Quantum fingerprinting.

@article{Buhrman2001QuantumF,
  title={Quantum fingerprinting.},
  author={Harry Buhrman and Richard Cleve and John Watrous and Ronald de Wolf},
  journal={Physical review letters},
  year={2001},
  volume={87 16},
  pages={
          167902
        },
  url={https://api.semanticscholar.org/CorpusID:1096490}
}
It is shown that fingerprints consisting of quantum information can be made exponentially smaller than the original strings without any correlations or entanglement between the parties, implying an exponential quantum/classical gap for the equality problem in the simultaneous message passing model of communication complexity.

Figures from this paper

Classical vs Quantum Fingerprinting

Single-qubit quantum fingerprinting is feasible, and its advantages theoretically and experimentally are demonstrated.

Feasibility of quantum fingerprinting using optical signals with random global phase

It is shown that an experimental demonstration of a quantum fingerprinting protocol beating the known bound on the performance of classical schemes should be possible using currently available technology.

Optimal fingerprinting strategies with one-sided error

For small message lengths, this work presents constructions of optimal classical fingerprinting strategies with one-sided error, in both the one-way and simultaneous message passing models, and provides bounds on the worst-case error probability with the help of extremal set theory.

One-qubit fingerprinting schemes

This paper considers the extreme scenario of performing fingerprinting where Alice and Bob both send either one bit or one qubit messages to the referee for the equality problem, and shows that it is easy to construct one-qubit fingerprinting schemes which can outperform any one- bit fingerprinting scheme.

Quantum digital signatures with smaller public keys

A variant of quantum signatures in which nonbinary symbols are signed instead of bits, which reduces the number of qubits expended per message bit and gives a security proof and numerical results show how the improvement in public key size depends on the message length.

Single-qubit optical quantum fingerprinting

It is proved that shared entanglement permits 100% reliable quantum fingerprinting, which will outperform classical fingerprinting even with arbitrary amounts of shared randomness.

Quantum fingerprinting without a shared phase reference

This work introduces and analyzes a quantum fingerprinting protocol based on two-photon interference which does require a shared phase reference and works in scenarios when the global phase of transmitted signals becomes completely random.

Quantum fingerprinting using two-photon interference.

A quantum fingerprinting protocol relying on two-photon interference which does not require a shared phase reference between the parties preparing optical signals carrying data fingerprints is presented, offering comparable advantage over classical fingerprinting protocols without access to shared prior randomness.

On Quantum Fingerprinting and Quantum Cryptographic Hashing

This chapter presents computational aspects of quantum fingerprinting and quantum hashing and discusses cryptographical properties of quantum hashing.

Quantum fingerprinting with a single particle

We show that the two-slit experiment in which a single quantum particle interferes with itself can be interpreted as a quantum fingerprinting protocol: the interference pattern exhibited by the
...

Quantum vs. classical communication and computation

A simple and general simulation technique is presented that transforms any black-box quantum algorithm to a quantum communication protocol for a related problem, in a way that fully exploits the quantum parallelism, to obtain new positive and negative results.

Cost of Exactly Simulating Quantum Entanglement with Classical Communication

It is shown that, in the case of a single pair of qubits in a Bell state, a constant number of bits of communication is always sufficient — regardless of the number of measurements under consideration.

Distinguishability and Accessible Information in Quantum Theory

This document focuses on translating various information-theoretic measures of distinguishability for probability distributions into measures of distin- guishability for quantum states, and gives a way of expressing the problem so that it appears as algebraic as that of the problem of finding quantum distinguishability measures.

Randomized simultaneous messages: solution of a problem of Yao in communication complexity

This work settles Yao's question, asking the exact randomized SM complexity of the equality function, and gives a constructive proof that O(log n) public coins reduce the complexity of "equality" to constant.

Advances in Cryptology: Crypto, 90 : Proceedings

A Statistical Attack of the FEAL-8 Cryptosystem and an Improved Linear Syndrome Algorithm in Cryptanalysis With Applications are presented.

Communication Complexity

Theory of Error-correcting Codes

This course expounds the principles of coded modulations for the Gaussian channel and, if time permits, for Rician and Rayleigh fading channels (fully interleaved), and reminds students of the basics of the theory of linear codes for conventional memoryless ergodic channels.

On Randomized One-round Communication Complexity

The results include a connection to the VC-dimension, a study of the problem of computing the inner product of two real valued vectors, and a relation between “simultaneous” protocols and one-round protocols.

Some complexity questions related to distributive computing(Preliminary Report)

The quantity of interest, which measures the information exchange necessary for computing f, is the minimum number of bits exchanged in any algorithm.