Abstract
The counterfeit coin problem requires us to find all false coins from a given bunch of coins using a balance scale. We assume that the balance scale gives us only “balanced” or “tilted” information and that we know the number k of false coins in advance. The balance scale can be modeled by a certain type of oracle and its query complexity is a measure for the cost of weighing algorithms (the number of weighings). In this paper, we study the quantum query complexity for this problem. Let Q(k,N) be the quantum query complexity of finding all k false coins from the N given coins. We show that for any k and N such that k < N/2, Q(k,N) = O(k 1/4), contrasting with the classical query complexity, Ω(klog(N/k)), that depends on N. So our quantum algorithm achieves a quartic speed-up for this problem. We do not have a matching lower bound, but we show some evidence that the upper bound is tight: any algorithm, including our algorithm, that satisfies certain properties needs Ω(k 1/4) queries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ambainis, A.: Quantum lower bounds by quantum arguments. J. Comput. Syst. Sci. 64, 750–767 (2002)
Ambainis, A.: Polynomial degree vs. quantum query complexity. J. Comput. Syst. Sci. 72, 220–238 (2006)
Barnum, H., Saks, M.E., Szegedy, M.: Quantum query complexity and semi-definite programming. In: Proc. 18th CCC, pp. 179–193 (2003)
Bernstein, E., Vazirani, U.: Quantum complexity theory. SIAM J. Comput. 26, 1411–1473 (1997)
Boyer, M., Brassard, G., Høyer, P., Tapp, A.: Tight bounds on quantum searching. Fortschritte Der Physik 46, 493–505 (1998)
Brassard, G., Høyer, P., Mosca, M., Tapp, A.: Quantum amplitude amplification and estimation. In: Quantum Computation and Quantum Information: A Millennium Volume. AMS Contemporary Mathematics Series, vol. 305, pp. 53–74 (2002)
van Dam, W., Shparlinski, I.: Classical and quantum algorithms for exponential congruences. In: Kawano, Y., Mosca, M. (eds.) TQC 2008. LNCS, vol. 5106, pp. 1–10. Springer, Heidelberg (2008)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proc. 28th STOC, pp. 212–219 (1996)
Guy, R.K., Nowakowski, R.J.: Coin-weighing problems. Amer. Math. Monthly 102, 164–167 (1995)
Halbeisen, L., Hungerbühler, N.: The general counterfeit coin problem. Discrete Mathematics 147, 139–150 (1995)
Høyer, P., Lee, T., Špalek, R.: Negative weights make adversaries stronger. In: Proc. 39th STOC, pp. 526–535 (2007)
Iwama, K., Nishimura, H., Raymond, R., Teruyama, J.: Quantum counterfeit coin problems. arXiv:1009.0416 (2010)
Laplante, S., Magniez, F.: Lower bounds for randomized and quantum query complexity using Kolmogorov arguments. SIAM J. Comput. 38, 46–62 (2008)
Liu, W.A., Zhang, W.G., Nie, Z.K.: Searching for two counterfeit coins with two-arms balance. Discrete Appl. Math. 152, 187–212 (2005)
Magniez, F., Santha, M., Szegedy, M.: Quantum algorithms for the triangle problem. SIAM J. Comput. 37, 413–424 (2007)
Manvel, B.: Counterfeit coin problems. Mathematics Magazine 50, 90–92 (1977)
Reichardt, B.: Span programs and quantum query complexity: The general adversary bound is nearly tight for every boolean function. In: Proc. 50th FOCS, pp. 544–551 (2009)
Reichardt, B.: Reflections for quantum query algorithms. arXiv:1005.1601 (2010)
Špalek, R., Szegedy, M.: All quantum adversary methods are equivalent. Theory of Computing 2, 1–18 (2006)
Terhal, B.M., Smolin, J.A.: Single quantum querying of a database. Phys. Rev. A 58, 1822–1826 (1998)
Zhang, S.: On the power of Ambainis’s lower bounds. Theoret. Comput. Sci. 339, 241–256 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Iwama, K., Nishimura, H., Raymond, R., Teruyama, J. (2010). Quantum Counterfeit Coin Problems. In: Cheong, O., Chwa, KY., Park, K. (eds) Algorithms and Computation. ISAAC 2010. Lecture Notes in Computer Science, vol 6506. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17517-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-17517-6_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17516-9
Online ISBN: 978-3-642-17517-6
eBook Packages: Computer ScienceComputer Science (R0)