All Quantum Adversary Methods Are Equivalent
نویسندگان
چکیده
The quantum adversary method is one of the most versatile lower-bound methods for quantum algorithms. We show that all known variants of this method are equivalent: spectral adversary (Barnum, Saks, and Szegedy, 2003), weighted adversary (Ambainis, 2003), strong weighted adversary (Zhang, 2005), and the Kolmogorov complexity adversary (Laplante and Magniez, 2004). We also present a few new equivalent formulations of the method. This shows that there is essentially one quantum adversary method. From our approach, all known limitations of these versions of the quantum adversary method easily follow. ACM Classification: F.1.2, F.1.3 AMS Classification: 81P68, 68Q17
منابع مشابه
ua nt - p h / 04 09 11 6 v 2 2 1 A pr 2 00 5 All Quantum Adversary Methods are Equivalent
The quantum adversary method is one of the most versatile lower-bound methods for quantum algorithms. We show that all known variants of this method are equal: spectral adversary [BSS03], weighted adversary [Amb03], strong weighted adversary [Zha04], and the Kolmogorov complexity adversary [LM04]. We also present a few new equivalent formulations of the method. This shows that there is essentia...
متن کاملSe p 20 04 All Quantum Adversary Methods are Equivalent
The quantum adversary method is one of the most versatile lower-bound methods for quantum algorithms. We show that all known variants of this method are equal up to a multiplicative factor: weighted adversary [Amb03], strong weighted adversary [Zha04], spectral adversary [BSS03], and the Kolmogorov complexity adversary [LM04]. We also present a few new equivalent formulations of the method. Thi...
متن کاملTight adversary bounds for composite functions
The quantum adversary method is a versatile method for proving lower bounds on quantum algorithms. It yields tight bounds for many computational problems, is robust in having many equivalent formulations, and has natural connections to classical lower bounds. A further nice property of the adversary method is that it behaves very well with respect to composition of functions. We generalize the ...
متن کاملAn optimal adiabatic quantum query algorithm
The quantum adversary method was originally introduced by Ambainis [Amb02] for lower-bounding the quantum query complexity Q(f) of a function f . It is based on optimizing a matrix Γ assigning weights to pairs of inputs. It was later shown by Høyer et al. [HLŠ07] that using negative weights also provides a lower bound, which is stronger for some functions. A series of works [RŠ12, Rei09, Rei11]...
متن کاملSubtleties in the Definition of IND-CCA
The definition of IND-CCA disallows an adversary from querying the challenge ciphertext to its decryption oracle. We point out that there are several ways to formalize this. We show that, surprisingly, for public-key encryption the resulting notions are not all equivalent. We then consider the same question for key-encapsulation mechanisms (KEMs) and show that in this case the four notions are ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Theory of Computing
دوره 2 شماره
صفحات -
تاریخ انتشار 2005