Introduction
Pointer chasing is one of the core problems that measure how information moves through rounds of communication. Each round depends on the message from the previous one, which makes the task sensitive to the number of interactions between parties. Classical lower bounds for multi-round pointer chasing remain active and sharp through recent work [
1]. None of those results include a local workspace limit, and no quantum paper since Klauck’s early work [
2,
3] has treated pointer chasing under explicit memory bounds.
In realistic quantum communication, local memory cannot be ignored. Qubits that remain coherent during message exchange occupy space and control resources, and that physical limit changes the information flow of a protocol. A bounded workspace means fewer orthogonal states can be stored between rounds, which in turn restricts how much new information can be carried forward. This work asks how that memory limit changes the cost of pointer chasing.
The main result shows that total communication
T and local workspace
S satisfy the inequality
Here
k is the number of rounds and
n the pointer length. The bound recovers
when
and reduces to
when
. It extends the single-round workspace relation proved in
Workspace Bound [
4] and moves the analysis to multi-round settings where both communication and local memory act as limited resources.
Section 2 defines the workspace-bounded pointer-chasing model. Section 3 proves the multi-round packing lemma using the Kadison–Schwarz inequality. Section 4 derives the tradeoff and checks endpoint cases. Section 5 discusses implications and open directions for interactive quantum protocols.
Model and Definitions
The pointer-chasing task involves two parties that exchange quantum messages through multiple rounds. Alice holds an array of functions and Bob starts with an initial pointer . Each round uses one of the functions to update the pointer value. The goal is for Bob to output the final pointer after k rounds with error at most .
At round r, the message register has size at most qubits. Each party maintains a private workspace of at most S qubits that may be reused but not expanded. The total Hilbert space for a sender in round r can be written as . The workspace limit defines how much coherent information can be stored locally between rounds.
The protocol evolves by completely positive trace-preserving maps with an intermediate verification and reset (see [
5]). After round
r, the global state satisfies
where
represents the message transmission and
is a local unitary that resets a verified operator subspace to a clean state before the next round.
Success requires that Bob outputs the correct final pointer value with probability at least
. The total communication is the sum of all message sizes,
Distinguishability among message states is expressed through the Gram matrix
which uses the Hilbert–Schmidt inner product and satisfies
(standard in quantum lower-bound methods [
6,
7]). For an
S-qubit workspace, the underlying Hilbert space has dimension
, so the Gram matrix obeys the conservative rank bound
The verify–and–reset structure also induces a Hilbert–Schmidt orthogonal projector
onto a verified operator subspace. In later sections this projector provides a finite operator-norm budget through Kadison–Schwarz, recorded as
in the proofs (cf. [
4]). That budget controls sums of squared Hilbert–Schmidt norms inside the verified subspace. The packing bounds in the next section use this operator-budget together with the Gram structure above to quantify how limited workspace restricts total information flow across rounds.
Multi-Round Workspace Packing Lemma
This section quantifies how bounded workspace limits total distinguishability across k rounds. The objects are defined explicitly, and every step is recorded.
Setup. For each round
and each marked input index
i, let
denote Bob’s reduced state just before the
r-th message is applied on the instance where the
i-th location is the unique target. Let
be the corresponding reference state for the all-zero instance. Define the round-
r difference operators
Fix adversary weights
with
. These are the same weights used in standard hybrid and adversary arguments for quantum lower bounds [
6].
No-accumulation bound (per round). Verify-and-reset ensures that each round begins from a fresh verified subspace. For density matrices
and
,
Hence, for fixed
r,
This is the same no-accumulation principle used in the earlier workspace paper to control round-local operator growth [
4].
Kadison–Schwarz inequality (Hilbert–Schmidt form). Let
be the Hilbert–Schmidt orthogonal projector onto a verified operator subspace with
. For any operator
X,
This is the standard Kadison–Schwarz inequality in operator-space form [
8].
Round projectors. Let be the verified operator projectors for rounds 1 through k, each with . These encode the per-round workspace budget.
Packing calculation. Apply Kadison–Schwarz to the weighted differences inside each round and sum over
r and
i:
Each inequality is explicit: Kadison–Schwarz on the left, the no-accumulation bound per round in the middle, and the trace identity
on the right.
Lemma (multi-round packing). In a
k-round workspace-bounded protocol with per-round verified operator projectors
satisfying
,
Interpretation: the total Hilbert–Schmidt disturbance available to distinguish inputs across all rounds is bounded by a linear budget
. This is the only place where the
k factor enters; everything else will be an averaging step over inputs and rounds.
Figure 1.
Workspace-bounded k-round pointer-chasing protocol. Each round r uses S qubits of local workspace and sends qubits. The verify-and-reset operation applies projector with , enforcing the workspace bound before the next round.
Figure 1.
Workspace-bounded k-round pointer-chasing protocol. Each round r uses S qubits of local workspace and sends qubits. The verify-and-reset operation applies projector with , enforcing the workspace bound before the next round.
Main Theorem
This section derives the communication–workspace tradeoff from the multi-round packing lemma using per-step indexing. Each transmitted qubit is treated as one step.
Adversary potential. For step index
define
with
the trace distance. This measures the average distinguishability after
message steps. Initially
. Success with bounded error requires
for some constant
.
Per-step progress bound. Let
be the round active at step
, let
, fix weights
with
, and let
be the verified operator projector for round
r (Section 3). The hybrid argument [
6] implies
Packing budget across all steps. From the multi-round packing lemma,
Each step
belongs to some round
, so reindexing gives
Accumulating progress (Cauchy–Schwarz). Summing
and applying Cauchy–Schwarz,
By the packing budget, the last factor is at most
, hence
Conclusion. Since
, rearranging yields
This is the communication–workspace tradeoff for
k-round pointer chasing.
Theorem (main result). In any
k-round quantum pointer-chasing protocol with local workspace at most
S qubits per party and total communication
T qubits,
Endpoints: for
,
. For
, the bound reduces to
. This extends the single-round workspace relation of [
4] to the multi-round setting.
Discussion
The bound connects directly to classical pointer chasing. Classical lower bounds such as Mao, Yang, and Zhang (ITCS 2025) remain active, showing that interaction depth controls information cost when local memory is unrestricted. Those results assume parties can reuse unlimited workspace between rounds. This paper introduces the first quantum version with an explicit workspace parameter since the early studies of Klauck (2000–2002), establishing how finite quantum memory alters the scaling of communication.
Workspace acts as an information resource. The Hilbert–Schmidt budget per round shows that limited workspace compresses distinguishable state evolution. The factor proves the tradeoff between memory and communication is multiplicative, not additive. Each round gains only in communication advantage rather than the full factor of n that appears when workspace is unbounded.
Several questions remain. A matching upper bound is not known: it is open whether a protocol achieving exists. The role of entanglement assistance is also unclear; pre-shared EPR pairs may change the effective workspace scaling. Another direction is to remove the verify-and-reset assumption and test whether the Kadison–Schwarz argument survives in a fully general setting. Finally, a query-model version using multi-oracle access could determine whether the same Hilbert–Schmidt control extends beyond communication tasks.
The verify-and-reset rule simplifies the analysis but may reflect real hardware constraints. Systems with fixed qubit registers that must be re-initialized after each communication naturally follow this pattern. Testing these bounds experimentally on such architectures would show whether physical coherence limits match the theoretical scaling.
Conclusion. The inequality
shows that bounded workspace imposes a fundamental information bottleneck in multi-round quantum protocols. It extends the single-round framework of [
4] to interactive settings where limited local coherence constrains global communication.
Author Contributions
This article is the sole work of the author.
Funding
No external funding was received for this work.
Institutional Review Board Statement
Not applicable.
Data Availability Statement
No datasets were generated or analyzed in this study.
Conflicts of Interest
The author declares no conflicts of interest.
Use of Artificial Intelligence
ChatGPT and Claude were used as editorial and formatting assistants. Claude additionally provided research verification, literature searches, and methodological feedback. The reasoning, mathematics, and proofs originate entirely from the author’s work.
References
- Mao, X., Yang, G., & Zhang, J. (2025). Gadgetless lifting beats round elimination: Improved lower bounds for pointer chasing. In 16th Innovations in Theoretical Computer Science Conference (ITCS), LIPIcs (Vol. 325, pp. 75:1–75:14).
- Klauck, H. (2000). Quantum communication complexity. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (pp. 241–252).
- Klauck, H. Lower bounds for quantum communication complexity. SIAM Journal on Computing 2002, 30, 1863–1879. [Google Scholar]
- Cody, M. A. Workspace Bound. Zenodo Preprint, 2025. [Google Scholar] [CrossRef]
- Nielsen, M. A.; Chuang, I. L. Quantum computation and quantum information; Cambridge University Press, 2000. [Google Scholar]
- Ambainis, A. Quantum lower bounds by quantum arguments. Journal of Computer and System Sciences 2002, 64, 750–767. [Google Scholar] [CrossRef]
- Holevo, A. S. Bounds for the quantity of information transmitted by a quantum communication channel. Problems of Information Transmission 1973, 9, 177–183. [Google Scholar]
- Paulsen, V. I. Completely Bounded Maps and Operator Algebras; Cambridge University Press, 2002. [Google Scholar]
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).