Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary
|
|
- Alison Nash
- 2 years ago
- Views:
Transcription
1 Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary
2 #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions) - algorithms for: finding abelian hidden subgroups, hidden normal subgroups, and order of solvable groups; decomposing abelian groups; computing class numbers of quadratic number fields; solving Pell s equation.
3 #1 Open Problem Find new quantum algorithms. Existing algorithms: Grover s Algorithm + Amplitude Amplification. - many black box problems admit some polynomial speed-up: counting, finding collisions, searching spatial regions,
4 #1 Open Problem Find new quantum algorithms. Existing algorithms: Graph reachability via quantum walks [Childs, Cleve, Deotto, Farhi, Gutmann, Spielman, 2002] Application to a non-black-box problem?
5 #1 Open Problem Find new quantum algorithms. BQP NP Not too many natural problems suspected to be here P NP-complete problems
6 #1 Open Problem Find new quantum algorithms. Candidate problems: graph isomorphism group-theoretic problems lattice problems simulating physical systems Warning: many have tried Find new techniques.
7 Weak Coin-Flipping Is weak coin flipping with arbitrary bias possible? Alice and Bob want to flip a fair coin, but one of them might be cheating Alice wants heads, Bob wants tails. Bias is possible. Bias e requires O ( - log loge 1 ) rounds.
8 Black-box Problems Several open problems on black-box complexity: Improve the bound ( ( ) 2 ) D ( f ) = O Q f ( ( ) 6 ) D ( f ) = O Q f for total functions. Is there a black box (promise) problem that admits an exponential quantum speed-up where the answer is invariant under permutation of the black box? Specific problems: finding triangles in graphs, searching a 2 dimensional region, AND-OR trees, equal or disjoint sets to
9 QMA Identify natural problems in QMA. Problems known to be in QMA: Local Hamiltonian problem Group Non-membership Approximate shortest vector in a lattice. Is graph non-isomorphism in QMA? Other complexity questions: Is BQP in the polynomial-time hierarchy? Is QIP = PSPACE? Is QIP = EXP?
10 Non-Distillability of NPT States Do there exist non-distillable NPT states? Let T denote the linear mapping corresponding to matrix transposition: T ( A) = T A Tensoring with the identity gives the partial transpose: ( T ƒ I) ( Aƒ B) = A T ƒ B (extend by linearity).
11 Non-Distillability of NPT States Do there exist non-distillable NPT states? ( T ƒ I)( r) If r is separable, then semidefinite. If r is entangled, then not be positive semidefinite: ( T ƒ I)( r) is positive may or may ( T ƒ I)( r) 0 fi r ( T ƒ I)( r) 0 fi r is is PPT NPT E ( ) D r = 0 ( r) = 0 If r is PPT, then r for which? E D. Is there an NPT state
12 Communication Complexity There are many open questions about quantum communication complexity: Is there a total function for which an exponential savings in communication is possible in the quantum setting? How powerful is prior entanglement for quantum communication protocols? Find a problem for which one-way quantum communication is exponentially more efficient than one-way classical communication.
13 Non-locality and Multiple Provers There are many open questions concerning non-locality. Alice entanglement Bob Referee Referee asks classical questions, Alice and Bob give classical answers we are interested in the possible correlations in their answers.
14 Non-locality and Multiple Provers There are many open questions concerning non-locality. How much classical communication would be needed for classical players Alice and Bob to look quantum to the referee. Cooperative games setting: how much entanglement is needed for Alice and Bob to play optimally? Does parallel repetition work? What is the power of multi-prover quantum interactive proofs.
15 Quantum Channel Capacities There are many open questions concerning quantum channel capacities: Unlike classical channels, quantum channels can have several different capacities (e.g., for sending quantum information or classical information, one-way or two-way communication, prior entanglement). Additivity questions. Relations between capacities.
16 Quantum Cryptography Open questions in quantum cryptography: Identify candidate quantum one-way functions. Develop classical cryptographic systems that are secure against quantum attacks. Give a cryptographically good definition for quantum zero knowledge. Identification and relations among quantum cryptographic primitives.
17 Physical Implementations Entanglement of spatially separated qubits: Put two ions into physically separated ion traps into an entangled state. (Or a similar experiment.) Characterize errors in quantum systems: validate or invalidate error models. Develop methods to efficiently approximate errors. Better fault-tolerant quantum computing schemes
18 That s s all for now
An Introduction to Quantum Algorithms
An Introduction to Quantum Algorithms Emma Strubell COS498 Chawathe Spring An Introduction to Quantum Algorithms Contents Contents What are quantum algorithms? 3. Background..................................
Introduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso encisomo@in.tum.de Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography
Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography Julia Kempe CNRS & LRI, Université de Paris-Sud 9405 Orsay, France
Factoring by Quantum Computers
Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single
A New Quantum Algorithm for NP-complete Problems
CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
Quantum Computing. Robert Sizemore
Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical
Quantum Computability and Complexity and the Limits of Quantum Computation
Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will
Quantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
Quantum Computing. Eleanor Rieffel FX Palo Alto Laboratory. 1 Introduction 3. 2 Early history 4. 3 Basic concepts of quantum computation 6
Quantum Computing Eleanor Rieffel FX Palo Alto Laboratory Contents 1 Introduction 3 2 Early history 4 3 Basic concepts of quantum computation 6 4 Quantum algorithms 8 4.1 Grover s algorithm and generalizations.............
arxiv:1004.5127v1 [quant-ph] 28 Apr 2010
Quantum money from knots arxiv:1004.5127v1 [quant-ph] 28 Apr 2010 Edward Farhi, David Gosset, Avinatan Hassidim, Andrew Lutomirski, and Peter Shor April 28, 2010 Abstract Quantum money is a cryptographic
arxiv:1206.3686v1 [quant-ph] 16 Jun 2012
Is Quantum Mechanics Falsifiable? A computational perspective on the foundations of Quantum Mechanics. Dorit Aharonov and Umesh Vazirani June 19, 2012 arxiv:1206.3686v1 [quant-ph] 16 Jun 2012 Abstract
The Limits of Adiabatic Quantum Computation
The Limits of Adiabatic Quantum Computation Alper Sarikaya June 11, 2009 Presentation of work given on: Thesis and Presentation approved by: Date: Contents Abstract ii 1 Introduction to Quantum Computation
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Alternative machine models
Alternative machine models Computational complexity thesis: All reasonable computer models can simulate one another in polynomial time (i.e. P is robust or machine independent ). But the Turing machine
Efficient quantum algorithms for the principal ideal problem and class group problem in arbitrary-degree number fields
Efficient quantum algorithms for the principal ideal problem and class group problem in arbitrary-degree number fields Fang Song Institute for Quantum Computing University of Waterloo Joint work with Jean-François
Computational complexity theory
Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision
Quantum Computing and Grover s Algorithm
Quantum Computing and Grover s Algorithm Matthew Hayward January 14, 2015 1 Contents 1 Motivation for Study of Quantum Computing 3 1.1 A Killer App for Quantum Computing.............. 3 2 The Quantum Computer
Quantum Monte Carlo and the negative sign problem
Quantum Monte Carlo and the negative sign problem or how to earn one million dollar Matthias Troyer, ETH Zürich Uwe-Jens Wiese, Universität Bern Complexity of many particle problems Classical 1 particle:
Universality in the theory of algorithms and computer science
Universality in the theory of algorithms and computer science Alexander Shen Computational models The notion of computable function was introduced in 1930ies. Simplifying (a rather interesting and puzzling)
Introduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008
MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
Entanglement and its Role in Shor's Algorithm
ntanglement and its Role in Shor's Algorithm Vivien M. Kendon 1, William J. Munro Trusted Systems Laboratory P Laboratories Bristol PL-2005-215 December 5, 2005* entanglement, Shor's algorithm ntanglement
Cryptographic and Physical Zero- Knowledge Proof Systems for Solutions of Sudoku Puzzles
Cryptographic and Physical Zero- Knowledge Proof Systems for Solutions of Sudoku Puzzles, University of Haifa Joint work with Ronen Gradwohl, Moni Naor and Guy Rothblum page 1 Sudoku Fill in the empty
Quantum Machine Learning Algorithms: Read the Fine Print
Quantum Machine Learning Algorithms: Read the Fine Print Scott Aaronson For twenty years, quantum computing has been catnip to science journalists. Not only would a quantum computer harness the notorious
Modular arithmetic. x ymodn if x = y +mn for some integer m. p. 1/??
p. 1/?? Modular arithmetic Much of modern number theory, and many practical problems (including problems in cryptography and computer science), are concerned with modular arithmetic. While this is probably
Bits Superposition Quantum Parallelism
7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism
Enhancing privacy with quantum networks
Enhancing privacy with quantum networks P. Mateus N. Paunković J. Rodrigues A. Souto SQIG- Instituto de Telecomunicações and DM - Instituto Superior Técnico - Universidade de Lisboa Abstract Using quantum
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
Quantum Computing: Lecture Notes. Ronald de Wolf
Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my Quantum computing course at the University of Amsterdam, Feb-May 2011, and compiled into
The Internal and External Algebraic Structure. of Complexity Classes. Lance Fortnow. Department of Computer Science. The University of Chicago
The Internal and External Algebraic Structure of Complexity Classes Lance Fortnow Department of Computer Science The University of Chicago 1100 East 58th Street Chicago, Illinois 60637 Abstract The report
The Future of Cryptography Under Quantum Computers
Dartmouth College Computer Science Technical Report TR2002-425 The Future of Cryptography Under Quantum Computers Marco A. Barreno marco.barreno@alum.dartmouth.org July 21, 2002 Senior Honors Thesis Advisor
Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers
Quantum Computers And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015 1 Includes joint work with Amlan Chakrabarti, U. Calcutta If you were designing Nature, how would
How to Prove a Theorem So No One Else Can Claim It
Proceedings of the International Congress of Mathematicians Berkeley, California, USA, 1986 How to Prove a Theorem So No One Else Can Claim It MANUEL BLUM Goldwasser, Micali, and Rackoff [GMR] define for
Cryptography in a Quantum World
Cryptography in a Quantum World Grégoire Ribordy May 2016 Cybersecurity Cybertechnologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety and security of
2. Introduction to quantum mechanics
2. Introduction to quantum mechanics 2.1 Linear algebra Dirac notation Complex conjugate Vector/ket Dual vector/bra Inner product/bracket Tensor product Complex conj. matrix Transpose of matrix Hermitian
2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
arxiv:quant-ph/9809016 v2 19 Jan 2000
An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
The Road to Quantum Artificial Intelligence
The Road to Quantum Artificial Intelligence Kyriakos N. Sgarbas Wire Communications Lab., Dept. of Electrical and Computer Engineering, University of Patras, GR-26500, Patras, Greece E-mail: sgarbas@upatras.gr
How Quantum Can a Computer Be? 1
How Quantum Can a Computer Be? 1 Elham Kashefi 2 Prisme N 29 September 2014 1 This text is a transcription of the presentation given by Elham Kashefi at the Cournot seminar, «Quantum Turing Testing» in
Introduction to Quantum Computing
Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement
Course: Model, Learning, and Inference: Lecture 5
Course: Model, Learning, and Inference: Lecture 5 Alan Yuille Department of Statistics, UCLA Los Angeles, CA 90095 yuille@stat.ucla.edu Abstract Probability distributions on structured representation.
Algorithms and Data Structures
Algorithm Analysis Page 1 BFH-TI: Softwareschule Schweiz Algorithm Analysis Dr. CAS SD01 Algorithm Analysis Page 2 Outline Course and Textbook Overview Analysis of Algorithm Pseudo-Code and Primitive Operations
P vs NP problem in the field anthropology
Research Article P vs NP problem in the field anthropology Michael.A. Popov, Oxford, UK Email Michael282.eps@gmail.com Keywords P =?NP - complexity anthropology - M -decision - quantum -like game - game-theoretical
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)
Examples of decision problems:
Examples of decision problems: The Investment Problem: a. Problem Statement: i. Give n possible shares to invest in, provide a distribution of wealth on stocks. ii. The game is repetitive each time we
Lecture 2: Essential quantum mechanics
Department of Physical Sciences, University of Helsinki http://theory.physics.helsinki.fi/ kvanttilaskenta/ p. 1/46 Quantum information and computing Lecture 2: Essential quantum mechanics Jani-Petri Martikainen
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Two-Dimensional Quantum Search Algorithm. Arti Chamoli and Samina Masood
Two-Dimensional Quantum Search Algorithm Arti Chamoli and Samina Masood Department of Physics, University of Houston-Clear Lake, Houston, Texas-77058 Abstract Quantum mechanical search induces polynomial
Computer Science 308-547A Cryptography and Data Security. Claude Crépeau
Computer Science 308-547A Cryptography and Data Security Claude Crépeau These notes are, largely, transcriptions by Anton Stiglic of class notes from the former course Cryptography and Data Security (308-647A)
P versus NP, and More
1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify
A 2D NEAREST-NEIGHBOR QUANTUM ARCHITECTURE FOR FACTORING IN POLYLOGARITHMIC DEPTH
Quantum Information and Computation, Vol. 13, No. 11&12 (2013) 0937 0962 c Rinton Press A 2D NEAREST-NEIGHBOR QUANTUM ARCHITECTURE FOR FACTORING IN POLYLOGARITHMIC DEPTH PAUL PHAM a Quantum Theory Group,
Coin Flipping of Any Constant Bias Implies One-Way Functions
Coin Flipping of Any Constant Bias Implies One-Way Functions Extended Abstract] Itay Berman School of Computer Science Tel Aviv University Israel itayberm@post.tau.ac.il Iftach Haitner School of Computer
Quantum computers can search arbitrarily large databases by a single query
Quantum computers can search arbitrarily large databases by a single query Lov K. Grover, 3C-404A Bell Labs, 600 Mountain Avenue, Murray Hill J 07974 (lkgrover@bell-labs.com) Summary This paper shows that
Quantum Computation as Geometry
Quantum Computation as Geometry arxiv:quant-ph/0603161v2 21 Mar 2006 Michael A. Nielsen, Mark R. Dowling, Mile Gu, and Andrew C. Doherty School of Physical Sciences, The University of Queensland, Queensland
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Near Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
Computing Relations in the Quantum Query Model 1
Scientific Papers, University of Latvia, 2011. Vol. 770 Computer Science and Information Technologies 68 89 P. Computing Relations in the Quantum Query Model 1 Alina Vasilieva, Taisia Mischenko-Slatenkova
Lecture 1: Random numbers, coin tossing
QIC 890/891 Selected advanced topics in quantum information Spring 2013 Topic: Topics in quantum cryptography Lecture 1: Random numbers, coin tossing Lecturer: Gus Gutoski This lecture and the next are
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
Minimal memory requirements for. pearl-necklace encoders of quantum convolutional codes
Minimal memory requirements for pearl-necklace encoders of quantum convolutional codes Monireh Houshmand, Saied Hosseini-Khayat, and Mark M. Wilde arxiv:004.579v2 [quant-ph] Nov 200 Abstract One of the
The van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
ORDERS OF ELEMENTS IN A GROUP
ORDERS OF ELEMENTS IN A GROUP KEITH CONRAD 1. Introduction Let G be a group and g G. We say g has finite order if g n = e for some positive integer n. For example, 1 and i have finite order in C, since
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 12 Digital Signatures
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 12 Digital Signatures Department of Computer Science and Information Engineering, Chaoyang University of Technology 朝 陽 科 技 大 學 資 工
Chapter 7. Permutation Groups
Chapter 7 Permutation Groups () We started the study of groups by considering planar isometries In the previous chapter, we learnt that finite groups of planar isometries can only be cyclic or dihedral
Study of algorithms for factoring integers and computing discrete logarithms
Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department
The Quantum Harmonic Oscillator Stephen Webb
The Quantum Harmonic Oscillator Stephen Webb The Importance of the Harmonic Oscillator The quantum harmonic oscillator holds a unique importance in quantum mechanics, as it is both one of the few problems
Salman Beigi. Education
Salman Beigi Full name: Salman Abolfathe Beikidezfuli School of Mathematics Institute for Research in Fundamental Sciences (IPM) http://math.ipm.ac.ir/~beigi/ salman.beigi@gmail.com Education Postdoctoral
NP-Completeness I. Lecture 19. 19.1 Overview. 19.2 Introduction: Reduction and Expressiveness
Lecture 19 NP-Completeness I 19.1 Overview In the past few lectures we have looked at increasingly more expressive problems that we were able to solve using efficient algorithms. In this lecture we introduce
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
Authentic Digital Signature Based on Quantum Correlation
Authentic Digital Signature Based on Quantum Correlation Xiao-Jun Wen, Yun Liu School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 00044, China Abstract: An authentic digital
Quantum Computation with Bose-Einstein Condensation and. Capable of Solving NP-Complete and #P Problems. Abstract
Quantum Computation with Bose-Einstein Condensation and Capable of Solving NP-Complete and #P Problems Yu Shi Cavendish Laboratory, University of Cambridge, Cambridge CB3 0HE, United Kingdom Abstract It
Closed Timelike Curves Make Quantum and Classical Computing Equivalent
Closed Timelike Curves Make Quantum and Classical Computing Equivalent Scott Aaronson MIT John Watrous University of Waterloo Abstract While closed timelike curves (CTCs) are not known to exist, studying
Quantum and Non-deterministic computers facing NP-completeness
Quantum and Non-deterministic computers facing NP-completeness Thibaut University of Vienna Dept. of Business Administration Austria Vienna January 29th, 2013 Some pictures come from Wikipedia Introduction
Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary
Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
0.1 Phase Estimation Technique
Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP Hongda Li, Qihua Niu, Guifang Huang 1 The Data Assurance and Communication Security Research Center 2 State Key Lab of Information
Transportation Polytopes: a Twenty year Update
Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,
Solving systems of linear equations over finite fields
Solving systems of linear equations over finite fields June 1, 2007 1 Introduction 2 3 4 Basic problem Introduction x 1 + x 2 + x 3 = 1 x 1 + x 2 = 1 x 1 + x 2 + x 4 = 1 x 2 + x 4 = 0 x 1 + x 3 + x 4 =
Introduction to Security Proof of Cryptosystems
Introduction to Security Proof of Cryptosystems D. J. Guan November 16, 2007 Abstract Provide proof of security is the most important work in the design of cryptosystems. Problem reduction is a tool to
MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis
LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,
in quantum computation
in computation Kestrel Institute and Oxford University - Oxford, August 2008 Outline Quantum programming λ- Abstraction with pictures Consequences - Abstraction in Category of measurements - Outline Quantum
Zero-Knowledge Proofs for Puzzles
Merrimack College Merrimack ScholarWorks Honors Program Capstone Projects Honors Program Spring 2016 Zero-Knowledge Proofs for Puzzles Hunter Ripsom-Gardiner ripsomgardih@merrimack.edu Follow this and
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
arxiv:quant-ph/0002033v2 12 Jun 2000
Multi-Valued Logic Gates for Quantum Computation Ashok Muthukrishnan and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 1467 (February 1, 008) arxiv:quant-ph/000033v
QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION
Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth
COMS4236: Introduction to Computational Complexity. Summer 2014
COMS4236: Introduction to Computational Complexity Summer 2014 Mihalis Yannakakis Lecture 17 Outline conp NP conp Factoring Total NP Search Problems Class conp Definition of NP is nonsymmetric with respect
Simulated Quantum Annealer
Simulated Quantum Annealer Department of CIS - Senior Design 013-014 Danica Bassman danicab@seas.upenn.edu University of Pennsylvania Philadelphia, PA ABSTRACT Quantum computing requires qubits, which
Master of Arts in Mathematics
Master of Arts in Mathematics Administrative Unit The program is administered by the Office of Graduate Studies and Research through the Faculty of Mathematics and Mathematics Education, Department of
arxiv: v2 [quant-ph] 18 Aug 2013
Secure multiparty quantum computation based on bit commitment arxiv:1306.0447v2 [quant-ph] 18 Aug 2013 Min Liang Data Communication Science and Technology Research Institute, Beijing 100191, China Abstract
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie
Lecture 13: Factoring Integers
CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method
CMPSCI611: Approximating MAX-CUT Lecture 20
CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to