skip to main content
10.1145/1250790.1250866acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

Exponential separations for one-way quantum communication complexity, with applications to cryptography

Published: 11 June 2007 Publication History

Abstract

We give an exponential separation between one-way quantum and classical communication protocols for twopartial Boolean functions, both of which are variants of the Boolean Hidden Matching Problem of Bar-Yossef et al. Earlier such an exponential separation was known only for a relational version of the Hidden Matching Problem. Our proofs use the Fourier coefficients inequality of Kahn, Kalai, and Linial. We give a number of applications of this separation. In particular, in the bounded-storage model of cryptography we exhibita scheme that is secure against adversaries with a certain amount of classical storage, but insecure against adversaries with a similar (or even much smaller) amount of quantum storage; in the setting of privacy amplification, we show that there are strong extractors that yield a classically secure key, but are insecure against a quantum adversary.

References

[1]
S. Aaronson. The learnability of quantum states. quant-ph/0608142, 18 Aug 2006.
[2]
Y. Aumann, Y.Z. Ding, and M. Rabin. Everlasting security in the bounded storage model. IEEE Transof Information Theory, 48:1668--1680, 2002.
[3]
N. Alon, Y. Matias, and M. Szegedy. The space complexity of approximating the frequency moments. Journal of Computer and Systems Sciences, 58(1):137--147, 1999.
[4]
C.H. Bennett, G. Brassard, and J.-MRobert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210--229, 1988.
[5]
H. Buhrman, R. Cleve, and A. Wigderson. Quantum vsclassical communication and computation. In 30th ACM STOC, pages 63--68, 1998.
[6]
H. Buhrman, R. Cleve, J. Watrous, and R. de Wolf. Quantum fingerprinting. Physical Review Letters, 87(16), September 26, 2001.
[7]
W. Beckner. Inequalities in Fourier analysis. Annals of Mathematics,102:159--182,1975.
[8]
Z. Bar-Yossef, T.S. Jayram, and I. Kerenidis. Exponential separation of quantum and classical one-way communication complexity. In 36th ACM STOC, pages 128--137, 2004.
[9]
A. Bonami. Etude des coefficients de Fourier des fonctions de Lp(G). Annales de l'Institute Fourier, 20(2):335--402, 1970.
[10]
B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230--261, 1988.
[11]
S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5--26, 2004.
[12]
F. Le Gall. Exponential separation of quantum and classical online space complexity. In 18th ACM SPAA, pages 67--73, 2006.
[13]
D. Gavinsky, J. Kempe, O. Regev, and R. de Wolf. Bounded-error quantum state identification and exponential separations in communication complexity. In 38th ACM STOC, pages 594--603, 2006.
[14]
A.S. Holevo. Bounds for the quantity of information transmitted by a quantum communication channel. Problemy Peredachi Informatsii, 9(3):3--11, 1973. English translation in Problems of Information Transmission, 9:177--183, 1973.
[15]
R. Impagliazzo, L.A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In 21st ACM STOC, pages 12--24, 1989.
[16]
J. Kahn, G. Kalai, and N. Linial. The influence of variables on Boolean functions. In 29th IEEE FOCS, pages 68--80, 1988.
[17]
H. Klauck. Lower bounds for quantum communication complexity. In 42nd IEEE FOCS, pages 288--297, 2001.
[18]
E. Kushilevitz, N. Nisan. Communication Complexity. Cambridge Univ. Press, 1997.
[19]
R. König and BM. Terhal. The bounded storage model in the presence of a quantum adversary, 11 Aug 2006. quant-ph/0608101.
[20]
M. Ledoux and M. Talagrand. Probability in Banach Spaces. Springer, 1991.
[21]
C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27--42, 2004.
[22]
U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53--66, 1992.
[23]
C. McDiarmid. Concentration. In Probabilistic Methods for Algorithmic Discrete Mathematics, pages 195--248. Springer, Berlin, 1998.
[24]
M. Muthukrishnan. Data Streams:Algorithms and Applications. Now Publishers, 2005.
[25]
M.A. Nielsen and I.L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 2000.
[26]
I. Newman. Private vscommon random bits in communication complexity. Information Processing Letters, 39(2):67--71, 1991.
[27]
R. Raz. Fourier analysis for probabilistic communication complexity. Computational Complexity, 5(3/4):205--221, 1995.
[28]
R. Raz. Exponential separation of quantum and classical communication complexity. In 31st ACM STOC, pages 358--367, 1999.
[29]
R. Renner. Security of Quantum Key Distribution. PhD thesis, ETH Zörich, 2005.
[30]
R. Renner and R. König. Universally composable privacy amplification against quantum adversaries. In 2nd TCC, vol3378 of LNCS, pages 407--425, 2005.
[31]
P.W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5):1484--1509, 1997.
[32]
M. Talagrand. How much are increasing sets correlated? Combinatorica, 16(2):243--258, 1996.
[33]
S.P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43--77, 2004.
[34]
R. de Wolf. Quantum communication and complexity. Theoretical Computer Science, 287(1):337--353, 2002.
[35]
A.C.-C. Yao. Probabilistic computations: Toward a unified measure of complexity. In 18th IEEE FOCS, pages 222--227, 1977.
[36]
A.C.-C. Yao. Some complexity questions related to distributive computing. In 11th ACM STOC, pages 209--213, 1979.

Cited By

View all

Index Terms

  1. Exponential separations for one-way quantum communication complexity, with applications to cryptography

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
    June 2007
    734 pages
    ISBN:9781595936318
    DOI:10.1145/1250790
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. communication complexity
    2. cryptography
    3. quantum

    Qualifiers

    • Article

    Conference

    STOC07
    Sponsor:
    STOC07: Symposium on Theory of Computing
    June 11 - 13, 2007
    California, San Diego, USA

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Upcoming Conference

    STOC '25
    57th Annual ACM Symposium on Theory of Computing (STOC 2025)
    June 23 - 27, 2025
    Prague , Czech Republic

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)44
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Sample-optimal classical shadows for pure statesQuantum10.22331/q-2024-06-17-13738(1373)Online publication date: 17-Jun-2024
    • (2024)Matrix hypercontractivity, streaming algorithms and LDCs: the large alphabet caseACM Transactions on Computation Theory10.1145/368882416:4(1-38)Online publication date: 11-Nov-2024
    • (2024)Quantum Measurement AdversaryIEEE Transactions on Information Theory10.1109/TIT.2023.331314970:1(318-335)Online publication date: Jan-2024
    • (2024)Real‐time seedless post‐processing for quantum random number generatorsIET Quantum Communication10.1049/qtc2.121185:4(650-657)Online publication date: 11-Dec-2024
    • (2023)Trade-Offs Between Entanglement and CommunicationProceedings of the conference on Proceedings of the 38th Computational Complexity Conference10.4230/LIPIcs.CCC.2023.25(1-23)Online publication date: 17-Jul-2023
    • (2023)On relating one-way classical and quantum communication complexitiesQuantum10.22331/q-2023-05-22-10107(1010)Online publication date: 22-May-2023
    • (2023)Practical randomness amplification and privatisation with implementations on quantum computersQuantum10.22331/q-2023-03-30-9697(969)Online publication date: 30-Mar-2023
    • (2023)(Noisy) Gap Cycle Counting Strikes Back: Random Order Streaming Lower Bounds for Connected Components and BeyondProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585192(183-195)Online publication date: 2-Jun-2023
    • (2023)Streaming Euclidean MST to a Constant FactorProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585168(156-169)Online publication date: 2-Jun-2023
    • (2023)Quantum Versus Classical Online Streaming Algorithms with Logarithmic Size of MemoryLobachevskii Journal of Mathematics10.1134/S199508022302020844:2(687-698)Online publication date: 22-May-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media