Preprint
Article

This version is not peer-reviewed.

Workspace-Bounded Quantum Pointer Chasing

Submitted:

10 October 2025

Posted:

10 October 2025

You are already at the latest version

Abstract
Pointer chasing measures how information propagates through multiple rounds of communication. Quantum versions of the problem have never incorporated bounded local memory, even though every realistic protocol operates under finite workspace. This paper defines a workspace-bounded quantum pointer-chasing model, where each party has at most S qubits of reusable memory and total communication T. A multi-round form of the Kadison--Schwarz packing lemma shows that bounded workspace limits distinguishable state evolution across k rounds, giving T\( \sqrt{S} \;\ge\; \Omega\!\big(k\sqrt{n}\big) \). The bound recovers T \( \ge \Omega(k\sqrt{n}) \) when S=1 and becomes trivial at T \( \ge \Omega(k) \)when S \( \ge \) n. It extends the single-round framework established in Workspace Bound and provides the first explicit multi-round tradeoff between communication and local memory in quantum protocols.

Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  ;  

Introduction

Pointer chasing is one of the core problems that measure how information moves through rounds of communication. Each round depends on the message from the previous one, which makes the task sensitive to the number of interactions between parties. Classical lower bounds for multi-round pointer chasing remain active and sharp through recent work [12]. None of those results include a local workspace limit, and no quantum paper since Klauck’s early work [9,10] has treated pointer chasing under explicit memory bounds. In realistic quantum communication, local memory cannot be ignored. Qubits that remain coherent during message exchange occupy space and control resources, and that physical limit changes the information flow of a protocol. A bounded workspace means fewer orthogonal states can be stored between rounds, which in turn restricts how much new information can be carried forward. This work asks how that memory limit changes the cost of pointer chasing.
The main result shows that total communication T and local workspace S satisfy the inequality
T S Ω ( k n ) .
Here k is the number of rounds and n the pointer length. The bound recovers T Ω ( k n ) when S = 1 and reduces to T Ω ( k ) when S n . It extends the single-round workspace relation proved in Workspace Bound [5] and moves the analysis to multi-round settings where both communication and local memory act as limited resources.
The bound connects directly to prior results. Classical k-round pointer chasing without workspace limits requires Ω ( n log k 1 n ) communication [15], while quantum protocols without workspace constraints achieve Ω ( k n ) communication [9]. The workspace-bounded inequality derived here recovers the quantum bound when S = 1 (minimal workspace) and becomes trivial when S n (unbounded workspace), showing that the S factor quantifies how limited memory compresses distinguishable evolution across rounds. The tradeoff is multiplicative: reducing workspace from n to n increases the required communication by a factor of n .
Section 2 defines the workspace-bounded pointer-chasing model. Section 3 proves the multi-round packing lemma using the Kadison–Schwarz inequality. Section 4 derives the tradeoff and checks endpoint cases. Section 5 discusses implications and open directions for interactive quantum protocols.

Related Work

Quantum communication complexity lower bounds began with Yao’s early work and were formalized by Klauck [9,10], who proved that quantum protocols require Ω ( n ) communication for functions like disjointness and established general adversary frameworks. Those results assume unlimited local memory. Pointer chasing appeared in Klauck’s framework but without workspace constraints. Classical pointer chasing has sharp multi-round bounds: Ponzio, Radhakrishnan, and Venkatesh [15] showed that k-round protocols need Ω ( n / k ) communication, and recent work by Mao, Yang, and Zhang [12] tightened these bounds using gadgetless lifting. None of those papers restrict how much memory each party can reuse between rounds.
Quantum lower-bound techniques rely on distinguishability arguments through the adversary method [1] and Gram matrix rank bounds [2]. The hybrid argument used here comes from Ambainis [1] and applies to multi-round settings where progress is measured step by step. Surveys by de Wolf [6] and Buhrman, Cleve, and Wigderson [4] cover standard quantum communication methods but do not address memory limits during interaction. Bounded quantum memory has been studied for single-party computation. Beame, Saks, Sun, and Vee [3] analyzed time-space tradeoffs for quantum search and showed that workspace constraints affect query complexity. Klauck, Špalek, and de Wolf [11] proved strong direct-product theorems with space bounds for quantum query models. These results apply to computation, not communication, and the techniques do not transfer directly because communication involves two parties with separate workspaces and message transmission between them.
The verify-and-reset structure used here follows the bounded-memory model from the workspace analysis in [5] and connects to reset operations in fault-tolerant quantum computation [13]. The Kadison–Schwarz inequality in operator form appears in Paulsen’s operator algebra text [14] and has been used for quantum channel capacity bounds [8], but applying it to multi-round communication with workspace projectors is new.
This paper combines workspace constraints with multi-round pointer chasing for the first time. The result shows that the S factor changes communication scaling even when protocols can interact over k rounds.

Model and Definitions

Preliminaries. Let H denote a finite-dimensional Hilbert space. For density matrices ρ , σ on H , the trace distance is D ( ρ , σ ) = 1 2 ρ σ 1 . The Hilbert–Schmidt inner product is A , B HS = Tr ( A B ) with induced norm A 2 = Tr ( A A ) . A quantum communication protocol uses local workspaces of dimension 2 S (S qubits per party) and message registers of C r qubits per round. The total communication cost is T = r C r . The pointer-chasing function P C k : [ n ] k × [ n ] [ n ] is P C k ( f 1 , , f k ; i 0 ) = f k ( f k 1 ( f 1 ( i 0 ) ) ) . The goal is to obtain lower bounds on T as a function of workspace S. The pointer-chasing task involves two parties that exchange quantum messages through multiple rounds. Alice holds an array of functions f 1 , , f k and Bob starts with an initial pointer i 0 . Each round uses one of the functions to update the pointer value. The goal is for Bob to output the final pointer after k rounds with error at most 1 / 3 .
At round r, the message register has size at most C r qubits. Each party maintains a private workspace of at most S qubits that may be reused but not expanded. The total Hilbert space for a sender in round r can be written as H msg ( C r ) H work ( S ) . The workspace limit defines how much coherent information can be stored locally between rounds.
The protocol evolves by completely positive trace-preserving maps with an intermediate verification and reset (see [13]). After round r, the global state satisfies
ρ r + 1 = V r M r ( ρ r ) V r ,
where M r represents the message transmission and V r is a local unitary that resets a verified operator subspace to a clean state before the next round.
Success requires that Bob outputs the correct final pointer value with probability at least 2 / 3 . The total communication is the sum of all message sizes,
T = r = 1 k C r .
Distinguishability among message states is expressed through the Gram matrix
G x y = Tr ρ x ρ y = ρ x , ρ y HS ,
which uses the Hilbert–Schmidt inner product and satisfies G 0 (standard in quantum lower-bound methods [1,8]). For an S-qubit workspace, the underlying Hilbert space has dimension 2 S , so the Gram matrix obeys the conservative rank bound
rank ( G ) 2 S .
The verify–and–reset structure also induces a Hilbert–Schmidt orthogonal projector Π onto a verified operator subspace. In later sections this projector provides a finite operator-norm budget through Kadison–Schwarz, recorded as Tr ( Π ) = S in the proofs (cf. [5]). That budget controls sums of squared Hilbert–Schmidt norms inside the verified subspace. The packing bounds in the next section use this operator-budget together with the Gram structure above to quantify how limited workspace restricts total information flow across rounds.

Multi-Round Workspace Packing Lemma

This section quantifies how bounded workspace limits total distinguishability across k rounds. The objects are defined explicitly, and every step is recorded.
Setup. For each round r { 1 , , k } and each marked input index i, let ρ i ( r ) denote Bob’s reduced state just before the r-th message is applied on the instance where the i-th location is the unique target. Let ρ 0 ( r ) be the corresponding reference state for the all-zero instance. Define the round-r difference operators
F i ( r ) = ρ i ( r ) ρ 0 ( r ) .
Fix adversary weights w i with i w i 2 = 1 . These are the same weights used in standard hybrid and adversary arguments for quantum lower bounds [1].
No-accumulation bound (per round). Verify-and-reset ensures that each round begins from a fresh verified subspace. For density matrices ρ and σ ,
( ρ σ ) 2 2 ( ρ 2 + σ 2 ) 2 ( ρ + σ ) 4 I .
Hence, for fixed r,
i w i 2 F i ( r ) F i ( r ) 4 I .
This is the same no-accumulation principle used in the earlier workspace paper to control round-local operator growth [5].
Kadison–Schwarz inequality (Hilbert–Schmidt form). Let Π be the Hilbert–Schmidt orthogonal projector onto a verified operator subspace with Tr ( Π ) = S . For any operator X,
Π X 2 2 Tr Π X X .
This is the standard Kadison–Schwarz inequality in operator-space form [14].
Round projectors. Let Π 1 , , Π k be the verified operator projectors for rounds 1 through k, each with Tr ( Π r ) = S . These encode the per-round workspace budget.
Packing calculation. Apply Kadison–Schwarz to the weighted differences inside each round and sum over r and i:
r , i Π r w i F i ( r ) 2 2 r Tr Π r i w i 2 F i ( r ) F i ( r ) r Tr Π r · 4 I = 4 k S .
Each inequality is explicit: Kadison–Schwarz on the left, the no-accumulation bound per round in the middle, and the trace identity Tr ( Π r I ) = Tr ( Π r ) = S on the right.
Lemma (multi-round packing). In a k-round workspace-bounded protocol with per-round verified operator projectors Π r satisfying Tr ( Π r ) = S ,
r , i Π r w i F i ( r ) 2 2 4 k S .
Interpretation: the total Hilbert–Schmidt disturbance available to distinguish inputs across all rounds is bounded by a linear budget O ( k S ) . This is the only place where the k factor enters; everything else will be an averaging step over inputs and rounds.
Figure 1. Workspace-bounded k-round pointer-chasing protocol. Each round r uses S qubits of local workspace and sends C r qubits. The verify-and-reset operation applies projector Π r with Tr ( Π r ) = S , enforcing the workspace bound before the next round.
Figure 1. Workspace-bounded k-round pointer-chasing protocol. Each round r uses S qubits of local workspace and sends C r qubits. The verify-and-reset operation applies projector Π r with Tr ( Π r ) = S , enforcing the workspace bound before the next round.
Preprints 180232 g001

Main Theorem

This section derives the communication–workspace tradeoff from the multi-round packing lemma using per-step indexing. Each transmitted qubit is treated as one step.
Adversary potential. For step index τ { 0 , 1 , , T } define
Φ τ = 1 n i = 1 n D ρ τ ( i ) , ρ τ ( 0 ) ,
with D ( ρ , σ ) = 1 2 ρ σ 1 the trace distance. This measures the average distinguishability after τ message steps. Initially Φ 0 = 0 . Success with bounded error requires Φ T c for some constant c > 0 . This follows from the Helstrom bound relating distinguishability to trace distance [7].
Per-step progress bound. Let r ( τ ) be the round active at step τ , let F i ( r ) = ρ i ( r ) ρ 0 ( r ) , fix weights w i with i w i 2 = 1 , and let Π r be the verified operator projector for round r (Section 3). The hybrid argument [1] implies
Δ τ : = Φ τ + 1 Φ τ 1 n i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 .
Packing budget across all steps. From the multi-round packing lemma,
r = 1 k i Π r w i F i ( r ) 2 2 4 k S .
Each step τ belongs to some round r ( τ ) , so reindexing gives
τ = 1 T i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 4 k S .
Accumulating progress (Cauchy–Schwarz). Summing Δ τ and applying Cauchy–Schwarz,
Φ T = τ = 0 T 1 Δ τ 1 n τ = 0 T 1 i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 1 n T τ = 0 T 1 i Π r ( τ ) w i F i ( r ( τ ) ) 2 2 .
By the packing budget, the last factor is at most 4 k S , hence
Φ T O T k S n .
Conclusion. Since Φ T c , rearranging yields
T S Ω k n .
This is the communication–workspace tradeoff for k-round pointer chasing.
Theorem (main result). In any k-round quantum pointer-chasing protocol with local workspace at most S qubits per party and total communication T qubits,
T S Ω k n .
Endpoints: for S = 1 , T Ω ( k n ) . For S n , the bound reduces to T Ω ( k ) . This extends the single-round workspace relation of [5] to the multi-round setting.

Discussion

The bound connects directly to classical pointer chasing. Classical lower bounds such as Mao, Yang, and Zhang (ITCS 2025) remain active, showing that interaction depth controls information cost when local memory is unrestricted. Those results assume parties can reuse unlimited workspace between rounds. This paper introduces the first quantum version with an explicit workspace parameter since the early studies of Klauck (2000–2002), establishing how finite quantum memory alters the scaling of communication.
Workspace acts as an information resource. The Hilbert–Schmidt budget per round shows that limited workspace compresses distinguishable state evolution. The S factor proves the tradeoff between memory and communication is multiplicative, not additive. Each round gains only n / S in communication advantage rather than the full factor of n that appears when workspace is unbounded. Several questions remain. A matching upper bound is not known: it is open whether a protocol achieving T = O ( k n / S ) exists. The role of entanglement assistance is also unclear; pre-shared EPR pairs may change the effective workspace scaling. Another direction is to remove the verify-and-reset assumption and test whether the Kadison–Schwarz argument survives in a fully general setting. Finally, a query-model version using multi-oracle access could determine whether the same Hilbert–Schmidt control extends beyond communication tasks.
The verify-and-reset rule simplifies the analysis but may reflect real hardware constraints. Systems with fixed qubit registers that must be re-initialized after each communication naturally follow this pattern. Testing these bounds experimentally on such architectures would show whether physical coherence limits match the theoretical scaling.
Table 1. Pointer-chasin g communication-complexity bounds.
Table 1. Pointer-chasin g communication-complexity bounds.
Setting Bound Reference
Classical (unlimited workspace) Ω ( n log k 1 n ) [15]
Quantum (unlimited workspace) Ω ( k n ) [9,10]
Quantum ( S = 1 ) Ω ( k n ) Theorem 1
Quantum ( S = n ) Ω ( k n 1 / 4 ) Theorem 1
Quantum ( S n ) Ω ( k ) Theorem 1

Conclusions

This work establishes T S Ω ( k n ) for quantum pointer chasing with S-qubit workspace, the first workspace–communication tradeoff for multi-round quantum protocols. The bound recovers Ω ( k n ) when S = 1 and reduces to Ω ( k ) when S n , showing that the S factor quantifies how limited memory constrains communication. Several questions remain open. A matching upper bound achieving T = O ( k n / S ) is unknown. The role of pre-shared entanglement in altering workspace scaling requires study. Removing the verify-and-reset assumption to test whether Kadison–Schwarz arguments survive in general settings is a natural next step. Extending these techniques beyond pointer chasing to other multi-round communication problems would determine the scope of workspace-packing methods.
The verify-and-reset structure may reflect real hardware limits. Systems with fixed qubit registers that must be re-initialized after each exchange naturally follow this model. Testing these bounds on such architectures would show whether physical coherence limits match theoretical predictions.
Not applicable.

Author Contributions

This article is the sole work of the author.

Funding

No external funding was received for this work.

Data Availability Statement

No datasets were generated or analyzed in this study.

Conflicts of Interest

The author declares no conflicts of interest.

Use of Artificial Intelligence

Language and formatting assistance were provided by generative AI tools. All mathematical reasoning, results, and conclusions are the author’s own.

References

  1. Ambainis, A. (2002). Quantum lower bounds by quantum arguments. Journal of Computer and System Sciences, 64(4), 750–767.
  2. Barnum, H. Saks, M., & Szegedy, M. (2003). Quantum query complexity and semi-definite programming. In Proceedings of the 18th IEEE Conference on Computational Complexity (pp. 179–193.
  3. Beame, P. Saks, M., Sun, X., & Vee, E. (2003). Time-space tradeoff lower bounds for randomized computation of decision problems. Journal of the ACM, 50(2), 154–195.
  4. Buhrman, H. Cleve, R., & Wigderson, A. (1998). Quantum vs. classical communication and computation. In Proceedings of the 30th ACM Symposium on Theory of Computing (pp. 63–68).
  5. Cody, M. A. (2025). Workspace bound. Zenodo Preprint. [CrossRef]
  6. de Wolf, R. (2002). Quantum communication and complexity. Theoretical Computer Science, 287(1), 337–353.
  7. Helstrom, C. W. (1976). Quantum detection and estimation theory. Academic Press.
  8. Holevo, A. S. (1973). Bounds for the quantity of information transmitted by a quantum communication channel. Problems of Information Transmission, 9(3), 177–183.
  9. Klauck, H. (2000). Quantum communication complexity. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (pp. 241–252).
  10. Klauck, H. (2002). Lower bounds for quantum communication complexity. SIAM Journal on Computing, 30(6), 1863–1879.
  11. Klauck, H. Špalek, R., & de Wolf, R. (2007). Quantum and classical strong direct product theorems and optimal time-space tradeoffs. SIAM Journal on Computing, 36(5), 1472–1493.
  12. Mao, X. , Yang, G., & Zhang, J. (2025). Gadgetless lifting beats round elimination: Improved lower bounds for pointer chasing. In 16th Innovations in Theoretical Computer Science Conference (ITCS), LIPIcs (Vol. 325, pp. 75:1–75:14).
  13. Nielsen, M. A. Chuang, I. L. (2000). Quantum computation and quantum information. Cambridge University Press.
  14. Paulsen, V. I. (2002). Completely bounded maps and operator algebras. Cambridge University Press.
  15. Ponzio, S. J. Radhakrishnan, J., & Venkatesh, S. (2001). The communication complexity of pointer chasing. Journal of Computer and System Sciences, 62(2), 323–355.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated