3,241 research outputs found
Two Results about Quantum Messages
We show two results about the relationship between quantum and classical
messages. Our first contribution is to show how to replace a quantum message in
a one-way communication protocol by a deterministic message, establishing that
for all partial Boolean functions we
have . This bound was previously
known for total functions, while for partial functions this improves on results
by Aaronson, in which either a log-factor on the right hand is present, or the
left hand side is , and in which also no entanglement is
allowed.
In our second contribution we investigate the power of quantum proofs over
classical proofs. We give the first example of a scenario, where quantum proofs
lead to exponential savings in computing a Boolean function. The previously
only known separation between the power of quantum and classical proofs is in a
setting where the input is also quantum.
We exhibit a partial Boolean function , such that there is a one-way
quantum communication protocol receiving a quantum proof (i.e., a protocol of
type QMA) that has cost for , whereas every one-way quantum
protocol for receiving a classical proof (protocol of type QCMA) requires
communication
Quantum Branching Programs and Space-Bounded Nonuniform Quantum Complexity
In this paper, the space complexity of nonuniform quantum computations is
investigated. The model chosen for this are quantum branching programs, which
provide a graphic description of sequential quantum algorithms. In the first
part of the paper, simulations between quantum branching programs and
nonuniform quantum Turing machines are presented which allow to transfer lower
and upper bound results between the two models. In the second part of the
paper, different variants of quantum OBDDs are compared with their
deterministic and randomized counterparts. In the third part, quantum branching
programs are considered where the performed unitary operation may depend on the
result of a previous measurement. For this model a simulation of randomized
OBDDs and exponential lower bounds are presented.Comment: 45 pages, 3 Postscript figures. Proofs rearranged, typos correcte
Shadow Tomography of Quantum States
We introduce the problem of *shadow tomography*: given an unknown
-dimensional quantum mixed state , as well as known two-outcome
measurements , estimate the probability that
accepts , to within additive error , for each of the
measurements. How many copies of are needed to achieve this, with high
probability? Surprisingly, we give a procedure that solves the problem by
measuring only copies. This means, for example, that we can learn the behavior of an
arbitrary -qubit state, on all accepting/rejecting circuits of some fixed
polynomial size, by measuring only copies of the state.
This resolves an open problem of the author, which arose from his work on
private-key quantum money schemes, but which also has applications to quantum
copy-protected software, quantum advice, and quantum one-way communication.
Recently, building on this work, Brand\~ao et al. have given a different
approach to shadow tomography using semidefinite programming, which achieves a
savings in computation time.Comment: 29 pages, extended abstract appeared in Proceedings of STOC'2018,
revised to give slightly better upper bound (1/eps^4 rather than 1/eps^5) and
lower bounds with explicit dependence on the dimension
Quantum Proofs
Quantum information and computation provide a fascinating twist on the notion
of proofs in computational complexity theory. For instance, one may consider a
quantum computational analogue of the complexity class \class{NP}, known as
QMA, in which a quantum state plays the role of a proof (also called a
certificate or witness), and is checked by a polynomial-time quantum
computation. For some problems, the fact that a quantum proof state could be a
superposition over exponentially many classical states appears to offer
computational advantages over classical proof strings. In the interactive proof
system setting, one may consider a verifier and one or more provers that
exchange and process quantum information rather than classical information
during an interaction for a given input string, giving rise to quantum
complexity classes such as QIP, QSZK, and QMIP* that represent natural quantum
analogues of IP, SZK, and MIP. While quantum interactive proof systems inherit
some properties from their classical counterparts, they also possess distinct
and uniquely quantum features that lead to an interesting landscape of
complexity classes based on variants of this model.
In this survey we provide an overview of many of the known results concerning
quantum proofs, computational models based on this concept, and properties of
the complexity classes they define. In particular, we discuss non-interactive
proofs and the complexity class QMA, single-prover quantum interactive proof
systems and the complexity class QIP, statistical zero-knowledge quantum
interactive proof systems and the complexity class \class{QSZK}, and
multiprover interactive proof systems and the complexity classes QMIP, QMIP*,
and MIP*.Comment: Survey published by NOW publisher
Quantum and classical strong direct product theorems and optimal time-space tradeoffs
A strong direct product theorem says that if we want to compute
independent instances of a function, using less than times
the resources needed for one instance, then our overall success
probability will be exponentially small in .
We establish such theorems for the classical as well as quantum
query complexity of the OR-function. This implies slightly
weaker direct product results for all total functions.
We prove a similar result for quantum communication
protocols computing instances of the disjointness function.
Our direct product theorems imply a time-space tradeoff
T^2S=\Om{N^3} for sorting items on a quantum computer, which
is optimal up to polylog factors. They also give several tight
time-space and communication-space tradeoffs for the problems of
Boolean matrix-vector multiplication and matrix multiplication
μμ μ»΄ν¨ν°μ λν μνΈνμ μκ³ λ¦¬μ¦
νμλ
Όλ¬Έ(λ°μ¬) -- μμΈλνκ΅λνμ : μμ°κ³Όνλν μ리과νλΆ, 2022. 8. μ΄νν¬.The advent of a quantum mechanical computer presents a clear threat to existing cryptography. On the other hand, the quantum computer also suggests the possibility of a new cryptographic protocol through the properties of quantum mechanics. These two perspectives, respectively, gave rise to a new field called post-quantum cryptography as a countermeasure against quantum attacks and quantum cryptography as a new cryptographic technology using quantum mechanics, which are the subject of this thesis.
In this thesis, we reconsider the security of the current post-quantum cryptography through a new quantum attack, model, and security proof. We present the fine-grained quantum security of hash functions as cryptographic primitives against preprocessing adversaries. We also bring recent quantum information theoretic research into cryptography, creating new quantum public key encryption and quantum commitment. Along the way, we resolve various open problems such as limitations of quantum algorithms with preprocessing computation, oracle separation problems in quantum complexity theory, and public key encryption using group action.μμμνμ μ΄μ©ν μ»΄ν¨ν°μ λ±μ₯μ μΌμ΄μ μκ³ λ¦¬μ¦ λ±μ ν΅ν΄ κΈ°μ‘΄ μνΈνμ λͺ
λ°±ν μνμ μ μνλ©°, μμμνμ μ±μ§μ ν΅ν μλ‘μ΄ μνΈνλ‘ν μ½μ κ°λ₯μ± λν μ μνλ€. μ΄λ¬ν λ κ°μ§ κ΄μ μ κ°κ° μ΄ νμ λ
Όλ¬Έμ μ£Όμ κ° λλ μμ곡격μ λν λμμ±
μΌλ‘μ¨μ λμμμνΈμ μμμνμ μ΄μ©ν μνΈκΈ°μ μΈ μμμνΈλΌκ³ λΆλ¦¬λ μλ‘μ΄ λΆμΌλ₯Ό λ°μμμΌ°λ€.
μ΄ νμ λ
Όλ¬Έμμλ νμ¬ λμμμνΈμ μμ μ±μ μλ‘μ΄ μμμνΈ κ³΅κ²© μκ³ λ¦¬μ¦κ³Ό λͺ¨λΈ, μμ μ± μ¦λͺ
μ ν΅ν΄ μ¬κ³ νλ€. νΉν μνΈνμ ν΄μ¬ν¨μμ μΌλ°©ν₯ν¨μ, μνΈνμ μμ¬λμμμ±κΈ°λ‘μμ λμμ μνΈ μμ μ±μ ꡬ체μ μΈ νκ°λ₯Ό μ μνλ€. λν μ΅κ·Ό μμμνμ μ°κ΅¬λ₯Ό μμμνΈμ λμ
ν¨μΌλ‘μ¨ μλ‘μ΄ μμ 곡κ°ν€μνΈμ μμ 컀λ°λ¨ΌνΈ λ±μ μλ‘μ΄ λ°κ²¬μ μ μνλ€. μ΄ κ³Όμ μμ μ μ²λ¦¬ κ³μ°μ ν¬ν¨ν μμμκ³ λ¦¬μ¦μ νκ³, μμ 볡μ‘κ³λ€μ μ€λΌν΄λΆλ¦¬ λ¬Έμ , κ΅°μ μμ©μ μ΄μ©ν 곡κ°ν€ μνΈ λ±μ μ¬λ¬ μ΄λ¦°λ¬Έμ λ€μ ν΄κ²°μ μ μνλ€.1 Introduction 1
1.1 Contributions 3
1.2 Related Works 11
1.3 Research Papers 13
2 Preliminaries 14
2.1 Quantum Computations 15
2.2 Quantum Algorithms 20
2.3 Cryptographic Primitives 21
I Post-Quantum Cryptography: Attacks, New Models, and Proofs 24
3 Quantum Cryptanalysis 25
3.1 Introduction 25
3.2 QROM-AI Algorithm for Function Inversion 26
3.3 Quantum Multiple Discrete Logarithm Problem 34
3.4 Discussion and Open problems 39
4 Quantum Random Oracle Model with Classical Advice 42
4.1 Quantum ROM with Auxiliary Input 44
4.2 Function Inversion 46
4.3 Pseudorandom Generators 56
4.4 Post-quantum Primitives 58
4.5 Discussion and Open Problems 59
5 Quantum Random Permutations with Quantum Advice 62
5.1 Bound for Inverting Random Permutations 64
5.2 Preparation 64
5.3 Proof of Theorem 68
5.4 Implication in Complexity Theory 74
5.5 Discussion and Open Problems 77
II Quantum Cryptography: Public-key Encryptions and Bit Commitments 79
6 Equivalence Theorem 80
6.1 Equivalence Theorem 81
6.2 Non-uniform Equivalence Theorem 83
6.3 Proof of Equivalence Theorem 86
7 Quantum Public Key Encryption 89
7.1 Swap-trapdoor Function Pairs 90
7.2 Quantum-Ciphertext Public Key Encryption 94
7.3 Group Action based Construction 99
7.4 Lattice based Construction 107
7.5 Discussion and Open Problems 113
7.6 Deferred Proof 114
8 Quantum Bit Commitment 119
8.1 Quantum Commitments 120
8.2 Efficient Conversion 123
8.3 Applications of Conversion 126
8.4 Discussion and Open Problems 137λ°
Quantum computing for finance
Quantum computers are expected to surpass the computational capabilities of
classical computers and have a transformative impact on numerous industry
sectors. We present a comprehensive summary of the state of the art of quantum
computing for financial applications, with particular emphasis on stochastic
modeling, optimization, and machine learning. This Review is aimed at
physicists, so it outlines the classical techniques used by the financial
industry and discusses the potential advantages and limitations of quantum
techniques. Finally, we look at the challenges that physicists could help
tackle
Complexity Theory
Computational Complexity Theory is the mathematical study of the intrinsic power and limitations of computational resources like time, space, or randomness. The current workshop focused on recent developments in various sub-areas including arithmetic complexity, Boolean complexity, communication complexity, cryptography, probabilistic proof systems, pseudorandomness, and quantum computation. Many of the developements are related to diverse mathematical ο¬elds such as algebraic geometry, combinatorial number theory, probability theory, quantum mechanics, representation theory, and the theory of error-correcting codes
- β¦