Makrand Sinha
YOU?
Author Swipe
View article: Lower bounds on the complexity of mixed-integer programs for stable set and knapsack
Lower bounds on the complexity of mixed-integer programs for stable set and knapsack Open
Standard mixed-integer programming formulations for the stable set problem on n -node graphs require n integer variables. We prove that this is almost optimal: We give a family of n -node graphs for which every polynomial-size MIP formulat…
View article: The Hardness of Learning Quantum Circuits and its Cryptographic Applications
The Hardness of Learning Quantum Circuits and its Cryptographic Applications Open
We show that concrete hardness assumptions about learning or cloning the output state of a random quantum circuit can be used as the foundation for secure quantum cryptography. In particular, under these assumptions we construct secure one…
View article: The Power of Adaptivity in Quantum Query Algorithms
The Power of Adaptivity in Quantum Query Algorithms Open
Motivated by limitations on the depth of near-term quantum devices, we study the depth-computation trade-off in the query model, where depth corresponds to the number of adaptive query rounds and the computation per layer corresponds to th…
View article: Simple constructions of linear-depth t-designs and pseudorandom unitaries
Simple constructions of linear-depth t-designs and pseudorandom unitaries Open
Uniformly random unitaries, i.e. unitaries drawn from the Haar measure, have many useful properties, but cannot be implemented efficiently. This has motivated a long line of research into random unitaries that "look" sufficiently Haar rand…
View article: Pseudorandom unitaries with non-adaptive security
Pseudorandom unitaries with non-adaptive security Open
Pseudorandom unitaries (PRUs) are ensembles of efficiently implementable unitary operators that cannot be distinguished from Haar random unitaries by any quantum polynomial-time algorithm with query access to the unitary. We present a simp…
View article: The Power of Adaptivity in Quantum Query Algorithms
The Power of Adaptivity in Quantum Query Algorithms Open
Motivated by limitations on the depth of near-term quantum devices, we study the depth-computation trade-off in the query model, where the depth corresponds to the number of adaptive query rounds and the computation per layer corresponds t…
View article: Lower Bounds on the Complexity of Mixed-Integer Programs for Stable Set and Knapsack
Lower Bounds on the Complexity of Mixed-Integer Programs for Stable Set and Knapsack Open
Standard mixed-integer programming formulations for the stable set problem on $n$-node graphs require $n$ integer variables. We prove that this is almost optimal: We give a family of $n$-node graphs for which every polynomial-size MIP form…
View article: Fourier Growth of Communication Protocols for XOR Functions
Fourier Growth of Communication Protocols for XOR Functions Open
The level-$k$ $\ell_1$-Fourier weight of a Boolean function refers to the sum of absolute values of its level-$k$ Fourier coefficients. Fourier growth refers to the growth of these weights as $k$ grows. It has been extensively studied for …
View article: Quantum Cryptography in Algorithmica
Quantum Cryptography in Algorithmica Open
We construct a classical oracle relative to which P = NP yet single-copy secure pseudorandom quantum states exist. In the language of Impagliazzo's five worlds, this is a construction of pseudorandom states in "Algorithmica," and hence sho…
View article: Quantum Cryptography in Algorithmica
Quantum Cryptography in Algorithmica Open
We construct a classical oracle relative to which $\mathsf{P} = \mathsf{NP}$ yet single-copy secure pseudorandom quantum states exist. In the language of Impagliazzo's five worlds, this is a construction of pseudorandom states in "Algorith…
View article: The NISQ Complexity of Collision Finding
The NISQ Complexity of Collision Finding Open
Collision-resistant hashing, a fundamental primitive in modern cryptography, ensures that there is no efficient way to find distinct inputs that produce the same hash value. This property underpins the security of various cryptographic app…
View article: Smoothed Analysis of the Komlós Conjecture
Smoothed Analysis of the Komlós Conjecture Open
The well-known Komlós conjecture states that given $n$ vectors in $\mathbb{R}^d$ with Euclidean norm at most one, there always exists a $\pm 1$ coloring such that the $\ell_{\infty}$ norm of the signed-sum vector is a constant independent …
View article: Influence in Completely Bounded Block-multilinear Forms and Classical Simulation of Quantum Algorithms
Influence in Completely Bounded Block-multilinear Forms and Classical Simulation of Quantum Algorithms Open
The Aaronson-Ambainis conjecture (Theory of Computing '14) says that every low-degree bounded polynomial on the Boolean hypercube has an influential variable. This conjecture, if true, would imply that the acceptance probability of every $…
View article: Prefix Discrepancy, Smoothed Analysis, and Combinatorial Vector Balancing
Prefix Discrepancy, Smoothed Analysis, and Combinatorial Vector Balancing Open
A well-known result of Banaszczyk in discrepancy theory concerns the prefix discrepancy problem (also known as the signed series problem): given a sequence of T unit vectors in ℝ^d, find ± signs for each of them such that the signed sum ve…
View article: Prefix Discrepancy, Smoothed Analysis, and Combinatorial Vector\n Balancing
Prefix Discrepancy, Smoothed Analysis, and Combinatorial Vector\n Balancing Open
A well-known result of Banaszczyk in discrepancy theory concerns the prefix\ndiscrepancy problem (also known as the signed series problem): given a sequence\nof $T$ unit vectors in $\\mathbb{R}^d$, find $\\pm$ signs for each of them such\n…
View article: k-forrelation optimally separates Quantum and classical query complexity
k-forrelation optimally separates Quantum and classical query complexity Open
Aaronson and Ambainis (SICOMP `18) showed that any partial function on $N$ bits that can be computed with an advantage $δ$ over a random guess by making $q$ quantum queries, can also be computed classically with an advantage $δ/2$ by a ran…
View article: Online Discrepancy Minimization for Stochastic Arrivals
Online Discrepancy Minimization for Stochastic Arrivals Open
In the stochastic online vector balancing problem, vectors $v_1,v_2,\ldots,v_T$ chosen independently from an arbitrary distribution in $\mathbb{R}^n$ arrive one-by-one and must be immediately given a $\pm$ sign. The goal is to keep the nor…
View article: Majorizing Measures for the Optimizer
Majorizing Measures for the Optimizer Open
The theory of majorizing measures, extensively developed by Fernique, Talagrand and many others, provides one of the most general frameworks for controlling the behavior of stochastic processes. In particular, it can be applied to derive q…
View article: Majorizing Measures for the Optimizer
Majorizing Measures for the Optimizer Open
The theory of majorizing measures, extensively developed by Fernique, Talagrand and many others, provides one of the most general frameworks for controlling the behavior of stochastic processes. In particular, it can be applied to derive q…
View article: Edge Estimation with Independent Set Oracles
Edge Estimation with Independent Set Oracles Open
We study the task of estimating the number of edges in a graph, where the access to the graph is provided via an independent set oracle. Independent set queries draw motivation from group testing and have applications to the complexity of …
View article: Online vector balancing and geometric discrepancy
Online vector balancing and geometric discrepancy Open
We consider an online vector balancing question where $T$ vectors, chosen from an arbitrary distribution over $[-1,1]^n$, arrive one-by-one and must be immediately given a $\pm$ sign. The goal is to keep the discrepancy small as possible. …
View article: Exponential Separation between Quantum Communication and Logarithm of\n Approximate Rank
Exponential Separation between Quantum Communication and Logarithm of\n Approximate Rank Open
Chattopadhyay, Mande and Sherif (ECCC 2018) recently exhibited a total\nBoolean function, the sink function, that has polynomial approximate rank and\npolynomial randomized communication complexity. This gives an exponential\nseparation be…
View article: Exponential Separation between Quantum Communication and Logarithm of Approximate Rank
Exponential Separation between Quantum Communication and Logarithm of Approximate Rank Open
Chattopadhyay, Mande and Sherif (ECCC 2018) recently exhibited a total Boolean function, the sink function, that has polynomial approximate rank and polynomial randomized communication complexity. This gives an exponential separation betwe…
View article: Lower Bounds for Approximating the Matching Polytope
Lower Bounds for Approximating the Matching Polytope Open
We prove that any extended formulation that approximates the matching polytope on $n$-vertex graphs up to a factor of $(1+\varepsilon)$ for any $\frac2n \le \varepsilon \le 1$ must have at least $\binom{n}{α/{\varepsilon}}$ defining inequa…
View article: A Direct-Sum Theorem for Read-Once Branching Programs
A Direct-Sum Theorem for Read-Once Branching Programs Open
We study a direct-sum question for read-once branching programs. If M(f) denotes the minimum average memory required to compute a function f(x_1,x_2, ..., x_n) how much memory is required to compute f on k independent inputs that arrive in…