AbstractWe present two general methods for proving lower bounds on the query complexity of nonadaptive quantum algorithms. Both methods are based on the adversary method of Ambainis. We show that they yield optimal lower bounds for several natural problems, and we challenge the reader to determine the nonadaptive quantum query complexity of the “1-to-1 versus 2-to-1” problem and of Hidden Translation.In addition to the results presented at Wollic 2008 in the conference version of this paper, we show that the lower bound given by the second method is always at least as good (and sometimes better) as the lower bound given by the first method. We also compare these two quantum lower bounds to probabilistic lower bounds
AbstractThe degree of a polynomial representing (or approximating) a function f is a lower bound for...
We study quantum algorithms that are given access to trusted and untrusted quantum witnesses. We est...
We investigate query-to-communication lifting theorems for models related to the quantum adversary b...
International audienceWe present general methods for proving lower bounds on the query complexity of...
AbstractWe present two general methods for proving lower bounds on the query complexity of nonadapti...
The polynomial method and the adversary method are the two main techniques to prove lower bounds on ...
Inspired by the Elitzur-Vaidman bomb testing problem [Elitzur/Vaidman 1993], we introduce a new quer...
, Abstract. We prove a very general lower bound technique for quantum and randomized query complexit...
We propose a new method for proving lower bounds on quantum query algorithms.Instead of a classical ...
We show that almost all n-bit Boolean functions have bounded-error quantum query complexity at least...
AbstractWe propose a new method for proving lower bounds on quantum query algorithms. Instead of a c...
Generalizing earlier work characterizing the quantum query complexity of computing a function of an ...
The quantum adversary method is one of the most successful techniques for proving lower bounds on qu...
Quantum query complexity measures the minimum number of queries a quantum algorithm needs to make to...
We propose a new method for proving lower bounds on quantum query algorithms. Instead of a classical...
AbstractThe degree of a polynomial representing (or approximating) a function f is a lower bound for...
We study quantum algorithms that are given access to trusted and untrusted quantum witnesses. We est...
We investigate query-to-communication lifting theorems for models related to the quantum adversary b...
International audienceWe present general methods for proving lower bounds on the query complexity of...
AbstractWe present two general methods for proving lower bounds on the query complexity of nonadapti...
The polynomial method and the adversary method are the two main techniques to prove lower bounds on ...
Inspired by the Elitzur-Vaidman bomb testing problem [Elitzur/Vaidman 1993], we introduce a new quer...
, Abstract. We prove a very general lower bound technique for quantum and randomized query complexit...
We propose a new method for proving lower bounds on quantum query algorithms.Instead of a classical ...
We show that almost all n-bit Boolean functions have bounded-error quantum query complexity at least...
AbstractWe propose a new method for proving lower bounds on quantum query algorithms. Instead of a c...
Generalizing earlier work characterizing the quantum query complexity of computing a function of an ...
The quantum adversary method is one of the most successful techniques for proving lower bounds on qu...
Quantum query complexity measures the minimum number of queries a quantum algorithm needs to make to...
We propose a new method for proving lower bounds on quantum query algorithms. Instead of a classical...
AbstractThe degree of a polynomial representing (or approximating) a function f is a lower bound for...
We study quantum algorithms that are given access to trusted and untrusted quantum witnesses. We est...
We investigate query-to-communication lifting theorems for models related to the quantum adversary b...