The one-way communication complexity of the Boolean Hidden Matching Problem

Size: px
Start display at page:

Download "The one-way communication complexity of the Boolean Hidden Matching Problem"

Transcription

1 The one-way communication complexity of the Boolean Hidden Matching Problem Iordanis Kerenidis CRS - LRI Université Paris-Sud jkeren@lri.fr Ran Raz Faculty of Mathematics Weizmann Institute ran.raz@weizmann.ac.il July 5, 006 Abstract We give a tight lower bound of Ω( n) for the randomized one-way communication complexity of the Boolean Hidden Matching Problem [BJK04]. Since there is a quantum one-way communication complexity protocol of O(log n) qubits for this problem, we obtain an exponential separation of quantum and classical one-way communication complexity for partial functions. A similar result was independently obtained by Gavinsky, Kempe, de Wolf [GKdW06]. Our lower bound is obtained by Fourier analysis, using the Fourier coefficients inequality of Kahn Kalai and Linial [KKL88]. Introduction Communication complexity is a central model of computation, first defined by Yao in 979 [Yao79]. It has found applications in many areas of theoretical computer science. umerous examples of such applications can be found in the textbook of Kushilevitz and isan [K97]. A communication complexity problem is defined by three sets X, Y, Z and a relation R X Y Z. There are two unconditionally powerful parties, Alice and Bob, who are given inputs x X and y Y, respectively. Alice and Bob exchange messages according to a shared protocol over a channel, until Bob has sufficient information to announce an output z Z s.t. (x, y, z) R. The communication cost of a protocol is the sum of the lengths of Supported in part by ACI Securité Informatique SI/03 5 and AR AlgoQP grants of hte French Ministry and in part by the European Commission under the Intergrated Project Qubit Applications (QAP) funded by the IST directorate as Contract umber Part of this work was done when the second author visited Microsoft Research, Redmond.

2 messages (in bits) Alice and Bob exchange on the worst-case choice of inputs x and y. The communication complexity of the problem R is the cost of the best protocol that computes R correctly. In the one-way variant of the model [PS84, Abl96, KR99], Alice is allowed to send a single message to Bob, after which he announces the outcome. Last, in the Simultaneous Messages Passing (SMP) model, Alice and Bob cannot communicate directly, but instead, each of them sends a single message to a third party called the referee, who computes the outcome based on the two messages. Another important distinction has to do with the type of problem that Alice and Bob try to solve. In the most natural setting, the problem is a total Boolean function, meaning that Alice and Bob receive inputs x {0, } n and y {0, } n and the goal is to compute a Boolean function f(x, y), which is defined for all possible (x, y). In other cases, the problem is a partial function (or promise problem), meaning that Alice and Bob receive only inputs that satisfy some special property and compute a Boolean function f(x, y). For example, Alice and Bob might receive sets S and T with the property that either they are disjoint or their intersection is half their size and the question is to figure out which of the two cases it is. Last, the communication problem could be a relation, meaning that for each input of Alice and Bob there could be more than one right answer. For example, on inputs x {0, } n and y {0, } n Alice and Bob need to output an index i [n] such that x i = y i (if such an i exists). ote that a total Boolean function is a special case of a promise problem, which is a special case of a relation. We can define different measures of communication complexity for a problem R depending on the allowed protocols. In a bounded-error randomized protocol with error δ, we allow Alice and Bob to have access to public random coins. For any inputs x, y, the outcome z should be correct with probability at least δ, where the probability is taken over the public random coins. The cost of a randomized protocol is the number of bits Alice and Bob exchange in the worst-case. The randomized communication complexity of R (w.r.t. δ) is the cost of the optimal randomized protocol for R. In the setting of quantum communication complexity [Yao93], Alice and Bob have qubits, some of which are initialized to their respective inputs. In a communication round, a player can perform a unitary operation on his/her part of the qubits and send some of them to the other player. At the end of the protocol Bob performs a measurement and decides on an outcome. The outcome of the protocol should be correct with probability of at least δ (for any inputs x, y). The quantum communication complexity of R is the number of qubits exchanged in the optimal bounded-error quantum protocol for R. The main question in the theory of quantum communication complexity is whether in the different communication models quantum channels can reduce significantly the amount of communication necessary to solve certain types of problems. For total functions, we do not have any exponential gap between quantum communication and randomized communication with public coins in any of the abovementioned models. Buhrman et al. [BCWdW0] were able to solve the equality problem in the SMP model with a quantum protocol of complexity O(log n) rather than the Θ( n) bits necessary in any

3 bounded-error randomized SMP protocol with private coins [S96, BK97]. However, if we allow the players to share random coins, then equality can be solved classically with O() communication. For promise problems, an exponential gap between the quantum and the (public-coins) randomized communication complexity models was proved in [Raz99]. This was obtained by describing a promise problem P with an efficient quantum protocol of complexity O(log n) and such that the bounded-error randomized communication complexity of P is Ω(n /4 ). For relations, Bar-Yossef et. al. [BJK04] defined the Hidden Matching Problem and proved an exponential gap between quantum and randomized communication in the oneway model and the SMP model. In this paper we give a tight lower bound of Ω( n) for the bounded-error randomized one-way communication complexity of a Boolean version of the Hidden Matching Problem [BJK04]. Since there is a simple quantum one-way communication complexity protocol of O(log n) qubits for the problem, this provides an exponential separation for promise problems between the models of quantum and randomized one-way communication complexity. A similar result was independently obtained by Gavinsky, Kempe, de Wolf [GKdW06]. Our lower bound is obtained by Fourier analysis, using the Fourier coefficients inequality of Kahn Kalai and Linial [KKL88], which in turn was proved using the Bonami-Beckner inequality [Bon70, Bec75]. The KKL inequality was previously used in the context of communication complexity in [Raz95, Kla0]. Preliminaries. Fourier analysis For a function f : {0, } n R, we define the l and l norms as f = f(x), f = f(x) x {0,} n x {0,} n It is a well known fact that for a function f : {0, } n R f f. n The Fourier transform of f : {0, } n R is defined as f = ˆf(s)χs, s {0,} n where χ s : {0, } n R is the character χ s (y) = ( ) yt s with being the scalar product over GF () and ˆf(s) is the Fourier coefficient ˆf(s) = n y {0,} n f(y)χ s (y). 3 /

4 One very useful fact about the Fourier coefficients of a function is Parseval s identity Lemma. (Parseval s Identity) For a function f : {0, } n R it holds that f = n s {0,} n ( ˆf(s)) Let f : {0, } n R and g : {0, } n R and + denote the bitwise XOR of two strings. The convolution f g : {0, } n R is defined as f g(w) = f(y + w)g(y) y {0,} n For the Fourier coefficients of a convolution we have the following lemma Lemma. For functions f : {0, } n R and g : {0, } n R it holds that f g(s) = n ˆf(s) ĝ(s) Let h(, ) be the hamming distance function and h( ) the hamming weight function. A final tool in our analysis is the KKL lemma Lemma 3. [KKL88] Let f be a function f : {0, } n {, 0, }. Let t be the probability that f 0. Then for every 0 δ δ h(s) ( ˆf(s)) t +δ s {0,} n. Quantum computation We explain the standard notation of quantum computing and describe the basic notions that will be useful in this paper. For more details we refer the reader to the textbook of ielsen and Chuang [C00]. Let H denote a -dimensional complex vector space, equipped with the standard inner product. We pick an orthonormal basis for this space, ( label ) the( two ) basis vectors 0 and, 0 and for simplicity identify them with the vectors and, respectively. A qubit 0 is a unit length vector in this space, and so can be expressed as a linear combination of the basis states: ( ) α0 α α =. Here α 0, α are complex amplitudes, and α 0 + α =. An m-qubit system is a unit vector in the m-fold tensor space H H. The m basis states of this space are the m-fold tensor products of the states 0 and. For example, the 4 α

5 basis states of a -qubit system are the four 4-dimensional unit vectors 0 0, 0, 0, and. We abbreviate, e.g., 0 to 0, or, 0, or 0, or even (since is 0 in binary). With these basis states, an m-qubit state φ is a m -dimensional complex unit vector φ = α i i. i {0,} m We use φ = φ to denote the conjugate transpose of the vector φ, and φ ψ = φ ψ for the inner product between states φ and ψ. These two states are orthogonal if φ ψ = 0. The norm of φ is φ = φ φ. Let φ be an m-qubit state and B = { b,..., b m } an orthonormal basis of the m- qubit space. A measurement of the state φ in the B basis means that we apply the projection operators P i = b i b i to φ. The resulting quantum state is b i with probability p i = φ b i. 3 Definition of the Boolean Hidden Matching Problem The relational version of the Hidden Matching Problem was defined in [BJK04]. There, they proved a Ω( n) lower bound for the randomized one-way communication complexity of it and also described a O(log n) quantum one-way protocol. This provided an exponential separation for a relation between the randomized and quantum one-way communication complexity models. [BJK04] also defined a Boolean version of the Hidden Matching Problem but did not provide a lower bound for the randomized communication complexity of it. A version of the relational Hidden Matching Problem was also used by Gavinsky et al [GKRdW06] to show that in the model of Simultaneous Messages, shared entanglement can reduce the communication exponentially compared to shared randomness. Here, we define a slightly different version of the Boolean Hidden Matching Problem and prove a tight lower bound for its randomized one-way communication complexity. We denote a perfect matching on [n] as a (n n) binary matrix M where each column corresponds to a number in [n] and the i-th row corresponds to the i-th edge of the matching. In other words, if the i-th edge of the matching is (k, l), then the i-th row of the matrix contains two s at the positions k and l and 0 s elsewhere. Let x {0, } n. Then the product Mx is an n-bit string w, where the i-th bit is equal to the parity of the two bits of x that correspond to the i-th edge of the matching, i.e. w i = x k x l. Recall that we denote by h(, ) the hamming distance function and by h( ) the hamming weight function. The Boolean Hidden Matching Problem (BHM n ): Alice gets as input a string x {0, } n and Bob gets as input a perfect matching M on [n] and a string w {0, } n. The promise is that either h(mx, w) n/3 ( 0 instance) or h(mx, w) n/3 ( instance). The goal is for Bob to determine where the input corresponds to a 0 instance or to a instance. 5

6 4 Quantum protocol for the Boolean Hidden Matching Problem We present a quantum protocol for the Boolean Hidden Matching Problem with communication complexity of O(log n) qubits. Let x = x... x n be Alice s input and M, w be Bob s input. Quantum protocol for bhm n. Alice sends the state ψ = n n i= ( )x i i.. Bob performs a measurement on the state ψ in the orthonormal basis B = { ( k ± l ) (k, l) M}. The probability that the outcome of the measurement is a basis state ( k + l ) is ψ ( k + l ) = 4n (( )x k + ( ) x l ). This equals to /n if x k x l = 0 and 0 otherwise. Similarly for the state ( k l ) we have that ψ ( k l ) is 0 if x k x l = 0 and /n if x k x l =. Hence, if the outcome of the measurement is a state ( k + l ) then Bob knows with certainty that x k x l = 0. If the outcome is a state ( k l ) then Bob knows with certainty that x k x l =. Let (k, l) be the j-th edge in the matching M, then Bob outputs x k x l w j. The protocol is correct with probability at least /3 and by repeating a constant number of times we can achieve correctness ɛ for any small constant ɛ. 5 The randomized one-way communication complexity of the Boolean Hidden Matching Problem Theorem 4. The randomized one-way communication complexity of the Boolean Hidden Matching Problem is Ω( n). Proof. For b {0, } we denote by σ b the distribution over {0, } such that Prob σb [b] = 3/4 and define µ b = (σ b ) n. In other words, µ 0 is the distribution over strings {0, } n such that independently for every bit i [n], Prob µ0 [i-th bit is 0] = 3/4 and µ is the distribution over strings {0, } n such that independently for every bit i [n], Prob µ [i-th bit is ] = 3/4. 6

7 We define the function f : {0, } n R as f(y) = Prob µ0 [y] Prob µ [y] It is easy to see that the Fourier coefficients of f are { for s with h(s) = k and k odd ˆf(s) = n+k 0 otherwise Using Yao s Lemma [Yao83], in order to prove the lower bound, it suffices to construct a hard distribution over instances of bhm n, and prove a lower bound for deterministic one-way protocols whose distributional error with respect to this distribution is at most ɛ. For every x {0, } n and matching M we define the following distributions: D 0 is the distribution over strings w {0, } n such that independently for each i [n], Prob[w i = (Mx) i ] = 3/4 and D is the distribution over strings w {0, } n such that independently for each i [n], Prob[w i (Mx) i ] = 3/4. The hard distribution T is defined as follows: The string x {0, } n and the matching M are picked uniformly at random. The string w {0, } n is picked according to the distribution D = D 0+ D, that is w is picked with probability / from the distribution D 0 and with probability / from the distribution D, where D 0, D are the ones corresponding to x, M. The goal is now for Bob to determine whether w was drawn from the distribution D 0 or D. ote that if (x, M, w) are picked according to the distribution T, then the probability that n/3 h(m x, w) n/3 is exponentially small. Hence, any probabilistic protocol for bhm n with error ɛ gives a deterministic protocol for the distribution T with distributional error ɛ + o(). Therefore, for the rest of the proof we use the distribution T. Let us assume that there exists a deterministic protocol P which is correct on the distribution T with probability ɛ, namely for uniformly random x, M and w drawn from D, Bob can determine with probability ɛ whether w was drawn from D 0 or D. Then, the protocol is correct for at least half of the x s, with probability at least ( ɛ) over the input of Bob. Let us denote by S {0, } n the set of these good x s. Let A S be a set of x s, for which Alice sends the same message. ote that since A is a subset of S, the protocol is correct with probability at least ( ɛ) over the inputs x A. We are going to show that the size of A cannot be too large. Let g : {0, } n R be the uniform distribution over the set A, i.e. g(x) = { for x A 0 for x A For any matching M we define g M : {0, } n R to be the distribution of Mx when x is picked uniformly from the set A, i.e. g M (y) = {x A Mx = y} 7

8 For the l norm of f g M we have f g M = = f g M (w) = w {0,} n f(mx + w) w {0,} n x A w {0,} n f(y + w)g M (y) y {0,} n where the last equation follows from the definition of the function g M. Since Alice s message is fixed for the set A and Bob s algorithm is deterministic, for every matching M we can split the set of w s into two sets W b,m, where b {0, } is Bob s answer. Let M denote the set of all possible perfect matchings on [n] and = M. Then = = + + f g M f(mx + w) + f(mx + w) x A w W,M x A f(mx + w) w W 0,M x A + f(mx + w) w W,M x A (Prob µ0 [Mx + w] Prob µ [Mx + w]) w W 0,M x A (Prob µ0 [Mx + w] Prob µ [Mx + w]) w W,M x A Prob µ0 [Mx + w] w W 0,M x A Prob µ [Mx + w] w W 0,M x A Prob µ [Mx + w] Prob µ0 [Mx + w] w W 0,M w W,M x A w W,M x A The protocol is correct when Bob answers b {0, } and the string w was drawn from the distribution D b. Since the protocol is correct with probability at least ɛ we have x A w W 0,M x A w W 0,M Prob D 0 [w] + Prob µ0 [Mx + w] + x A w W,M x A w W,M Prob D [w] ɛ Prob µ [Mx + w] 4ɛ 8

9 Similarly, w W 0,M x A Prob µ [Mx + w] + w W,M x A Prob µ0 [Mx + w] 4ɛ Hence, we conclude that f g M ( 4ɛ) The l and l norms are related by the following inequality and hence for the l norm we have f g M f g M f g M n f g M n = n ( f g M n f g M ) n ( 4ɛ) () By Parseval s identity (lemma ) and the convolution theorem (lemma ) it holds that f g M = n s ( f g M (s)) = 3n s ( ˆf(s)) ( gˆ M (s)) Using the expression for the Fourier coefficients of f we have f g M = 3n s = n+ ( ˆf(s)) ( gˆ M (s)) = 3n s:h(s)=k k odd s:h(s)=k k odd 4 ( gˆ M(s)) n+k ( gˆ M(s)) () k Putting () and () together we have ( 4ɛ) n s:h(s)=k k odd ( gˆ M(s)) (3) k We now relate the Fourier coefficients of g M with those of g. ote first that if M is an (n n) matrix, x {0, } n and s {0, } n then (Mx) T s = (x T M T ) s = x T (M T s) 9

10 By the definition of g M, its Fourier coefficients are ĝ M (s) = g n M (y)( ) yt s = ( ) {x A (Mx) T s = 0} {x A (Mx) T s = }. n y Let s M = M T s and note that h(s M ) = h(s). Then, ĝ(s M ) = g(x)( ) xt sm = ( ) {x A x T s n n M = 0} {x A x T s M = } x {0,} n ( ) = {x A (Mx) T s = 0} {x A (Mx) T s = } n = n ĝm(s) Inequality (3) now becomes ( 4ɛ) n = n = 4n s:h(s)=k k odd s:h(s)=k k odd s:h(s)=k k odd ( gˆ M(s)) k k n (ĝ(s M )) k (ĝ(s M)) (4) In the above expression we first sum over all matchings and then over the string s. In what follows we will try to change the order of the summation. ote that in the above expression when h(s) is odd, h(s M ) = mod 4. For any k = mod 4 we define γ k as follows: Let z {0, } n be any string of hamming weight k and M be a random matching. Then γ k = Prob M [ s s.t. z = s M ] ote that this probability depends only on k and not on the specific string z. For any even number t, let (t) be the number of perfect matchings on [t]. Then, () =, (t) = (t )(t ). It is not hard to see that the expression for γ k is γ k = (k)(n k) (n) = (k )(k 3)... (n )(n 3)... (n k + ) We now rewrite inequality (4) after changing the order of the summation ( 4ɛ) 4n γ k k (ĝ(z)) k=(mod4) 0 ( ) k/ k n

11 and hence = ( 4ɛ) 4n k=(mod4) k=(mod4) ( 4ɛ) 4n k γ k (ĝ(z)) k γ k (ĝ(z)) From the above inequality, it is easy to see that there exists a k such that ( 4ɛ) 4n γ k(ĝ(z)) / k k/ r=(mod4) otherwise sum over k = mod 4 to get a contradiction. Moreover, r=(mod4) r/ 3 r/ and hence for that k 4n k/ γ k(ĝ(z)) 3( 4ɛ). We choose small enough ɛ such that 3( 4ɛ) and then we rewrite the above inequality as 4n γ k (ĝ(z)) k/ (5) Let δ = (γ k ) /k. ote that 0 δ. By the KKL inequality (lemma 3) [KKL88], we know that ( ) δ k (ĝ(z)) +δ. Hence, inequality (5) becomes and therefore k/ 4n ( n ) +δ = ( n n ) δ +δ ( n ) δ n ( k/) /δ = k/4δ (6)

12 We know that γ k ( k n) k/ and k, so k 4δ = From inequality (6) we conclude that k 4(γ k ) k nk /k 4 ( ) k / = 4 n n n n Ω( n) Since the size of any cannot be more than n Ω( n), it means that there are at least Ω( n) different sets A. In other words, there are at least Ω( n) different messages that Alice sends and therefore the length of her message is at least Ω( n). References n. [Abl96] F. Ablayev. Lower bounds for one-way probabilistic communication complexity and their application to space complexity. Theoretical Computer Science, 57():39 59, 996. [Bec75] W. Beckner. Inequalities in Fourier Analysis. Annals of Mathematics, 0:59 8, 975. [Bon70] [BJK04] [BCW98] A. Bonami. Etude des coefficients de Fourier des fonctions de Lp (G). Annales de l Instute Fourier, 0():335 40, 970. Ziv Bar-Yossef, T. S. Jayram, Iordanis Kerenidis Exponential separation of quantum and classical one-way communication complexity, Proceedings of ACM STOC 004 H. Buhrman, R. Cleve, and A. Wigderson. Quantum vs. classical communication and computation. In Proceedings of the 30th ACM Symposium on Theory of Computing (STOC), pages 63 68, 998. [BCWdW0] H. Buhrman, R. Cleve, J. Watrous, and R. de Wolf. Quantum fingerprinting. Physical Review Letters, 87(6), 00. [BK97] L. Babai and P. G. Kimmel. Randomized simultaneous messages: Solution of a problem of Yao in communication complexity. In Proceedings of the th IEEE Conference on Computational Complexity (CCC), pages 39 46, 997. [GKRdW06] Dmitry Gavinsky, Julia Kempe, Oded Regev, and Ronald de Wolf. Boundederror quantum state identification and exponential separations in communication complexity. Proceedings of ACM Symposium on Theory of Computing (STOC), 006.

13 [GKdW06] [KKL88] [Kla0] [K97] [KR99] [C00] [S96] [PS84] [Raz95] [Raz99] [Yao79] [Yao83] [Yao93] Dmitry Gavinsky, Julia Kempe and Ronald de Wolf. Exponential separation of quantum and classical one-way communication complexity for a boolean function. Manuscript, 006. J. Kahn, G. Kalai,. Linial The influence of variables on Boolean functions. Proceedings of 9th IEEE Symp. Foundations of Computer Science (FOCS), 988 H. Klauck. Lower Bounds for Quantum Communication Complexity. In Proceedings of the 4th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 88 97, 00. E. Kushilevitz and. isan. Communication Complexity. Cambridge University Press, 997. I. Kremer,. isan, and D. Ron. On randomized one-round communication complexity. Computational Complexity, 8(): 49, 999. M.A. ielsen and I.L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 000. I. ewman and M. Szegedy. Public vs. private coin flips in one round communication games. In Proceedings of the 8th ACM Symposium on Theory of Computing (STOC), pages , 996. C. H. Papadimitriou and M. Sipser. Communication complexity. Journal of Computer and System Sciences, 8():60 69, 984. R. Raz. Fourier analysis for probabilistic communication complexity. Computational Complexity, 5(3):05, 995. R. Raz. Exponential separation of quantum and classical communication complexity. In Proceedings of the 3st ACM Symposium on Theory of Computing (STOC), pages , 999. A. C-C. Yao. Some complexity questions related to distributive computing. In Proceedings of the th ACM Symposium on Theory of Computing (STOC), pages 09 3, 979. A. C-C. Yao. Lower bounds by probabilistic arguments. In Proceedings of the 4th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 40 48, 983. A. C-C. Yao. Quantum circuit complexity. In Proceedings of the 34th IEEE Annual Symposium on Foundations of Computer Science (FOCS), pages 35 36, Los Alamitos, CA,

Simultaneous Communication Protocols with Quantum and Classical Messages

Simultaneous Communication Protocols with Quantum and Classical Messages Simultaneous Communication Protocols with Quantum and Classical Messages Oded Regev Ronald de Wolf July 17, 2008 Abstract We study the simultaneous message passing model of communication complexity, for

More information

Simultaneous Communication Protocols with Quantum and Classical Messages

Simultaneous Communication Protocols with Quantum and Classical Messages Simultaneous Communication Protocols with Quantum and Classical Messages Dmitry Gavinsky Oded Regev Ronald de Wolf December 29, 2008 Abstract We study the simultaneous message passing (SMP) model of communication

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

EXPONENTIAL SEPARATION FOR ONE-WAY QUANTUM COMMUNICATION COMPLEXITY, WITH APPLICATIONS TO CRYPTOGRAPHY

EXPONENTIAL SEPARATION FOR ONE-WAY QUANTUM COMMUNICATION COMPLEXITY, WITH APPLICATIONS TO CRYPTOGRAPHY EXPONENTIAL SEPARATION FOR ONE-WAY QUANTUM COMMUNICATION COMPLEXITY, WITH APPLICATIONS TO CRYPTOGRAPHY DMITRY GAVINSKY, JULIA KEMPE, IORDANIS KERENIDIS, RAN RAZ, AND RONALD DE WOLF Abstract. We give an

More information

Exponential separation for one-way quantum communication complexity, with applications to cryptography

Exponential separation for one-way quantum communication complexity, with applications to cryptography Exponential separation for one-way quantum communication complexity, with applications to cryptography Dmitry Gavinsky IQC, University of Waterloo Iordanis Kerenidis CNRS & LRI Univ. de Paris-Sud, Orsay

More information

EXPONENTIAL SEPARATION OF QUANTUM AND CLASSICAL ONE-WAY COMMUNICATION COMPLEXITY

EXPONENTIAL SEPARATION OF QUANTUM AND CLASSICAL ONE-WAY COMMUNICATION COMPLEXITY EXPONENTIAL SEPARATION OF QUANTUM AND CLASSICAL ONE-WAY COMMUNICATION COMPLEXITY ZIV BAR-YOSSEF, T. S. JAYRAM, AND IORDANIS KERENIDIS Abstract. We give the first exponential separation between quantum

More information

An exponential separation between quantum and classical one-way communication complexity

An exponential separation between quantum and classical one-way communication complexity An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical

More information

Strengths and Weaknesses of Quantum Fingerprinting

Strengths and Weaknesses of Quantum Fingerprinting Strengths and Weaknesses of Quantum Fingerprinting Dmitry Gavinsky University of Calgary Julia Kempe CNRS & LRI Univ. de Paris-Sud, Orsay Ronald de Wolf CWI, Amsterdam Abstract We study the power of quantum

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

On Quantum vs. Classical Communication Complexity

On Quantum vs. Classical Communication Complexity On Quantum vs. Classical Communication Complexity Dmitry Gavinsky Institute of Mathematics, Praha Czech Academy of Sciences Introduction Introduction The setting of communication complexity is one of the

More information

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

Exponential separations for one-way quantum communication complexity, with applications to cryptography

Exponential separations for one-way quantum communication complexity, with applications to cryptography Exponential separations for one-way quantum communication complexity, with applications to cryptography Dmitry Gavinsky IQC, University of Waterloo Iordanis Kerenidis CNRS & LRI Univ. de Paris-Sud, Orsay

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Exponential Separations for One-Way Quantum Communication Complexity, with Applications to Cryptography

Exponential Separations for One-Way Quantum Communication Complexity, with Applications to Cryptography Exponential Separations for One-Way Quantum Communication Complexity, with Applications to Cryptography Dmitry Gavinsky IQC, University of Waterloo Julia Kempe CNRS & LRI, Univ. aris-sud, Orsay and School

More information

Exponential Separation of Quantum and Classical Non-Interactive Multi-Party Communication Complexity

Exponential Separation of Quantum and Classical Non-Interactive Multi-Party Communication Complexity Electronic Colloquium on Computational Complexity, Report No. 74 (2007) Exponential Separation of Quantum and Classical Non-Interactive ulti-party Communication Complexity Dmitry Gavinsky Pavel Pudlák

More information

Quantum One-Way Communication is Exponentially Stronger Than Classical Communication

Quantum One-Way Communication is Exponentially Stronger Than Classical Communication Quantum One-Way Communication is Exponentially Stronger Than Classical Communication Bo az Klartag Oded Regev Abstract In STOC 1999, Raz presented a (partial) function for which there is a quantum protocol

More information

Lecture 21: Quantum communication complexity

Lecture 21: Quantum communication complexity CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 21: Quantum communication complexity April 6, 2006 In this lecture we will discuss how quantum information can allow for a

More information

Multi-Party Quantum Communication Complexity with Routed Messages

Multi-Party Quantum Communication Complexity with Routed Messages Multi-Party Quantum Communication Complexity with Routed Messages Seiichiro Tani Masaki Nakanishi Shigeru Yamashita Abstract This paper describes a general quantum lower bounding technique for the communication

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Efficient quantum protocols for XOR functions

Efficient quantum protocols for XOR functions Efficient quantum protocols for XOR functions Shengyu Zhang Abstract We show that for any Boolean function f : {0, 1} n {0, 1}, the bounded-error quantum communication complexity Q ɛ f ) of XOR functions

More information

On the Role of Shared Entanglement

On the Role of Shared Entanglement On the Role of Shared Entanglement Dmitry Gavinsy David R. Cheriton School of Computer Science and Institute for Quantum Computing University of Waterloo Abstract Despite the apparent similarity between

More information

Nonlocal Quantum XOR Games for Large Number of Players

Nonlocal Quantum XOR Games for Large Number of Players onlocal Quantum XOR Games for Large umber of Players Andris Ambainis, Dmitry Kravchenko, ikolajs ahimovs, Alexander Rivosh Faculty of Computing, University of Latvia Abstract onlocal games are used to

More information

Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity

Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity László Babai Peter G. Kimmel Department of Computer Science The University of Chicago 1100 East 58th Street Chicago,

More information

Quantum Pseudo-Telepathy

Quantum Pseudo-Telepathy Quantum Pseudo-Telepathy Michail Lampis mlambis@softlab.ntua.gr NTUA Quantum Pseudo-Telepathy p.1/24 Introduction In Multi-Party computations we are interested in measuring communication complexity. Communication

More information

Optimal quantum strong coin flipping

Optimal quantum strong coin flipping Optimal quantum strong coin flipping André Chailloux LRI Université Paris-Sud andre.chailloux@lri.fr Iordanis Kerenidis CNRS - LRI Université Paris-Sud jkeren@lri.fr April, 009 Abstract Coin flipping is

More information

Information Complexity vs. Communication Complexity: Hidden Layers Game

Information Complexity vs. Communication Complexity: Hidden Layers Game Information Complexity vs. Communication Complexity: Hidden Layers Game Jiahui Liu Final Project Presentation for Information Theory in TCS Introduction Review of IC vs CC Hidden Layers Game Upper Bound

More information

Tensor norms and the classical communication complexity of nonlocal quantum measurement 1 2. Abstract

Tensor norms and the classical communication complexity of nonlocal quantum measurement 1 2. Abstract Tensor norms and the classical communication complexity of nonlocal quantum measurement 1 2 Yaoyun Shi Department of Electrical Engineering and Computer Science The University of Michigan Ann Arbor, MI

More information

Quantum Communication

Quantum Communication Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally

More information

How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions?

How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? Andris Ambainis Ronald de Wolf Abstract It has long been known that any Boolean function that depends on n input

More information

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Unitary evolution: this axiom governs how the state of the quantum system evolves in time. CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the

More information

Quantum Algorithms for Element Distinctness

Quantum Algorithms for Element Distinctness Quantum Algorithms for Element Distinctness Harry Buhrman Christoph Dürr Mark Heiligman Peter Høyer Frédéric Magniez Miklos Santha Ronald de Wolf Abstract We present several applications of quantum amplitude

More information

Quantum boolean functions

Quantum boolean functions Quantum boolean functions Ashley Montanaro 1 and Tobias Osborne 2 1 Department of Computer Science 2 Department of Mathematics University of Bristol Royal Holloway, University of London Bristol, UK London,

More information

ON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS

ON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS Quantum Information and Computation, Vol. 0, No. 0 (2010) 000 000 c Rinton Press ON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS ALEXANDER A. SHERSTOV Department of Computer Sciences,

More information

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02] Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known

More information

Grothendieck Inequalities, XOR games, and Communication Complexity

Grothendieck Inequalities, XOR games, and Communication Complexity Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Quantum Property Testing

Quantum Property Testing Quantum Property Testing Harry Buhrman Lance Fortnow Ilan ewman Hein Röhrig ovember 24, 2003 Abstract A language L has a property tester if there exists a probabilistic algorithm that given an input x

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Hartmut Klauck FB Informatik, Johann-Wolfgang-Goethe-Universität 60054 Frankfurt am Main, Germany Abstract This paper surveys the field of quantum communication complexity.

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for

More information

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

Lecture 3 Small bias with respect to linear tests

Lecture 3 Small bias with respect to linear tests 03683170: Expanders, Pseudorandomness and Derandomization 3/04/16 Lecture 3 Small bias with respect to linear tests Amnon Ta-Shma and Dean Doron 1 The Fourier expansion 1.1 Over general domains Let G be

More information

Lecture 20: Bell inequalities and nonlocality

Lecture 20: Bell inequalities and nonlocality CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the

More information

Equality, Revisited. Ralph C. Bottesch Dmitry Gavinsky Hartmut Klauck

Equality, Revisited. Ralph C. Bottesch Dmitry Gavinsky Hartmut Klauck Equality, Revisited Ralph C. Bottesch Dmitry Gavinsky Hartmut Klauck Abstract In 1979 Yao published a paper that started the field of communication complexity and asked, in particular, what was the randomised

More information

Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness

Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness Amit Chakrabarti School of Mathematics Institute for Advanced Study Princeton, NJ 08540 amitc@ias.edu Subhash Khot

More information

Lecture Lecture 9 October 1, 2015

Lecture Lecture 9 October 1, 2015 CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest

More information

6.896 Quantum Complexity Theory November 4th, Lecture 18

6.896 Quantum Complexity Theory November 4th, Lecture 18 6.896 Quantum Complexity Theory November 4th, 2008 Lecturer: Scott Aaronson Lecture 18 1 Last Time: Quantum Interactive Proofs 1.1 IP = PSPACE QIP = QIP(3) EXP The first result is interesting, because

More information

Quantum Property Testing

Quantum Property Testing Quantum Property Testing Harry Buhrman Lance Fortnow Ilan ewman Hein Röhrig March 24, 2004 Abstract A language L has a property tester if there exists a probabilistic algorithm that given an input x only

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

The Quantum Query Complexity of Algebraic Properties

The Quantum Query Complexity of Algebraic Properties The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430

More information

Algebraic Problems in Computational Complexity

Algebraic Problems in Computational Complexity Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.

More information

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY Eric Blais, Joshua Brody, and Kevin Matulef February 1, 01 Abstract. We develop a new technique for proving lower bounds in property testing,

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity

Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity Jeff Ford and Anna Gál Dept. of Computer Science, University of Texas at Austin, Austin, TX 78712-1188, USA {jeffford, panni}@cs.utexas.edu

More information

Optimal bounds for quantum bit commitment

Optimal bounds for quantum bit commitment Optimal bounds for quantum bit commitment André Chailloux LRI Université Paris-Sud andre.chailloux@gmail.fr Iordanis Kerenidis CNRS - LIAFA Université Paris 7 jkeren@liafa.jussieu.fr 1 Introduction Quantum

More information

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2 CMPT 881: Pseudorandomness Prof. Valentine Kabanets Lecture 20: N W Pseudorandom Generator November 25, 2004 Scribe: Ladan A. Mahabadi 1 Introduction In this last lecture of the course, we ll discuss the

More information

Hardness of MST Construction

Hardness of MST Construction Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what

More information

An Information Complexity Approach to the Inner Product Problem

An Information Complexity Approach to the Inner Product Problem An Information Complexity Approach to the Inner Product Problem William Henderson-Frost Advisor: Amit Chakrabarti Senior Honors Thesis Submitted to the faculty in partial fulfillment of the requirements

More information

arxiv: v3 [cs.cc] 28 Jun 2015

arxiv: v3 [cs.cc] 28 Jun 2015 Parity Decision Tree Complexity and 4-Party Communication Complexity of XOR-functions Are Polynomially Equivalent arxiv:156.2936v3 [cs.cc] 28 Jun 215 Penghui Yao CWI, Amsterdam phyao1985@gmail.com September

More information

An Introduction to Analysis of Boolean functions

An Introduction to Analysis of Boolean functions An Introduction to Analysis of Boolean functions Mohammad Bavarian Massachusetts Institute of Technology 1 Introduction The focus of much of harmonic analysis is the study of functions, and operators on

More information

Rounds in Communication Complexity Revisited

Rounds in Communication Complexity Revisited Rounds in Communication Complexity Revisited Noam Nisan Hebrew University Avi Widgerson Hebrew University and Princeton University Abstract The k-round two-party communication complexity was studied in

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Quantum Symmetrically-Private Information Retrieval

Quantum Symmetrically-Private Information Retrieval Quantum Symmetrically-Private Information Retrieval Iordanis Kerenidis UC Berkeley jkeren@cs.berkeley.edu Ronald de Wolf CWI Amsterdam rdewolf@cwi.nl arxiv:quant-ph/0307076v 0 Jul 003 Abstract Private

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

Quantum Hashing for Finite Abelian Groups arxiv: v1 [quant-ph] 7 Mar 2016

Quantum Hashing for Finite Abelian Groups arxiv: v1 [quant-ph] 7 Mar 2016 Quantum Hashing for Finite Abelian Groups arxiv:1603.02209v1 [quant-ph] 7 Mar 2016 Alexander Vasiliev Abstract We propose a generalization of the quantum hashing technique based on the notion of the small-bias

More information

Distinguishing two probability ensembles with one sample from each ensemble

Distinguishing two probability ensembles with one sample from each ensemble Distinguishing two probability ensembles with one sample from each ensemble Luís Antunes 1,2 Harry Buhrman 3,4 Armando Matos 2,5 André Souto 6,7 Andreia Teixeira 2,8 1 CRACS & INESC-TEC 2 DCC - Faculdade

More information

Non-locality and Communication Complexity

Non-locality and Communication Complexity Non-locality and Communication Complexity Harry Buhrman Richard Cleve Serge Massar Ronald de Wolf July 21, 2009 Abstract Quantum information processing is the emerging field that defines and realizes computing

More information

Exact Quantum Amplitude Amplification for the Leader Election Problem

Exact Quantum Amplitude Amplification for the Leader Election Problem Exact Quantum Amplitude Amplification for the Leader Election Problem Seiichiro Tani tani@theory.brl.ntt.co.jp Hirotada Kobayashi hirotada@nii.ac.jp Keiji Matsumoto keiji@nii.ac.jp NTT Communication Science

More information

Communication Complexity

Communication Complexity Communication Complexity Jie Ren Adaptive Signal Processing and Information Theory Group Nov 3 rd, 2014 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, 2014 1 / 77 1 E. Kushilevitz and N. Nisan, Communication Complexity,

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students

More information

Lecture 10 + additional notes

Lecture 10 + additional notes CSE533: Information Theorn Computer Science November 1, 2010 Lecturer: Anup Rao Lecture 10 + additional notes Scribe: Mohammad Moharrami 1 Constraint satisfaction problems We start by defining bivariate

More information

Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions

Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions LATVIJAS UNIVERSITĀTES RAKSTI. 008, 733. sēj.: DATORZINĀTNE UN INFORMĀCIJAS TEHNOLOĢIJAS 15. 38. lpp. Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions Alina Vasiljeva

More information

ROUNDS IN COMMUNICATION COMPLEXITY REVISITED

ROUNDS IN COMMUNICATION COMPLEXITY REVISITED ROUNDS IN COMMUNICATION COMPLEXITY REVISITED NOAM NISAN AND AVI WIDGERSON Abstract. The k-round two-party communication complexity was studied in the deterministic model by [14] and [4] and in the probabilistic

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Adi Shraibman Weizmann Institute of Science Robert Špalek Google Direct product theorems: Why is Google interested? Direct product theorems:

More information

Testing Booleanity and the Uncertainty Principle

Testing Booleanity and the Uncertainty Principle Testing Booleanity and the Uncertainty Principle Tom Gur Weizmann Institute of Science tom.gur@weizmann.ac.il Omer Tamuz Weizmann Institute of Science omer.tamuz@weizmann.ac.il Abstract Let f : { 1, 1}

More information

On the P versus NP intersected with co-np question in communication complexity

On the P versus NP intersected with co-np question in communication complexity On the P versus NP intersected with co-np question in communication complexity Stasys Jukna Abstract We consider the analog of the P versus NP co-np question for the classical two-party communication protocols

More information

arxiv: v2 [quant-ph] 19 Mar 2016

arxiv: v2 [quant-ph] 19 Mar 2016 Time-space tradeoffs for two-way finite automata Shenggen Zheng zhengshenggen@gmail.com Sun Yat-sen University Daowen Qiu issqdw@mail.sysu.edu.cn Sun Yat-sen University Jozef Gruska gruska@fi.muni.cz Masaryk

More information

Notes for Lecture 25

Notes for Lecture 25 U.C. Berkeley CS278: Computational Complexity Handout N25 ofessor Luca Trevisan 12/1/2004 Notes for Lecture 25 Circuit Lower Bounds for Parity Using Polynomials In this lecture we prove a lower bound on

More information

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games Scribe: Zeyu Guo In the first lecture, we saw three equivalent variants of the classical PCP theorems in terms of CSP, proof checking,

More information

Notes for Lecture 15

Notes for Lecture 15 U.C. Berkeley CS278: Computational Complexity Handout N15 Professor Luca Trevisan 10/27/2004 Notes for Lecture 15 Notes written 12/07/04 Learning Decision Trees In these notes it will be convenient to

More information

QUANTUM ARTHUR MERLIN GAMES

QUANTUM ARTHUR MERLIN GAMES comput. complex. 14 (2005), 122 152 1016-3328/05/020122 31 DOI 10.1007/s00037-005-0194-x c Birkhäuser Verlag, Basel 2005 computational complexity QUANTUM ARTHUR MERLIN GAMES Chris Marriott and John Watrous

More information

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i. CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy

More information

Linear sketching for Functions over Boolean Hypercube

Linear sketching for Functions over Boolean Hypercube Linear sketching for Functions over Boolean Hypercube Grigory Yaroslavtsev (Indiana University, Bloomington) http://grigory.us with Sampath Kannan (U. Pennsylvania), Elchanan Mossel (MIT) and Swagato Sanyal

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Robert Špalek Google Direct product theorems: Why is Google interested? Direct product theorems: Why should Google be interested? Direct

More information

Exponential Lower Bound for 2-Query Locally Decodable Codes via a Quantum Argument

Exponential Lower Bound for 2-Query Locally Decodable Codes via a Quantum Argument Exponential Lower Bound for 2-Query Locally Decodable Codes via a Quantum Argument Iordanis Kerenidis UC Berkeley, CS Division 587 Soda Hall Berkeley, CA 94720 U.S.A. jkeren@cs.berkeley.edu Ronald de Wolf

More information

Lecture 8: Linearity and Assignment Testing

Lecture 8: Linearity and Assignment Testing CE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 8: Linearity and Assignment Testing 26 October 2005 Lecturer: Venkat Guruswami cribe: Paul Pham & Venkat Guruswami 1 Recap In

More information

Lecture 1: Overview of quantum information

Lecture 1: Overview of quantum information CPSC 59/69: Quantum Computation John Watrous, University of Calgary References Lecture : Overview of quantum information January 0, 006 Most of the material in these lecture notes is discussed in greater

More information

Arthur-Merlin Streaming Complexity

Arthur-Merlin Streaming Complexity Weizmann Institute of Science Joint work with Ran Raz Data Streams The data stream model is an abstraction commonly used for algorithms that process network traffic using sublinear space. A data stream

More information

14. Direct Sum (Part 1) - Introduction

14. Direct Sum (Part 1) - Introduction Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in

More information

Product theorems via semidefinite programming

Product theorems via semidefinite programming Product theorems via semidefinite programming Troy Lee Department of Computer Science Rutgers University Rajat Mittal Department of Computer Science Rutgers University Abstract The tendency of semidefinite

More information

LOWER BOUNDS FOR QUANTUM COMMUNICATION COMPLEXITY

LOWER BOUNDS FOR QUANTUM COMMUNICATION COMPLEXITY LOWER BOUNDS FOR QUANTUM COMMUNICATION COMPLEXITY HARTMUT KLAUCK Abstract. We prove lower bounds on the bounded error quantum communication complexity. Our methods are based on the Fourier transform of

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

Quantum Computing 1. Multi-Qubit System. Goutam Biswas. Lect 2

Quantum Computing 1. Multi-Qubit System. Goutam Biswas. Lect 2 Quantum Computing 1 Multi-Qubit System Quantum Computing State Space of Bits The state space of a single bit is {0,1}. n-bit state space is {0,1} n. These are the vertices of the n-dimensional hypercube.

More information

A direct product theorem for discrepancy

A direct product theorem for discrepancy A direct product theorem for discrepancy Troy Lee Department of Computer Science Rutgers University Robert Špalek Google, Inc. Adi Shraibman Department of Mathematics Weizmann Institute of Science Abstract

More information

Approximation norms and duality for communication complexity lower bounds

Approximation norms and duality for communication complexity lower bounds Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased

More information