3,869 research outputs found
Exact Quantum Query Algorithm for Error Detection Code Verification
Quantum algorithms can be analyzed in a query model to compute Boolean functions.
Function input is provided in a black box, and the aim is to compute the function value using as few queries to the black box as possible.
A repetition code is an error detection scheme that repeats each bit of the original message r times.
After a message with redundant bits is transmitted via a communication channel, it must be verified.
If the received message consists of r-size blocks of equal bits, the conclusion is that there were no errors.
The verification procedure can be interpreted as an application of a query algorithm, where input is a message to be checked.
Classically, for N-bit message, values of all N variables must be queried. We demonstrate an exact quantum algorithm that uses only N/2 queries
Superlinear advantage for exact quantum algorithms
A quantum algorithm is exact if, on any input data, it outputs the correct
answer with certainty (probability 1). A key question is: how big is the
advantage of exact quantum algorithms over their classical counterparts:
deterministic algorithms. For total Boolean functions in the query model, the
biggest known gap was just a factor of 2: PARITY of N inputs bits requires
queries classically but can be computed with N/2 queries by an exact quantum
algorithm.
We present the first example of a Boolean function f(x_1, ..., x_N) for which
exact quantum algorithms have superlinear advantage over the deterministic
algorithms. Any deterministic algorithm that computes our function must use N
queries but an exact quantum algorithm can compute it with O(N^{0.8675...})
queries.Comment: 20 pages, v6: small number of small correction
Quantum Locally Testable Codes
We initiate the study of quantum Locally Testable Codes (qLTCs). We provide a
definition together with a simplification, denoted sLTCs, for the special case
of stabilizer codes, together with some basic results using those definitions.
The most crucial parameter of such codes is their soundness, ,
namely, the probability that a randomly chosen constraint is violated as a
function of the distance of a word from the code (, the relative
distance from the code, is called the proximity). We then proceed to study
limitations on qLTCs. In our first main result we prove a surprising,
inherently quantum, property of sLTCs: for small values of proximity, the
better the small-set expansion of the interaction graph of the constraints, the
less sound the qLTC becomes. This phenomenon, which can be attributed to
monogamy of entanglement, stands in sharp contrast to the classical setting.
The complementary, more intuitive, result also holds: an upper bound on the
soundness when the code is defined on poor small-set expanders (a bound which
turns out to be far more difficult to show in the quantum case). Together we
arrive at a quantum upper-bound on the soundness of stabilizer qLTCs set on any
graph, which does not hold in the classical case. Many open questions are
raised regarding what possible parameters are achievable for qLTCs. In the
appendix we also define a quantum analogue of PCPs of proximity (PCPPs) and
point out that the result of Ben-Sasson et. al. by which PCPPs imply LTCs with
related parameters, carries over to the sLTCs. This creates a first link
between qLTCs and quantum PCPs.Comment: Some of the results presented here appeared in an initial form in our
quant-ph submission arXiv:1301.3407. This is a much extended and improved
version. 30 pages, no figure
Decision and function problems based on boson sampling
Boson sampling is a mathematical problem that is strongly believed to be
intractable for classical computers, whereas passive linear interferometers can
produce samples efficiently. So far, the problem remains a computational
curiosity, and the possible usefulness of boson-sampling devices is mainly
limited to the proof of quantum supremacy. The purpose of this work is to
investigate whether boson sampling can be used as a resource of decision and
function problems that are computationally hard, and may thus have
cryptographic applications. After the definition of a rather general
theoretical framework for the design of such problems, we discuss their
solution by means of a brute-force numerical approach, as well as by means of
non-boson samplers. Moreover, we estimate the sample sizes required for their
solution by passive linear interferometers, and it is shown that they are
independent of the size of the Hilbert space.Comment: Close to the version published in PR
Unforgeable Quantum Encryption
We study the problem of encrypting and authenticating quantum data in the
presence of adversaries making adaptive chosen plaintext and chosen ciphertext
queries. Classically, security games use string copying and comparison to
detect adversarial cheating in such scenarios. Quantumly, this approach would
violate no-cloning. We develop new techniques to overcome this problem: we use
entanglement to detect cheating, and rely on recent results for characterizing
quantum encryption schemes. We give definitions for (i.) ciphertext
unforgeability , (ii.) indistinguishability under adaptive chosen-ciphertext
attack, and (iii.) authenticated encryption. The restriction of each definition
to the classical setting is at least as strong as the corresponding classical
notion: (i) implies INT-CTXT, (ii) implies IND-CCA2, and (iii) implies AE. All
of our new notions also imply QIND-CPA privacy. Combining one-time
authentication and classical pseudorandomness, we construct schemes for each of
these new quantum security notions, and provide several separation examples.
Along the way, we also give a new definition of one-time quantum authentication
which, unlike all previous approaches, authenticates ciphertexts rather than
plaintexts.Comment: 22+2 pages, 1 figure. v3: error in the definition of QIND-CCA2 fixed,
some proofs related to QIND-CCA2 clarifie
- …