Sciweavers

523 search results - page 15 / 105
» On the Power of Quantum Proofs
Sort
View
111
Voted
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...
CORR
2004
Springer
114views Education» more  CORR 2004»
15 years 1 months ago
Quantum Communication Cannot Simulate a Public Coin
We study the simultaneous message passing model of communication complexity. Building on the quantum fingerprinting protocol of Buhrman et al., Yao recently showed that a large cl...
Dmitry Gavinsky, Julia Kempe, Ronald de Wolf
89
Voted
COMBINATORICS
2007
67views more  COMBINATORICS 2007»
15 years 1 months ago
Non-Commutative Sylvester's Determinantal Identity
Sylvester’s identity is a classical determinantal identity with a straightforward linear algebra proof. We present combinatorial proofs of several non-commutative extensions, an...
Matjaz Konvalinka
124
Voted
STOC
2003
ACM
174views Algorithms» more  STOC 2003»
16 years 2 months ago
Adiabatic quantum state generation and statistical zero knowledge
The design of new quantum algorithms has proven to be an extremely difficult task. This paper considers a different approach to the problem, by studying the problem of 'quant...
Dorit Aharonov, Amnon Ta-Shma
113
Voted
TEC
2008
135views more  TEC 2008»
15 years 1 months ago
Quantum Genetic Optimization
Abstract--The complexity of the selection procedure of a genetic algorithm that requires reordering, if we restrict the class of the possible fitness functions to varying fitness f...
Andrea Malossini, Enrico Blanzieri, T. Calarco