Ankit Garg Princeton Univ. Joint work with Mark Braverman Young Kun Ko Princeton Univ. Princeton Univ. Jieming Mao Dave Touchette Princeton Univ. Univ.

Slides:



Advertisements
Similar presentations
Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Advertisements

The Learnability of Quantum States Scott Aaronson University of Waterloo.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
Quantum Search of Spatial Regions Scott Aaronson (UC Berkeley) Joint work with Andris Ambainis (U. Latvia)
The Complexity of Agreement A 100% Quantum-Free Talk Scott Aaronson MIT.
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
Optimal Bounds for Johnson- Lindenstrauss Transforms and Streaming Problems with Sub- Constant Error T.S. Jayram David Woodruff IBM Almaden.
Xiaoming Sun Tsinghua University David Woodruff MIT
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
How to Delegate Computations: The Power of No-Signaling Proofs Ran Raz (Weizmann Institute & IAS) Joint work with: Yael Tauman Kalai Ron Rothblum.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
1 Information complexity and exact communication bounds April 26, 2013 Mark Braverman Princeton University Based on joint work with Ankit Garg, Denis Pankratov,
On the tightness of Buhrman- Cleve-Wigderson simulation Shengyu Zhang The Chinese University of Hong Kong On the relation between decision tree complexity.
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
On the Difficulty of Scalably Detecting Network Attacks Kirill Levchenko with Ramamohan Paturi and George Varghese.
Socket Programming A review By Snehal Kale. What is a socket? An End Point of a 2-way Communication Link Used in Client – Server Communication Bound to.
CSEP 590tv: Quantum Computing
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Beyond Set Disjointness: The Communication Complexity of Finding the Intersection Grigory Yaroslavtsev Joint with Brody, Chakrabarti,
Shengyu Zhang The Chinese University of Hong Kong.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 22, 2005
Lower Bounds for Massive Dataset Algorithms T.S. Jayram (IBM Almaden) IIT Kanpur Workshop on Data Streams.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Distributed Verification and Hardness of Distributed Approximation Atish Das Sarma Stephan Holzer Danupon Nanongkai Gopal Pandurangan David Peleg 1 Weizmann.
Entangling without Entanglement T. Cubitt, F. Verstraete, W. Dür, J. I. Cirac “Separable State can be used to Distribute Entanglement” (to appear in PRL.
1 Information and interactive computation January 16, 2012 Mark Braverman Computer Science, Princeton University.
Information Complexity Lower Bounds for Data Streams David Woodruff IBM Almaden.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Information Theory for Data Streams David P. Woodruff IBM Almaden.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Introduction to Quantum Key Distribution
Christian Schaffner, PhD student NF-årsfest 2005 A A R H U S U N I V E R S I T E T DAIMI – Department of Computer Science BRICS – Basic Research in Computer.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem.
The Classically Enhanced Father Protocol
Information Complexity: an Overview Rotem Oshman, Princeton CCI Based on work by Braverman, Barak, Chen, Rao, and others Charles River Science of Information.
CSEP 590tv: Quantum Computing Dave Bacon July 20, 2005 Today’s Menu n Qubit registers Begin Quantum Algorithms Administrivia Superdense Coding Finish Teleportation.
The Price of Uncertainty in Communication Brendan Juba (Washington U., St. Louis) with Mark Braverman (Princeton)
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Massive Data Sets and Information Theory Ziv Bar-Yossef Department of Electrical Engineering Technion.
ETH-hardness of Densest-k-Subgraph with Perfect Completeness Aviad Rubinstein (UC Berkeley) Mark Braverman, Young Kun Ko, and Omri Weinstein.
Communication Complexity Guy Feigenblat Based on lecture by Dr. Ely Porat Some slides where adapted from various sources Complexity course Computer science.
Gillat Kol (IAS) joint work with Anat Ganor (Weizmann) Ran Raz (Weizmann + IAS) Exponential Separation of Information and Communication.
Ankit Garg Princeton Univ. Joint work with Leonid Gurvits Rafael Oliveira CCNY Princeton Univ. Avi Wigderson IAS Noncommutative rational identity testing.
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
The Message Passing Communication Model David Woodruff IBM Almaden.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Imperfectly Shared Randomness
Random Access Codes and a Hypercontractive Inequality for
The Exact Round Complexity of Secure Computation
Information Complexity Lower Bounds
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Information primitives and laws of nature Mai 2008 Alain Tapp
Effcient quantum protocols for XOR functions
Cryptography for Quantum Computers
CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.
Quantum Information Theory Introduction
Classical Algorithms from Quantum and Arthur-Merlin Communication Protocols Lijie Chen MIT Ruosong Wang CMU.
Imperfectly Shared Randomness
Based on results by: Masanes, Renner, Christandl, Winter and Barrett
New Direct Product results in Communication Complexity
Find the Perimeter.
Presentation transcript:

Ankit Garg Princeton Univ. Joint work with Mark Braverman Young Kun Ko Princeton Univ. Princeton Univ. Jieming Mao Dave Touchette Princeton Univ. Univ. of Waterloo and Perimeter Institute Near Optimal Bounds on Bounded-Rounded Quantum Communication Complexity of Disjointness

Quantum Communication Complexity Alice Bob

Quantum Protocols Alice Bob Send C 1

Quantum Protocols Alice Bob Send C 2

Quantum protocols

Quantum communication complexity [Yao ‘93]

Disjointness

Quantum Information Theory 101

Classical Information Cost [CSWY `01, BJKS-04, BBCR-10] A B Protocol π

Quantum Information Cost A B Protocol π Quantum Protocol Issues: 1.No concept of transcript. 2.Reversible computing.

Quantum Information Cost [Touchette `14] Account for forgetting of information.

Quantum Information Cost [Touchette `14] Information sent by Alice Information forgotten by Alice

Quantum Information Complexity

QIC of AND

Why is it hard?

Proof idea

Complete reduction

Continuity of QIC

Conclusion and Open Problems

We prove this if the goal is to compute boolean functions.

Thank You