-
arXiv:2204.09076 [pdf, ps, other]
Spatial Search via Memoryless Walk with Selfloop
Abstract: The defining feature of memoryless quantum walks is that they operate on the vertex space of a graph, and therefore can be used to produce search algorithms with minimal memory. We present a memoryless walk that can find a unique marked vertex on a two-dimensional grid. Our walk is based on the construction proposed by Falk, which tessellates the grid with squares of size $2 \times 2$. Our walk us… ▽ More
Submitted 19 April, 2022; originally announced April 2022.
Comments: 35 pages, 1 figure
-
arXiv:2111.10485 [pdf, ps, other]
Tight Bound for Estimating Expectation Values from a System of Linear Equations
Abstract: The System of Linear Equations Problem (SLEP) is specified by a complex invertible matrix $A$, the condition number $κ$ of $A$, a vector $b$, a Hermitian matrix $M$ and an accuracy $ε$, and the task is to estimate $x^\dagger Mx$, where $x$ is the solution vector to the equation $Ax = b$. We aim to establish a lower bound on the complexity of the end-to-end quantum algorithms for SLEP with respect… ▽ More
Submitted 3 September, 2022; v1 submitted 19 November, 2021; originally announced November 2021.
Comments: 24 pages
Journal ref: Phys. Rev. Research, Vol 4, page 023237, 2022
-
arXiv:2012.05233 [pdf, ps, other]
The Role of Symmetry in Quantum Query-to-Communication Simulation
Abstract: Buhrman, Cleve and Wigderson (STOC'98) showed that for every Boolean function f : {-1,1}^n to {-1,1} and G in {AND_2, XOR_2}, the bounded-error quantum communication complexity of the composed function f o G equals O(Q(f) log n), where Q(f) denotes the bounded-error quantum query complexity of f. This is achieved by Alice running the optimal quantum query algorithm for f, using a round of O(log n)… ▽ More
Submitted 25 April, 2023; v1 submitted 9 December, 2020; originally announced December 2020.
Comments: 37 pages. This is a merger of two papers that appeared in CCC'20 (10.4230/LIPIcs.CCC.2020.32) and STACS'22 (10.4230/LIPIcs.STACS.2022.20)
-
arXiv:2002.11234 [pdf, ps, other]
Analysis of Lackadaisical Quantum Walks
Abstract: The lackadaisical quantum walk is a quantum analogue of the lazy random walk obtained by adding a self-loop to each vertex in the graph. We analytically prove that lackadaisical quantum walks can find a unique marked vertex on any regular locally arc-transitive graph with constant success probability quadratically faster than the hitting time. This result proves several speculations and numerical… ▽ More
Submitted 13 November, 2020; v1 submitted 25 February, 2020; originally announced February 2020.
Comments: 17 pages, 3 figures
Journal ref: Quantum Information and Computation, Vol. 20, No. 13-14 (2020) 1137-1152
-
arXiv:1704.08182 [pdf, ps, other]
Provably secure key establishment against quantum adversaries
Abstract: At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment capable of protecting quantum and classical legitimate parties unconditionally against a quantum eavesdropper in the query complexity model. Unfortunately, our security proofs were unsatisfactory from a cryptographically meaningful perspective because they were sound only in a worst-case scenario. Her… ▽ More
Submitted 28 April, 2017; v1 submitted 26 April, 2017; originally announced April 2017.
Comments: 22 pages, no figures, fixes a problem with arXiv:1108.2316v2. Will appear in the Proceedings of the 12th Conference on Theory of Quantum Computation, Communication and Cryptography (TQC), Paris, June 2017. The only change in v2 is that there was a problem with the affiliations in v1
Journal ref: Proceedings of 12th Conference on Theory of Quantum Computation, Communication and Cryptography (TQC), Paris, June 2017
-
arXiv:1612.08958 [pdf, ps, other]
Efficient quantum walk on the grid with multiple marked elements
Abstract: We give a quantum algorithm for finding a marked element on the grid when there are multiple marked elements. Our algorithm uses quadratically fewer steps than a random walk on the grid, ignoring logarithmic factors. This is the first known quantum walk that finds a marked element in a number of steps less than the square-root of the extended hitting time. We also give a new tighter upper bound on… ▽ More
Submitted 28 December, 2016; originally announced December 2016.
Comments: 18 pages, to appear in STACS 2017, the 34th International Symposium on Theoretical Aspects of Computer Science
ACM Class: F.1.2; F.2.2; G.2.2
Journal ref: 34th Symposium on Theoretical Aspects of Computer Science (STACS), vol 66 of LIPIcs, pp. 42:1-42:14, 2017
-
Contextuality in multipartite pseudo-telepathy graph games
Abstract: Analyzing pseudo-telepathy graph games, we propose a way to build contextuality scenarios exhibiting the quantum supremacy using graph states. We consider the combinatorial structures that generate equivalent scenarios. We introduce a new tool called multipartiteness width to investigate which scenarios are harder to decompose and show that there exist graphs generating scenarios with a linear mul… ▽ More
Submitted 24 June, 2017; v1 submitted 30 September, 2016; originally announced September 2016.
Journal ref: Journal of Computer and System Sciences, Vol 107, Feb 2020, Pp 156-165
-
arXiv:1305.1543 [pdf, ps, other]
Polynomial time quantum algorithms for certain bivariate hidden polynomial problems
Abstract: We present a new method for solving the hidden polynomial graph problem (HPGP) which is a special case of the hidden polynomial problem (HPP). The new approach yields an efficient quantum algorithm for the bivariate HPGP even when the input consists of several level set superpositions, a more difficult version of the problem than the one where the input is given by an oracle. For constant degree,… ▽ More
Submitted 8 October, 2013; v1 submitted 7 May, 2013; originally announced May 2013.
Comments: Theorem numbering changed; new subsection with a high-level description of the main algorithm
Journal ref: Quantum Information and Computation 14 (2014), 790-806
-
arXiv:1206.1035 [pdf, ps, other]
Gaussian quantum computation with oracle-decision problems
Abstract: We study a simple-harmonic-oscillator quantum computer solving oracle decision problems. We show that such computers can perform better by using nonorthogonal Gaussian wave functions rather than orthogonal top-hat wave functions as input to the information encoding process. Using the Deutsch-Jozsa problem as an example, we demonstrate that Gaussian modulation with optimized width parameter results… ▽ More
Submitted 5 June, 2012; originally announced June 2012.
Comments: RevTeX4, 10 pages with 4 figures
Journal ref: Quantum Information Processing 12(4), 1759-1779 (2013)
-
Quantum Nonlocal Boxes Exhibit Stronger Distillability
Abstract: The hypothetical nonlocal box (\textsf{NLB}) proposed by Popescu and Rohrlich allows two spatially separated parties, Alice and Bob, to exhibit stronger than quantum correlations. If the generated correlations are weak, they can sometimes be distilled into a stronger correlation by repeated applications of the \textsf{NLB}. Motivated by the limited distillability of \textsf{NLB}s, we initiate here… ▽ More
Submitted 20 April, 2012; originally announced April 2012.
Comments: 25 pages, 7 figures
Journal ref: Mod. Phys. Lett. A, Vol. 28, No. 17 (2013) 1330012
-
arXiv:1112.1446 [pdf, ps, other]
Quantum Computation with Coherent Spin States and the Close Hadamard Problem
Abstract: We study a model of quantum computation based on the continuously-parameterized yet finite-dimensional Hilbert space of a spin system. We explore the computational powers of this model by analyzing a pilot problem we refer to as the close Hadamard problem. We prove that the close Hadamard problem can be solved in the spin system model with arbitrarily small error probability in a constant number o… ▽ More
Submitted 7 January, 2016; v1 submitted 6 December, 2011; originally announced December 2011.
Comments: RevTeX4, 13 pages with 8 figures. Accepted for publication in Quantum Information Processing. Article number: s11128-015-1229-0
Journal ref: Quantum Information Processing (2016) Vol. 15, issue 4, pp. 1361-1386, April 2016
-
arXiv:1108.2316 [pdf, ps, other]
Key establishment à la Merkle in a quantum world
Abstract: In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of… ▽ More
Submitted 12 February, 2015; v1 submitted 10 August, 2011; originally announced August 2011.
Comments: 32 pages, this is a December 2014 much improved and extended version of our paper "Merkle puzzles in a quantum world" from the Proceedings of CRYPTO 2011, pp. 391-410
-
arXiv:1103.4174 [pdf, ps, other]
Improved Error Bounds for the Adiabatic Approximation
Abstract: Since the discovery of adiabatic quantum computing, a need has arisen for rigorously proven bounds for the error in the adiabatic approximation. We present in this paper, a rigorous and elementary derivation of upper and lower bounds on the error incurred from using the adiabatic approximation for quantum systems. Our bounds are often asymptotically tight in the limit of slow evolution for fixed H… ▽ More
Submitted 21 March, 2011; originally announced March 2011.
Journal ref: J. Phys. A: Math. Theor. 44 415302 (2011)
-
arXiv:1011.3489 [pdf, ps, other]
Simulating Quantum Dynamics On A Quantum Computer
Abstract: We present efficient quantum algorithms for simulating time-dependent Hamiltonian evolution of general input states using an oracular model of a quantum computer. Our algorithms use either constant or adaptively chosen time steps and are significant because they are the first to have time-complexities that are comparable to the best known methods for simulating time-independent Hamiltonian evoluti… ▽ More
Submitted 27 May, 2011; v1 submitted 15 November, 2010; originally announced November 2010.
Comments: Paper modified from previous version to enhance clarity. Comments are welcome
Journal ref: J. Phys. A: Math. Theor. 44, 445308 (2011)
-
arXiv:1009.1668 [pdf, ps, other]
Optimal Protocols for Nonlocality Distillation
Abstract: Forster, Winkler, and Wolf recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)]. We first show that their protocol is optimal among all non-adaptive protocols. We next consider adaptive protocols. We show that the depth 2 protocol of Allcock et al. [Phys. Rev. A 80, 062107, (2009)] p… ▽ More
Submitted 8 September, 2010; originally announced September 2010.
Comments: RevTeX4, 6 pages with 4 figures
Journal ref: Phys. Rev. A 82, 042118 (2010) [6 pages]
-
arXiv:0812.3694 [pdf, ps, other]
On continuous variable quantum algorithms for oracle identification problems
Abstract: We establish a framework for oracle identification problems in the continuous variable setting, where the stated problem necessarily is the same as in the discrete variable case, and continuous variables are manifested through a continuous representation in an infinite-dimensional Hilbert space. We apply this formalism to the Deutsch-Jozsa problem and show that, due to an uncertainty relation be… ▽ More
Submitted 18 December, 2008; originally announced December 2008.
Comments: RevTeX4, 15 pages with 10 figures
Journal ref: New Journal of Physics 11: 103035 (24 pp.), 21 October 2009
-
arXiv:0812.0562 [pdf, ps, other]
Higher Order Decompositions of Ordered Operator Exponentials
Abstract: We present a decomposition scheme based on Lie-Trotter-Suzuki product formulae to represent an ordered operator exponential as a product of ordinary operator exponentials. We provide a rigorous proof that does not use a time-displacement superoperator, and can be applied to non-analytic functions. Our proof provides explicit bounds on the error and includes cases where the functions are not infi… ▽ More
Submitted 4 December, 2008; v1 submitted 2 December, 2008; originally announced December 2008.
Comments: 16 pages, 1 figure
MSC Class: 81Q15
Journal ref: J. Phys. A: Math. Theor. 43, 065203 (2010)
-
arXiv:0810.3647 [pdf, ps, other]
Exact quantum lower bound for Grover's problem
Abstract: One of the most important quantum algorithms ever discovered is Grover's algorithm for searching an unordered set. We give a new lower bound in the query model which proves that Grover's algorithm is exactly optimal. Similar to existing methods for proving lower bounds, we bound the amount of information we can gain from a single oracle query, but we bound this information in terms of angles. Th… ▽ More
Submitted 20 October, 2008; originally announced October 2008.
Comments: 7 pages, no figures
Journal ref: Quantum Information and Computation 9(5-6): 533 - 540, 1 May 2009
-
Negative weights make adversaries stronger
Abstract: The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has application to classical complexity in formula size lower bounds, and is versatile with equivalent formulations in terms of weight schemes, eigenvalues, and Kolmogorov complexity. All these formulations rely on the princi… ▽ More
Submitted 24 April, 2007; v1 submitted 4 November, 2006; originally announced November 2006.
Comments: 29 pages, v2: added automorphism principle, extended to non-boolean functions, simplified examples, added matching upper bound for ADV
Journal ref: Proceedings of 39th Annual Symposium on Theory of Computing (STOC), San Diego, California, pp. 526-535, 2007
-
Lower Bounds on Quantum Query Complexity
Abstract: Shor's and Grover's famous quantum algorithms for factoring and searching show that quantum computers can solve certain computational problems significantly faster than any classical computer. We discuss here what quantum computers_cannot_ do, and specifically how to prove limits on their computational power. We cover the main known techniques for proving lower bounds, and exemplify and compare… ▽ More
Submitted 21 September, 2005; originally announced September 2005.
Comments: survey, 23 pages
Journal ref: Bulletin of the European Association for Theoretical Computer Science, Volume 87, pp. 78-103, Oct. 2005
-
Tight adversary bounds for composite functions
Abstract: The quantum adversary method is a versatile method for proving lower bounds on quantum algorithms. It yields tight bounds for many computational problems, is robust in having many equivalent formulations, and has natural connections to classical lower bounds. A further nice property of the adversary method is that it behaves very well with respect to composition of functions. We generalize the a… ▽ More
Submitted 11 September, 2006; v1 submitted 9 September, 2005; originally announced September 2005.
Comments: 10 pages, v2: simplified the proof and added an application, v3: fixed a proof
-
Multipartite Nonlocal Quantum Correlations Resistant to Imperfections
Abstract: We use techniques for lower bounds on communication to derive necessary conditions in terms of detector efficiency or amount of super-luminal communication for being able to reproduce with classical local hidden-variable theories the quantum correlations occurring in EPR-type experiments in the presence of noise. We apply our method to an example involving n parties sharing a GHZ-type state on w… ▽ More
Submitted 18 October, 2004; originally announced October 2004.
Journal ref: Phys. Rev. A, 73(1) 012321 (9 pp.) Jan 2006
-
Consequences and Limits of Nonlocal Strategies
Abstract: This paper investigates the powers and limitations of quantum entanglement in the context of cooperative games of incomplete information. We give several examples of such nonlocal games where strategies that make use of entanglement outperform all possible classical strategies. One implication of these examples is that entanglement can profoundly affect the soundness property of two-prover inter… ▽ More
Submitted 11 January, 2010; v1 submitted 12 April, 2004; originally announced April 2004.
Comments: 25 pages
-
Quantum query complexity of some graph problems
Abstract: Quantum algorithms for graph problems are considered, both in the adjacency matrix model and in an adjacency list-like array model. We give almost tight lower and upper bounds for the bounded error quantum query complexity of Connectivity, Strong Connectivity, Minimum Spanning Tree, and Single Source Shortest Paths. For example we show that the query complexity of Minimum Spanning Tree is in The… ▽ More
Submitted 8 June, 2004; v1 submitted 15 January, 2004; originally announced January 2004.
Comments: 7 figures. Subsumes and replaces quant-ph/9607014, quant-ph/0303131, and quant-ph/0303169
Journal ref: SIAM J. Comput., 35(6), 1310-1328 (19 pages), 2006
-
The quantum query complexity of the hidden subgroup problem is polynomial
Abstract: We present a quantum algorithm which identifies with certainty a hidden subgroup of an arbitrary finite group G in only a polynomial (in log |G|) number of calls to the oracle. This is exponentially better than the best classical algorithm. However our quantum algorithm requires exponential time, as in the classical case. Our algorithm utilizes a new technique for constructing error-free algorit… ▽ More
Submitted 14 January, 2004; originally announced January 2004.
Comments: To appear in Information Processing Letters (IPL)
Journal ref: Information Processing Letters, 91(1), 43-48, 16 July 2004
-
Quantum Search on Bounded-Error Inputs
Abstract: Suppose we have n algorithms, quantum or classical, each computing some bit-value with bounded error probability. We describe a quantum algorithm that uses O(sqrt{n}) repetitions of the base algorithms and with high probability finds the index of a 1-bit among these n bits (if there is such an index). This shows that it is not necessary to first significantly reduce the error probability in the… ▽ More
Submitted 14 April, 2003; v1 submitted 7 April, 2003; originally announced April 2003.
Comments: 9 pages Latex. To appear in Proceedings of ICALP 03. 2nd version: corrected affiliation of 2nd author (no other changes)
Journal ref: 30th Intl. Colloquium on Automata, Languages, and Programming (ICALP), LNCS 2719, pp. 291-299, 2003
-
Combinatorics and Quantum Nonlocality
Abstract: We use techniques for lower bounds on communication to derive necessary conditions (in terms of detector efficiency or amount of super-luminal communication) for being able to reproduce the quantum correlations occurring in EPR-type experiments with classical local hidden-variable theories. As an application, we consider n parties sharing a GHZ-type state and show that the amount of super-lumina… ▽ More
Submitted 28 May, 2003; v1 submitted 6 September, 2002; originally announced September 2002.
Comments: added author; minor corrections; accepted for publication in PRL
Journal ref: Phys. Rev. Lett. 91, 047903 (2003)
-
Quantum Circuits with Unbounded Fan-out
Abstract: We demonstrate that the unbounded fan-out gate is very powerful. Constant-depth polynomial-size quantum circuits with bounded fan-in and unbounded fan-out over a fixed basis (denoted by QNCf^0) can approximate with polynomially small error the following gates: parity, mod[q], And, Or, majority, threshold[t], exact[q], and Counting. Classically, we need logarithmic depth even if we can use unboun… ▽ More
Submitted 18 May, 2005; v1 submitted 7 August, 2002; originally announced August 2002.
Comments: 20 pages, 9 figures, STACS'2003. v3: rewritten from scratch, new co-author, everything put into constant depth (including quantum Fourier transform). v4: polished a lot
Journal ref: Theory of Computing, 1(5):81-103, 2005
-
Improved Quantum Communication Complexity Bounds for Disjointness and Equality
Abstract: We prove new bounds on the quantum communication complexity of the disjointness and equality problems. For the case of exact and non-deterministic protocols we show that these complexities are all equal to n+1, the previous best lower bound being n/2. We show this by improving a general bound for non-deterministic protocols of de Wolf. We also give an O(sqrt{n}c^{log^* n})-qubit bounded-error pr… ▽ More
Submitted 14 September, 2001; originally announced September 2001.
Comments: 11 pages LaTeX
Journal ref: 19th Annual Symposium on Theoretical Aspects of Computer Science, STACS 2002, LNCS 2285, pp. 299-310, 2002
-
Quantum complexities of ordered searching, sorting, and element distinctness
Abstract: We consider the quantum complexities of the following three problems: searching an ordered list, sorting an un-ordered list, and deciding whether the numbers in a list are all distinct. Letting N be the number of elements in the input list, we prove a lower bound of \frac{1}π(\ln(N)-1) accesses to the list elements for ordered searching, a lower bound of Ω(N\log{N}) binary comparisons for sortin… ▽ More
Submitted 27 April, 2001; v1 submitted 15 February, 2001; originally announced February 2001.
Comments: This new version contains new results. To appear at ICALP '01. Some of the results have previously been presented at QIP '01. This paper subsumes the papers quant-ph/0009091 and quant-ph/0009032
Journal ref: 28th ICALP, LNCS 2076, pp. 346-357, July 2001
-
Bounds on quantum ordered searching
Abstract: We prove that any exact quantum algorithm searching an ordered list of N elements requires more than \frac{1}π(\ln(N)-1) queries to the list. This improves upon the previously best known lower bound of {1/12}\log_2(N) - O(1). Our proof is based on a weighted all-pairs inner product argument, and it generalizes to bounded-error quantum algorithms. The currently best known upper bound for exac… ▽ More
Submitted 27 April, 2001; v1 submitted 8 September, 2000; originally announced September 2000.
Comments: This paper has been merged with another paper. See quant-ph/0102078. Except for this comment v2 is unchanged compared to v1. 12 pages, 1 figure
-
Quantum Algorithms for Element Distinctness
Abstract: We present several applications of quantum amplitude amplification to finding claws and collisions in ordered or unordered functions. Our algorithms generalize those of Brassard, Hoyer, and Tapp, and imply an O(N^{3/4} log N) quantum upper bound for the element distinctness problem in the comparison complexity model (contrasting with Theta(N log N) classical complexity). We also prove a lower bo… ▽ More
Submitted 1 September, 2000; v1 submitted 6 July, 2000; originally announced July 2000.
Comments: 15 pages. Supersedes quant-ph/007016v1 and quant-ph/0006136
Journal ref: SIAM Journal on Computing, 34(6), 1324-1330, 2005
-
On Arbitrary Phases in Quantum Amplitude Amplification
Abstract: We consider the use of arbitrary phases in quantum amplitude amplification which is a generalization of quantum searching. We prove that the phase condition in amplitude amplification is given by $\tan(\varphi/2) = \tan(φ/2)(1-2a)$, where $φ$ and $φ$ are the phases used and where $a$ is the success probability of the given algorithm. Thus the choice of phases depends nontrivially and nonlinearly… ▽ More
Submitted 7 June, 2000; originally announced June 2000.
Comments: 6 pages, 1 figure
Journal ref: Phys. Rev. A 62(5), 052304 (5 pp.), Oct 2000
-
Quantum Amplitude Amplification and Estimation
Abstract: Consider a Boolean function $χ: X \to \{0,1\}$ that partitions set $X$ between its good and bad elements, where $x$ is good if $χ(x)=1$ and bad otherwise. Consider also a quantum algorithm $\mathcal A$ such that $A |0\rangle= \sum_{x\in X} α_x |x\rangle$ is a quantum superposition of the elements of $X$, and let $a$ denote the probability that a good element is produced if $A |0\rangle$ is measu… ▽ More
Submitted 15 May, 2000; originally announced May 2000.
Comments: 32 pages, no figures
Journal ref: Quantum Computation and Quantum Information, Samuel J. Lomonaco, Jr. (editor), AMS Contemporary Mathematics, 305:53-74, 2002
-
Quantum State Detection Via Elimination
Abstract: We present the view of quantum algorithms as a search-theoretic problem. We show that the Fourier transform, used to solve the Abelian hidden subgroup problem, is an example of an efficient elimination observable which eliminates a constant fraction of the candidate secret states with high probability. Finally, we show that elimination observables do not always exist by considering the geometry… ▽ More
Submitted 28 May, 1999; originally announced May 1999.
Comments: 8 pages, no figures
Report number: LAUR-992667
-
Hidden Subgroup States are Almost Orthogonal
Abstract: It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm… ▽ More
Submitted 14 January, 1999; originally announced January 1999.
Comments: 5 pages, no figures
-
A Quantum Observable for the Graph Isomorphism Problem
Abstract: Suppose we are given two graphs on $n$ vertices. We define an observable in the Hilbert space $\Co[(S_n \wr S_2)^m]$ which returns the answer ``yes'' with certainty if the graphs are isomorphic and ``no'' with probability at least $1-n!/2^m$ if the graphs are not isomorphic. We do not know if this observable is efficiently implementable.
Submitted 13 January, 1999; originally announced January 1999.
Comments: 5 pages, no figures
Report number: LA-UR-99-179
-
On Quantum Algorithms for Noncommutative Hidden Subgroups
Abstract: Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. We present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of… ▽ More
Submitted 10 July, 1998; originally announced July 1998.
Comments: 13 pages, no figures, LaTeX2e
Report number: LA-UR-98-2010 (May 6, 1998)
Journal ref: Proceedings of 16th Annual Symposium on Theoretical Aspects of Computer Science (STACS), Trier, Germany, pp. 478-487, 1999
-
Quantum Counting
Abstract: We study some extensions of Grover's quantum searching algorithm. First, we generalize the Grover iteration in the light of a concept called amplitude amplification. Then, we show that the quadratic speedup obtained by the quantum searching algorithm over classical brute force can still be obtained for a large family of search problems for which good classical heuristics exist. Finally, as our m… ▽ More
Submitted 27 May, 1998; originally announced May 1998.
Comments: 12 pages, LaTeX2e
Journal ref: 25th Intl. Colloquium on Automata, Languages, and Programming (ICALP), LNCS 1443, pp. 820-831, 1998
-
Multiparty Quantum Communication Complexity
Abstract: Quantum entanglement cannot be used to achieve direct communication between remote parties, but it can reduce the communication needed for some problems. Let each of k parties hold some partial input data to some fixed k-variable function f. The communication complexity of f is the minimum number of classical bits required to be broadcasted for every party to know the value of f on their inputs.… ▽ More
Submitted 3 June, 1999; v1 submitted 22 October, 1997; originally announced October 1997.
Comments: 8 pages, LaTeX2e, no figures; new result and author added
Journal ref: Phys.Rev. A60 (1999) 2737-2741
-
Quantum Algorithm for the Collision Problem
Abstract: In this note, we give a quantum algorithm that finds collisions in arbitrary r-to-one functions after only O((N/r)^(1/3)) expected evaluations of the function. Assuming the function is given by a black box, this is more efficient than the best possible classical algorithm, even allowing probabilism. We also give a similar algorithm for finding claws in pairs of functions. Furthermore, we exhibit… ▽ More
Submitted 1 May, 1997; originally announced May 1997.
Comments: 8 pages, LaTeX2e
Journal ref: Third Latin American Symp. on Theoretical Informatics (LATIN'98), pp. 163-169, 1998. LNCS 1380
-
An Exact Quantum Polynomial-Time Algorithm for Simon's Problem
Abstract: We investigate the power of quantum computers when they are required to return an answer that is guaranteed to be correct after a time that is upper-bounded by a polynomial in the worst case. We show that a natural generalization of Simon's problem can be solved in this way, whereas previous algorithms required quantum polynomial time in the expected sense only, without upper bounds on the worst… ▽ More
Submitted 14 April, 1997; originally announced April 1997.
Comments: 12 pages, LaTeX2e, no figures. To appear in Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems (ISTCS'97)
Journal ref: Fifth Israeli Symposium on Theory of Computing and Systems (ISTCS'97), pp. 12-23, June 1997
-
Efficient Quantum Transforms
Abstract: Quantum mechanics requires the operation of quantum computers to be unitary, and thus makes it important to have general techniques for develo** fast quantum algorithms for computing unitary transforms. A quantum routine for computing a generalized Kronecker product is given. Applications include re-development of the networks for computing the Walsh-Hadamard and the quantum Fourier transform.… ▽ More
Submitted 11 February, 1997; originally announced February 1997.
Comments: 30 pages, LaTeX2e, 7 figures included
-
On The Power of Exact Quantum Polynomial Time
Abstract: We investigate the power of quantum computers when they are required to return an answer that is guaranteed correct after a time that is upper-bounded by a polynomial in the worst case. In an oracle setting, it is shown that such machines can solve problems that would take exponential time on any classical bounded-error probabilistic computer.
Submitted 3 December, 1996; originally announced December 1996.
Comments: 10 pages, LaTeX2e, no figures
-
A Quantum Algorithm for Finding the Minimum
Abstract: We give a quantum algorithm to find the index y in a table T of size N such that in time O(c sqrt N), T[y] is minimum with probability at least 1-1/2^c.
Submitted 7 January, 1999; v1 submitted 18 July, 1996; originally announced July 1996.
Comments: 2 pages
-
Tight bounds on quantum searching
Abstract: We provide a tight analysis of Grover's recent algorithm for quantum database searching. We give a simple closed-form formula for the probability of success after any given number of iterations of the algorithm. This allows us to determine the number of iterations necessary to achieve almost certainty of finding the answer. Furthermore, we analyse the behaviour of the algorithm when the element… ▽ More
Submitted 23 May, 1996; originally announced May 1996.
Comments: 8 pages, LaTeX2e, PhysComp 96 submission
Journal ref: Fortsch.Phys.46:493-506,1998