Preprint
Article

This version is not peer-reviewed.

Workspace-Bounded Quantum Pointer Chasing

Submitted:

05 October 2025

Posted:

06 October 2025

Read the latest preprint version here

Abstract

Pointer chasing measures how information propagates through multiple rounds of communication. Quantum versions of the problem have never incorporated bounded local memory, even though every realistic protocol operates under finite workspace. This paper defines a workspace-bounded quantum pointer-chasing model, where each party has at most S qubits of reusable memory and total communication T. A multi-round form of the Kadison--Schwarz packing lemma shows that bounded workspace limits distinguishable state evolution across k rounds, giving T\( \sqrt{S} \;\ge\; \Omega\!\big(k\sqrt{n}\big) \). The bound recovers T \( \ge \Omega(k\sqrt{n}) \) when S=1 and becomes trivial at T \( \ge \Omega(k) \)when S \( \ge \) n. It extends the single-round framework established in Workspace Bound and provides the first explicit multi-round tradeoff between communication and local memory in quantum protocols.

Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  ;  

Introduction

Pointer chasing is one of the core problems that measure how information moves through rounds of communication. Each round depends on the message from the previous one, which makes the task sensitive to the number of interactions between parties. Classical lower bounds for multi-round pointer chasing remain active and sharp through recent work [1]. None of those results include a local workspace limit, and no quantum paper since Klauck’s early work [2,3] has treated pointer chasing under explicit memory bounds.
In realistic quantum communication, local memory cannot be ignored. Qubits that remain coherent during message exchange occupy space and control resources, and that physical limit changes the information flow of a protocol. A bounded workspace means fewer orthogonal states can be stored between rounds, which in turn restricts how much new information can be carried forward. This work asks how that memory limit changes the cost of pointer chasing.
The main result shows that total communication T and local workspace S satisfy the inequality
T S Ω ( k n ) .
Here k is the number of rounds and n the pointer length. The bound recovers T Ω ( k n ) when S = 1 and reduces to T Ω ( k ) when S n . It extends the single-round workspace relation proved in Workspace Bound [4] and moves the analysis to multi-round settings where both communication and local memory act as limited resources.
Section 2 defines the workspace-bounded pointer-chasing model. Section 3 proves the multi-round packing lemma using the Kadison–Schwarz inequality. Section 4 derives the tradeoff and checks endpoint cases. Section 5 discusses implications and open directions for interactive quantum protocols.

Model and Definitions

The pointer-chasing task involves two parties that exchange quantum messages through multiple rounds. Alice holds an array of functions f 1 , , f k and Bob starts with an initial pointer i 0 . Each round uses one of the functions to update the pointer value. The goal is for Bob to output the final pointer after k rounds with error at most 1 / 3 .
At round r, the message register has size at most C r qubits. Each party maintains a private workspace of at most S qubits that may be reused but not expanded. The total Hilbert space for a sender in round r can be written as H msg ( C r ) H work ( S ) . The workspace limit defines how much coherent information can be stored locally between rounds.
The protocol evolves by completely positive trace-preserving maps with an intermediate verification and reset (see [5]). After round r, the global state satisfies
ρ r + 1 = V r M r ( ρ r ) V r ,
where M r represents the message transmission and V r is a local unitary that resets a verified operator subspace to a clean state before the next round.
Success requires that Bob outputs the correct final pointer value with probability at least 2 / 3 . The total communication is the sum of all message sizes,
T = r = 1 k C r .
Distinguishability among message states is expressed through the Gram matrix
G x y = Tr ρ x ρ y = ρ x , ρ y HS ,
which uses the Hilbert–Schmidt inner product and satisfies G 0 (standard in quantum lower-bound methods [6,7]). For an S-qubit workspace, the underlying Hilbert space has dimension 2 S , so the Gram matrix obeys the conservative rank bound
rank ( G ) 2 S .
The verify–and–reset structure also induces a Hilbert–Schmidt orthogonal projector Π onto a verified operator subspace. In later sections this projector provides a finite operator-norm budget through Kadison–Schwarz, recorded as Tr ( Π ) = S in the proofs (cf. [4]). That budget controls sums of squared Hilbert–Schmidt norms inside the verified subspace. The packing bounds in the next section use this operator-budget together with the Gram structure above to quantify how limited workspace restricts total information flow across rounds.

Multi-Round Workspace Packing Lemma

This section quantifies how bounded workspace limits total distinguishability across k rounds. The objects are defined explicitly, and every step is recorded.
Setup. For each round r { 1 , , k } and each marked input index i, let ρ i ( r ) denote Bob’s reduced state just before the r-th message is applied on the instance where the i-th location is the unique target. Let ρ 0 ( r ) be the corresponding reference state for the all-zero instance. Define the round-r difference operators
F i ( r ) = ρ i ( r ) ρ 0 ( r ) .
Fix adversary weights w i with i w i 2 = 1 . These are the same weights used in standard hybrid and adversary arguments for quantum lower bounds [6].
No-accumulation bound (per round). Verify-and-reset ensures that each round begins from a fresh verified subspace. For density matrices ρ and σ ,
( ρ σ ) 2 2 ( ρ 2 + σ 2 ) 2 ( ρ + σ ) 4 I .
Hence, for fixed r,
i w i 2 F i ( r ) F i ( r ) 4 I .
This is the same no-accumulation principle used in the earlier workspace paper to control round-local operator growth [4].
Kadison–Schwarz inequality (Hilbert–Schmidt form). Let Π be the Hilbert–Schmidt orthogonal projector onto a verified operator subspace with Tr ( Π ) = S . For any operator X,
Π X 2 2 Tr Π X X .
This is the standard Kadison–Schwarz inequality in operator-space form [8].
Round projectors. Let Π 1 , , Π k be the verified operator projectors for rounds 1 through k, each with Tr ( Π r ) = S . These encode the per-round workspace budget.
Packing calculation. Apply Kadison–Schwarz to the weighted differences inside each round and sum over r and i:
r , i Π r w i F i ( r ) 2 2 r Tr Π r i w i 2 F i ( r ) F i ( r ) r Tr Π r · 4 I = 4 k S .
Each inequality is explicit: Kadison–Schwarz on the left, the no-accumulation bound per round in the middle, and the trace identity Tr ( Π r I ) = Tr ( Π r ) = S on the right.
Lemma (multi-round packing). In a k-round workspace-bounded protocol with per-round verified operator projectors Π r satisfying Tr ( Π r ) = S ,
r , i Π r w i F i ( r ) 2 2 4 k S .
Interpretation: the total Hilbert–Schmidt disturbance available to distinguish inputs across all rounds is bounded by a linear budget O ( k S ) . This is the only place where the k factor enters; everything else will be an averaging step over inputs and rounds.
Figure 1. Workspace-bounded k-round pointer-chasing protocol. Each round r uses S qubits of local workspace and sends C r qubits. The verify-and-reset operation applies projector Π r with Tr ( Π r ) = S , enforcing the workspace bound before the next round.
Figure 1. Workspace-bounded k-round pointer-chasing protocol. Each round r uses S qubits of local workspace and sends C r qubits. The verify-and-reset operation applies projector Π r with Tr ( Π r ) = S , enforcing the workspace bound before the next round.
Preprints 179637 g001

Main Theorem

This section derives the communication–workspace tradeoff from the multi-round packing lemma using per-step indexing. Each transmitted qubit is treated as one step.
Adversary potential. For step index τ { 0 , 1 , , T } define
Φ τ = 1 n i = 1 n D ρ τ ( i ) , ρ τ ( 0 ) ,
with D ( ρ , σ ) = 1 2 ρ σ 1 the trace distance. This measures the average distinguishability after τ message steps. Initially Φ 0 = 0 . Success with bounded error requires Φ T c for some constant c > 0 .
Per-step progress bound. Let r ( τ ) be the round active at step τ , let F i ( r ) = ρ i ( r ) ρ 0 ( r ) , fix weights w i with i w i 2 = 1 , and let Π r be the verified operator projector for round r (Section 3). The hybrid argument [6] implies
Δ τ : = Φ τ + 1 Φ τ 1 n i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 .
Packing budget across all steps. From the multi-round packing lemma,
r = 1 k i Π r w i F i ( r ) 2 2 4 k S .
Each step τ belongs to some round r ( τ ) , so reindexing gives
τ = 1 T i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 4 k S .
Accumulating progress (Cauchy–Schwarz). Summing Δ τ and applying Cauchy–Schwarz,
Φ T = τ = 0 T 1 Δ τ 1 n τ = 0 T 1 i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 1 n T τ = 0 T 1 i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 .
By the packing budget, the last factor is at most 4 k S , hence
Φ T O T k S n .
Conclusion. Since Φ T c , rearranging yields
T S Ω k n .
This is the communication–workspace tradeoff for k-round pointer chasing.
Theorem (main result). In any k-round quantum pointer-chasing protocol with local workspace at most S qubits per party and total communication T qubits,
T S Ω k n .
Endpoints: for S = 1 , T Ω ( k n ) . For S n , the bound reduces to T Ω ( k ) . This extends the single-round workspace relation of [4] to the multi-round setting.

Discussion

The bound connects directly to classical pointer chasing. Classical lower bounds such as Mao, Yang, and Zhang (ITCS 2025) remain active, showing that interaction depth controls information cost when local memory is unrestricted. Those results assume parties can reuse unlimited workspace between rounds. This paper introduces the first quantum version with an explicit workspace parameter since the early studies of Klauck (2000–2002), establishing how finite quantum memory alters the scaling of communication.
Workspace acts as an information resource. The Hilbert–Schmidt budget per round shows that limited workspace compresses distinguishable state evolution. The S factor proves the tradeoff between memory and communication is multiplicative, not additive. Each round gains only n / S in communication advantage rather than the full factor of n that appears when workspace is unbounded.
Several questions remain. A matching upper bound is not known: it is open whether a protocol achieving T = O ( k n / S ) exists. The role of entanglement assistance is also unclear; pre-shared EPR pairs may change the effective workspace scaling. Another direction is to remove the verify-and-reset assumption and test whether the Kadison–Schwarz argument survives in a fully general setting. Finally, a query-model version using multi-oracle access could determine whether the same Hilbert–Schmidt control extends beyond communication tasks.
The verify-and-reset rule simplifies the analysis but may reflect real hardware constraints. Systems with fixed qubit registers that must be re-initialized after each communication naturally follow this pattern. Testing these bounds experimentally on such architectures would show whether physical coherence limits match the theoretical scaling.
Conclusion. The inequality
T S Ω ( k n )
shows that bounded workspace imposes a fundamental information bottleneck in multi-round quantum protocols. It extends the single-round framework of [4] to interactive settings where limited local coherence constrains global communication.

Author Contributions

This article is the sole work of the author.

Funding

No external funding was received for this work.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No datasets were generated or analyzed in this study.

Conflicts of Interest

The author declares no conflicts of interest.

Use of Artificial Intelligence

ChatGPT and Claude were used as editorial and formatting assistants. Claude additionally provided research verification, literature searches, and methodological feedback. The reasoning, mathematics, and proofs originate entirely from the author’s work.

References

  1. Mao, X., Yang, G., & Zhang, J. (2025). Gadgetless lifting beats round elimination: Improved lower bounds for pointer chasing. In 16th Innovations in Theoretical Computer Science Conference (ITCS), LIPIcs (Vol. 325, pp. 75:1–75:14).
  2. Klauck, H. (2000). Quantum communication complexity. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (pp. 241–252).
  3. Klauck, H. Lower bounds for quantum communication complexity. SIAM Journal on Computing 2002, 30, 1863–1879. [Google Scholar]
  4. Cody, M. A. Workspace Bound. Zenodo Preprint, 2025. [Google Scholar] [CrossRef]
  5. Nielsen, M. A.; Chuang, I. L. Quantum computation and quantum information; Cambridge University Press, 2000. [Google Scholar]
  6. Ambainis, A. Quantum lower bounds by quantum arguments. Journal of Computer and System Sciences 2002, 64, 750–767. [Google Scholar] [CrossRef]
  7. Holevo, A. S. Bounds for the quantity of information transmitted by a quantum communication channel. Problems of Information Transmission 1973, 9, 177–183. [Google Scholar]
  8. Paulsen, V. I. Completely Bounded Maps and Operator Algebras; Cambridge University Press, 2002. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated