159 research outputs found
Classical and quantum fingerprinting with shared randomness and one-sided error
Within the simultaneous message passing model of communication complexity,
under a public-coin assumption, we derive the minimum achievable worst-case
error probability of a classical fingerprinting protocol with one-sided error.
We then present entanglement-assisted quantum fingerprinting protocols
attaining worst-case error probabilities that breach this bound.Comment: 10 pages, 1 figur
Single-qubit optical quantum fingerprinting
We analyze and demonstrate the feasibility and superiority of linear optical
single-qubit fingerprinting over its classical counterpart. For one-qubit
fingerprinting of two-bit messages, we prepare `tetrahedral' qubit states
experimentally and show that they meet the requirements for quantum
fingerprinting to exceed the classical capability. We prove that shared
entanglement permits 100% reliable quantum fingerprinting, which will
outperform classical fingerprinting even with arbitrary amounts of shared
randomness.Comment: 4 pages, one figur
One-qubit fingerprinting schemes
Fingerprinting is a technique in communication complexity in which two
parties (Alice and Bob) with large data sets send short messages to a third
party (a referee), who attempts to compute some function of the larger data
sets. For the equality function, the referee attempts to determine whether
Alice's data and Bob's data are the same. In this paper, we consider the
extreme scenario of performing fingerprinting where Alice and Bob both send
either one bit (classically) or one qubit (in the quantum regime) messages to
the referee for the equality problem. Restrictive bounds are demonstrated for
the error probability of one-bit fingerprinting schemes, and show that it is
easy to construct one-qubit fingerprinting schemes which can outperform any
one-bit fingerprinting scheme. The author hopes that this analysis will provide
results useful for performing physical experiments, which may help to advance
implementations for more general quantum communication protocols.Comment: 9 pages; Fixed some typos; changed order of bibliographical
reference
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Classical and quantum partition bound and detector inefficiency
We study randomized and quantum efficiency lower bounds in communication
complexity. These arise from the study of zero-communication protocols in which
players are allowed to abort. Our scenario is inspired by the physics setup of
Bell experiments, where two players share a predefined entangled state but are
not allowed to communicate. Each is given a measurement as input, which they
perform on their share of the system. The outcomes of the measurements should
follow a distribution predicted by quantum mechanics; however, in practice, the
detectors may fail to produce an output in some of the runs. The efficiency of
the experiment is the probability that the experiment succeeds (neither of the
detectors fails).
When the players share a quantum state, this gives rise to a new bound on
quantum communication complexity (eff*) that subsumes the factorization norm.
When players share randomness instead of a quantum state, the efficiency bound
(eff), coincides with the partition bound of Jain and Klauck. This is one of
the strongest lower bounds known for randomized communication complexity, which
subsumes all the known combinatorial and algebraic methods including the
rectangle (corruption) bound, the factorization norm, and discrepancy.
The lower bound is formulated as a convex optimization problem. In practice,
the dual form is more feasible to use, and we show that it amounts to
constructing an explicit Bell inequality (for eff) or Tsirelson inequality (for
eff*). We give an example of a quantum distribution where the violation can be
exponentially bigger than the previously studied class of normalized Bell
inequalities.
For one-way communication, we show that the quantum one-way partition bound
is tight for classical communication with shared entanglement up to arbitrarily
small error.Comment: 21 pages, extended versio
The Quantum Frontier
The success of the abstract model of computation, in terms of bits, logical
operations, programming language constructs, and the like, makes it easy to
forget that computation is a physical process. Our cherished notions of
computation and information are grounded in classical mechanics, but the
physics underlying our world is quantum. In the early 80s researchers began to
ask how computation would change if we adopted a quantum mechanical, instead of
a classical mechanical, view of computation. Slowly, a new picture of
computation arose, one that gave rise to a variety of faster algorithms, novel
cryptographic mechanisms, and alternative methods of communication. Small
quantum information processing devices have been built, and efforts are
underway to build larger ones. Even apart from the existence of these devices,
the quantum view on information processing has provided significant insight
into the nature of computation and information, and a deeper understanding of
the physics of our universe and its connections with computation.
We start by describing aspects of quantum mechanics that are at the heart of
a quantum view of information processing. We give our own idiosyncratic view of
a number of these topics in the hopes of correcting common misconceptions and
highlighting aspects that are often overlooked. A number of the phenomena
described were initially viewed as oddities of quantum mechanics. It was
quantum information processing, first quantum cryptography and then, more
dramatically, quantum computing, that turned the tables and showed that these
oddities could be put to practical effect. It is these application we describe
next. We conclude with a section describing some of the many questions left for
future work, especially the mysteries surrounding where the power of quantum
information ultimately comes from.Comment: Invited book chapter for Computation for Humanity - Information
Technology to Advance Society to be published by CRC Press. Concepts
clarified and style made more uniform in version 2. Many thanks to the
referees for their suggestions for improvement
On Quantum Fingerprinting and Quantum Cryptographic Hashing
Fingerprinting and cryptographic hashing have quite different usages in computer science, but have similar properties. Interpretation of their properties is determined by the area of their usage: fingerprinting methods are methods for constructing efficient randomized and quantum algorithms for computational problems, whereas hashing methods are one of the central cryptographical primitives. Fingerprinting and hashing methods are being developed from the mid of the previous century, whereas quantum fingerprinting and quantum hashing have a short history. In this chapter, we investigate quantum fingerprinting and quantum hashing. We present computational aspects of quantum fingerprinting and quantum hashing and discuss cryptographical properties of quantum hashing
Correlation in Hard Distributions in Communication Complexity
We study the effect that the amount of correlation in a bipartite
distribution has on the communication complexity of a problem under that
distribution. We introduce a new family of complexity measures that
interpolates between the two previously studied extreme cases: the (standard)
randomised communication complexity and the case of distributional complexity
under product distributions.
We give a tight characterisation of the randomised complexity of Disjointness
under distributions with mutual information , showing that it is
for all . This smoothly interpolates
between the lower bounds of Babai, Frankl and Simon for the product
distribution case (), and the bound of Razborov for the randomised case.
The upper bounds improve and generalise what was known for product
distributions, and imply that any tight bound for Disjointness needs
bits of mutual information in the corresponding distribution.
We study the same question in the distributional quantum setting, and show a
lower bound of , and an upper bound, matching up to a
logarithmic factor.
We show that there are total Boolean functions on inputs that have
distributional communication complexity under all distributions of
information up to , while the (interactive) distributional complexity
maximised over all distributions is for .
We show that in the setting of one-way communication under product
distributions, the dependence of communication cost on the allowed error
is multiplicative in -- the previous upper bounds
had the dependence of more than
- …