Strengths and weaknesses of quantum fingerprinting

Dmitry Gavinsky, Julia Kempe, Ronald De Wolf

Research output: Chapter in Book/Report/Conference proceedingConference contribution


We study the power of quantum fingerprints in the simultaneous message passing (SMP) setting of communication complexity. Yao recently showed how to simulate, with exponential overhead, classical shared-randomness SMP protocols by means of quantum SMP protocols without shared randomness (Q -protocols). Our first result is to extend Yao's simulation to the strongest possible model: every many-round quantum protocol with unlimited shared entanglement can be simulated, with exponential overhead, by Q| -protocols. We apply our technique to obtain an efficient Q -protocol for a function which cannot be efficiently solved through more restricted simulations. Second, we tightly characterize the power of the quantum fingerprinting technique by making a connection to arrangements of homogeneous halfspaces with maximal margin. These arrangements have been well studied in computational learning theory, and we use some strong results obtained in this area to exhibit weaknesses of quantum fingerprinting. In particular, this implies that for almost all functions, quantum fingerprinting protocols are exponentially worse than classical deterministic SMP protocols.

Original languageEnglish (US)
Title of host publicationProceedings - Twenty-First Annual IEEE Conference on Computational Complexity, CCC 2006
Number of pages8
StatePublished - 2006
Event21st Annual IEEE Conference on Computational Complexity, CCC 2006 - Prague, Czech Republic
Duration: Jul 16 2006Jul 20 2006

Publication series

NameProceedings of the Annual IEEE Conference on Computational Complexity
ISSN (Print)1093-0159


Other21st Annual IEEE Conference on Computational Complexity, CCC 2006
Country/TerritoryCzech Republic

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Computational Mathematics


Dive into the research topics of 'Strengths and weaknesses of quantum fingerprinting'. Together they form a unique fingerprint.

Cite this