Quantum Lower Bound for Graph Collision Implies Lower Bound for Triangle Detection
نویسندگان
چکیده
We show that an improvement to the best known quantum lower bound for Graph-Collision problem implies an improvement to the best known lower bound for Triangle problem in the quantum query complexity model. In Graph-Collision we are given free access to a graph (V,E) and access to a function f : V → {0, 1} as a black box. We are asked to determine if there exist (u, v) ∈ E, such that f(u) = f(v) = 1. In Triangle we have a black box access to an adjacency matrix of a graph and we have to determine if the graph contains a triangle. For both of these problems the known lower bounds are trivial (Ω( √ n) and Ω(n), respectively) and there is no known matching upper bound.
منابع مشابه
ar X iv : q ua nt - p h / 03 11 06 0 v 1 1 0 N ov 2 00 3 On the power of Ambainis ’ s lower bounds ∗
The polynomial method and Ambainis’s lower bound method are two main quantum lower bound techniques. Recently Ambainis showed that the polynomial method is not tight. The present paper aims at studying the limitation of Ambainis’s lower bounds. We first give a generalization of the three known Ambainis’s lower bound theorems. Then it is shown that all these four Ambainis’s lower bounds have an ...
متن کاملThe lower bound for the number of 1-factors in generalized Petersen graphs
In this paper, we investigate the number of 1-factors of a generalized Petersen graph $P(N,k)$ and get a lower bound for the number of 1-factors of $P(N,k)$ as $k$ is odd, which shows that the number of 1-factors of $P(N,k)$ is exponential in this case and confirms a conjecture due to Lovász and Plummer (Ann. New York Acad. Sci. 576(2006), no. 1, 389-398).
متن کاملMAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
متن کاملMaximal Independent Sets for the Pixel Expansion of Graph Access Structure
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
متن کاملNew bounds on the classical and quantum communication complexity of some graph properties
We study the communication complexity of a number of graph properties where the edges of the graph G are distributed between Alice and Bob (i.e., each receives some of the edges as input). Our main results are: An Ω(n) lower bound on the quantum communication complexity of deciding whether an nvertex graph G is connected, nearly matching the trivial classical upper bound of O(n logn) bits of co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1507.03885 شماره
صفحات -
تاریخ انتشار 2015