10,028 research outputs found
New Bounds for the Garden-Hose Model
We show new results about the garden-hose model. Our main results include
improved lower bounds based on non-deterministic communication complexity
(leading to the previously unknown bounds for Inner Product mod 2
and Disjointness), as well as an upper bound for the
Distributed Majority function (previously conjectured to have quadratic
complexity). We show an efficient simulation of formulae made of AND, OR, XOR
gates in the garden-hose model, which implies that lower bounds on the
garden-hose complexity of the order will be
hard to obtain for explicit functions. Furthermore we study a time-bounded
variant of the model, in which even modest savings in time can lead to
exponential lower bounds on the size of garden-hose protocols.Comment: In FSTTCS 201
The Garden Hose Complexity for the Equality Function
The garden hose complexity is a new communication complexity introduced by H.
Buhrman, S. Fehr, C. Schaffner and F. Speelman [BFSS13] to analyze
position-based cryptography protocols in the quantum setting. We focus on the
garden hose complexity of the equality function, and improve on the bounds of
O. Margalit and A. Matsliah[MM12] with the help of a new approach and of our
handmade simulated annealing based solver. We have also found beautiful
symmetries of the solutions that have lead us to develop the notion of garden
hose permutation groups. Then, exploiting this new concept, we get even
further, although several interesting open problems remain.Comment: 16 page
Communication Memento: Memoryless Communication Complexity
We study the communication complexity of computing functions
in the memoryless
communication model. Here, Alice is given , Bob is given and their goal is to compute F(x,y) subject to the following
constraint: at every round, Alice receives a message from Bob and her reply to
Bob solely depends on the message received and her input x; the same applies to
Bob. The cost of computing F in this model is the maximum number of bits
exchanged in any round between Alice and Bob (on the worst case input x,y). In
this paper, we also consider variants of our memoryless model wherein one party
is allowed to have memory, the parties are allowed to communicate quantum bits,
only one player is allowed to send messages. We show that our memoryless
communication model capture the garden-hose model of computation by Buhrman et
al. (ITCS'13), space bounded communication complexity by Brody et al. (ITCS'13)
and the overlay communication complexity by Papakonstantinou et al. (CCC'14).
Thus the memoryless communication complexity model provides a unified framework
to study space-bounded communication models. We establish the following: (1) We
show that the memoryless communication complexity of F equals the logarithm of
the size of the smallest bipartite branching program computing F (up to a
factor 2); (2) We show that memoryless communication complexity equals
garden-hose complexity; (3) We exhibit various exponential separations between
these memoryless communication models.
We end with an intriguing open question: can we find an explicit function F
and universal constant c>1 for which the memoryless communication complexity is
at least ? Note that would imply a
lower bound for general formula size, improving
upon the best lower bound by Ne\v{c}iporuk in 1966.Comment: 30 Pages; several improvements to the presentation
Code-routing: a new attack on position verification
The cryptographic task of position verification attempts to verify one
party's location in spacetime by exploiting constraints on quantum information
and relativistic causality. A popular verification scheme known as -routing
involves requiring the prover to redirect a quantum system based on the value
of a Boolean function . Cheating strategies for the -routing scheme
require the prover use pre-shared entanglement, and security of the scheme
rests on assumptions about how much entanglement a prover can manipulate. Here,
we give a new cheating strategy in which the quantum system is encoded into a
secret-sharing scheme, and the authorization structure of the secret-sharing
scheme is exploited to direct the system appropriately. This strategy completes
the -routing task using EPR pairs, where is the
minimal size of a span program over the field computing .
This shows we can efficiently attack -routing schemes whenever is in the
complexity class , after allowing for local
pre-processing. The best earlier construction achieved the class L, which is
believed to be strictly inside of . We also show that the
size of a quantum secret sharing scheme with indicator function upper
bounds entanglement cost of -routing on the function .Comment: 29 pages, v4 adds minor comment
Instantaneous Non-Local Computation of Low T-Depth Quantum Circuits
Instantaneous non-local quantum computation requires multiple parties to jointly perform a quantum operation, using pre-shared entanglement and a single round of simultaneous communication. We study this task for its close connection to position-based quantum cryptography, but it also has natural applications in the context of foundations of quantum physics and in distributed computing. The best known general construction for instantaneous non-local quantum computation requires a pre-shared state which is exponentially large in the number of qubits involved in the operation, while efficient constructions are known for very specific cases only.
We partially close this gap by presenting new schemes for efficient instantaneous non-local computation of several classes of quantum circuits, using the Clifford+T gate set. Our main result is a protocol which uses entanglement exponential in the T-depth of a quantum circuit, able to perform non-local computation of quantum circuits with a (poly-)logarithmic number of layers of T gates with quasi-polynomial entanglement. Our proofs combine ideas from blind and delegated quantum computation with the garden-hose model, a combinatorial model of communication complexity which was recently introduced as a tool for studying certain schemes for quantum position verification. As an application of our results, we also present an efficient attack on a recently-proposed scheme for position verification by Chakraborty and Leverrier
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
Complexity and entanglement in non-local computation and holography
Does gravity constrain computation? We study this question using the AdS/CFT
correspondence, where computation in the presence of gravity can be related to
non-gravitational physics in the boundary theory. In AdS/CFT, computations
which happen locally in the bulk are implemented in a particular non-local form
in the boundary, which in general requires distributed entanglement. In more
detail, we recall that for a large class of bulk subregions the area of a
surface called the ridge is equal to the mutual information available in the
boundary to perform the computation non-locally. We then argue the complexity
of the local operation controls the amount of entanglement needed to implement
it non-locally, and in particular complexity and entanglement cost are related
by a polynomial. If this relationship holds, gravity constrains the complexity
of operations within these regions to be polynomial in the area of the ridge.Comment: v2 weakens some statements made in section 2.
- …