2,506 research outputs found
Efficient quantum protocols for XOR functions
We show that for any Boolean function f on {0,1}^n, the bounded-error quantum
communication complexity of XOR functions satisfies that
, where d is the F2-degree of f, and
.
This implies that the previous lower bound by Lee and Shraibman \cite{LS09} is tight
for f with low F2-degree. The result also confirms the quantum version of the
Log-rank Conjecture for low-degree XOR functions. In addition, we show that the
exact quantum communication complexity satisfies , where is the number of nonzero Fourier coefficients of
f. This matches the previous lower bound
by Buhrman and de Wolf \cite{BdW01} for low-degree XOR functions.Comment: 11 pages, no figur
On the communication complexity of XOR functions
An XOR function is a function of the form g(x,y) = f(x + y), for some boolean
function f on n bits. We study the quantum and classical communication
complexity of XOR functions. In the case of exact protocols, we completely
characterise one-way communication complexity for all f. We also show that,
when f is monotone, g's quantum and classical complexities are quadratically
related, and that when f is a linear threshold function, g's quantum complexity
is Theta(n). More generally, we make a structural conjecture about the Fourier
spectra of boolean functions which, if true, would imply that the quantum and
classical exact communication complexities of all XOR functions are
asymptotically equivalent. We give two randomised classical protocols for
general XOR functions which are efficient for certain functions, and a third
protocol for linear threshold functions with high margin. These protocols
operate in the symmetric message passing model with shared randomness.Comment: 18 pages; v2: minor correction
Algorithms and lower bounds for de Morgan formulas of low-communication leaf gates
The class consists of Boolean functions
computable by size- de Morgan formulas whose leaves are any Boolean
functions from a class . We give lower bounds and (SAT, Learning,
and PRG) algorithms for , for classes
of functions with low communication complexity. Let
be the maximum -party NOF randomized communication
complexity of . We show:
(1) The Generalized Inner Product function cannot be computed in
on more than fraction of inputs
for As a corollary, we get an average-case lower bound for
against .
(2) There is a PRG of seed length that -fools . For
, we get the better seed length . This gives the first
non-trivial PRG (with seed length ) for intersections of half-spaces
in the regime where .
(3) There is a randomized -time SAT algorithm for , where In particular, this implies a nontrivial
#SAT algorithm for .
(4) The Minimum Circuit Size Problem is not in .
On the algorithmic side, we show that can be
PAC-learned in time
Quantum-enhanced Secure Delegated Classical Computing
We present a quantumly-enhanced protocol to achieve unconditionally secure
delegated classical computation where the client and the server have both
limited classical and quantum computing capacity. We prove the same task cannot
be achieved using only classical protocols. This extends the work of Anders and
Browne on the computational power of correlations to a security setting.
Concretely, we present how a client with access to a non-universal classical
gate such as a parity gate could achieve unconditionally secure delegated
universal classical computation by exploiting minimal quantum gadgets. In
particular, unlike the universal blind quantum computing protocols, the
restriction of the task to classical computing removes the need for a full
universal quantum machine on the side of the server and makes these new
protocols readily implementable with the currently available quantum technology
in the lab
A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing and LDCs
The Bonami-Beckner hypercontractive inequality is a powerful tool in Fourier
analysis of real-valued functions on the Boolean cube. In this paper we present
a version of this inequality for matrix-valued functions on the Boolean cube.
Its proof is based on a powerful inequality by Ball, Carlen, and Lieb. We also
present a number of applications. First, we analyze maps that encode
classical bits into qubits, in such a way that each set of bits can be
recovered with some probability by an appropriate measurement on the quantum
encoding; we show that if , then the success probability is
exponentially small in . This result may be viewed as a direct product
version of Nayak's quantum random access code bound. It in turn implies strong
direct product theorems for the one-way quantum communication complexity of
Disjointness and other problems. Second, we prove that error-correcting codes
that are locally decodable with 2 queries require length exponential in the
length of the encoded string. This gives what is arguably the first
``non-quantum'' proof of a result originally derived by Kerenidis and de Wolf
using quantum information theory, and answers a question by Trevisan.Comment: This is the full version of a paper that will appear in the
proceedings of the IEEE FOCS 08 conferenc
- β¦