T00:00:00
[ [ "Bacon", "Dave", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
quant-ph/0612155
Fr\'ed\'eric Dupuis
Fr\'ed\'eric Dupuis, Patrick Hayden, Ke Li
A father protocol for quantum broadcast channels
Typo in statement of Theorem 4 fixed
IEEE Transactions on Information Theory 56(6)2946-2956, 2010
10.1109/TIT.2010.2046217
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol is presented. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication; in the case of unassisted transmission, the region we obtain has no independent constraint on the sum rate, only on the individual transmission rates. Regularized versions of all three rate regions are provably optimal.
[ { "version": "v1", "created": "Tue, 19 Dec 2006 20:29:06 GMT" }, { "version": "v2", "created": "Wed, 18 Apr 2007 17:46:39 GMT" }, { "version": "v3", "created": "Mon, 31 Jan 2011 09:51:18 GMT" }, { "version": "v4", "created": "Wed, 10 Oct 2012 10:27:02 GMT" } ]
2012-10-11T00:00:00
[ [ "Dupuis", "Frédéric", "" ], [ "Hayden", "Patrick", "" ], [ "Li", "Ke", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0612199
J\"urgen Koslowski
Pablo Arrighi, Gilles Dowek
Lineal: A linear-algebraic Lambda-calculus
The complementary note "On the critical pairs of a rewrite system for vector spaces" is provided in the source files. Short version : "Linear-algebraic Lambda-calculus : higher-order and confluence", Proceedings of RTA 08, Hagenberg, July 2008. LNCS 5117, 17, (2008). Long version : LMCS
Logical Methods in Computer Science, Volume 13, Issue 1 (March 17, 2017) lmcs:3203
10.23638/LMCS-13(1:8)2017
null
quant-ph cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a computational definition of the notions of vector space and bilinear functions. We use this result to introduce a minimal language combining higher-order computation and linear algebra. This language extends the Lambda-calculus with the possibility to make arbitrary linear combinations of terms alpha.t + beta.u. We describe how to "execute" this language in terms of a few rewrite rules, and justify them through the two fundamental requirements that the language be a language of linear operators, and that it be higher-order. We mention the perspectives of this work in the field of quantum computation, whose circuits we show can be easily encoded in the calculus. Finally, we prove the confluence of the entire calculus.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 17:25:56 GMT" }, { "version": "v2", "created": "Mon, 10 Mar 2008 18:14:56 GMT" }, { "version": "v3", "created": "Wed, 10 Jun 2015 15:19:44 GMT" }, { "version": "v4", "created": "Mon, 13 Mar 2017 09:42:01 GMT" }, { "version": "v5", "created": "Thu, 16 Mar 2017 08:32:19 GMT" }, { "version": "v6", "created": "Tue, 21 Mar 2017 16:23:59 GMT" } ]
2019-03-14T00:00:00
[ [ "Arrighi", "Pablo", "" ], [ "Dowek", "Gilles", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
quant-ph/0701020
Manabu Hagiwara
Manabu Hagiwara, Hideki Imai
Quantum Quasi-Cyclic LDPC Codes
18 pages, 1 figures, published in proc. of ISIT 2007, (2007 IEEE International Symposium on Information Theory)
null
10.1109/ISIT.2007.4557323
null
quant-ph cs.IT math-ph math.CO math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known as VG bound, and achieve a lower bound of the code length.
[ { "version": "v1", "created": "Fri, 5 Jan 2007 10:36:46 GMT" }, { "version": "v2", "created": "Wed, 18 Apr 2007 07:13:49 GMT" }, { "version": "v3", "created": "Thu, 13 May 2010 04:57:03 GMT" }, { "version": "v4", "created": "Sat, 28 Aug 2010 11:46:17 GMT" } ]
2016-11-18T00:00:00
[ [ "Hagiwara", "Manabu", "" ], [ "Imai", "Hideki", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
quant-ph/0701037
Andreas Klappenecker
Salah A. Aly, Andreas Klappenecker, Pradeep Kiran Sarvepalli
Quantum Convolutional Codes Derived From Reed-Solomon and Reed-Muller Codes
5 pages; updated parameters of classical (whence quantum) RM convolutional codes
null
null
null
quant-ph cs.IT math.IT
null
Convolutional stabilizer codes promise to make quantum communication more reliable with attractive online encoding and decoding algorithms. This paper introduces a new approach to convolutional stabilizer codes based on direct limit constructions. Two families of quantum convolutional codes are derived from generalized Reed-Solomon codes and from Reed- Muller codes. A Singleton bound for pure convolutional stabilizer codes is given.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 04:29:03 GMT" }, { "version": "v2", "created": "Mon, 22 Jan 2007 17:14:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Klappenecker", "Andreas", "" ], [ "Sarvepalli", "Pradeep Kiran", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0701113
Daniel Lehmann
Daniel Lehmann
A presentation of Quantum Logic based on an "and then" connective
28 pages. Submitted
Journal of Logic and Computation 18 (1): 59-76 Feb. 2008
10.1093/logcom/exm054
Short version in Leibniz Center, School of Engineering, Hebrew U. TR-2007-1
quant-ph cs.LO math.LO
null
When a physicist performs a quantic measurement, new information about the system at hand is gathered. This paper studies the logical properties of how this new information is combined with previous information. It presents Quantum Logic as a propositional logic under two connectives: negation and the "and then" operation that combines old and new information. The "and then" connective is neither commutative nor associative. Many properties of this logic are exhibited, and some small elegant subset is shown to imply all the properties considered. No independence or completeness result is claimed. Classical physical systems are exactly characterized by the commutativity, the associativity, or the monotonicity of the "and then" connective. Entailment is defined in this logic and can be proved to be a partial order. In orthomodular lattices, the operation proposed by Finch (1969) satisfies all the properties studied in this paper. All properties satisfied by Finch's operation in modular lattices are valid in Hilbert Space Quantum Logic. It is not known whether all properties of Hilbert Space Quantum Logic are satisfied by Finch's operation in modular lattices. Non-commutative, non-associative algebraic structures generalizing Boolean algebras are defined, ideals are characterized and a homomorphism theorem is proved.
[ { "version": "v1", "created": "Tue, 16 Jan 2007 17:55:20 GMT" } ]
2008-02-24T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
quant-ph/0701168
Romain All\'eaume
Romain All\'eaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger
Using quantum key distribution for cryptographic purposes: a survey
Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81
Theoretical Computer Science, 560 (2014), pp. 62-81
null
null
quant-ph cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 14:25:32 GMT" }, { "version": "v2", "created": "Wed, 3 Dec 2014 18:07:36 GMT" }, { "version": "v3", "created": "Thu, 4 Dec 2014 23:28:28 GMT" } ]
2014-12-10T00:00:00
[ [ "Alléaume", "Romain", "" ], [ "Branciard", "Cyril", "" ], [ "Bouda", "Jan", "" ], [ "Debuisschert", "Thierry", "" ], [ "Dianati", "Mehrdad", "" ], [ "Gisin", "Nicolas", "" ], [ "Godfrey", "Mark", "" ], [ "Grangier", "Philippe", "" ], [ "Langer", "Thomas", "" ], [ "Lutkenhaus", "Norbert", "" ], [ "Monyk", "Christian", "" ], [ "Painchault", "Philippe", "" ], [ "Peev", "Momtchil", "" ], [ "Poppe", "Andreas", "" ], [ "Pornin", "Thomas", "" ], [ "Rarity", "John", "" ], [ "Renner", "Renato", "" ], [ "Ribordy", "Gregoire", "" ], [ "Riguidel", "Michel", "" ], [ "Salvail", "Louis", "" ], [ "Shields", "Andrew", "" ], [ "Weinfurter", "Harald", "" ], [ "Zeilinger", "Anton", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
quant-ph/0701171
Paola Zizzi
Paola A. Zizzi
Turning the Liar paradox into a metatheorem of Basic logic
12 pages, 1 figure, submitted to CIE 2007. The subject of Section 4, formerly devoted to the conclusions, has been changed, and is about a generalized version of self-reference
null
null
null
quant-ph cs.LO math.LO
null
We show that self-reference can be formalized in Basic logic by means of the new connective @, called "entanglement". In fact, the property of non-idempotence of the connective @ is a metatheorem, which states that a self-entangled sentence loses its own identity. This prevents having self-referential paradoxes in the corresponding metalanguage. In this context, we introduce a generalized definition of self-reference, which is needed to deal with the multiplicative connectives of substructural logics.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 18:36:47 GMT" }, { "version": "v2", "created": "Wed, 28 Mar 2007 11:53:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Zizzi", "Paola A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]