-
On the Hardness of Satisfiability with Bounded Occurrences in the Polynomial-Time Hierarchy
Authors:
Ishay Haviv,
Oded Regev,
Amnon Ta-Shma
Abstract:
$ \newcommand{\eps}ε \newcommand{\NP}{\mathsf{NP}} \newcommand{\YES}{\mathsf{YES}} \newcommand{\NO}{\mathsf{NO}} \newcommand{\myminus}{\text{-}}\newcommand{\Bsat}{\mathsf{B}} \newcommand{\threesat}{\rm{3}\myminus\mathsf{SAT}} \newcommand{\gapthreesat}{\mathsf{\forall\exists}\myminus{\rm{3}}\myminus\mathsf{SAT}} $In 1991, Papadimitriou and Yannakakis gave a reduction implying the $\NP…
▽ More
$ \newcommand{\eps}ε \newcommand{\NP}{\mathsf{NP}} \newcommand{\YES}{\mathsf{YES}} \newcommand{\NO}{\mathsf{NO}} \newcommand{\myminus}{\text{-}}\newcommand{\Bsat}{\mathsf{B}} \newcommand{\threesat}{\rm{3}\myminus\mathsf{SAT}} \newcommand{\gapthreesat}{\mathsf{\forall\exists}\myminus{\rm{3}}\myminus\mathsf{SAT}} $In 1991, Papadimitriou and Yannakakis gave a reduction implying the $\NP$-hardness of approximating the problem $\threesat$ with bounded occurrences. Their reduction is based on expander graphs. We present an analogue of this result for the second level of the polynomial-time hierarchy based on superconcentrator graphs. This resolves an open question of Ko and Lin (1995) and should be useful in deriving inapproximability results in the polynomial-time hierarchy.
More precisely, we show that given an instance of $\gapthreesat$ in which every variable occurs at most $\Bsat$ times (for some absolute constant $\Bsat$), it is $Π_2$-hard to distinguish between the following two cases: $\YES$ instances, in which for any assignment to the universal variables there exists an assignment to the existential variables that satisfies all the clauses, and $\NO$ instances in which there exists an assignment to the universal variables such that any assignment to the existential variables satisfies at most a $1-\eps$ fraction of the clauses. We also generalize this result to any level of the polynomial-time hierarchy.
△ Less
Submitted 11 June, 2018;
originally announced June 2018.
-
Limits of privacy amplification against non-signalling memory attacks
Authors:
Rotem Arnon,
Amnon Ta-Shma
Abstract:
The task of privacy amplification, in which Alice holds some partially secret information with respect to an adversary Eve and wishes to distill it until it is completely secret, is known to be solvable almost optimally both in the classical and quantum world. Unfortunately, when considering an adversary who is only limited by non-signalling constraints such a statement cannot be made in general.…
▽ More
The task of privacy amplification, in which Alice holds some partially secret information with respect to an adversary Eve and wishes to distill it until it is completely secret, is known to be solvable almost optimally both in the classical and quantum world. Unfortunately, when considering an adversary who is only limited by non-signalling constraints such a statement cannot be made in general. We here prove that under the natural assumptions of time-ordered non-signalling system, which allow past subsystems to signal future subsystems (using the device's memory for example), super-polynomial privacy amplification by any hashing is impossible. This is in great relevance when considering practical device independent key distribution protocols which assume a super-quantum adversary.
△ Less
Submitted 30 December, 2012; v1 submitted 6 November, 2012;
originally announced November 2012.
-
Towards the Impossibility of Non-Signalling Privacy Amplification from Time-Like Ordering Constraints
Authors:
Rotem Arnon,
Esther Hänggi,
Amnon Ta-Shma
Abstract:
In the past few years there was a growing interest in proving the security of cryptographic protocols, such as key distribution protocols, from the sole assumption that the systems of Alice and Bob cannot signal to each other. This can be achieved by making sure that Alice and Bob perform their measurements in a space-like separated way (and therefore signalling is impossible according to the non-…
▽ More
In the past few years there was a growing interest in proving the security of cryptographic protocols, such as key distribution protocols, from the sole assumption that the systems of Alice and Bob cannot signal to each other. This can be achieved by making sure that Alice and Bob perform their measurements in a space-like separated way (and therefore signalling is impossible according to the non-signalling postulate of relativity theory) or even by shielding their apparatus. Unfortunately, it was proven in [E. Haenggi, R. Renner, and S. Wolf. The impossibility of non-signaling privacy amplification] that, no matter what hash function we use, privacy amplification is impossible if we only impose non-signalling conditions between Alice and Bob and not within their systems. In this letter we reduce the gap between the assumptions of Haenggi et al. and the physical relevant assumptions, from an experimental point of view, which say that the systems can only signal forward in time within the systems of Alice and Bob. We consider a set of assumptions which is very close to the conditions above and prove that the impossibility result of Haenggi et al. still holds.
△ Less
Submitted 4 September, 2012; v1 submitted 16 May, 2012;
originally announced May 2012.
-
Interaction in Quantum Communication
Authors:
Hartmut Klauck,
Ashwin Nayak,
Amnon Ta-Shma,
David Zuckerman
Abstract:
In some scenarios there are ways of conveying information with many fewer, even exponentially fewer, qubits than possible classically. Moreover, some of these methods have a very simple structure--they involve only few message exchanges between the communicating parties. It is therefore natural to ask whether every classical protocol may be transformed to a ``simpler'' quantum protocol--one that…
▽ More
In some scenarios there are ways of conveying information with many fewer, even exponentially fewer, qubits than possible classically. Moreover, some of these methods have a very simple structure--they involve only few message exchanges between the communicating parties. It is therefore natural to ask whether every classical protocol may be transformed to a ``simpler'' quantum protocol--one that has similar efficiency, but uses fewer message exchanges.
We show that for any constant k, there is a problem such that its k+1 message classical communication complexity is exponentially smaller than its k message quantum communication complexity. This, in particular, proves a round hierarchy theorem for quantum communication complexity, and implies, via a simple reduction, an Omega(N^{1/k}) lower bound for k message quantum protocols for Set Disjointness for constant k.
Enroute, we prove information-theoretic lemmas, and define a related measure of correlation, the informational distance, that we believe may be of significance in other contexts as well.
△ Less
Submitted 15 March, 2006;
originally announced March 2006.
-
Interaction in Quantum Communication Complexity
Authors:
Ashwin Nayak,
Amnon Ta-Shma,
David Zuckerman
Abstract:
One of the most intriguing facts about communication using quantum states is that these states cannot be used to transmit more classical bits than the number of qubits used, yet there are ways of conveying information with exponentially fewer qubits than possible classically. Moreover, these methods have a very simple structure---they involve little interaction between the communicating parties.…
▽ More
One of the most intriguing facts about communication using quantum states is that these states cannot be used to transmit more classical bits than the number of qubits used, yet there are ways of conveying information with exponentially fewer qubits than possible classically. Moreover, these methods have a very simple structure---they involve little interaction between the communicating parties. We look more closely at the ways in which information encoded in quantum states may be manipulated, and consider the question as to whether every classical protocol may be transformed to a ``simpler'' quantum protocol of similar efficiency. By a simpler protocol, we mean a protocol that uses fewer message exchanges. We show that for any constant k, there is a problem such that its k+1 message classical communication complexity is exponentially smaller than its k message quantum communication complexity, thus answering the above question in the negative. Our result builds on two primitives, local transitions in bi-partite states (based on previous work) and average encoding which may be of significance in other applications as well.
△ Less
Submitted 25 May, 2000;
originally announced May 2000.
-
Dense Quantum Coding and a Lower Bound for 1-way Quantum Automata
Authors:
Andris Ambainis,
Ashwin Nayak,
Amnon Ta-Shma,
Umesh Vazirani
Abstract:
We consider the possibility of encoding m classical bits into much fewer n quantum bits so that an arbitrary bit from the original m bits can be recovered with a good probability, and we show that non-trivial quantum encodings exist that have no classical counterparts. On the other hand, we show that quantum encodings cannot be much more succint as compared to classical encodings, and we provide…
▽ More
We consider the possibility of encoding m classical bits into much fewer n quantum bits so that an arbitrary bit from the original m bits can be recovered with a good probability, and we show that non-trivial quantum encodings exist that have no classical counterparts. On the other hand, we show that quantum encodings cannot be much more succint as compared to classical encodings, and we provide a lower bound on such quantum encodings. Finally, using this lower bound, we prove an exponential lower bound on the size of 1-way quantum finite automata for a family of languages accepted by linear sized deterministic finite automata.
△ Less
Submitted 24 November, 1998; v1 submitted 17 April, 1998;
originally announced April 1998.