메뉴 건너뛰기




Volumn , Issue , 2007, Pages 516-525

Exponential separations for one-way quantum communication complexity, with applications to cryptography

Author keywords

Communication complexity; Cryptography; Quantum

Indexed keywords

ADVERSARIES; FOURIER COEFFICIENTS; HIDDEN MATCHING PROBLEMS; QUANTUM STORAGE;

EID: 35448991662     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1250790.1250866     Document Type: Conference Paper
Times cited : (146)

References (37)
  • 1
    • 35448939595 scopus 로고    scopus 로고
    • The learnability of quantum states
    • quant-ph/0608142, 18 Aug
    • S. Aaronson. The learnability of quantum states. quant-ph/0608142, 18 Aug 2006.
    • (2006)
    • Aaronson, S.1
  • 5
    • 0031630576 scopus 로고    scopus 로고
    • Quantum vs. classical communication and computation
    • H. Buhrman, R. Cleve, and A. Wigderson. Quantum vs. classical communication and computation. In 30th ACM STOC, pages 63-68, 1998.
    • (1998) 30th ACM STOC , pp. 63-68
    • Buhrman, H.1    Cleve, R.2    Wigderson, A.3
  • 7
    • 0000898117 scopus 로고
    • Inequalities in Fourier analysis
    • W. Beckner. Inequalities in Fourier analysis. Annals of Mathematics, 102:159-182, 1975.
    • (1975) Annals of Mathematics , vol.102 , pp. 159-182
    • Beckner, W.1
  • 8
    • 4544303934 scopus 로고    scopus 로고
    • Exponential separation of quantum and classical one-way communication complexity
    • Z. Bar-Yossef, T. S. Jayram, and I. Kerenidis. Exponential separation of quantum and classical one-way communication complexity. In 36th ACM STOC, pages 128-137, 2004.
    • (2004) 36th ACM STOC , pp. 128-137
    • Bar-Yossef, Z.1    Jayram, T.S.2    Kerenidis, I.3
  • 9
    • 0000781699 scopus 로고
    • Etude des coefficients de Fourier des fonctions de Lp(G).
    • A. Bonami. Etude des coefficients de Fourier des fonctions de Lp(G). Annales de l'Institute Fourier, 20(2):335-402, 1970.
    • (1970) Annales de l'Institute Fourier , vol.20 , Issue.2 , pp. 335-402
    • Bonami, A.1
  • 10
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230-261, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 11
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5-26, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 12
    • 33749549986 scopus 로고    scopus 로고
    • Exponential separation of quantum and classical online space complexity
    • F. Le Gall. Exponential separation of quantum and classical online space complexity. In 18th ACM SPAA, pages 67-73, 2006.
    • (2006) 18th ACM SPAA , pp. 67-73
    • Le Gall, F.1
  • 13
    • 33748093058 scopus 로고    scopus 로고
    • Bounded-error quantum state identification and exponential separations in communication complexity
    • D. Gavinsky, J. Kempe, O. Regev, and R. de Wolf. Bounded-error quantum state identification and exponential separations in communication complexity. In 38th ACM STOC, pages 594-603, 2006.
    • (2006) 38th ACM STOC , pp. 594-603
    • Gavinsky, D.1    Kempe, J.2    Regev, O.3    de Wolf, R.4
  • 14
    • 0002863425 scopus 로고
    • Bounds for the quantity of information transmitted by a quantum communication channel
    • A. S. Holevo. Bounds for the quantity of information transmitted by a quantum communication channel. Problemy Peredachi Informatsii, 9(3):3-11, 1973.
    • (1973) Problemy Peredachi Informatsii , vol.9 , Issue.3 , pp. 3-11
    • Holevo, A.S.1
  • 16
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions
    • R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In 21st ACM STOC, pages 12-24, 1989.
    • (1989) 21st ACM STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.A.2    Luby, M.3
  • 17
    • 0024140061 scopus 로고
    • The influence of variables on Boolean functions
    • J. Kahn, G. Kalai, and N. Linial. The influence of variables on Boolean functions. In 29th IEEE FOCS, pages 68-80, 1988.
    • (1988) 29th IEEE FOCS , pp. 68-80
    • Kahn, J.1    Kalai, G.2    Linial, N.3
  • 18
    • 0035187013 scopus 로고    scopus 로고
    • Lower bounds for quantum communication complexity
    • H. Klauck. Lower bounds for quantum communication complexity. In 42nd IEEE FOCS, pages 288-297, 2001.
    • (2001) 42nd IEEE FOCS , pp. 288-297
    • Klauck, H.1
  • 20
    • 84858370349 scopus 로고    scopus 로고
    • R. König and B. M. Terhal. The bounded storage model in the presence of a quantum adversary, 11 Aug 2006. quant-ph/0608101.
    • R. König and B. M. Terhal. The bounded storage model in the presence of a quantum adversary, 11 Aug 2006. quant-ph/0608101.
  • 22
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27-42, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 27-42
    • Lu, C.-J.1
  • 23
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 25
    • 35448961552 scopus 로고    scopus 로고
    • M. Muthukrishnan. Data Streams:Algorithms and Applications. Now Publishers, 2005.
    • M. Muthukrishnan. Data Streams:Algorithms and Applications. Now Publishers, 2005.
  • 27
    • 0026187604 scopus 로고
    • Private vs. common random bits in communication complexity
    • I. Newman. Private vs. common random bits in communication complexity. Information Processing Letters, 39(2):67-71, 1991.
    • (1991) Information Processing Letters , vol.39 , Issue.2 , pp. 67-71
    • Newman, I.1
  • 28
    • 21344441171 scopus 로고
    • Fourier analysis for probabilistic communication complexity
    • R. Raz. Fourier analysis for probabilistic communication complexity. Computational Complexity, 5(3/4):205-221, 1995.
    • (1995) Computational Complexity , vol.5 , Issue.3-4 , pp. 205-221
    • Raz, R.1
  • 29
    • 0032629110 scopus 로고    scopus 로고
    • Exponential separation of quantum and classical communication complexity
    • R. Raz. Exponential separation of quantum and classical communication complexity. In 31st ACM STOC, pages 358-367, 1999.
    • (1999) 31st ACM STOC , pp. 358-367
    • Raz, R.1
  • 31
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • 2nd TCC, of
    • R. Renner and R. König. Universally composable privacy amplification against quantum adversaries. In 2nd TCC, vol. 3378 of LNCS, pages 407-425, 2005.
    • (2005) LNCS , vol.3378 , pp. 407-425
    • Renner, R.1    König, R.2
  • 32
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P. W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5):1484-1509, 1997.
    • (1997) SIAM Journal on Computing , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 33
    • 0041050940 scopus 로고    scopus 로고
    • How much are increasing sets correlated?
    • M. Talagrand. How much are increasing sets correlated? Combinatorica, 16(2):243-258, 1996.
    • (1996) Combinatorica , vol.16 , Issue.2 , pp. 243-258
    • Talagrand, M.1
  • 34
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43-77, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 35
    • 0037174206 scopus 로고    scopus 로고
    • Quantum communication and complexity
    • R. de Wolf. Quantum communication and complexity. Theoretical Computer Science, 287(1):337-353, 2002.
    • (2002) Theoretical Computer Science , vol.287 , Issue.1 , pp. 337-353
    • de Wolf, R.1
  • 36
    • 85026748110 scopus 로고
    • Probabilistic computations: Toward a unified measure of complexity
    • A. C-C. Yao. Probabilistic computations: Toward a unified measure of complexity. In 18th IEEE FOCS, pages 222-227, 1977.
    • (1977) 18th IEEE FOCS , pp. 222-227
    • Yao, A.C.-C.1
  • 37
    • 85039623622 scopus 로고
    • Some complexity questions related to distributive computing
    • A. C-C. Yao. Some complexity questions related to distributive computing. In 11th ACM STOC, pages 209-213, 1979.
    • (1979) 11th ACM STOC , pp. 209-213
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.