Sciweavers

934 search results - page 32 / 187
» Quantum Algorithmic Entropy
Sort
View
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
WDAG
1998
Springer
87views Algorithms» more  WDAG 1998»
14 years 1 months ago
Wait-Free Synchronization in Quantum-Based Multiprogrammed Systems
d Abstract) James H. Anderson, Rohit Jain, and David Ott Department of Computer Science University of North Carolina at Chapel Hill We consider wait-free synchronization in multipr...
James H. Anderson, Rohit Jain, David Ott
COCO
2008
Springer
86views Algorithms» more  COCO 2008»
13 years 10 months ago
The Multiplicative Quantum Adversary
We present a new variant of the quantum adversary method. All adversary methods give lower bounds on the quantum query complexity of a function by bounding the change of a progres...
Robert Spalek
FOCS
2008
IEEE
14 years 3 months ago
Sketching and Streaming Entropy via Approximation Theory
We give near-optimal sketching and streaming algorithms for estimating Shannon entropy in the most general streaming model, with arbitrary insertions and deletions. This improves ...
Nicholas J. A. Harvey, Jelani Nelson, Krzysztof On...
COCO
2001
Springer
161views Algorithms» more  COCO 2001»
14 years 1 months ago
Communication Complexity Lower Bounds by Polynomials
The quantum version of communication complexity allows the two communicating parties to exchange qubits and/or to make use of prior entanglement (shared EPRpairs). Some lower boun...
Harry Buhrman, Ronald de Wolf