Skip to main content

Showing 1–46 of 46 results for author: Høyer, P

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2204.09076  [pdf, ps, other

    quant-ph

    Spatial Search via Memoryless Walk with Selfloop

    Authors: Peter Høyer, Janet Leahy

    Abstract: The defining feature of memoryless quantum walks is that they operate on the vertex space of a graph, and therefore can be used to produce search algorithms with minimal memory. We present a memoryless walk that can find a unique marked vertex on a two-dimensional grid. Our walk is based on the construction proposed by Falk, which tessellates the grid with squares of size $2 \times 2$. Our walk us… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: 35 pages, 1 figure

  2. Tight Bound for Estimating Expectation Values from a System of Linear Equations

    Authors: Abhijeet Alase, Robert R. Nerem, Mohsen Bagherimehrab, Peter Høyer, Barry C. Sanders

    Abstract: The System of Linear Equations Problem (SLEP) is specified by a complex invertible matrix $A$, the condition number $κ$ of $A$, a vector $b$, a Hermitian matrix $M$ and an accuracy $ε$, and the task is to estimate $x^\dagger Mx$, where $x$ is the solution vector to the equation $Ax = b$. We aim to establish a lower bound on the complexity of the end-to-end quantum algorithms for SLEP with respect… ▽ More

    Submitted 3 September, 2022; v1 submitted 19 November, 2021; originally announced November 2021.

    Comments: 24 pages

    Journal ref: Phys. Rev. Research, Vol 4, page 023237, 2022

  3. arXiv:2012.05233  [pdf, ps, other

    quant-ph cs.CC

    The Role of Symmetry in Quantum Query-to-Communication Simulation

    Authors: Sourav Chakraborty, Arkadev Chattopadhyay, Peter Høyer, Nikhil S. Mande, Manaswi Paraashar, Ronald de Wolf

    Abstract: Buhrman, Cleve and Wigderson (STOC'98) showed that for every Boolean function f : {-1,1}^n to {-1,1} and G in {AND_2, XOR_2}, the bounded-error quantum communication complexity of the composed function f o G equals O(Q(f) log n), where Q(f) denotes the bounded-error quantum query complexity of f. This is achieved by Alice running the optimal quantum query algorithm for f, using a round of O(log n)… ▽ More

    Submitted 25 April, 2023; v1 submitted 9 December, 2020; originally announced December 2020.

    Comments: 37 pages. This is a merger of two papers that appeared in CCC'20 (10.4230/LIPIcs.CCC.2020.32) and STACS'22 (10.4230/LIPIcs.STACS.2022.20)

  4. Analysis of Lackadaisical Quantum Walks

    Authors: Peter Høyer, Zhan Yu

    Abstract: The lackadaisical quantum walk is a quantum analogue of the lazy random walk obtained by adding a self-loop to each vertex in the graph. We analytically prove that lackadaisical quantum walks can find a unique marked vertex on any regular locally arc-transitive graph with constant success probability quadratically faster than the hitting time. This result proves several speculations and numerical… ▽ More

    Submitted 13 November, 2020; v1 submitted 25 February, 2020; originally announced February 2020.

    Comments: 17 pages, 3 figures

    Journal ref: Quantum Information and Computation, Vol. 20, No. 13-14 (2020) 1137-1152

  5. Provably secure key establishment against quantum adversaries

    Authors: Aleksandrs Belovs, Gilles Brassard, Peter Hoyer, Marc Kaplan, Sophie Laplante, Louis Salvail

    Abstract: At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment capable of protecting quantum and classical legitimate parties unconditionally against a quantum eavesdropper in the query complexity model. Unfortunately, our security proofs were unsatisfactory from a cryptographically meaningful perspective because they were sound only in a worst-case scenario. Her… ▽ More

    Submitted 28 April, 2017; v1 submitted 26 April, 2017; originally announced April 2017.

    Comments: 22 pages, no figures, fixes a problem with arXiv:1108.2316v2. Will appear in the Proceedings of the 12th Conference on Theory of Quantum Computation, Communication and Cryptography (TQC), Paris, June 2017. The only change in v2 is that there was a problem with the affiliations in v1

    Journal ref: Proceedings of 12th Conference on Theory of Quantum Computation, Communication and Cryptography (TQC), Paris, June 2017

  6. Efficient quantum walk on the grid with multiple marked elements

    Authors: Peter Hoyer, Mojtaba Komeili

    Abstract: We give a quantum algorithm for finding a marked element on the grid when there are multiple marked elements. Our algorithm uses quadratically fewer steps than a random walk on the grid, ignoring logarithmic factors. This is the first known quantum walk that finds a marked element in a number of steps less than the square-root of the extended hitting time. We also give a new tighter upper bound on… ▽ More

    Submitted 28 December, 2016; originally announced December 2016.

    Comments: 18 pages, to appear in STACS 2017, the 34th International Symposium on Theoretical Aspects of Computer Science

    ACM Class: F.1.2; F.2.2; G.2.2

    Journal ref: 34th Symposium on Theoretical Aspects of Computer Science (STACS), vol 66 of LIPIcs, pp. 42:1-42:14, 2017

  7. Contextuality in multipartite pseudo-telepathy graph games

    Authors: Anurag Anshu, Peter Hoyer, Mehdi Mhalla, Simon Perdrix

    Abstract: Analyzing pseudo-telepathy graph games, we propose a way to build contextuality scenarios exhibiting the quantum supremacy using graph states. We consider the combinatorial structures that generate equivalent scenarios. We introduce a new tool called multipartiteness width to investigate which scenarios are harder to decompose and show that there exist graphs generating scenarios with a linear mul… ▽ More

    Submitted 24 June, 2017; v1 submitted 30 September, 2016; originally announced September 2016.

    Journal ref: Journal of Computer and System Sciences, Vol 107, Feb 2020, Pp 156-165

  8. Polynomial time quantum algorithms for certain bivariate hidden polynomial problems

    Authors: Thomas Decker, Peter Hoyer, Gabor Ivanyos, Miklos Santha

    Abstract: We present a new method for solving the hidden polynomial graph problem (HPGP) which is a special case of the hidden polynomial problem (HPP). The new approach yields an efficient quantum algorithm for the bivariate HPGP even when the input consists of several level set superpositions, a more difficult version of the problem than the one where the input is given by an oracle. For constant degree,… ▽ More

    Submitted 8 October, 2013; v1 submitted 7 May, 2013; originally announced May 2013.

    Comments: Theorem numbering changed; new subsection with a high-level description of the main algorithm

    Journal ref: Quantum Information and Computation 14 (2014), 790-806

  9. Gaussian quantum computation with oracle-decision problems

    Authors: Mark Adcock, Peter Hoyer, Barry C. Sanders

    Abstract: We study a simple-harmonic-oscillator quantum computer solving oracle decision problems. We show that such computers can perform better by using nonorthogonal Gaussian wave functions rather than orthogonal top-hat wave functions as input to the information encoding process. Using the Deutsch-Jozsa problem as an example, we demonstrate that Gaussian modulation with optimized width parameter results… ▽ More

    Submitted 5 June, 2012; originally announced June 2012.

    Comments: RevTeX4, 10 pages with 4 figures

    Journal ref: Quantum Information Processing 12(4), 1759-1779 (2013)

  10. Quantum Nonlocal Boxes Exhibit Stronger Distillability

    Authors: Peter Høyer, Jibran Rashid

    Abstract: The hypothetical nonlocal box (\textsf{NLB}) proposed by Popescu and Rohrlich allows two spatially separated parties, Alice and Bob, to exhibit stronger than quantum correlations. If the generated correlations are weak, they can sometimes be distilled into a stronger correlation by repeated applications of the \textsf{NLB}. Motivated by the limited distillability of \textsf{NLB}s, we initiate here… ▽ More

    Submitted 20 April, 2012; originally announced April 2012.

    Comments: 25 pages, 7 figures

    Journal ref: Mod. Phys. Lett. A, Vol. 28, No. 17 (2013) 1330012

  11. Quantum Computation with Coherent Spin States and the Close Hadamard Problem

    Authors: Mark Adcock, Peter Hoyer, Barry C. Sanders

    Abstract: We study a model of quantum computation based on the continuously-parameterized yet finite-dimensional Hilbert space of a spin system. We explore the computational powers of this model by analyzing a pilot problem we refer to as the close Hadamard problem. We prove that the close Hadamard problem can be solved in the spin system model with arbitrarily small error probability in a constant number o… ▽ More

    Submitted 7 January, 2016; v1 submitted 6 December, 2011; originally announced December 2011.

    Comments: RevTeX4, 13 pages with 8 figures. Accepted for publication in Quantum Information Processing. Article number: s11128-015-1229-0

    Journal ref: Quantum Information Processing (2016) Vol. 15, issue 4, pp. 1361-1386, April 2016

  12. arXiv:1108.2316  [pdf, ps, other

    quant-ph

    Key establishment à la Merkle in a quantum world

    Authors: Gilles Brassard, Peter Hoyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail

    Abstract: In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of… ▽ More

    Submitted 12 February, 2015; v1 submitted 10 August, 2011; originally announced August 2011.

    Comments: 32 pages, this is a December 2014 much improved and extended version of our paper "Merkle puzzles in a quantum world" from the Proceedings of CRYPTO 2011, pp. 391-410

  13. Improved Error Bounds for the Adiabatic Approximation

    Authors: Donny Cheung, Peter Hoyer, Nathan Wiebe

    Abstract: Since the discovery of adiabatic quantum computing, a need has arisen for rigorously proven bounds for the error in the adiabatic approximation. We present in this paper, a rigorous and elementary derivation of upper and lower bounds on the error incurred from using the adiabatic approximation for quantum systems. Our bounds are often asymptotically tight in the limit of slow evolution for fixed H… ▽ More

    Submitted 21 March, 2011; originally announced March 2011.

    Journal ref: J. Phys. A: Math. Theor. 44 415302 (2011)

  14. Simulating Quantum Dynamics On A Quantum Computer

    Authors: Nathan Wiebe, Dominic W. Berry, Peter Hoyer, Barry C. Sanders

    Abstract: We present efficient quantum algorithms for simulating time-dependent Hamiltonian evolution of general input states using an oracular model of a quantum computer. Our algorithms use either constant or adaptively chosen time steps and are significant because they are the first to have time-complexities that are comparable to the best known methods for simulating time-independent Hamiltonian evoluti… ▽ More

    Submitted 27 May, 2011; v1 submitted 15 November, 2010; originally announced November 2010.

    Comments: Paper modified from previous version to enhance clarity. Comments are welcome

    Journal ref: J. Phys. A: Math. Theor. 44, 445308 (2011)

  15. Optimal Protocols for Nonlocality Distillation

    Authors: Peter Hoyer, Jibran Rashid

    Abstract: Forster, Winkler, and Wolf recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)]. We first show that their protocol is optimal among all non-adaptive protocols. We next consider adaptive protocols. We show that the depth 2 protocol of Allcock et al. [Phys. Rev. A 80, 062107, (2009)] p… ▽ More

    Submitted 8 September, 2010; originally announced September 2010.

    Comments: RevTeX4, 6 pages with 4 figures

    Journal ref: Phys. Rev. A 82, 042118 (2010) [6 pages]

  16. On continuous variable quantum algorithms for oracle identification problems

    Authors: Mark Adcock, Peter Hoyer, Barry C. Sanders

    Abstract: We establish a framework for oracle identification problems in the continuous variable setting, where the stated problem necessarily is the same as in the discrete variable case, and continuous variables are manifested through a continuous representation in an infinite-dimensional Hilbert space. We apply this formalism to the Deutsch-Jozsa problem and show that, due to an uncertainty relation be… ▽ More

    Submitted 18 December, 2008; originally announced December 2008.

    Comments: RevTeX4, 15 pages with 10 figures

    Journal ref: New Journal of Physics 11: 103035 (24 pp.), 21 October 2009

  17. Higher Order Decompositions of Ordered Operator Exponentials

    Authors: Nathan Wiebe, Dominic W. Berry, Peter Hoyer, Barry C. Sanders

    Abstract: We present a decomposition scheme based on Lie-Trotter-Suzuki product formulae to represent an ordered operator exponential as a product of ordinary operator exponentials. We provide a rigorous proof that does not use a time-displacement superoperator, and can be applied to non-analytic functions. Our proof provides explicit bounds on the error and includes cases where the functions are not infi… ▽ More

    Submitted 4 December, 2008; v1 submitted 2 December, 2008; originally announced December 2008.

    Comments: 16 pages, 1 figure

    MSC Class: 81Q15

    Journal ref: J. Phys. A: Math. Theor. 43, 065203 (2010)

  18. Exact quantum lower bound for Grover's problem

    Authors: Catalin Dohotaru, Peter Hoyer

    Abstract: One of the most important quantum algorithms ever discovered is Grover's algorithm for searching an unordered set. We give a new lower bound in the query model which proves that Grover's algorithm is exactly optimal. Similar to existing methods for proving lower bounds, we bound the amount of information we can gain from a single oracle query, but we bound this information in terms of angles. Th… ▽ More

    Submitted 20 October, 2008; originally announced October 2008.

    Comments: 7 pages, no figures

    Journal ref: Quantum Information and Computation 9(5-6): 533 - 540, 1 May 2009

  19. Negative weights make adversaries stronger

    Authors: Peter Hoyer, Troy Lee, Robert Spalek

    Abstract: The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has application to classical complexity in formula size lower bounds, and is versatile with equivalent formulations in terms of weight schemes, eigenvalues, and Kolmogorov complexity. All these formulations rely on the princi… ▽ More

    Submitted 24 April, 2007; v1 submitted 4 November, 2006; originally announced November 2006.

    Comments: 29 pages, v2: added automorphism principle, extended to non-boolean functions, simplified examples, added matching upper bound for ADV

    Journal ref: Proceedings of 39th Annual Symposium on Theory of Computing (STOC), San Diego, California, pp. 526-535, 2007

  20. arXiv:quant-ph/0509153  [pdf, ps, other

    quant-ph

    Lower Bounds on Quantum Query Complexity

    Authors: Peter Hoyer, Robert Spalek

    Abstract: Shor's and Grover's famous quantum algorithms for factoring and searching show that quantum computers can solve certain computational problems significantly faster than any classical computer. We discuss here what quantum computers_cannot_ do, and specifically how to prove limits on their computational power. We cover the main known techniques for proving lower bounds, and exemplify and compare… ▽ More

    Submitted 21 September, 2005; originally announced September 2005.

    Comments: survey, 23 pages

    Journal ref: Bulletin of the European Association for Theoretical Computer Science, Volume 87, pp. 78-103, Oct. 2005

  21. arXiv:quant-ph/0509067  [pdf, ps, other

    quant-ph

    Tight adversary bounds for composite functions

    Authors: Peter Hoyer, Troy Lee, Robert Spalek

    Abstract: The quantum adversary method is a versatile method for proving lower bounds on quantum algorithms. It yields tight bounds for many computational problems, is robust in having many equivalent formulations, and has natural connections to classical lower bounds. A further nice property of the adversary method is that it behaves very well with respect to composition of functions. We generalize the a… ▽ More

    Submitted 11 September, 2006; v1 submitted 9 September, 2005; originally announced September 2005.

    Comments: 10 pages, v2: simplified the proof and added an application, v3: fixed a proof

  22. Multipartite Nonlocal Quantum Correlations Resistant to Imperfections

    Authors: H. Buhrman, P. Hoyer, S. Massar, H. Roehrig

    Abstract: We use techniques for lower bounds on communication to derive necessary conditions in terms of detector efficiency or amount of super-luminal communication for being able to reproduce with classical local hidden-variable theories the quantum correlations occurring in EPR-type experiments in the presence of noise. We apply our method to an example involving n parties sharing a GHZ-type state on w… ▽ More

    Submitted 18 October, 2004; originally announced October 2004.

    Journal ref: Phys. Rev. A, 73(1) 012321 (9 pp.) Jan 2006

  23. arXiv:quant-ph/0404076  [pdf, ps, other

    quant-ph

    Consequences and Limits of Nonlocal Strategies

    Authors: Richard Cleve, Peter Hoyer, Ben Toner, John Watrous

    Abstract: This paper investigates the powers and limitations of quantum entanglement in the context of cooperative games of incomplete information. We give several examples of such nonlocal games where strategies that make use of entanglement outperform all possible classical strategies. One implication of these examples is that entanglement can profoundly affect the soundness property of two-prover inter… ▽ More

    Submitted 11 January, 2010; v1 submitted 12 April, 2004; originally announced April 2004.

    Comments: 25 pages

  24. Quantum query complexity of some graph problems

    Authors: Christoph Durr, Mark Heiligman, Peter Hoyer, Mehdi Mhalla

    Abstract: Quantum algorithms for graph problems are considered, both in the adjacency matrix model and in an adjacency list-like array model. We give almost tight lower and upper bounds for the bounded error quantum query complexity of Connectivity, Strong Connectivity, Minimum Spanning Tree, and Single Source Shortest Paths. For example we show that the query complexity of Minimum Spanning Tree is in The… ▽ More

    Submitted 8 June, 2004; v1 submitted 15 January, 2004; originally announced January 2004.

    Comments: 7 figures. Subsumes and replaces quant-ph/9607014, quant-ph/0303131, and quant-ph/0303169

    Journal ref: SIAM J. Comput., 35(6), 1310-1328 (19 pages), 2006

  25. The quantum query complexity of the hidden subgroup problem is polynomial

    Authors: Mark Ettinger, Peter Hoyer, Emanuel Knill

    Abstract: We present a quantum algorithm which identifies with certainty a hidden subgroup of an arbitrary finite group G in only a polynomial (in log |G|) number of calls to the oracle. This is exponentially better than the best classical algorithm. However our quantum algorithm requires exponential time, as in the classical case. Our algorithm utilizes a new technique for constructing error-free algorit… ▽ More

    Submitted 14 January, 2004; originally announced January 2004.

    Comments: To appear in Information Processing Letters (IPL)

    Journal ref: Information Processing Letters, 91(1), 43-48, 16 July 2004

  26. Quantum Search on Bounded-Error Inputs

    Authors: Peter Hoyer, Michele Mosca, Ronald de Wolf

    Abstract: Suppose we have n algorithms, quantum or classical, each computing some bit-value with bounded error probability. We describe a quantum algorithm that uses O(sqrt{n}) repetitions of the base algorithms and with high probability finds the index of a 1-bit among these n bits (if there is such an index). This shows that it is not necessary to first significantly reduce the error probability in the… ▽ More

    Submitted 14 April, 2003; v1 submitted 7 April, 2003; originally announced April 2003.

    Comments: 9 pages Latex. To appear in Proceedings of ICALP 03. 2nd version: corrected affiliation of 2nd author (no other changes)

    Journal ref: 30th Intl. Colloquium on Automata, Languages, and Programming (ICALP), LNCS 2719, pp. 291-299, 2003

  27. Combinatorics and Quantum Nonlocality

    Authors: Harry Buhrman, Peter Hoyer, Serge Massar, Hein Roehrig

    Abstract: We use techniques for lower bounds on communication to derive necessary conditions (in terms of detector efficiency or amount of super-luminal communication) for being able to reproduce the quantum correlations occurring in EPR-type experiments with classical local hidden-variable theories. As an application, we consider n parties sharing a GHZ-type state and show that the amount of super-lumina… ▽ More

    Submitted 28 May, 2003; v1 submitted 6 September, 2002; originally announced September 2002.

    Comments: added author; minor corrections; accepted for publication in PRL

    Journal ref: Phys. Rev. Lett. 91, 047903 (2003)

  28. Quantum Circuits with Unbounded Fan-out

    Authors: Peter Hoyer, Robert Spalek

    Abstract: We demonstrate that the unbounded fan-out gate is very powerful. Constant-depth polynomial-size quantum circuits with bounded fan-in and unbounded fan-out over a fixed basis (denoted by QNCf^0) can approximate with polynomially small error the following gates: parity, mod[q], And, Or, majority, threshold[t], exact[q], and Counting. Classically, we need logarithmic depth even if we can use unboun… ▽ More

    Submitted 18 May, 2005; v1 submitted 7 August, 2002; originally announced August 2002.

    Comments: 20 pages, 9 figures, STACS'2003. v3: rewritten from scratch, new co-author, everything put into constant depth (including quantum Fourier transform). v4: polished a lot

    Journal ref: Theory of Computing, 1(5):81-103, 2005

  29. Improved Quantum Communication Complexity Bounds for Disjointness and Equality

    Authors: Peter Hoyer, Ronald de Wolf

    Abstract: We prove new bounds on the quantum communication complexity of the disjointness and equality problems. For the case of exact and non-deterministic protocols we show that these complexities are all equal to n+1, the previous best lower bound being n/2. We show this by improving a general bound for non-deterministic protocols of de Wolf. We also give an O(sqrt{n}c^{log^* n})-qubit bounded-error pr… ▽ More

    Submitted 14 September, 2001; originally announced September 2001.

    Comments: 11 pages LaTeX

    Journal ref: 19th Annual Symposium on Theoretical Aspects of Computer Science, STACS 2002, LNCS 2285, pp. 299-310, 2002

  30. Quantum complexities of ordered searching, sorting, and element distinctness

    Authors: Peter Hoyer, Jan Neerbek, Yaoyun Shi

    Abstract: We consider the quantum complexities of the following three problems: searching an ordered list, sorting an un-ordered list, and deciding whether the numbers in a list are all distinct. Letting N be the number of elements in the input list, we prove a lower bound of \frac{1}π(\ln(N)-1) accesses to the list elements for ordered searching, a lower bound of Ω(N\log{N}) binary comparisons for sortin… ▽ More

    Submitted 27 April, 2001; v1 submitted 15 February, 2001; originally announced February 2001.

    Comments: This new version contains new results. To appear at ICALP '01. Some of the results have previously been presented at QIP '01. This paper subsumes the papers quant-ph/0009091 and quant-ph/0009032

    Journal ref: 28th ICALP, LNCS 2076, pp. 346-357, July 2001

  31. arXiv:quant-ph/0009032  [pdf, ps, other

    quant-ph

    Bounds on quantum ordered searching

    Authors: Peter Hoyer, Jan Neerbek

    Abstract: We prove that any exact quantum algorithm searching an ordered list of N elements requires more than \frac{1}π(\ln(N)-1) queries to the list. This improves upon the previously best known lower bound of {1/12}\log_2(N) - O(1). Our proof is based on a weighted all-pairs inner product argument, and it generalizes to bounded-error quantum algorithms. The currently best known upper bound for exac… ▽ More

    Submitted 27 April, 2001; v1 submitted 8 September, 2000; originally announced September 2000.

    Comments: This paper has been merged with another paper. See quant-ph/0102078. Except for this comment v2 is unchanged compared to v1. 12 pages, 1 figure

  32. Quantum Algorithms for Element Distinctness

    Authors: Harry Buhrman, Christoph Durr, Mark Heiligman, Peter Hoyer, Frederic Magniez, Miklos Santha, Ronald de Wolf

    Abstract: We present several applications of quantum amplitude amplification to finding claws and collisions in ordered or unordered functions. Our algorithms generalize those of Brassard, Hoyer, and Tapp, and imply an O(N^{3/4} log N) quantum upper bound for the element distinctness problem in the comparison complexity model (contrasting with Theta(N log N) classical complexity). We also prove a lower bo… ▽ More

    Submitted 1 September, 2000; v1 submitted 6 July, 2000; originally announced July 2000.

    Comments: 15 pages. Supersedes quant-ph/007016v1 and quant-ph/0006136

    Journal ref: SIAM Journal on Computing, 34(6), 1324-1330, 2005

  33. On Arbitrary Phases in Quantum Amplitude Amplification

    Authors: Peter Hoyer

    Abstract: We consider the use of arbitrary phases in quantum amplitude amplification which is a generalization of quantum searching. We prove that the phase condition in amplitude amplification is given by $\tan(\varphi/2) = \tan(φ/2)(1-2a)$, where $φ$ and $φ$ are the phases used and where $a$ is the success probability of the given algorithm. Thus the choice of phases depends nontrivially and nonlinearly… ▽ More

    Submitted 7 June, 2000; originally announced June 2000.

    Comments: 6 pages, 1 figure

    Journal ref: Phys. Rev. A 62(5), 052304 (5 pp.), Oct 2000

  34. Quantum Amplitude Amplification and Estimation

    Authors: Gilles Brassard, Peter Hoyer, Michele Mosca, Alain Tapp

    Abstract: Consider a Boolean function $χ: X \to \{0,1\}$ that partitions set $X$ between its good and bad elements, where $x$ is good if $χ(x)=1$ and bad otherwise. Consider also a quantum algorithm $\mathcal A$ such that $A |0\rangle= \sum_{x\in X} α_x |x\rangle$ is a quantum superposition of the elements of $X$, and let $a$ denote the probability that a good element is produced if $A |0\rangle$ is measu… ▽ More

    Submitted 15 May, 2000; originally announced May 2000.

    Comments: 32 pages, no figures

    Journal ref: Quantum Computation and Quantum Information, Samuel J. Lomonaco, Jr. (editor), AMS Contemporary Mathematics, 305:53-74, 2002

  35. arXiv:quant-ph/9905099  [pdf, ps, other

    quant-ph

    Quantum State Detection Via Elimination

    Authors: J. Mark Ettinger, Peter Hoyer

    Abstract: We present the view of quantum algorithms as a search-theoretic problem. We show that the Fourier transform, used to solve the Abelian hidden subgroup problem, is an example of an efficient elimination observable which eliminates a constant fraction of the candidate secret states with high probability. Finally, we show that elimination observables do not always exist by considering the geometry… ▽ More

    Submitted 28 May, 1999; originally announced May 1999.

    Comments: 8 pages, no figures

    Report number: LAUR-992667

  36. arXiv:quant-ph/9901034  [pdf, ps, other

    quant-ph

    Hidden Subgroup States are Almost Orthogonal

    Authors: Mark Ettinger, Peter Hoyer, Emanuel Knill

    Abstract: It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm… ▽ More

    Submitted 14 January, 1999; originally announced January 1999.

    Comments: 5 pages, no figures

  37. arXiv:quant-ph/9901029  [pdf, ps, other

    quant-ph

    A Quantum Observable for the Graph Isomorphism Problem

    Authors: Mark Ettinger, Peter Hoyer

    Abstract: Suppose we are given two graphs on $n$ vertices. We define an observable in the Hilbert space $\Co[(S_n \wr S_2)^m]$ which returns the answer ``yes'' with certainty if the graphs are isomorphic and ``no'' with probability at least $1-n!/2^m$ if the graphs are not isomorphic. We do not know if this observable is efficiently implementable.

    Submitted 13 January, 1999; originally announced January 1999.

    Comments: 5 pages, no figures

    Report number: LA-UR-99-179

  38. On Quantum Algorithms for Noncommutative Hidden Subgroups

    Authors: Mark Ettinger, Peter Hoyer

    Abstract: Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. We present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of… ▽ More

    Submitted 10 July, 1998; originally announced July 1998.

    Comments: 13 pages, no figures, LaTeX2e

    Report number: LA-UR-98-2010 (May 6, 1998)

    Journal ref: Proceedings of 16th Annual Symposium on Theoretical Aspects of Computer Science (STACS), Trier, Germany, pp. 478-487, 1999

  39. Quantum Counting

    Authors: Gilles Brassard, Peter Hoyer, Alain Tapp

    Abstract: We study some extensions of Grover's quantum searching algorithm. First, we generalize the Grover iteration in the light of a concept called amplitude amplification. Then, we show that the quadratic speedup obtained by the quantum searching algorithm over classical brute force can still be obtained for a large family of search problems for which good classical heuristics exist. Finally, as our m… ▽ More

    Submitted 27 May, 1998; originally announced May 1998.

    Comments: 12 pages, LaTeX2e

    Journal ref: 25th Intl. Colloquium on Automata, Languages, and Programming (ICALP), LNCS 1443, pp. 820-831, 1998

  40. Multiparty Quantum Communication Complexity

    Authors: Harry Buhrman, Wim van Dam, Peter Hoyer, Alain Tapp

    Abstract: Quantum entanglement cannot be used to achieve direct communication between remote parties, but it can reduce the communication needed for some problems. Let each of k parties hold some partial input data to some fixed k-variable function f. The communication complexity of f is the minimum number of classical bits required to be broadcasted for every party to know the value of f on their inputs.… ▽ More

    Submitted 3 June, 1999; v1 submitted 22 October, 1997; originally announced October 1997.

    Comments: 8 pages, LaTeX2e, no figures; new result and author added

    Journal ref: Phys.Rev. A60 (1999) 2737-2741

  41. Quantum Algorithm for the Collision Problem

    Authors: Gilles Brassard, Peter Hoyer, Alain Tapp

    Abstract: In this note, we give a quantum algorithm that finds collisions in arbitrary r-to-one functions after only O((N/r)^(1/3)) expected evaluations of the function. Assuming the function is given by a black box, this is more efficient than the best possible classical algorithm, even allowing probabilism. We also give a similar algorithm for finding claws in pairs of functions. Furthermore, we exhibit… ▽ More

    Submitted 1 May, 1997; originally announced May 1997.

    Comments: 8 pages, LaTeX2e

    Journal ref: Third Latin American Symp. on Theoretical Informatics (LATIN'98), pp. 163-169, 1998. LNCS 1380

  42. An Exact Quantum Polynomial-Time Algorithm for Simon's Problem

    Authors: Gilles Brassard, Peter Hoyer

    Abstract: We investigate the power of quantum computers when they are required to return an answer that is guaranteed to be correct after a time that is upper-bounded by a polynomial in the worst case. We show that a natural generalization of Simon's problem can be solved in this way, whereas previous algorithms required quantum polynomial time in the expected sense only, without upper bounds on the worst… ▽ More

    Submitted 14 April, 1997; originally announced April 1997.

    Comments: 12 pages, LaTeX2e, no figures. To appear in Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems (ISTCS'97)

    Journal ref: Fifth Israeli Symposium on Theory of Computing and Systems (ISTCS'97), pp. 12-23, June 1997

  43. arXiv:quant-ph/9702028  [pdf, ps, other

    quant-ph

    Efficient Quantum Transforms

    Authors: Peter Hoyer

    Abstract: Quantum mechanics requires the operation of quantum computers to be unitary, and thus makes it important to have general techniques for develo** fast quantum algorithms for computing unitary transforms. A quantum routine for computing a generalized Kronecker product is given. Applications include re-development of the networks for computing the Walsh-Hadamard and the quantum Fourier transform.… ▽ More

    Submitted 11 February, 1997; originally announced February 1997.

    Comments: 30 pages, LaTeX2e, 7 figures included

  44. arXiv:quant-ph/9612017  [pdf, ps, other

    quant-ph

    On The Power of Exact Quantum Polynomial Time

    Authors: Gilles Brassard, Peter Hoyer

    Abstract: We investigate the power of quantum computers when they are required to return an answer that is guaranteed correct after a time that is upper-bounded by a polynomial in the worst case. In an oracle setting, it is shown that such machines can solve problems that would take exponential time on any classical bounded-error probabilistic computer.

    Submitted 3 December, 1996; originally announced December 1996.

    Comments: 10 pages, LaTeX2e, no figures

  45. arXiv:quant-ph/9607014  [pdf, ps, other

    quant-ph cs.DS

    A Quantum Algorithm for Finding the Minimum

    Authors: Christoph Durr, Peter Hoyer

    Abstract: We give a quantum algorithm to find the index y in a table T of size N such that in time O(c sqrt N), T[y] is minimum with probability at least 1-1/2^c.

    Submitted 7 January, 1999; v1 submitted 18 July, 1996; originally announced July 1996.

    Comments: 2 pages

  46. Tight bounds on quantum searching

    Authors: Michel Boyer, Gilles Brassard, Peter Hoeyer, Alain Tapp

    Abstract: We provide a tight analysis of Grover's recent algorithm for quantum database searching. We give a simple closed-form formula for the probability of success after any given number of iterations of the algorithm. This allows us to determine the number of iterations necessary to achieve almost certainty of finding the answer. Furthermore, we analyse the behaviour of the algorithm when the element… ▽ More

    Submitted 23 May, 1996; originally announced May 1996.

    Comments: 8 pages, LaTeX2e, PhysComp 96 submission

    Journal ref: Fortsch.Phys.46:493-506,1998