Elements of information theory
Elements of information theory
Rounds in communication complexity revisited
SIAM Journal on Computing
Journal of the ACM (JACM)
On data structures and asymmetric communication complexity
Journal of Computer and System Sciences
On quantum and probabilistic communication: Las Vegas and one-way protocols
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
The communication complexity of pointer chasing
Journal of Computer and System Sciences - Special issue on the fourteenth annual IEE conference on computational complexity
Quantum computation and quantum information
Quantum computation and quantum information
Dense quantum coding and quantum finite automata
Journal of the ACM (JACM)
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
On Quantum and Approximate Privacy
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
Optimal Lower Bounds for Quantum Automata and Random Access Codes
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Informational Complexity and the Direct Sum Problem for Simultaneous Message Complexity
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
An Optimal Randomised Cell Probe Lower Bound for Approximate Nearest Neighbour Searching
FOCS '04 Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science
Prior Entanglement, Message Compression and Privacy in Quantum Communication
CCC '05 Proceedings of the 20th Annual IEEE Conference on Computational Complexity
Bounded-error quantum state identification and exponential separations in communication complexity
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
One-Way Communication Complexity and the Nečiporuk Lower Bound on Formula Size
SIAM Journal on Computing
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
SFCS '93 Proceedings of the 1993 IEEE 34th Annual Foundations of Computer Science
New Binding-Concealing Trade-Offs for Quantum String Commitment
Journal of Cryptology
A direct sum theorem in communication complexity via message compression
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
Communication complexity of remote state preparation with entanglement
Quantum Information & Computation
The communication complexity of correlation
IEEE Transactions on Information Theory
A separation between divergence and holevo information for ensembles
Mathematical Structures in Computer Science
Everywhere-tight information cost tradeoffs for augmented index
APPROX'11/RANDOM'11 Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques
On the existence of loss-tolerant quantum oblivious transfer protocols
Quantum Information & Computation
Hi-index | 0.06 |
We prove the following information-theoretic property about quantum states. Substate theorem: Let ρ and σ be quantum states in the same Hilbert space with relative entropy S(ρ ∥ σ) ≔ Tr ρ (log ρ− log σ) = c. Then for all ε 0, there is a state ρ′ such that the trace distance ∥ρ′ − ρ∥tr ≔ Tr &sqrt;(ρ′ − ρ)2 ≤ ε, and ρ′/2O(c/ε2) ≤ σ. It states that if the relative entropy of ρ and σ is small, then there is a state ρ′ close to ρ, i.e. with small trace distance ∥ρ′ − ρ∥tr, that when scaled down by a factor 2O(c) ‘sits inside’, or becomes a ‘substate’ of, σ. This result has several applications in quantum communication complexity and cryptography. Using the substate theorem, we derive a privacy trade-off for the set membership problem in the two-party quantum communication model. Here Alice is given a subset A &subse; [n], Bob an input i ∈ [n], and they need to determine if i ∈ A. Privacy trade-off for set membership: In any two-party quantum communication protocol for the set membership problem, if Bob reveals only k bits of information about his input, then Alice must reveal at least n/2O(k) bits of information about her input. We also discuss relationships between various information theoretic quantities that arise naturally in the context of the substate theorem.