Skip to main content
Recently, it was shown that Repeat-Until-Success (RUS) circuits can achieve a 2.5 times reduction in expected depth over ancilla-free techniques for single-qubit unitary decomposition. However, the previously best-known algorithm to... more
    • by  and +2
Recently it has been shown that Repeat-Until-Success (RUS) circuits can approximate a given single-qubit unitary with an expected number of T gates of about 1/3 of what is required by optimal, deterministic, ancilla-free decompositions... more
    • by  and +1
We introduce techniques to analyze unitary operations in terms of quadratic form expansions, a form similar to a sum over paths in the computational basis where the phase contributed by each path is described by a quadratic form over ℝ.... more
    • by 
    •   2  
      Quantum PhysicsQuantum Computer
We present a family of non-abelian groups for which the hidden subgroup problem can be solved efficiently on a quantum computer.
    • by 
    •   2  
      Quantum PhysicsQuantum Computer
1/d holds for all b ∈ B and b ∈ B . The size of any set containing pairwise mutually unbiased bases of Cd cannot exceed d + 1. If d is a power of a prime, then extremal sets containing d+ 1 mutually unbiased bases are known to exist. We... more
    • by 
    •   3  
      Quantum CryptographyState EstimationFinite Field
Mutually unbiased bases (MUBs) are a primitive used in quantum information processing to capture the principle of complementarity. While constructions of maximal sets of d + 1 such bases are known for system of prime power dimension d, it... more
    • by 
    •   2  
      Quantum PhysicsQuantum Information Processing
A classical computer does not allow to calculate a dis-crete cosine transform on N points in less than linear time. This trivial lower bound is no longer valid for a computer that takes advantage of quantum mechanical superposition,... more
    • by 
    •   5  
      Quantum PhysicsQuantum MechanicsQuantum ComputerImage Signal Processing
The first problem of the King was brought to us by Aharanov, Vaidman, and Albert [19], although they did not dare1 to reveal the tale of the King. The story was later told by Aharanov and Englert [1,2] and we retold the tale. In more... more
    • by 
Quantum computers have the potential to solve certain problems at much higher speed than any classical computer. Some evidence for this statement is given by Shor's algorithm to factor integers in polynomial time on a quan-tum... more
    • by 
The hidden subgroup problem (HSP) provides a unified framework to study problems of grouptheoretical nature in quantum computing such as order finding and the discrete logarithm problem. While it is known that Fourier sampling provides an... more
    • by 
    •   3  
      Quantum PhysicsQuantum ComputerDiscrete Logarithm
We present a construction of self-orthogonal codes using product codes. From the resulting codes, one can construct both block quantum error-correcting codes and quantum convolutional codes. We show that from the examples of convolutional... more
    • by 
    •   2  
      Quantum PhysicsInformation Theory
Most quantum algorithms that give an exponential speedup over classical algorithms exploit the Fourier transform in some way. In Shor's algorithm, sampling from the quantum Fourier spectrum is used to discover periodicity of the modular... more
    • by 
    •   2  
      Quantum ComputerBoolean function
The k-pair problem in network coding theory asks to send k messages simultaneously between k source-target pairs over a directed acyclic graph. In a previous paper [ICALP 2009, Part I, pages 622-633] the present authors showed that if a... more
    • by 
    •   3  
      Network codingQuantum Network TheoryCommunication Protocol
Decoupling the interactions in a spin network governed by a pair-interaction Hamiltonian is a well-studied problem. Combinatorial schemes for decoupling and for manipulating the couplings of Hamiltonians have been developed which use... more
    • by 
We present an algorithm for computing depth-optimal decompositions of logical operations, leveraging a meet-in-the-middle technique to provide a significant speed-up over simple brute force algorithms. As an illustration of our method we... more
    • by 
    •   2  
      Computer HardwareElectrical and Electronic Engineering
We present families of quantum error-correcting codes which are optimal in the sense that the minimum distance is maximal. These maximum distance separable (MDS) codes are defined over q-dimensional quantum systems, where q is an... more
    • by 
    •   2  
      Quantum PhysicsQuantum Information
We address the problem of constructing positive operator-valued measures (POVMs) in finite dimension n consisting of n 2 operators of rank one which have an inner product close to uniform. This is motivated by the related question of... more
    • by 
    •   6  
      Number TheoryMathematical PhysicsSet TheoryMatrix Theory
We introduce a new quantum adversary method to prove lower bounds on the query complexity of the quantum state generation problem. This problem encompasses both, the computation of partial or total functions and the preparation of target... more
    • by 
    •   3  
      Complexity TheoryQuantum MechanicsQuantum Computer
Rejection sampling is a well-known method to sample from a target distribution, given the ability to sample from a given distribution. The method has been first formalized by von Neumann (1951) and has many applications in classical... more
    • by 
    •   5  
      Quantum PhysicsComputational ComplexityAutomorphism P-GroupBoolean function
We study the quantum query complexity of the Boolean hidden shift problem. Given oracle access to f (x + s) for a known Boolean function f , the task is to determine the n-bit string s. The quantum query complexity of this problem depends... more
    • by