2016
DOI: 10.26421/qic16.3-4-1
|View full text |Cite
|
Sign up to set email alerts
|

Information cost of quantum communication protocols

Abstract: In two-party quantum communication complexity, Alice and Bob receive some classical inputs and wish to compute some function that depends on both these inputs, while minimizing the communication. This model has found numerous applications in many areas of computer science. One notion that has received a lot of attention recently is the information cost of the protocol, namely how much information the players reveal about their inputs when they run the protocol. In the quantum world, it is not straightforward t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(21 citation statements)
references
References 14 publications
0
21
0
Order By: Relevance
“…We concretely construct the subgroup S(V) as follows. From (25), all elements of S(V) are commutative regardless of the choice of c v . Since I ∈ S(V), we set W(0) = I, i.e., c 0 = 1.…”
Section: Appendix B Proof Of Propositionmentioning
confidence: 99%
“…We concretely construct the subgroup S(V) as follows. From (25), all elements of S(V) are commutative regardless of the choice of c v . Since I ∈ S(V), we set W(0) = I, i.e., c 0 = 1.…”
Section: Appendix B Proof Of Propositionmentioning
confidence: 99%
“…Intuitively, it seems reasonable to conjecture this trivial solution is optimal for QPIR. However, since the C-QPIR for the honest server has more efficient solutions than the trivial solution [13], [14], we cannot exclude the possibility of efficient one-server QPIR protocols. Furthermore, whereas the optimality proof of classical PIR [1] uses the communication transcript between the server and the user, we cannot apply the same technique because quantum states cannot be copied because of the nocloning theorem.…”
Section: B Contribution: Quantum Pir For Quantum Messagesmentioning
confidence: 99%
“…The proposed QPIR protocol inherits the security of C-QPIR. With this property, on the honest server model with prior entanglement, there exists a QPIR protocol of communication complexity O(log m) since there exist C-QPIR protocols of communication complexity O(log m) by Kerenidis et al [14].…”
Section: B Contribution: Quantum Pir For Quantum Messagesmentioning
confidence: 99%
See 2 more Smart Citations