Quantum Algorithm for Identifying Hidden Polynomial Function Graphs
|
|
- Edwina Hudson
- 5 years ago
- Views:
Transcription
1 Quantum Algorithm for Identifying Hidden Polynomial Function Graphs Thomas Decker Jan Draisma Pawel Wocjan Abstract We introduce the Hidden Polynomial Function Graph Problem as a natural generalization of an abelian Hidden Subgroup Problem (HSP) where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. For the Hidden Polynomial Function Graph Problem the functions are not restricted to be linear but can also be m-variate polynomial functions of total degree n 2. For fixed m and bounded n the problem is hard on a classical computer as the black box query complexity is polynomial in d. In contrast, we reduce it to a quantum state identification problem so that its query complexity is n m +n m n, independent of d. We derive an efficient measurement for distinguishing the resulting quantum states provided that the characteristic of F is sufficiently large. Its success probability and implementation are closely related to a classical problem involving polynomial equations. 1 Introduction Shor s algorithm for factoring integers and calculating discrete logarithms [18] is one of the most important and well known examples of quantum computational speedups. This algorithm as well as other fast quantum algorithms for number-theoretic problems [11, 12, 17] essentially rely on the efficient solution of an abelian hidden subgroup problem (HSP) [3]. This has naturally raised the questions of what interesting problems can be reduced to the non-abelian HSP and of whether the general non-abelian HSP can also be solved efficiently on a quantum computer. It is known that an efficient quantum algorithm for the dihedral HSP would give rise to efficient quantum algorithms for certain lattice problems [19], and that an efficient quantum algorithm for the symmetric group would give rise to an efficient quantum Department of Computer Science & Engineering, University of Washington, Seattle, WA 98195, USA. Electronic address: decker@ira.uka.de Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, PO Box 513, 5600 MB Eindhoven, The Netherlands. Electronic address: j.draisma@tue.nl School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32816, USA. Electronic address: wocjan@cs.ucf.edu 1
2 algorithm for the graph isomorphism problem [9]. Despite the fact that efficient algorithms have been developed for several non-abelian HSP (see, for example, [15] and the references therein), the HSP over the dihedral group and the symmetric group have withstood all attempts so far. Moreover, there is evidence that the non-abelian HSP might be hard for some groups such as the symmetric group [13]. Another idea for the generalization of the abelian HSP is to consider Hidden Shift Problems [4, 7] or problems with hidden non-linear structures [5]. In the latter context, we define a new black-box problem, called the Hidden Polynomial Function Graph Problem, and present efficient quantum algorithms. More specific, the Hidden Polynomial Function Graph Problem is a natural generalization of the abelian HSP over groups of the special form G := F m+1, where the hidden subgroups are generated by the m generators (0,..., 1,..., 0, q i ) F m+1 with q i F and the 1 is in the ith component. Therefore, the hidden subgroups H Q and their cosets H Q,z are given by H Q := {(x, Q(x)) : x F m } and H Q,z := {(x, Q(x) + z) : x F m }, where z F and Q runs over all polynomials Q(X 1,..., X m ) = q 1 X q m X m. In the Hidden Polynomial Function Graph Problem the polynomials are no longer restricted to be linear but can also be of degree n 2. The subgroups and their cosets are generalized to graphs of polynomial multivariate functions going through the origin and to translated function graphs, respectively. We solve this problem by generalizing standard techniques for the HSP. First, we reduce it to a quantum state identification problem. Second, we design a measurement scheme for distinguishing the quantum states. Third, we relate the success probability and implementation of the measurement to a classical algebro-geometric problem. This paper is organized as follows. In Section 2 we define the Hidden Polynomial Function Graph Problem and show that it suffices to solve the univariate case on a quantum computer. In Section 3 we reduce this case to a state distinguishing problem. To illustrate the basic ideas of our algorithm, we present an idealized measurement relying on the solution of an algebro-geometric problem which we thoroughly analyze in Section 4. In Section 5 we complete our proof by showing that the hidden polynomial function states can be efficiently identified by an approximate measurement. In Section 6 we conclude and discuss possible objectives for further research. 2 Hidden Polynomial Function Graph Problem Definition 2.1 (Hidden Polynomial Function Graph Problem). Let F be a finite field of size d and let Q(X 1,..., X m ) F[X 1,..., X m ] be an arbitrary polynomial with total degree deg(q) n and vanishing constant term. Furthermore, let B : F m+1 F be a black-box function with B(r 1,..., r m, s) := π(s Q(r 1,..., r m )) where π is an arbitrary and unknown permutation of the elements of F. The Hidden Polynomial Function Graph Problem is to identify the polynomial Q if only the blackbox function B is given. 2
3 The Hidden Polynomial Function Graph Problem is related to the Hidden Polynomial Problem defined in [5] which can be equivalently reformulated as follows. The black-box function h : F m F is given by h(r 1,..., r m ) := σ(q(r 1,..., r m )), where σ is an arbitrary permutation of F and Q(X 1,..., X m ) is the hidden polynomial. It is readily seen that the black-boxes h can be obtained from the black-boxes B by querying B only at points of the form (r 1,..., r m, 0). For this reason the black-boxes B offer more flexibility in designing quantum algorithms. We are able to design an efficient quantum algorithm for the black-boxes B hiding m-variate polynomials of degree n (for fixed m and n), whereas no algorithms are known for the black-boxes h. The classical query complexity of the Hidden Polynomial Function Graph Problem is polynomial in d. This is because for univariate polynomials (i.e., m = 1) at least n different points (r (1), s (1) ),..., (r (n), s (n) ) satisfying B(r (1), s (1) ) =... = B(r (n), s (n) ) are required in order to determine the hidden polynomial Q of degree n. The probability of obtaining such an n-fold collision is smaller than 1/d n 1. Simple calculations using the upper bound on the number of copies in [14] imply that information-theoretically at most 4 ( ) n+m m quantum queries are required to attain a success probability of at least 1/2 [8]. Similar arguments establish that at least ( ) n+m m /m 1 queries are necessary. Theorem 2.2. The Hidden Polynomial Function Graph problem can be solved by a quantum algorithm whose query complexity is n m + n m n and whose running time is polylogarithmic in d. Lemma 2.3 shows that it suffices to solve the univariate case in polylogarithmic time on a quantum computer in order to obtain an efficient quantum algorithm for the multivariate case. The quantum algorithm for the univariate problem is derived in the following sections. Lemma 2.3. The m-variate Hidden Polynomial Function graph problem can be solved by using the quantum algorithm for the univariate case as a subroutine which is invoked n m 1 + n m times. Proof. Rewrite Q as Q(X 1,..., X m ) = α Q α(x m ) X α X α m 1 m 1, where the vector α := (α 1,..., α m 1 ) contains the exponents of the variables X 1,..., X m 1. For a recursion we assume that we have an efficient algorithm for polynomials with m 1 variables or less. Then we solve the m-variate problem with the following two steps. 1. Set X 1,..., X m 1 to 0 and obtain Q (0,...,0) (X m ) := Q(0,..., 0, X m ). This is a univariate problem with no constant term which can be solved by assumption. 2. For n different fixed t j F we consider 1 the polynomials Q(X 1,..., X m 1, t j ) = α Q α(t j ) X α Xα m 1 m 1 where Q α(t j ) is a constant coefficient. By assumption we can determine all Q α (t j ) for α (0,..., 0). Denote by α = j α j the degree of the monomial defined by α. Since for α 1 the polynomial Q α (X m ) has degree n α and since we know n function values, we can determine Q α efficiently with Lagrange interpolation [10]. Let κ m be the number of invocations of the algorithm for univariate polynomials. We have κ 1 = 1 and κ m = κ 1 + n κ m 1. This leads to the expression of κ m. 1 Note that the degree of the polynomials is w.l.o.g. smaller than the size of F after reducing exponents modulo d 1. 3
4 3 Distinguishing Polynomial Function States Generalizing the standard approach for hidden subgroup problems, we query the black box in superposition and measure the output register (see Appendix). We refer to the resulting states ρ Q as the Polynomial Function States. Structure of Polynomial Function States For a polynomial Q F[X] with zero constant term the corresponding polynomial function state ρ Q can be written as ρ Q := 1 φ Q,z φ Q,z with φ Q,z := 1 r Q(r) + z. d d z F To obtain a compact expression we introduce the shift operator S := x F +x x for F which directly leads to ρ Q = 1 d 2 b c S Q(b) Q(c). b,c F Now we use the fact that the shift operators S for all F can be diagonalized simultaneously with the Fourier transform DFT F := (1/ d) x,y F ωtr(xy) p x y over F, where Tr : F F p is the trace map of the field extension F/F p and ω p := e 2πi/p is a primitive complex pth root of unity. The Fourier transform DFT F can be approximated to within error ɛ in time polynomial in log( F ) and log(1/ɛ) [7]. For simplicity, we assume that it can be implemented perfectly (as the error can be made exponentially small with polynomial resources only). We have DFT F S DFT F = x F r F ω Tr( x) p x x. Switching to the Fourier basis, the density matrices have the block diagonal form ρ Q := (I d DFT F ) ρ Q (I d DFT F ) = 1 ( ) d 2 χ [Q(b) Q(c)]x b c x x, b,c,x F where χ(z) := ωp Tr(z) for all z F and I d denotes the identity matrix of size d. By repeating the standard approach k times for the same black-box function B, we obtain the density matrix ρ k Q. After rearranging the registers we can write ρ k Q = 1 k d 2k χ [Q(b j ) Q(c j )] x j b c x x b,c,x F k j=1 [ = 1 k n ] d 2k χ q i (b i j c i j) x j b c x x b,c,x F k j=1 i=1 = 1 n k d 2k q i (b i j c i j)x j b c x x = 1 d 2k b,c,x F k χ b,c,x F k χ i=1 j=1 ( ) q Φ n (b) Φ n (c) x b c x x, 4
5 where q, Φ n (b), Φ n (c), and x are defined as follows: q := (q 1, q 2,..., q n ) F 1 n is the row vector whose entries are the coefficients of the hidden polynomial Q(X) = n i=1 q ix i, Φ n (b) is the n k matrix Φ n (b) := n i=1 j=1 k b i j i j = b 1 b 2 b k b 2 1 b 2 2 b 2 k... b n 1 b n 2 b n k, and x := (x 1,..., x k ) T F k is the column vector whose entries are those of x. Algebro-Geometric Problem We now show how to construct an orthogonal measurement for distinguishing the states ρ k Q based on the pretty good measurement techniques [1, 2, 4]. Both the success probability and the efficient implementation of our measurement are closely related to the following algebro-geometric problem: determine all b F k for given x F k and w F n such that Φ n (b) x = w, i.e., b 1 b 2 b k x 1 w 1 b 2 1 b 2 2 b 2 k x 2 w 2... b n 1 b n 2 b n k. x k = We denote the set of solutions to these polynomial equations and its cardinality by. w n S x w := {b F k : Φ n (b) x = w } and η x w := S x w, respectively. We also define the quantum states Sw x to be the equally weighted superposition of all solutions Sw x := 1 b η x w if ηw x > 0 and Sw x to be the zero vector otherwise. Using this notation we can write the state ρ k Q as ρ k Q = 1 ( η d 2k q w q v ) x w ηv x Sw S x v x x x. (2) χ x F k w,v F n The block structure of the states ρ k Q in Eq. (2) implies that the second register can be measured in the computational basis without any loss of information. The probability of obtaining a particular x is ( ) Tr ρ k Q (I d k x x ) = 1 d 2k ηw x = 1 d k. w F n The resulting reduced state is ρ x Q := 1 d k w,v F n χ b S x w (1) ( η q w q v ) x w ηv x Sw S x v x. (3) 5
6 Idealized Measurement for Identifying the States To explain the intuition behind the measurement we assume that the unitary transformation U x satisfying U x S x w = w (4) for all (x, w) with ηw x > 0 can be efficiently implemented. In Section 5 we show that it suffices to realize an approximate version V x of U x. We apply U x to the state ρ x Q of Eq. (3) and obtain U x ρ x QU x = 1 ( η d k q w q v ) x w ηv x w v. w,v F n χ We now measure in the Fourier basis which is defined by the states ψ Q := 1 ( ) q w w. (5) d n w F n χ The probability for the correct identification of the state ρ x Q is ( ) 2 ψ Q ρ x Q ψ Q = 1 η d k+n x w. (6) w F n Consequently, the probability to correctly identify Q is given by ( ) 2 1 η d 2k+n x w. (7) x F k w F n The problem with this idealization is that there are pairs (x, w) where η x w is in the order of d. It is not clear how to implement the unitary (4) efficiently in this case. Therefore, we restrict the pairs (x, w) to cases where we know an upper bound for η x w when implementing V x. Then, an efficient implementation exists. Of course, we have to show that these cases include almost all (x, w). 4 Analysis of the Algebro-Geometric Problem We want to implement a unitary V x that maps S x w to w for a sufficiently large fraction of all (x, w). Hence, for these cases we need a uniform upper bound on ηx w which depends on n but not on d, and an efficient procedure for enumerating Sw x on a classical computer. Both requirements can be satisfied if we choose the number of copies to be equal to the maximally possible degree of the hidden polynomial, i.e., we set k = n. To prove this statement we reformulate this problem as follows. We define the n polynomials f j F[X 1,..., X n, B 1,..., B n ] as f 1 f 2. f n := B 1 B 2 B n B1 2 B2 2 Bk 2... B1 n B2 n Bn n 6 X 1 X 2. X n
7 where the product of the matrix and the vector corresponds to the left-hand side of Eq. (1). Furthermore, let f be the n-tuple f = (f 1,..., f n ) which defines a map from F n F n to F n with f(x, b) = (f 1 (x, b),..., f n (x, b)). Using this notation S x w can be expressed as S x w = {b F n : f(x, b) = w} with w F n. For a fixed x the tuple f defines a map from F n to F n and the sets S x w are the preimages of w F n under this map. The following general proposition allows us to make statements about the size of the preimages independently of the underlying field F. It deals with a general morphism f : A m A n A n, which should be thought of as a family of morphisms from the n-dimensional affine space A n to itself, parameterized by A m. Proposition 4.1. Consider a morphism f : A m A n A n defined over Z, that is, f is given by an n-tuple f = (f 1,..., f n ) of polynomials in Z[X, B], where X = (X 1,..., X m ) and B = (B 1,..., B n ) are the coordinates on A m and on the first copy of A n, respectively. Suppose that the Jacobian determinant det( f i / B j ) ij is a non-zero element 2 of Z[X, B]. Then there exists a real number γ with 0 < γ 1 and a non-zero polynomial g Z[X] such that for all finite fields F and x F m with g(x) 0 we have f({x} F n ) γ F n. Proof. By the condition on the Jacobian determinant f 1,..., f n Q(X, B) are algebraically independent over Q(X). 3 As Q(X, B) has transcendence degree n over Q(X), every B i is algebraic over Q(X, f 1,..., f n ), i.e., there exist non-zero polynomials P 1,..., P n Z[X, W, T ] such that P i (X, f, B i ) = 0 Z[X, B]. View P i as a polynomial of degree d i N in T with coefficients from Z[X, W ], and let Q i Z[X, W ] be the (non-zero) coefficient of T d i in P i. Then h := n i=1 Q i(x, W ) is a non-zero polynomial in Z[X, W ]. By the algebraic independence of the f i, h(x, f(x, B)) is a non-zero polynomial in Z[X, B]; viewing this as a polynomial of degree e in B with coefficients from Z[X], let g Z[X] be any non-zero coefficient of a monomial B α of degree e. Now let F be any finite field, and let x F m be such that g(x) 0. Then q := h(x, f(x, B)) is a non-zero polynomial in F[B] of degree e. For any b F n outside the zero set of q we have Q i (x, f(x, b)) 0 so that P i (x, f(x, b), T ) F[T ] has degree d i, for all i = 1,..., n. Again by construction, any b F n satisfying f(x, b ) = f(x, b) satisfies the system of polynomial equations P i (x, f(x, b), b i ) = 0 for i = 1,..., n, which has at most D := i d i solutions. We conclude that the fiber of f(x, ) over f(x, b) has cardinality at most D, and therefore f({x} F n ) {b Fn q(b) 0} D The Schwartz-Zippel theorem applied to q shows that the right-hand side of this inequality is at least ( F n e F n 1 )/D. From this the existence of γ follows. 2 This condition on f says that generic morphisms in this family are dominant. When we work over algebraically closed fields F this means that the image is dense in F n. The proposition states that over finite fields the generic morphism still hits a large subset of F n. 3 If P Q(X)[W 1,..., W n ] is of minimal degree with P (f) = P (f 1,..., f n ) = 0, then differentiation with respect to B j and the chain rules gives i P W i (f) fi B j Jacobian matrix, and non-zero by minimality of deg(p ) whence det( fi B j ) = 0. 7 = 0, so that ( P W i (f)) i is in the row kernel of the
8 Note that the polynomials P i, g, and h can all be computed effectively, e.g., using Gröbner basis methods [10]. In general, the running time will depend very strongly on the particular form of the morphism f, but is independent of the field size d, which is sufficient for our purposes. It is possible that a more refined analysis taking into account the structure of f could lead to an improved performance for certain types of morphisms. We emphasize that we cannot rule out that the polynomial g Z[X] is zero when considered as a polynomial over F. This can only happen if all coefficients of g are multiples of the characteristic p of F. For this reason, we have to assume that p is sufficiently large so that this case can be excluded. In what follows we will use the additional notation: X good := {x F m g(x) 0}, W x good := {w F n h(x, w) 0} for x X good, and B x good := {b F n f(x, b) W x good } for x X good. If the image of g in F[X] is non-zero then by the Schwartz-Zippel theorem at least F m deg(g) F m 1 of the elements x F m lie in X good. Similarly, for all x X good most w F n lie in Wgood x, and for such w the fiber Sx w of f(x, ) has at most d elements and also most b F n are in Bgood x. For x X good and w Wgood x the fiber Sx w can be computed efficiently: By computing the zeros of the univariate polynomials P i (x, w, T ) in F we find the possible values for each of the b i, and then we need only to determine 4 those combinations that are mapped to w. In our application we have m = n and the Jacobian determinant det( f i / B j ) is non-zero as after specializing all X i to 1 it is a non-zero scalar times the Vandermonde determinant det(bj i 1 ) ij, which is a non-zero polynomial. So the above results apply. 5 Approximate Measurement Assume we have obtained x X good in the first measurement step. Let P good be the projector onto the subspace spanned by b for all b Bgood x. Clearly, the measurement with respect to this decomposition can be carried out efficiently as membership in Wgood x can be tested efficiently. The probability to be in the good subspace is ) Tr (P good ρ x QP good = Bx good d k and the resulting reduced density operator is ρ x Q,good := 1 ( η Bgood x χ q w q v ) x w ηv x Sw S x v x. (8) w,v W x good In the following we use the fact that for x X good and all w Wgood x the cardinality ηw x is bounded from above by a constant independent of the field size d and that the 4 This can be done more efficiently by the replacement of the P i with a triangular system that can be used to find the elements of S x w consecutively. 8
9 elements of the sets S x w can be computed efficiently. In this case we have an efficiently computable bijection between S x w and the set {(w, j) : j = 0,..., η x w 1}. It is obtained by sorting the elements of S x w according to the lexicographic order on F k and associating to each b S x w the unique j {0,..., η x w 1} corresponding to its position in S x w. We now show how to efficiently implement V x satisfying V x S x w = w. Implement a transformation with b 0 0 w j η x w (9) for all b Bgood x. To make it unitary we can simply map all b Bx good onto some vectors which are orthogonal (e.g., by simply flipping some additional qubit saying that they are bad). Note that b and x determine j and w uniquely and vice versa. Furthermore, we can compute w and j efficiently since ηw x is bounded from above by a constant. Consequently, V x acts on the states Sw x as follows 1 η x w Apply the unitary η x w 1 b S x w b η x w w (F l+1 I d k l 1) l l + l=0 d k 1 l=η x w ηw x j ηw x (10) j=1 I d k l l on the second and third register. This implements the embedded Fourier transform F l of size l controlled by the second register in order to map the superposition of all j with j {0,..., l 1} to 0. The resulting state is w 0 η x w. Uncompute η x w in the third register with the help of w and x. This leads to the state w 0 0 We apply V x to the state of Eq. (8) and obtain V x ρ x Q,good V x 1 ( η = Bgood x χ q w q v ) x w ηv x w v. w,v W x good We measure in the Fourier basis ψ Q defined in Eq. (5). Analogously to the ideal situation we obtain that the probability for the correct detection of the state ρ x Q is ψ Q V x ρ x Q,good V x ψ Q = 1 1 d n Bgood x The overall success probability is 1 d n x X good B x good d n ψ Q V x ρ x Q,good V x ψ Q = 1 d 3n w W x good x F n 2 η x w. (11) w W x good The first factor 1/d n is the probability that we obtain a specific x. 9 2 η x w. (12)
10 Corollary 5.1. Assume that the image of g in F[X] is non-zero. Then the success probability is bounded from below by the expression 1 2 η d 3n x w (13) x X good w W x good which is a positive and non-zero constant independent of d. Proof. By Proposition 4.1, for all x X good the image f({x} F n ) has at least γd n elements. This means that the inner sum in expression (13) is also at least γd n. Therefore, the expression is at least 1 d 3n X good γ 2 d 2n 1 d 3n (dn deg(g) d n 1 ) γ 2 d 2n, whence the corollary follows. Remark 5.2. For the preceding analysis we assumed that the characteristic of F is sufficiently large. For quadratic and cubic polynomials, an alternative analysis based on Gröbner bases shows that our results hold for arbitrary characteristics [8]. This completes the proof of Theorem 2.2 by showing that Hidden Polynomial Function Graph problem for univariate polynomials can be solved by a quantum algorithm whose query complexity is n and whose running time is polylogarithmic in d. 6 Conclusion and Outlook We have shown that the hidden polynomial function graph problem can be solved efficiently on a quantum computer for fixed total degree n and fixed number m of indeterminates provided that the characteristic of the underlying finite field is sufficiently large. We have proved that it suffices to query the black box n m +n m n times. This result relies on a classical reduction of the multivariate problem to the univariate one for which we have provided an efficient quantum algorithm making n queries. The extension of our results to more general algebraic structures, e.g., rings with Fourier transforms, and the extension to a broader class of functions such as rational functions are possible directions of future research. Additionally, it would be important to find other polynomial black-boxes with efficient quantum algorithms and to explore if interesting real-life problems can be reduced efficiently to such black box problems. TD was supported under the ARO/DTO/NSA quantum algorithms grant number W911NSF JD was supported by DIAMANT, a mathematics cluster funded by NWO, the Netherlands Organization for Scientific Research. Appendix: Standard Approach Most quantum algorithms for HSP are based on the standard approach which reduces black box problems to state distinguishing problems. We apply this approach to the Hidden Polynomial Function Graph Problem in the following. 10
11 Evaluate the black-box function on an equally weighted superposition of all (r 1, r 2,..., r m, s) F m+1. The resulting state is 1 d m+1 r 1,r 2,...,r m,s F r 1, r 2,..., r m s B(r 1, r 2,..., r m, s) Measure and discard the third register. Assume we have obtained the result π(z). Then the state on the first and second register is ρ Q,z := φ Q,z φ Q,z where φ Q,z := 1 d m r 1,r 2,...,r m F r 1, r 2,..., r m Q(r 1, r 2,..., r m, s) + z with the unknown polynomial Q hidden by B, and z is uniformly at random. The corresponding density matrix is ρ Q := 1 φ Q,z φ Q,z. (14) d z F We refer to the states ρ Q as polynomial function states. We have to distinguish these states in order to solve the black box problem. References [1] D. Bacon, A. Childs, and W. van Dam, Optimal measurements for the dihedral hidden subgroup problem, Chicago Journal of Theoretical Computer Science, Article 2, [2] D. Bacon, A. Childs, and W. van Dam, From optimal measurements to efficient quantum algorithms for the hidden subgroup problem over semidirect product groups, Proc. of the 46th Symposium on Foundations of Computer Science, pp , [3] R. Boneh and R. Lipton, Quantum cryptanalysis of hidden linear functions, Proc. Advances in Cryptology, Lecture Notes in Computer Science 963, pp , [4] A. Childs and W. van Dam, Quantum algorithm for a generalized hidden shift problem, Proc. 18th ACM-SIAM Symposium on Discrete Algorithms, pp , [5] A. Childs, L. Schulman, and U. Vazirani, Quantum algorithms for hidden nonlinear structures, Personal communication and talk given at the QIP Workshop 2007, Brisbane, Australia, January 30 February 3, [6] A. Childs, L. Schulman, U. Vazirani, Quantum algorithms for hidden nonlinear structures, arxiv: v1, [7] W. van Dam, S. Hallgren, L. Ip, Quantum Algorithms for some Hidden Shift Problems, SIAM Journal on Computing, Volume 36, Issue 3, pp , [8] T. Decker, P. Wocjan, Efficient Quantum Algorithm for Hidden Quadratic and Cubic Polynomial Function Graphs, arxiv: quant-ph/ v3 11
12 [9] M. Ettinger and P. Høyer, A quantum observable for the graph isomorphism problem, quant-ph/ [10] J. von zur Gathen, J. Gerhard: Modern Computer Algebra, Cambridge University Press, [11] S. Hallgren, Polynomial-time quantum algorithms for Pell s equation and the principal ideal problem, Proc. 34th ACM Symposium on Theory of Computing, pp , [12] S. Hallgren, Fast quantum algorithms for computing the unit group and class group of a number field, Proc. 37th ACM Symposium on Theory of Computing, pp , [13] S. Hallgren, C. Moore, M. Rötteler, A. Russell, and P. Sen, Limitations of quantum coset states for graph isomorphism, Proc. of 38th ACM Symposium on Theory of Computing, pp , [14] A. Harrow, A. Winter, How many copies are needed for state discrimination?, [15] G. Ivanyos, L. Sanselme, and M. Santha, Quantum algorithm for the hidden subgroup problem in extraspecial groups, Proc. of 24th Annual Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science 4393, pp , [16] R. Motwani and P. Raghavan, Randomized algorithms, Cambridge University Press, [17] A. Schmidt and U. Vollmer, Polynomial time quantum algorithm for the computation of the unit group of a number field, Proc. 37th ACM Symposium on Theory of Computing, pp , [18] P. W. Shor, Polynomial-time algorithms for prime factorizations and discrete logarithms on a quantum computer, SIAM Journal on Computing 26, pp , [19] O. Regev, Quantum computation and lattice problems, Proc. 43rd Symposium on Foundations of Computer Science, pp ,
Quantum Algorithm for Identifying Hidden Polynomial Function Graphs
Quantum Algorithm for Identifying Hidden Polynomial Function Graphs Thomas Decker Jan Draisma Pawel Wocjan arxiv:0706.1219v1 [quant-ph] 8 Jun 2007 Abstract In a recent paper we studied the Hidden Polynomial
More informationEfficient Quantum Algorithm for Identifying Hidden Polynomials
Efficient Quantum Algorithm for Identifying Hidden Polynomials arxiv:0706.1219v3 [quant-ph] 2 Sep 2008 Thomas Decker Jan Draisma Pawel Wocjan September 2, 2008 Abstract We consider a natural generalization
More informationQuantum algorithms for hidden nonlinear structures
Quantum algorithms for hidden nonlinear structures Andrew Childs Waterloo Leonard Schulman Caltech Umesh Vazirani Berkeley Shor s algorithm finds hidden linear structures [Shor 94]: Efficient quantum algorithms
More informationThe Hunt for a Quantum Algorithm for Graph Isomorphism
The Hunt for a Quantum Algorithm for Graph Isomorphism Cristopher Moore, University of New Mexico Alexander Russell, University of Connecticut Leonard J. Schulman, Caltech The Hidden Subgroup Problem Given
More informationGraph isomorphism, the hidden subgroup problem and identifying quantum states
1 Graph isomorphism, the hidden subgroup problem and identifying quantum states Pranab Sen NEC Laboratories America, Princeton, NJ, U.S.A. Joint work with Sean Hallgren and Martin Rötteler. Quant-ph 0511148:
More informationHidden Symmetry Subgroup Problems
1/27 Hidden Symmetry Subgroup Problems Miklos Santha CNRS, Université Paris Diderot, France and Centre for Quantum Technologies, NUS, Singapore joint work with Thomas Decker Gábor Ivanyos Pawel Wocjan
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationFrom the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem
From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem Curtis Bright December 9, 011 Abstract In Quantum Computation and Lattice Problems [11] Oded Regev presented the first known connection
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 6: Quantum query complexity of the HSP
Quantum algorithms (CO 78, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 6: Quantum query complexity of the HSP So far, we have considered the hidden subgroup problem in abelian groups.
More informationQuantum algorithm for a generalized hidden shift problem
Quantum algorithm for a generalized hidden shift problem Andrew M. Childs Wim van Dam Abstract Consider the following generalized hidden shift problem: given a function f on {0,...,M } Z promised to be
More informationSolution to the Hidden Subgroup Problem for a Class of Noncommutative Groups
Solution to the Hidden Subgroup Problem for a Class of Noncommutative Groups Demerson N. Gonçalves 1,2, Renato Portugal 2, arxiv:1104.1361v1 [quant-ph] 7 Apr 2011 1 Universidade Católica de Petrópolis
More informationPh 219b/CS 219b. Exercises Due: Wednesday 11 February 2009
1 Ph 219b/CS 219b Exercises Due: Wednesday 11 February 2009 5.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n
ABSTRACT Title of Thesis: GRÖBNER BASES WITH APPLICATIONS IN GRAPH THEORY Degree candidate: Angela M. Hennessy Degree and year: Master of Arts, 2006 Thesis directed by: Professor Lawrence C. Washington
More informationMath 121 Homework 5: Notes on Selected Problems
Math 121 Homework 5: Notes on Selected Problems 12.1.2. Let M be a module over the integral domain R. (a) Assume that M has rank n and that x 1,..., x n is any maximal set of linearly independent elements
More informationRings and groups. Ya. Sysak
Rings and groups. Ya. Sysak 1 Noetherian rings Let R be a ring. A (right) R -module M is called noetherian if it satisfies the maximum condition for its submodules. In other words, if M 1... M i M i+1...
More informationarxiv: v1 [quant-ph] 23 Apr 2007
On solving systems of random linear disequations arxiv:0704.2988v [quant-ph] 23 Apr 2007 Gábor Ivanyos October 22, 208 Abstract An important subcase of the hidden subgroup problem is equivalent to the
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT
Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students
More informationElementary linear algebra
Chapter 1 Elementary linear algebra 1.1 Vector spaces Vector spaces owe their importance to the fact that so many models arising in the solutions of specific problems turn out to be vector spaces. The
More informationAn Improved Quantum Fourier Transform Algorithm and Applications
An Improved Quantum Fourier Transform Algorithm and Applications Lisa Hales Group in Logic and the Methodology of Science University of California at Berkeley hales@cs.berkeley.edu Sean Hallgren Ý Computer
More informationAn Additive Characterization of Fibers of Characters on F p
An Additive Characterization of Fibers of Characters on F p Chris Monico Texas Tech University Lubbock, TX c.monico@ttu.edu Michele Elia Politecnico di Torino Torino, Italy elia@polito.it January 30, 2009
More informationMath 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille
Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is
More informationThe non-injective hidden shift problem
The non-injective hidden shift problem by Mirmojtaba Gharibi A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Mathematics in Computer
More informationDiscrete quantum random walks
Quantum Information and Computation: Report Edin Husić edin.husic@ens-lyon.fr Discrete quantum random walks Abstract In this report, we present the ideas behind the notion of quantum random walks. We further
More informationQuantum Algorithms Lecture #2. Stephen Jordan
Quantum Algorithms Lecture #2 Stephen Jordan Last Time Defined quantum circuit model. Argued it captures all of quantum computation. Developed some building blocks: Gate universality Controlled-unitaries
More informationSpectra of Semidirect Products of Cyclic Groups
Spectra of Semidirect Products of Cyclic Groups Nathan Fox 1 University of Minnesota-Twin Cities Abstract The spectrum of a graph is the set of eigenvalues of its adjacency matrix A group, together with
More informationLecture 15: The Hidden Subgroup Problem
CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry
More informationCourse 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra
Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................
More informationD-MATH Algebraic Geometry FS 2018 Prof. Emmanuel Kowalski. Solutions Sheet 1. Classical Varieties
D-MATH Algebraic Geometry FS 2018 Prof. Emmanuel Kowalski Solutions Sheet 1 Classical Varieties Let K be an algebraically closed field. All algebraic sets below are defined over K, unless specified otherwise.
More informationQIP Note: On the Quantum Fourier Transform and Applications
QIP ote: On the Quantum Fourier Transform and Applications Ivan Damgård 1 Introduction This note introduces Fourier transforms over finite Abelian groups, and shows how this can be used to find the period
More informationPh 219b/CS 219b. Exercises Due: Wednesday 4 December 2013
1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationLecture 21: HSP via the Pretty Good Measurement
Quantum Computation (CMU 5-859BB, Fall 205) Lecture 2: HSP via the Pretty Good Measurement November 8, 205 Lecturer: John Wright Scribe: Joshua Brakensiek The Average-Case Model Recall from Lecture 20
More informationarxiv:quant-ph/ v1 2 Feb 2001
Efficient quantum algorithms for some instances of the non-abelian hidden subgroup problem Gábor Ivanyos Frédéric Magniez Miklos Santha arxiv:quant-ph/0102014v1 2 Feb 2001 October 15, 2018 Abstract Inthispaperweshowthatcertainspecialcasesofthehidden
More informationGábor Ivanyos SZTAKI, Hungarian Academy of Sciences, H-1111 Budapest, Hungary. CNRS LRI, UMR 8623, Université Paris Sud, Orsay, France
International Journal of Foundations of Computer Science c World Scientific Publishing Company Efficient quantum algorithms for some instances of the non-abelian hidden subgroup problem Gábor Ivanyos SZTAKI,
More informationTEST CODE: PMB SYLLABUS
TEST CODE: PMB SYLLABUS Convergence and divergence of sequence and series; Cauchy sequence and completeness; Bolzano-Weierstrass theorem; continuity, uniform continuity, differentiability; directional
More informationwhere m is the maximal ideal of O X,p. Note that m/m 2 is a vector space. Suppose that we are given a morphism
8. Smoothness and the Zariski tangent space We want to give an algebraic notion of the tangent space. In differential geometry, tangent vectors are equivalence classes of maps of intervals in R into the
More informationOPTIMAL MEASUREMENTS FOR THE DIHEDRAL HIDDEN SUBGROUP PROBLEM
OPTIMAL MEASUREMETS FOR THE DIHEDRAL HIDDE SUBGROUP PROBLEM DAVE BACO, ADREW M. CHILDS, AD WIM VA DAM Abstract. We consider the dihedral hidden subgroup problem as the problem of distinguishing hidden
More informationAlgebra Exam Topics. Updated August 2017
Algebra Exam Topics Updated August 2017 Starting Fall 2017, the Masters Algebra Exam will have 14 questions. Of these students will answer the first 8 questions from Topics 1, 2, and 3. They then have
More informationRepresentations and Linear Actions
Representations and Linear Actions Definition 0.1. Let G be an S-group. A representation of G is a morphism of S-groups φ G GL(n, S) for some n. We say φ is faithful if it is a monomorphism (in the category
More informationPh 219b/CS 219b. Exercises Due: Wednesday 22 February 2006
1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ
More informationAlgebraic structures I
MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one
More informationFILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS.
FILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS. Let A be a ring, for simplicity assumed commutative. A filtering, or filtration, of an A module M means a descending sequence of submodules M = M 0
More informationAlgebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3...
Algebra Exam Fall 2006 Alexander J. Wertheim Last Updated: October 26, 2017 Contents 1 Groups 2 1.1 Problem 1..................................... 2 1.2 Problem 2..................................... 2
More information(January 14, 2009) q n 1 q d 1. D = q n = q + d
(January 14, 2009) [10.1] Prove that a finite division ring D (a not-necessarily commutative ring with 1 in which any non-zero element has a multiplicative inverse) is commutative. (This is due to Wedderburn.)
More informationExercise Sheet 1.
Exercise Sheet 1 You can download my lecture and exercise sheets at the address http://sami.hust.edu.vn/giang-vien/?name=huynt 1) Let A, B be sets. What does the statement "A is not a subset of B " mean?
More informationCOMPLEX VARIETIES AND THE ANALYTIC TOPOLOGY
COMPLEX VARIETIES AND THE ANALYTIC TOPOLOGY BRIAN OSSERMAN Classical algebraic geometers studied algebraic varieties over the complex numbers. In this setting, they didn t have to worry about the Zariski
More information12. Hilbert Polynomials and Bézout s Theorem
12. Hilbert Polynomials and Bézout s Theorem 95 12. Hilbert Polynomials and Bézout s Theorem After our study of smooth cubic surfaces in the last chapter, let us now come back to the general theory of
More informationOn the Complexity of Computing Units in a Number Field
On the Complexity of Computing Units in a Number Field V. Arvind and Piyush P Kurur Institute of Mathematical Sciences C.I.T Campus,Chennai, India 600 113 {arvind,ppk}@imsc.res.in August 2, 2008 Abstract
More information10. Smooth Varieties. 82 Andreas Gathmann
82 Andreas Gathmann 10. Smooth Varieties Let a be a point on a variety X. In the last chapter we have introduced the tangent cone C a X as a way to study X locally around a (see Construction 9.20). It
More informationx by so in other words ( )
Math 210B. Norm and trace An interesting application of Galois theory is to help us understand properties of two special constructions associated to field extensions, the norm and trace. If L/k is a finite
More informationAlgebraic Geometry (Math 6130)
Algebraic Geometry (Math 6130) Utah/Fall 2016. 2. Projective Varieties. Classically, projective space was obtained by adding points at infinity to n. Here we start with projective space and remove a hyperplane,
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More informationMATH 8253 ALGEBRAIC GEOMETRY WEEK 12
MATH 8253 ALGEBRAIC GEOMETRY WEEK 2 CİHAN BAHRAN 3.2.. Let Y be a Noetherian scheme. Show that any Y -scheme X of finite type is Noetherian. Moreover, if Y is of finite dimension, then so is X. Write f
More informationFormal Groups. Niki Myrto Mavraki
Formal Groups Niki Myrto Mavraki Contents 1. Introduction 1 2. Some preliminaries 2 3. Formal Groups (1 dimensional) 2 4. Groups associated to formal groups 9 5. The Invariant Differential 11 6. The Formal
More informationMoreover this binary operation satisfies the following properties
Contents 1 Algebraic structures 1 1.1 Group........................................... 1 1.1.1 Definitions and examples............................. 1 1.1.2 Subgroup.....................................
More informationQuantum Algorithms Lecture #3. Stephen Jordan
Quantum Algorithms Lecture #3 Stephen Jordan Summary of Lecture 1 Defined quantum circuit model. Argued it captures all of quantum computation. Developed some building blocks: Gate universality Controlled-unitaries
More information18. Cyclotomic polynomials II
18. Cyclotomic polynomials II 18.1 Cyclotomic polynomials over Z 18.2 Worked examples Now that we have Gauss lemma in hand we can look at cyclotomic polynomials again, not as polynomials with coefficients
More informationDefinitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch
Definitions, Theorems and Exercises Abstract Algebra Math 332 Ethan D. Bloch December 26, 2013 ii Contents 1 Binary Operations 3 1.1 Binary Operations............................... 4 1.2 Isomorphic Binary
More information2. Intersection Multiplicities
2. Intersection Multiplicities 11 2. Intersection Multiplicities Let us start our study of curves by introducing the concept of intersection multiplicity, which will be central throughout these notes.
More information4.6. Linear Operators on Hilbert Spaces
4.6. Linear Operators on Hilbert Spaces 1 4.6. Linear Operators on Hilbert Spaces Note. This section explores a number of different kinds of bounded linear transformations (or, equivalently, operators
More informationELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS
ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS J. WARNER SUMMARY OF A PAPER BY J. CARLSON, E. FRIEDLANDER, AND J. PEVTSOVA, AND FURTHER OBSERVATIONS 1. The Nullcone and Restricted Nullcone We will need
More informationQuantum pattern matching fast on average
Quantum pattern matching fast on average Ashley Montanaro Department of Computer Science, University of Bristol, UK 12 January 2015 Pattern matching In the traditional pattern matching problem, we seek
More information18.S34 linear algebra problems (2007)
18.S34 linear algebra problems (2007) Useful ideas for evaluating determinants 1. Row reduction, expanding by minors, or combinations thereof; sometimes these are useful in combination with an induction
More informationFinite-dimensional spaces. C n is the space of n-tuples x = (x 1,..., x n ) of complex numbers. It is a Hilbert space with the inner product
Chapter 4 Hilbert Spaces 4.1 Inner Product Spaces Inner Product Space. A complex vector space E is called an inner product space (or a pre-hilbert space, or a unitary space) if there is a mapping (, )
More informationIntroduction to finite fields
Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in
More informationOutline of the Seminar Topics on elliptic curves Saarbrücken,
Outline of the Seminar Topics on elliptic curves Saarbrücken, 11.09.2017 Contents A Number theory and algebraic geometry 2 B Elliptic curves 2 1 Rational points on elliptic curves (Mordell s Theorem) 5
More informationRepresentation Theory
Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 Paper 1, Section II 19I 93 (a) Define the derived subgroup, G, of a finite group G. Show that if χ is a linear character
More informationLecture 12: Lower Bounds for Element-Distinctness and Collision
Quantum Computation (CMU 18-859BB, Fall 015) Lecture 1: Lower Bounds for Element-Distinctness and Collision October 19, 015 Lecturer: John Wright Scribe: Titouan Rigoudy 1 Outline In this lecture, we will:
More informationCourse Summary Math 211
Course Summary Math 211 table of contents I. Functions of several variables. II. R n. III. Derivatives. IV. Taylor s Theorem. V. Differential Geometry. VI. Applications. 1. Best affine approximations.
More informationMATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11
MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11 3. Examples I did some examples and explained the theory at the same time. 3.1. roots of unity. Let L = Q(ζ) where ζ = e 2πi/5 is a primitive 5th root of
More informationSince G is a compact Lie group, we can apply Schur orthogonality to see that G χ π (g) 2 dg =
Problem 1 Show that if π is an irreducible representation of a compact lie group G then π is also irreducible. Give an example of a G and π such that π = π, and another for which π π. Is this true for
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #17 11/05/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #17 11/05/2013 Throughout this lecture k denotes an algebraically closed field. 17.1 Tangent spaces and hypersurfaces For any polynomial f k[x
More informationTangent spaces, normals and extrema
Chapter 3 Tangent spaces, normals and extrema If S is a surface in 3-space, with a point a S where S looks smooth, i.e., without any fold or cusp or self-crossing, we can intuitively define the tangent
More informationIntroduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm
Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut
More informationMATH 223A NOTES 2011 LIE ALGEBRAS 35
MATH 3A NOTES 011 LIE ALGEBRAS 35 9. Abstract root systems We now attempt to reconstruct the Lie algebra based only on the information given by the set of roots Φ which is embedded in Euclidean space E.
More informationEXERCISES IN MODULAR FORMS I (MATH 726) (2) Prove that a lattice L is integral if and only if its Gram matrix has integer coefficients.
EXERCISES IN MODULAR FORMS I (MATH 726) EYAL GOREN, MCGILL UNIVERSITY, FALL 2007 (1) We define a (full) lattice L in R n to be a discrete subgroup of R n that contains a basis for R n. Prove that L is
More informationHonors Algebra II MATH251 Course Notes by Dr. Eyal Goren McGill University Winter 2007
Honors Algebra II MATH251 Course Notes by Dr Eyal Goren McGill University Winter 2007 Last updated: April 4, 2014 c All rights reserved to the author, Eyal Goren, Department of Mathematics and Statistics,
More informationLINEAR EQUATIONS WITH UNKNOWNS FROM A MULTIPLICATIVE GROUP IN A FUNCTION FIELD. To Professor Wolfgang Schmidt on his 75th birthday
LINEAR EQUATIONS WITH UNKNOWNS FROM A MULTIPLICATIVE GROUP IN A FUNCTION FIELD JAN-HENDRIK EVERTSE AND UMBERTO ZANNIER To Professor Wolfgang Schmidt on his 75th birthday 1. Introduction Let K be a field
More informationLecture 8: Finite fields
Lecture 8: Finite fields Rajat Mittal IIT Kanpur We have learnt about groups, rings, integral domains and fields till now. Fields have the maximum required properties and hence many nice theorems can be
More informationMath 121 Homework 2 Solutions
Math 121 Homework 2 Solutions Problem 13.2 #16. Let K/F be an algebraic extension and let R be a ring contained in K that contains F. Prove that R is a subfield of K containing F. We will give two proofs.
More informationCS 6815: Lecture 4. September 4, 2018
XS = X s... X st CS 685: Lecture 4 Instructor: Eshan Chattopadhyay Scribe: Makis Arsenis and Ayush Sekhari September 4, 208 In this lecture, we will first see an algorithm to construct ɛ-biased spaces.
More informationCOMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS
COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS ROBERT S. COULTER AND MARIE HENDERSON Abstract. Strong conditions are derived for when two commutative presemifields are isotopic. It is then shown that any commutative
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationEach is equal to CP 1 minus one point, which is the origin of the other: (C =) U 1 = CP 1 the line λ (1, 0) U 0
Algebraic Curves/Fall 2015 Aaron Bertram 1. Introduction. What is a complex curve? (Geometry) It s a Riemann surface, that is, a compact oriented twodimensional real manifold Σ with a complex structure.
More informationFrom the shortest vector problem to the dihedral hidden subgroup problem
From the shortest vector problem to the dihedral hidden subgroup problem Curtis Bright University of Waterloo December 8, 2011 1 / 19 Reduction Roughly, problem A reduces to problem B means there is a
More informationEfficient random number generation on FPGA-s
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 313 320 doi: 10.14794/ICAI.9.2014.1.313 Efficient random number generation
More informationCHARACTER THEORY OF FINITE GROUPS. Chapter 1: REPRESENTATIONS
CHARACTER THEORY OF FINITE GROUPS Chapter 1: REPRESENTATIONS G is a finite group and K is a field. A K-representation of G is a homomorphism X : G! GL(n, K), where GL(n, K) is the group of invertible n
More informationCurtis Heberle MTH 189 Final Paper 12/14/2010. Algebraic Groups
Algebraic Groups Curtis Heberle MTH 189 Final Paper 12/14/2010 The primary objects of study in algebraic geometry are varieties. Having become acquainted with these objects, it is interesting to consider
More informationClassical simulations of non-abelian quantum Fourier transforms
Classical simulations of non-abelian quantum Fourier transforms Diploma Thesis Juan Bermejo Vega December 7, 2011 Garching First reviewer: Prof. Dr. J. Ignacio Cirac Second reviewer: Prof. Dr. Alejandro
More informationResolution of Singularities in Algebraic Varieties
Resolution of Singularities in Algebraic Varieties Emma Whitten Summer 28 Introduction Recall that algebraic geometry is the study of objects which are or locally resemble solution sets of polynomial equations.
More informationAlgebra SEP Solutions
Algebra SEP Solutions 17 July 2017 1. (January 2017 problem 1) For example: (a) G = Z/4Z, N = Z/2Z. More generally, G = Z/p n Z, N = Z/pZ, p any prime number, n 2. Also G = Z, N = nz for any n 2, since
More informationPermutation groups/1. 1 Automorphism groups, permutation groups, abstract
Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.
More informationThe quantum threat to cryptography
The quantum threat to cryptography Ashley Montanaro School of Mathematics, University of Bristol 20 October 2016 Quantum computers University of Bristol IBM UCSB / Google University of Oxford Experimental
More informationThe decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t
The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t Wiebke S. Diestelkamp Department of Mathematics University of Dayton Dayton, OH 45469-2316 USA wiebke@udayton.edu
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationQUANTUM COMPUTATION AND LATTICE PROBLEMS
QUATUM COMPUTATIO AD LATTICE PROBLEMS ODED REGEV Abstract. We present the first explicit connection between quantum computation and lattice problems. amely, our main result is a solution to the Unique
More informationAN INTRODUCTION TO AFFINE TORIC VARIETIES: EMBEDDINGS AND IDEALS
AN INTRODUCTION TO AFFINE TORIC VARIETIES: EMBEDDINGS AND IDEALS JESSICA SIDMAN. Affine toric varieties: from lattice points to monomial mappings In this chapter we introduce toric varieties embedded in
More informationModern Computer Algebra
Modern Computer Algebra Exercises to Chapter 25: Fundamental concepts 11 May 1999 JOACHIM VON ZUR GATHEN and JÜRGEN GERHARD Universität Paderborn 25.1 Show that any subgroup of a group G contains the neutral
More informationREPRESENTATION THEORY OF S n
REPRESENTATION THEORY OF S n EVAN JENKINS Abstract. These are notes from three lectures given in MATH 26700, Introduction to Representation Theory of Finite Groups, at the University of Chicago in November
More informationPolynomial Interpolation Part II
Polynomial Interpolation Part II Prof. Dr. Florian Rupp German University of Technology in Oman (GUtech) Introduction to Numerical Methods for ENG & CS (Mathematics IV) Spring Term 2016 Exercise Session
More informationModular Counting of Rational Points over Finite Fields
Modular Counting of Rational Points over Finite Fields Daqing Wan Department of Mathematics University of California Irvine, CA 92697-3875 dwan@math.uci.edu Abstract Let F q be the finite field of q elements,
More information