Limits on fundamental limits to computation

IL Markov - Nature, 2014 - nature.com
An indispensable part of our personal and working lives, computing has also become
essential to industries and governments. Steady improvements in computer hardware have …

Quantum computational complexity

J Watrous - arxiv preprint arxiv:0804.3401, 2008 - arxiv.org
This article surveys quantum computational complexity, with a focus on three fundamental
notions: polynomial-time quantum computations, the efficient verification of quantum proofs …

Fractal: Post-quantum and Transparent Recursive Proofs from Holography

A Chiesa, D Ojha, N Spooner - … on the Theory and Applications of …, 2020 - Springer
We present a new methodology to efficiently realize recursive composition of succinct non-
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …

How to record quantum queries, and applications to quantum indifferentiability

M Zhandry - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
The quantum random oracle model (QROM) has become the standard model in which to
prove the post-quantum security of random-oracle-based constructions. Unfortunately, none …

Verifiable quantum advantage without structure

T Yamakawa, M Zhandry - Journal of the ACM, 2024 - dl.acm.org
We show the following hold, unconditionally unless otherwise stated, relative to a random
oracle:—There are NP search problems solvable by quantum polynomial-time (QPT) …

[KİTAP][B] Quantum walks and search algorithms

R Portugal - 2013 - Springer
This is a textbook about quantum walks and quantum search algorithms. The readers will
take advantage of the pedagogical aspects and learn the topics faster and make less effort …

Random oracles in a quantum world

D Boneh, Ö Dagdelen, M Fischlin, A Lehmann… - Advances in Cryptology …, 2011 - Springer
The interest in post-quantum cryptography—classical systems that remain secure in the
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …

Quantum walk algorithm for element distinctness

A Ambainis - SIAM Journal on Computing, 2007 - SIAM
We use quantum walks to construct a new quantum algorithm for element distinctness and
its generalization. For element distinctness (the problem of finding two equal items among N …

Quantum attacks on Bitcoin, and how to protect against them

D Aggarwal, GK Brennen, T Lee, M Santha… - arxiv preprint arxiv …, 2017 - arxiv.org
The key cryptographic protocols used to secure the internet and financial transactions of
today are all susceptible to attack by the development of a sufficiently large quantum …

Complexity-theoretic foundations of quantum supremacy experiments

S Aaronson, L Chen - arxiv preprint arxiv:1612.05903, 2016 - arxiv.org
In the near future, there will likely be special-purpose quantum computers with 40-50 high-
quality qubits. This paper lays general theoretical foundations for how to use such devices to …