Sciweavers

2661 search results - page 23 / 533
» Quantum Complexity Classes
Sort
View
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
84
Voted
STACS
2005
Springer
15 years 6 months ago
Robust Polynomials and Quantum Algorithms
We define and study the complexity of robust polynomials for Boolean functions and the related fault-tolerant quantum decision trees, where input bits are perturbed by noise. We ...
Harry Buhrman, Ilan Newman, Hein Röhrig, Rona...
123
Voted
STOC
2007
ACM
98views Algorithms» more  STOC 2007»
16 years 28 days ago
Negative weights make adversaries stronger
The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Peter Høyer, Troy Lee, Robert Spalek
COCO
2009
Springer
119views Algorithms» more  COCO 2009»
15 years 7 months ago
An Approximation Algorithm for Approximation Rank
One of the strongest techniques available for showing lower bounds on quantum communication complexity is the logarithm of the approximation rank of the communication matrix— th...
Troy Lee, Adi Shraibman
103
Voted
COCO
2008
Springer
86views Algorithms» more  COCO 2008»
15 years 2 months ago
The Multiplicative Quantum Adversary
We present a new variant of the quantum adversary method. All adversary methods give lower bounds on the quantum query complexity of a function by bounding the change of a progres...
Robert Spalek