Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Falk Unger is active.

Publication


Featured researches published by Falk Unger.


Physical Review Letters | 2006

Limit on Nonlocality in Any World in Which Communication Complexity Is Not Trivial

Gilles Brassard; Harry Buhrman; Noah Linden; André Allan Méthot; Alain Tapp; Falk Unger

Bell proved that quantum entanglement enables two spacelike separated parties to exhibit classically impossible correlations. Even though these correlations are stronger than anything classically achievable, they cannot be harnessed to make instantaneous (faster than light) communication possible. Yet, Popescu and Rohrlich have shown that even stronger correlations can be defined, under which instantaneous communication remains impossible. This raises the question: Why are the correlations achievable by quantum mechanics not maximal among those that preserve causality? We give a partial answer to this question by showing that slightly stronger correlations would result in a world in which communication complexity becomes trivial.


conference on computational complexity | 2007

Perfect Parallel Repetition Theorem for Quantum XOR Proof Systems

Richard Cleve; William Slofstra; Falk Unger; Sarvagya Upadhyay

We consider a class of two-prover interactive proof systems where each prover returns a single bit to the verifier and the verifiers verdict is a function of the XOR of the two bits received. We show that, when the provers are allowed to coordinate their behavior using a shared entangled quantum state, a perfect parallel repetition theorem holds in the following sense. The provers optimal success probability for simultaneously playing a collection of XOR proof systems is exactly the product of the individual optimal success probabilities. This property is remarkable in view of the fact that, in the classical case (where the provers can only utilize classical information), it does not hold. The theorem is proved by analyzing parities of XOR proof systems using semidefinite programming techniques, which we then relate to parallel repetitions of XOR games via Fourier analysis.


Nature | 2013

Classical command of quantum systems

Ben W. Reichardt; Falk Unger; Umesh V. Vazirani

Quantum computation and cryptography both involve scenarios in which a user interacts with an imperfectly modelled or ‘untrusted’ system. It is therefore of fundamental and practical interest to devise tests that reveal whether the system is behaving as instructed. In 1969, Clauser, Horne, Shimony and Holt proposed an experimental test that can be passed by a quantum-mechanical system but not by a system restricted to classical physics. Here we extend this test to enable the characterization of a large quantum system. We describe a scheme that can be used to determine the initial state and to classically command the system to evolve according to desired dynamics. The bipartite system is treated as two black boxes, with no assumptions about their inner workings except that they obey quantum physics. The scheme works even if the system is explicitly designed to undermine it; any misbehaviour is detected. Among its applications, our scheme makes it possible to test whether a claimed quantum computer is truly quantum. It also advances towards a goal of quantum cryptography: namely, the use of ‘untrusted’ devices to establish a shared random key, with security based on the validity of quantum physics.


conference on innovations in theoretical computer science | 2013

A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games

Ben W. Reichardt; Falk Unger; Umesh V. Vazirani

Can a classical experimentalist command an untrusted quantum system to realize arbitrary quantum dynamics, aborting if it misbehaves? If so, then we could realize the dream of device-independent quantum cryptography: using untrusted quantum devices to establish a shared random key, with security based on the correctness of quantum mechanics. It would also allow for testing whether a claimed quantum computer is truly quantum. We prove a rigidity theorem for the famous Clauser-Horne-Shimony-Holt (CHSH) game, first formulated to provide a means of experimentally testing the violation of the Bell inequalities. The theorem shows that the only way for the two non-communicating quantum players to win many games played in sequence is if their shared quantum state is close to the tensor product of EPR states (Bell states) and their measurements are the optimal CHSH measurements on successive qubits. This theorem may be viewed as analogous to classical multi-linearity testing, in the sense that the outcome of local checks gives a characterization of a global object. The rigidity theorem provides the basis of a technique by which a classical system can certify the joint, entangled state of a bipartite quantum system, as well as command the application of specific operators on each subsystem. This leads directly to a scheme for device-independent quantum key distribution. Control over the state and operators can also be leveraged to create more elaborate protocols for realizing general quantum circuits. In particular, it allows us to establish that a quantum interactive proof system with a classical verifier is as powerful as one with a quantum verifier, or QMIP = MIP*.


arXiv: Quantum Physics | 2006

Implications of superstrong non-locality for cryptography

Harry Buhrman; Matthias Christandl; Falk Unger; Stephanie Wehner; Andreas Winter

Non-local boxes are hypothetical ‘machines’ that give rise to superstrong non-local correlations, leading to a stronger violation of Bell/Clauser, Horne, Shimony & Holt inequalities than is possible within the framework of quantum mechanics. We show how non-local boxes can be used to perform any two-party secure computation. We first construct a protocol for bit commitment and then show how to achieve oblivious transfer using non-local boxes. Both have been shown to be impossible using quantum mechanics alone.


compiler construction | 2008

Perfect Parallel Repetition Theorem for Quantum Xor Proof Systems

Richard Cleve; William Slofstra; Falk Unger; Sarvagya Upadhyay

Abstract.We consider a class of two-prover interactive proof systems where each prover returns a single bit to the verifier and the verifier’s verdict is a function of the XOR of the two bits received. We show that, when the provers are allowed to coordinate their behavior using a shared entangled quantum state, a perfect parallel repetition theorem holds in the following sense. The prover’s optimal success probability for simultaneously playing a collection of XOR proof systems is exactly the product of the individual optimal success probabilities. This property is remarkable in view of the fact that, in the classical case (where the provers can only utilize classical information), it does not hold. The theorem is proved by analyzing parities of XOR proof systems using semidefinite programming techniques, which we then relate to parallel repetitions of XOR games via Fourier analysis.


international colloquium on automata languages and programming | 2008

Upper Bounds on the Noise Threshold for Fault-Tolerant Quantum Computing

Julia Kempe; Oded Regev; Falk Unger; Ronald de Wolf

We prove new upper bounds on the tolerable level of noise in a quantum circuit. Weconsider circuits consisting of unitary k-qubit gates each of whose input wires is subject todepolarizing noise of strength p, as well as arbitrary one-qubit gates that are essentiallynoise-free. We assume that the output of the circuit is the result of measuring somedesignated qubit in the final state. Our main result is that for p > 1 - Θ(1/√k), theoutput of any such circuit of large enough depth is essentially independent of its input,thereby making the circuit useless. For the important special case of k = 2, our bound isp > 35.7%. Moreover, if the only allowed gate on more than one qubit is the two-qubitCNOT gate, then our bound becomes 29.3%. These bounds on p are numerically betterthan previous bounds, yet are incomparable because of the somewhat different circuitmodel that we are using. Our main technique is the use of a Pauli basis decomposition,in which the effects of depolarizing noise are very easy to describe.


symposium on theoretical aspects of computer science | 2006

Sparse selfreducible sets and polynomial size circuit lower bounds

Harry Buhrman; Leen Torenvliet; Falk Unger

It is well-known that the class of sets that can be computed by polynomial size circuits is equal to the class of sets that are polynomial time reducible to a sparse set. It is widely believed, but unfortunately up to now unproven, that there are sets in EXPNP, or even in EXP that are not computable by polynomial size circuits and hence are not reducible to a sparse set. In this paper we study this question in a more restricted setting: what is the computational complexity of sparse sets that are selfreducible? It follows from earlier work of Lozano and Toran [10] that EXPNP does not have sparse selfreducible hard sets. We define a natural version of selfreduction, tree-selfreducibility, and show that NEXP does not have sparse tree-selfreducible hard sets. We also show that this result is optimal with respect to relativizing proofs, by exhibiting an oracle relative to which all of EXP is reducible to a sparse tree-selfreducible set. These lower bounds are corollaries of more general results about the computational complexity of sparse sets that are selfreducible, and can be interpreted as super-polynomial circuit lower bounds for NEXP.


Interactions | 2006

New Limits on Fault-Tolerant Quantum Computation

Harry Buhrman; Richard Cleve; Monique Laurent; Noah Linden; Alexander Schrijver; Falk Unger


foundations of computer science | 2014

Noisy Interactive Quantum Communication

Gilles Brassard; Ashwin Nayak; Alain Tapp; Dave Touchette; Falk Unger

Collaboration


Dive into the Falk Unger's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alain Tapp

Université de Montréal

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge