Quantum encodings and applications to locally decodable codes and communication complexity
暂无分享,去创建一个
[1] Ronald de Wolf,et al. Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval , 2004, ICALP.
[2] Dorit Aharonov,et al. Lattice Problems in NP cap coNP , 2004, FOCS.
[3] Eli Ben-Sasson,et al. Robust pcps of proximity, shorter pcps and applications to coding , 2004, STOC '04.
[4] Ziv Bar-Yossef,et al. Exponential separation of quantum and classical one-way communication complexity , 2004, STOC '04.
[5] C. Mochon. Quantum weak coin-flipping with bias of 0.192 , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[6] Scott Aaronson,et al. Lower bounds for local search by quantum arguments , 2003, STOC '04.
[7] Ronald de Wolf,et al. Quantum symmetrically-private information retrieval , 2003, Inf. Process. Lett..
[8] Iordanis Kerenidis,et al. Weak coin flipping with small bias , 2002, Inf. Process. Lett..
[9] Avi Wigderson,et al. Extractors: optimal up to constant factors , 2003, STOC '03.
[10] Ronald de Wolf,et al. Exponential lower bound for 2-query locally decodable codes via a quantum argument , 2002, STOC '03.
[11] Ashwin Nayak,et al. Bit-commitment-based quantum coin flipping , 2002, quant-ph/0206123.
[12] Yuval Ishai,et al. Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[13] Nicolas Gisin,et al. Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement? , 2002, Algorithmica.
[14] Luca Trevisan,et al. Lower bounds for linear locally decodable codes and private information retrieval , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[15] Jaikumar Radhakrishnan,et al. Better lower bounds for locally decodable codes , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[16] T. Rudolph,et al. Quantum protocol for cheat-sensitive weak coin flipping. , 2002, Physical review letters.
[17] E. Kushilevitz,et al. Barrier for Information-Theoretic Private Information Retrieval , 2002 .
[18] Lance Fortnow,et al. Nearly tight bounds for private information retrieval systems , 2002 .
[19] Andris Ambainis,et al. A new protocol and lower bounds for quantum coin flipping , 2001, STOC '01.
[20] Hartmut Klauck,et al. Interaction in quantum communication and the complexity of set disjointness , 2001, STOC '01.
[21] T. Rudolph,et al. Degrees of concealment and bindingness in quantum bit commitment protocols , 2001, quant-ph/0106019.
[22] Srinivasan Venkatesh,et al. Lower Bounds in the Quantum Cell Probe Model , 2001, ICALP.
[23] R. Cleve,et al. Quantum fingerprinting. , 2001, Physical review letters.
[24] Jaikumar Radhakrishnan,et al. The quantum complexity of set membership , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[25] Jonathan Katz,et al. On the efficiency of local decoding procedures for error-correcting codes , 2000, STOC '00.
[26] Hartmut Klauck,et al. On quantum and probabilistic communication: Las Vegas and one-way protocols , 2000, STOC '00.
[27] A. Yao,et al. Quantum bit escrow , 2000, STOC '00.
[28] Ran Raz,et al. Exponential separation of quantum and classical communication complexity , 1999, STOC '99.
[29] Ashwin Nayak,et al. Optimal lower bounds for quantum automata and random access codes , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[30] Andris Ambainis,et al. Dense quantum coding and a lower bound for 1-way quantum automata , 1998, STOC '99.
[31] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[32] Luca Trevisan,et al. Pseudorandom generators without the XOR lemma , 1999, Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317).
[33] Andris Ambainis,et al. The quantum communication complexity of sampling , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[34] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[35] Wim van Dam,et al. Quantum Oracle Interrogation: Getting All Information for Almost Half the Price , 1999 .
[36] Ronald de Wolf,et al. Quantum lower bounds by polynomials , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[37] M. Sipser,et al. Limit on the Speed of Quantum Computation in Determining Parity , 1998, quant-ph/9802045.
[38] A. Wigderson,et al. Quantum vs. classical communication and computation , 1998, STOC '98.
[39] Elizabeth D Mann. Private access to distributed information , 1998 .
[40] László Babai,et al. Randomized simultaneous messages: solution of a problem of Yao in communication complexity , 1997, Proceedings of Computational Complexity. Twelfth Annual IEEE Conference.
[41] D. Mayers. Unconditionally secure quantum bit commitment is impossible , 1996, quant-ph/9605044.
[42] H. Chau,et al. Why quantum bit commitment and ideal quantum coin tossing are impossible , 1996, quant-ph/9605026.
[43] Andris Ambainis,et al. On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .
[44] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[45] Ilan Newman,et al. Public vs. private coin flips in one round communication games (extended abstract) , 1996, STOC '96.
[46] E. Kushilevitz,et al. Communication Complexity: Basics , 1996 .
[47] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[48] Claude Crépeau,et al. Quantum Oblivious Transfer , 1994 .
[49] Daniel A. Spielman,et al. Expander codes , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[50] Andrew Chi-Chih Yao,et al. Quantum Circuit Complexity , 1993, FOCS.
[51] Joan Feigenbaum,et al. Random-Self-Reducibility of Complete Sets , 1993, SIAM J. Comput..
[52] Richard Beigel,et al. The polynomial method in circuit complexity , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[53] Madhu Sudan,et al. Highly Resilient Correctors for Polynomials , 1992, Inf. Process. Lett..
[54] Ilan Newman,et al. Private vs. Common Random Bits in Communication Complexity , 1991, Inf. Process. Lett..
[55] Noam Nisan,et al. BPP has subexponential time simulations unless EXPTIME has publishable proofs , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.
[56] Ronitt Rubinfeld,et al. Self-testing/correcting for polynomials and for approximate functions , 1991, STOC '91.
[57] Leonid A. Levin,et al. Checking computations in polylogarithmic time , 1991, STOC '91.
[58] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[59] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[60] Richard J. Lipton,et al. New Directions In Testing , 1989, Distributed Computing And Cryptography.
[61] Avi Wigderson,et al. Monotone circuits for connectivity require super-logarithmic depth , 1990, STOC '88.
[62] Andrew C. Yao,et al. Lower bounds by probabilistic arguments , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[63] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[64] Peter Frankl,et al. Intersection theorems with geometric consequences , 1981, Comb..
[65] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[66] A. Holevo. Bounds for the quantity of information transmitted by a quantum communication channel , 1973 .