Skip to main content

Showing 1–10 of 10 results for author: Podder, S

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2411.04085  [pdf, ps, other

    quant-ph cs.CC

    New Lower-bounds for Quantum Computation with Non-Collapsing Measurements

    Authors: David Miloschewsky, Supartha Podder

    Abstract: Aaronson, Bouland, Fitzsimons and Lee introduced the complexity class PDQP (which was original labeled naCQP), an alteration of BQP enhanced with the ability to obtain non-collapsing measurements, samples of quantum states without collapsing them. Although PDQP contains SZK, it still requires $Ω(N^{1/4})$ queries to solve unstructured search. We formulate an alternative equivalent definition of PD… ▽ More

    Submitted 17 May, 2025; v1 submitted 6 November, 2024; originally announced November 2024.

    Comments: 21 pages, 4 Figures

  2. arXiv:2410.11827  [pdf, ps, other

    quant-ph

    Are uncloneable proof and advice states strictly necessary?

    Authors: Rohit Chatterjee, Srijita Kundu, Supartha Podder

    Abstract: Yes, we show that they are. We initiate the study of languages that necessarily need uncloneable quantum proofs and advice. We define strictly uncloneable versions of the classes QMA, BQP/qpoly and FEQP/qpoly (which is the class of relational problems solvable exactly with polynomial-sized quantum advice). Strictly uncloneable QMA is defined to be the class of languages in QMA that only have unc… ▽ More

    Submitted 1 April, 2025; v1 submitted 15 October, 2024; originally announced October 2024.

    Comments: To be published in Proceedings of STOC 2025. Title of published version: Uncloneable quantum states are necessary as proofs and advice

  3. arXiv:2410.02228  [pdf, ps, other

    quant-ph cs.CC cs.CR

    The Role of piracy in quantum proofs

    Authors: Anne Broadbent, Alex B. Grilo, Supartha Podder, Jamie Sikora

    Abstract: A well-known feature of quantum information is that it cannot, in general, be cloned. Recently, a number of quantum-enabled information-processing tasks have demonstrated various forms of uncloneability; among these forms, piracy is an adversarial model that gives maximal power to the adversary, in controlling both a cloning-type attack, as well as the evaluation/verification stage. Here, we initi… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

  4. arXiv:2309.11279  [pdf, other

    cs.CC quant-ph

    On the Fine-Grained Query Complexity of Symmetric Functions

    Authors: Supartha Podder, Penghui Yao, Zekun Ye

    Abstract: This paper explores a fine-grained version of the Watrous conjecture, including the randomized and quantum algorithms with success probabilities arbitrarily close to $1/2$. Our contributions include the following: i) An analysis of the optimal success probability of quantum and randomized query algorithms of two fundamental partial symmetric Boolean functions given a fixed number of queries. We… ▽ More

    Submitted 21 October, 2023; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: accepted in ISAAC 2023

  5. Secure Software Leasing Without Assumptions

    Authors: Anne Broadbent, Stacey Jeffery, Sébastien Lord, Supartha Podder, Aarthi Sundaram

    Abstract: Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one of these areas of interest. Given a target circuit $C$ from a circuit class, SSL produces an encoding of $C$ that enables a recipient to evaluate $C$, and also enables the originator of the software to verify that the softwar… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 41 pages, 5 figures

    Journal ref: Proceedings of the 19th Theory of Cryptography Conference (TCC 2021), pp. 90-120

  6. Symmetries, graph properties, and quantum speedups

    Authors: Shalev Ben-David, Andrew M. Childs, András Gilyén, William Kretschmer, Supartha Podder, Daochen Wang

    Abstract: Aaronson and Ambainis (2009) and Chailloux (2018) showed that fully symmetric (partial) functions do not admit exponential quantum query speedups. This raises a natural question: how symmetric must a function be before it cannot exhibit a large quantum speedup? In this work, we prove that hypergraph symmetries in the adjacency matrix model allow at most a polynomial separation between randomized… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

    Comments: 46 pages. Subsumes arXiv:2001.09642 and arXiv:2001.10520; adds a characterization of permutation groups with speedup and an exponential speedup for adjacency-list graph property testing

    Journal ref: Proceedings of the 61st IEEE Symposium on Foundations of Computer Science (FOCS 2020), pp. 649-660 (2020)

  7. arXiv:2005.04068  [pdf, ps, other

    cs.CC quant-ph

    Communication memento: Memoryless communication complexity

    Authors: Srinivasan Arunachalam, Supartha Podder

    Abstract: We study the communication complexity of computing functions $F:\{0,1\}^n\times \{0,1\}^n \rightarrow \{0,1\}$ in the memoryless communication model. Here, Alice is given $x\in \{0,1\}^n$, Bob is given $y\in \{0,1\}^n$ and their goal is to compute F(x,y) subject to the following constraint: at every round, Alice receives a message from Bob and her reply to Bob solely depends on the message receive… ▽ More

    Submitted 9 September, 2020; v1 submitted 8 May, 2020; originally announced May 2020.

    Comments: 30 Pages; several improvements to the presentations

  8. arXiv:2001.09642  [pdf, ps, other

    quant-ph cs.CC

    How symmetric is too symmetric for large quantum speedups?

    Authors: Shalev Ben-David, Supartha Podder

    Abstract: Suppose a Boolean function $f$ is symmetric under a group action $G$ acting on the $n$ bits of the input. For which $G$ does this mean $f$ does not have an exponential quantum speedup? Is there a characterization of how rich $G$ must be before the function $f$ cannot have enough structure for quantum algorithms to exploit? In this work, we make several steps towards understanding the group actio… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

    Comments: 18 pages

  9. arXiv:1509.06361  [pdf, other

    cs.CC quant-ph

    Quantum Query Complexity of Subgraph Isomorphism and Homomorphism

    Authors: Raghav Kulkarni, Supartha Podder

    Abstract: Let $H$ be a fixed graph on $n$ vertices. Let $f_H(G) = 1$ iff the input graph $G$ on $n$ vertices contains $H$ as a (not necessarily induced) subgraph. Let $α_H$ denote the cardinality of a maximum independent set of $H$. In this paper we show: \[Q(f_H) = Ω\left(\sqrt{α_H \cdot n}\right),\] where $Q(f_H)$ denotes the quantum query complexity of $f_H$. As a consequence we obtain a lower bounds… ▽ More

    Submitted 21 September, 2015; v1 submitted 21 September, 2015; originally announced September 2015.

    Comments: 16 pages, 2 figures

  10. arXiv:1402.4312  [pdf, ps, other

    quant-ph cs.CC

    Two Results about Quantum Messages

    Authors: Hartmut Klauck, Supartha Podder

    Abstract: We show two results about the relationship between quantum and classical messages. Our first contribution is to show how to replace a quantum message in a one-way communication protocol by a deterministic message, establishing that for all partial Boolean functions $f:\{0,1\}^n\times\{0,1\}^m\to\{0,1\}$ we have $D^{A\to B}(f)\leq O(Q^{A\to B,*}(f)\cdot m)$. This bound was previously known for tota… ▽ More

    Submitted 16 April, 2014; v1 submitted 18 February, 2014; originally announced February 2014.