1,373 research outputs found
Cheat Sensitive Quantum Bit Commitment
We define cheat sensitive cryptographic protocols between mistrustful parties
as protocols which guarantee that, if either cheats, the other has some nonzero
probability of detecting the cheating. We give an example of an unconditionally
secure cheat sensitive non-relativistic bit commitment protocol which uses
quantum information to implement a task which is classically impossible; we
also describe a simple relativistic protocol.Comment: Final version: a slightly shortened version of this will appear in
PRL. Minor corrections from last versio
Quantum Bit String Commitment
A bit string commitment protocol securely commits classical bits in such
a way that the recipient can extract only bits of information about the
string. Classical reasoning might suggest that bit string commitment implies
bit commitment and hence, given the Mayers-Lo-Chau theorem, that
non-relativistic quantum bit string commitment is impossible. Not so: there
exist non-relativistic quantum bit string commitment protocols, with security
parameters and , that allow to commit
bits to so that 's probability of successfully cheating when revealing
any bit and 's probability of extracting more than bits of
information about the bit string before revelation are both less than
. With a slightly weakened but still restrictive definition of
security against , can be taken to be for a positive
constant . I briefly discuss possible applications.Comment: Published version. (Refs updated.
Quantum Algorithm for the Collision Problem
In this note, we give a quantum algorithm that finds collisions in arbitrary
r-to-one functions after only O((N/r)^(1/3)) expected evaluations of the
function. Assuming the function is given by a black box, this is more efficient
than the best possible classical algorithm, even allowing probabilism. We also
give a similar algorithm for finding claws in pairs of functions. Furthermore,
we exhibit a space-time tradeoff for our technique. Our approach uses Grover's
quantum searching algorithm in a novel way.Comment: 8 pages, LaTeX2
Exponential quantum enhancement for distributed addition with local nonlinearity
We consider classical and entanglement-assisted versions of a distributed
computation scheme that computes nonlinear Boolean functions of a set of input
bits supplied by separated parties. Communication between the parties is
restricted to take place through a specific apparatus which enforces the
constraints that all nonlinear, nonlocal classical logic is performed by a
single receiver, and that all communication occurs through a limited number of
one-bit channels. In the entanglement-assisted version, the number of channels
required to compute a Boolean function of fixed nonlinearity can become
exponentially smaller than in the classical version. We demonstrate this
exponential enhancement for the problem of distributed integer addition.Comment: To appear in Quantum Information Processin
Multipartite Nonlocal Quantum Correlations Resistant to Imperfections
We use techniques for lower bounds on communication to derive necessary
conditions in terms of detector efficiency or amount of super-luminal
communication for being able to reproduce with classical local hidden-variable
theories the quantum correlations occurring in EPR-type experiments in the
presence of noise. We apply our method to an example involving n parties
sharing a GHZ-type state on which they carry out measurements and show that for
local-hidden variable theories, the amount of super-luminal classical
communication c and the detector efficiency eta are constrained by eta 2^(-c/n)
= O(n^(-1/6)) even for constant general error probability epsilon = O(1)
Quantum Mechanics helps in searching for a needle in a haystack
Quantum mechanics can speed up a range of search applications over unsorted
data. For example imagine a phone directory containing N names arranged in
completely random order. To find someone's phone number with a probability of
50%, any classical algorithm (whether deterministic or probabilistic) will need
to access the database a minimum of O(N) times. Quantum mechanical systems can
be in a superposition of states and simultaneously examine multiple names. By
properly adjusting the phases of various operations, successful computations
reinforce each other while others interfere randomly. As a result, the desired
phone number can be obtained in only O(sqrt(N)) accesses to the database.Comment: Postscript, 4 pages. This is a modified version of the STOC paper
(quant-ph/9605043) and is modified to make it more comprehensible to
physicists. It appeared in Phys. Rev. Letters on July 14, 1997. (This paper
was originally put out on quant-ph on June 13, 1997, the present version has
some minor typographical changes
Two-player quantum pseudo-telepathy based on recent all-versus-nothing violations of local realism
We introduce two two-player quantum pseudo-telepathy games based on two
recently proposed all-versus-nothing (AVN) proofs of Bell's theorem [A.
Cabello, Phys. Rev. Lett. 95, 210401 (2005); Phys. Rev. A 72, 050101(R)
(2005)]. These games prove that Broadbent and Methot's claim that these AVN
proofs do not rule out local-hidden-variable theories in which it is possible
to exchange unlimited information inside the same light-cone (quant-ph/0511047)
is incorrect.Comment: REVTeX4, 5 page
Unconditionally Secure Bit Commitment
We describe a new classical bit commitment protocol based on cryptographic
constraints imposed by special relativity. The protocol is unconditionally
secure against classical or quantum attacks. It evades the no-go results of
Mayers, Lo and Chau by requiring from Alice a sequence of communications,
including a post-revelation verification, each of which is guaranteed to be
independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev.
Let
Optimal Quantum Measurements of Expectation Values of Observables
Experimental characterizations of a quantum system involve the measurement of
expectation values of observables for a preparable state |psi> of the quantum
system. Such expectation values can be measured by repeatedly preparing |psi>
and coupling the system to an apparatus. For this method, the precision of the
measured value scales as 1/sqrt(N) for N repetitions of the experiment. For the
problem of estimating the parameter phi in an evolution exp(-i phi H), it is
possible to achieve precision 1/N (the quantum metrology limit) provided that
sufficient information about H and its spectrum is available. We consider the
more general problem of estimating expectations of operators A with minimal
prior knowledge of A. We give explicit algorithms that approach precision 1/N
given a bound on the eigenvalues of A or on their tail distribution. These
algorithms are particularly useful for simulating quantum systems on quantum
computers because they enable efficient measurement of observables and
correlation functions. Our algorithms are based on a method for efficiently
measuring the complex overlap of |psi> and U|psi>, where U is an implementable
unitary operator. We explicitly consider the issue of confidence levels in
measuring observables and overlaps and show that, as expected, confidence
levels can be improved exponentially with linear overhead. We further show that
the algorithms given here can typically be parallelized with minimal increase
in resource usage.Comment: 22 page
Spatial search and the Dirac equation
We consider the problem of searching a d-dimensional lattice of N sites for a
single marked location. We present a Hamiltonian that solves this problem in
time of order sqrt(N) for d>2 and of order sqrt(N) log(N) in the critical
dimension d=2. This improves upon the performance of our previous quantum walk
search algorithm (which has a critical dimension of d=4), and matches the
performance of a corresponding discrete-time quantum walk algorithm. The
improvement uses a lattice version of the Dirac Hamiltonian, and thus requires
the introduction of spin (or coin) degrees of freedom.Comment: 5 pages, 1 figur
- …
