Quantum Algorithm for Identifying Hidden Polynomial Function Graphs

Size: px
Start display at page:

Download "Quantum Algorithm for Identifying Hidden Polynomial Function Graphs"

Transcription

1 Quantum Algorithm for Identifying Hidden Polynomial Function Graphs Thomas Decker Jan Draisma Pawel Wocjan Abstract We introduce the Hidden Polynomial Function Graph Problem as a natural generalization of an abelian Hidden Subgroup Problem (HSP) where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. For the Hidden Polynomial Function Graph Problem the functions are not restricted to be linear but can also be m-variate polynomial functions of total degree n 2. For fixed m and bounded n the problem is hard on a classical computer as the black box query complexity is polynomial in d. In contrast, we reduce it to a quantum state identification problem so that its query complexity is n m +n m n, independent of d. We derive an efficient measurement for distinguishing the resulting quantum states provided that the characteristic of F is sufficiently large. Its success probability and implementation are closely related to a classical problem involving polynomial equations. 1 Introduction Shor s algorithm for factoring integers and calculating discrete logarithms [18] is one of the most important and well known examples of quantum computational speedups. This algorithm as well as other fast quantum algorithms for number-theoretic problems [11, 12, 17] essentially rely on the efficient solution of an abelian hidden subgroup problem (HSP) [3]. This has naturally raised the questions of what interesting problems can be reduced to the non-abelian HSP and of whether the general non-abelian HSP can also be solved efficiently on a quantum computer. It is known that an efficient quantum algorithm for the dihedral HSP would give rise to efficient quantum algorithms for certain lattice problems [19], and that an efficient quantum algorithm for the symmetric group would give rise to an efficient quantum Department of Computer Science & Engineering, University of Washington, Seattle, WA 98195, USA. Electronic address: decker@ira.uka.de Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, PO Box 513, 5600 MB Eindhoven, The Netherlands. Electronic address: j.draisma@tue.nl School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32816, USA. Electronic address: wocjan@cs.ucf.edu 1

2 algorithm for the graph isomorphism problem [9]. Despite the fact that efficient algorithms have been developed for several non-abelian HSP (see, for example, [15] and the references therein), the HSP over the dihedral group and the symmetric group have withstood all attempts so far. Moreover, there is evidence that the non-abelian HSP might be hard for some groups such as the symmetric group [13]. Another idea for the generalization of the abelian HSP is to consider Hidden Shift Problems [4, 7] or problems with hidden non-linear structures [5]. In the latter context, we define a new black-box problem, called the Hidden Polynomial Function Graph Problem, and present efficient quantum algorithms. More specific, the Hidden Polynomial Function Graph Problem is a natural generalization of the abelian HSP over groups of the special form G := F m+1, where the hidden subgroups are generated by the m generators (0,..., 1,..., 0, q i ) F m+1 with q i F and the 1 is in the ith component. Therefore, the hidden subgroups H Q and their cosets H Q,z are given by H Q := {(x, Q(x)) : x F m } and H Q,z := {(x, Q(x) + z) : x F m }, where z F and Q runs over all polynomials Q(X 1,..., X m ) = q 1 X q m X m. In the Hidden Polynomial Function Graph Problem the polynomials are no longer restricted to be linear but can also be of degree n 2. The subgroups and their cosets are generalized to graphs of polynomial multivariate functions going through the origin and to translated function graphs, respectively. We solve this problem by generalizing standard techniques for the HSP. First, we reduce it to a quantum state identification problem. Second, we design a measurement scheme for distinguishing the quantum states. Third, we relate the success probability and implementation of the measurement to a classical algebro-geometric problem. This paper is organized as follows. In Section 2 we define the Hidden Polynomial Function Graph Problem and show that it suffices to solve the univariate case on a quantum computer. In Section 3 we reduce this case to a state distinguishing problem. To illustrate the basic ideas of our algorithm, we present an idealized measurement relying on the solution of an algebro-geometric problem which we thoroughly analyze in Section 4. In Section 5 we complete our proof by showing that the hidden polynomial function states can be efficiently identified by an approximate measurement. In Section 6 we conclude and discuss possible objectives for further research. 2 Hidden Polynomial Function Graph Problem Definition 2.1 (Hidden Polynomial Function Graph Problem). Let F be a finite field of size d and let Q(X 1,..., X m ) F[X 1,..., X m ] be an arbitrary polynomial with total degree deg(q) n and vanishing constant term. Furthermore, let B : F m+1 F be a black-box function with B(r 1,..., r m, s) := π(s Q(r 1,..., r m )) where π is an arbitrary and unknown permutation of the elements of F. The Hidden Polynomial Function Graph Problem is to identify the polynomial Q if only the blackbox function B is given. 2

3 The Hidden Polynomial Function Graph Problem is related to the Hidden Polynomial Problem defined in [5] which can be equivalently reformulated as follows. The black-box function h : F m F is given by h(r 1,..., r m ) := σ(q(r 1,..., r m )), where σ is an arbitrary permutation of F and Q(X 1,..., X m ) is the hidden polynomial. It is readily seen that the black-boxes h can be obtained from the black-boxes B by querying B only at points of the form (r 1,..., r m, 0). For this reason the black-boxes B offer more flexibility in designing quantum algorithms. We are able to design an efficient quantum algorithm for the black-boxes B hiding m-variate polynomials of degree n (for fixed m and n), whereas no algorithms are known for the black-boxes h. The classical query complexity of the Hidden Polynomial Function Graph Problem is polynomial in d. This is because for univariate polynomials (i.e., m = 1) at least n different points (r (1), s (1) ),..., (r (n), s (n) ) satisfying B(r (1), s (1) ) =... = B(r (n), s (n) ) are required in order to determine the hidden polynomial Q of degree n. The probability of obtaining such an n-fold collision is smaller than 1/d n 1. Simple calculations using the upper bound on the number of copies in [14] imply that information-theoretically at most 4 ( ) n+m m quantum queries are required to attain a success probability of at least 1/2 [8]. Similar arguments establish that at least ( ) n+m m /m 1 queries are necessary. Theorem 2.2. The Hidden Polynomial Function Graph problem can be solved by a quantum algorithm whose query complexity is n m + n m n and whose running time is polylogarithmic in d. Lemma 2.3 shows that it suffices to solve the univariate case in polylogarithmic time on a quantum computer in order to obtain an efficient quantum algorithm for the multivariate case. The quantum algorithm for the univariate problem is derived in the following sections. Lemma 2.3. The m-variate Hidden Polynomial Function graph problem can be solved by using the quantum algorithm for the univariate case as a subroutine which is invoked n m 1 + n m times. Proof. Rewrite Q as Q(X 1,..., X m ) = α Q α(x m ) X α X α m 1 m 1, where the vector α := (α 1,..., α m 1 ) contains the exponents of the variables X 1,..., X m 1. For a recursion we assume that we have an efficient algorithm for polynomials with m 1 variables or less. Then we solve the m-variate problem with the following two steps. 1. Set X 1,..., X m 1 to 0 and obtain Q (0,...,0) (X m ) := Q(0,..., 0, X m ). This is a univariate problem with no constant term which can be solved by assumption. 2. For n different fixed t j F we consider 1 the polynomials Q(X 1,..., X m 1, t j ) = α Q α(t j ) X α Xα m 1 m 1 where Q α(t j ) is a constant coefficient. By assumption we can determine all Q α (t j ) for α (0,..., 0). Denote by α = j α j the degree of the monomial defined by α. Since for α 1 the polynomial Q α (X m ) has degree n α and since we know n function values, we can determine Q α efficiently with Lagrange interpolation [10]. Let κ m be the number of invocations of the algorithm for univariate polynomials. We have κ 1 = 1 and κ m = κ 1 + n κ m 1. This leads to the expression of κ m. 1 Note that the degree of the polynomials is w.l.o.g. smaller than the size of F after reducing exponents modulo d 1. 3

4 3 Distinguishing Polynomial Function States Generalizing the standard approach for hidden subgroup problems, we query the black box in superposition and measure the output register (see Appendix). We refer to the resulting states ρ Q as the Polynomial Function States. Structure of Polynomial Function States For a polynomial Q F[X] with zero constant term the corresponding polynomial function state ρ Q can be written as ρ Q := 1 φ Q,z φ Q,z with φ Q,z := 1 r Q(r) + z. d d z F To obtain a compact expression we introduce the shift operator S := x F +x x for F which directly leads to ρ Q = 1 d 2 b c S Q(b) Q(c). b,c F Now we use the fact that the shift operators S for all F can be diagonalized simultaneously with the Fourier transform DFT F := (1/ d) x,y F ωtr(xy) p x y over F, where Tr : F F p is the trace map of the field extension F/F p and ω p := e 2πi/p is a primitive complex pth root of unity. The Fourier transform DFT F can be approximated to within error ɛ in time polynomial in log( F ) and log(1/ɛ) [7]. For simplicity, we assume that it can be implemented perfectly (as the error can be made exponentially small with polynomial resources only). We have DFT F S DFT F = x F r F ω Tr( x) p x x. Switching to the Fourier basis, the density matrices have the block diagonal form ρ Q := (I d DFT F ) ρ Q (I d DFT F ) = 1 ( ) d 2 χ [Q(b) Q(c)]x b c x x, b,c,x F where χ(z) := ωp Tr(z) for all z F and I d denotes the identity matrix of size d. By repeating the standard approach k times for the same black-box function B, we obtain the density matrix ρ k Q. After rearranging the registers we can write ρ k Q = 1 k d 2k χ [Q(b j ) Q(c j )] x j b c x x b,c,x F k j=1 [ = 1 k n ] d 2k χ q i (b i j c i j) x j b c x x b,c,x F k j=1 i=1 = 1 n k d 2k q i (b i j c i j)x j b c x x = 1 d 2k b,c,x F k χ b,c,x F k χ i=1 j=1 ( ) q Φ n (b) Φ n (c) x b c x x, 4

5 where q, Φ n (b), Φ n (c), and x are defined as follows: q := (q 1, q 2,..., q n ) F 1 n is the row vector whose entries are the coefficients of the hidden polynomial Q(X) = n i=1 q ix i, Φ n (b) is the n k matrix Φ n (b) := n i=1 j=1 k b i j i j = b 1 b 2 b k b 2 1 b 2 2 b 2 k... b n 1 b n 2 b n k, and x := (x 1,..., x k ) T F k is the column vector whose entries are those of x. Algebro-Geometric Problem We now show how to construct an orthogonal measurement for distinguishing the states ρ k Q based on the pretty good measurement techniques [1, 2, 4]. Both the success probability and the efficient implementation of our measurement are closely related to the following algebro-geometric problem: determine all b F k for given x F k and w F n such that Φ n (b) x = w, i.e., b 1 b 2 b k x 1 w 1 b 2 1 b 2 2 b 2 k x 2 w 2... b n 1 b n 2 b n k. x k = We denote the set of solutions to these polynomial equations and its cardinality by. w n S x w := {b F k : Φ n (b) x = w } and η x w := S x w, respectively. We also define the quantum states Sw x to be the equally weighted superposition of all solutions Sw x := 1 b η x w if ηw x > 0 and Sw x to be the zero vector otherwise. Using this notation we can write the state ρ k Q as ρ k Q = 1 ( η d 2k q w q v ) x w ηv x Sw S x v x x x. (2) χ x F k w,v F n The block structure of the states ρ k Q in Eq. (2) implies that the second register can be measured in the computational basis without any loss of information. The probability of obtaining a particular x is ( ) Tr ρ k Q (I d k x x ) = 1 d 2k ηw x = 1 d k. w F n The resulting reduced state is ρ x Q := 1 d k w,v F n χ b S x w (1) ( η q w q v ) x w ηv x Sw S x v x. (3) 5

6 Idealized Measurement for Identifying the States To explain the intuition behind the measurement we assume that the unitary transformation U x satisfying U x S x w = w (4) for all (x, w) with ηw x > 0 can be efficiently implemented. In Section 5 we show that it suffices to realize an approximate version V x of U x. We apply U x to the state ρ x Q of Eq. (3) and obtain U x ρ x QU x = 1 ( η d k q w q v ) x w ηv x w v. w,v F n χ We now measure in the Fourier basis which is defined by the states ψ Q := 1 ( ) q w w. (5) d n w F n χ The probability for the correct identification of the state ρ x Q is ( ) 2 ψ Q ρ x Q ψ Q = 1 η d k+n x w. (6) w F n Consequently, the probability to correctly identify Q is given by ( ) 2 1 η d 2k+n x w. (7) x F k w F n The problem with this idealization is that there are pairs (x, w) where η x w is in the order of d. It is not clear how to implement the unitary (4) efficiently in this case. Therefore, we restrict the pairs (x, w) to cases where we know an upper bound for η x w when implementing V x. Then, an efficient implementation exists. Of course, we have to show that these cases include almost all (x, w). 4 Analysis of the Algebro-Geometric Problem We want to implement a unitary V x that maps S x w to w for a sufficiently large fraction of all (x, w). Hence, for these cases we need a uniform upper bound on ηx w which depends on n but not on d, and an efficient procedure for enumerating Sw x on a classical computer. Both requirements can be satisfied if we choose the number of copies to be equal to the maximally possible degree of the hidden polynomial, i.e., we set k = n. To prove this statement we reformulate this problem as follows. We define the n polynomials f j F[X 1,..., X n, B 1,..., B n ] as f 1 f 2. f n := B 1 B 2 B n B1 2 B2 2 Bk 2... B1 n B2 n Bn n 6 X 1 X 2. X n

7 where the product of the matrix and the vector corresponds to the left-hand side of Eq. (1). Furthermore, let f be the n-tuple f = (f 1,..., f n ) which defines a map from F n F n to F n with f(x, b) = (f 1 (x, b),..., f n (x, b)). Using this notation S x w can be expressed as S x w = {b F n : f(x, b) = w} with w F n. For a fixed x the tuple f defines a map from F n to F n and the sets S x w are the preimages of w F n under this map. The following general proposition allows us to make statements about the size of the preimages independently of the underlying field F. It deals with a general morphism f : A m A n A n, which should be thought of as a family of morphisms from the n-dimensional affine space A n to itself, parameterized by A m. Proposition 4.1. Consider a morphism f : A m A n A n defined over Z, that is, f is given by an n-tuple f = (f 1,..., f n ) of polynomials in Z[X, B], where X = (X 1,..., X m ) and B = (B 1,..., B n ) are the coordinates on A m and on the first copy of A n, respectively. Suppose that the Jacobian determinant det( f i / B j ) ij is a non-zero element 2 of Z[X, B]. Then there exists a real number γ with 0 < γ 1 and a non-zero polynomial g Z[X] such that for all finite fields F and x F m with g(x) 0 we have f({x} F n ) γ F n. Proof. By the condition on the Jacobian determinant f 1,..., f n Q(X, B) are algebraically independent over Q(X). 3 As Q(X, B) has transcendence degree n over Q(X), every B i is algebraic over Q(X, f 1,..., f n ), i.e., there exist non-zero polynomials P 1,..., P n Z[X, W, T ] such that P i (X, f, B i ) = 0 Z[X, B]. View P i as a polynomial of degree d i N in T with coefficients from Z[X, W ], and let Q i Z[X, W ] be the (non-zero) coefficient of T d i in P i. Then h := n i=1 Q i(x, W ) is a non-zero polynomial in Z[X, W ]. By the algebraic independence of the f i, h(x, f(x, B)) is a non-zero polynomial in Z[X, B]; viewing this as a polynomial of degree e in B with coefficients from Z[X], let g Z[X] be any non-zero coefficient of a monomial B α of degree e. Now let F be any finite field, and let x F m be such that g(x) 0. Then q := h(x, f(x, B)) is a non-zero polynomial in F[B] of degree e. For any b F n outside the zero set of q we have Q i (x, f(x, b)) 0 so that P i (x, f(x, b), T ) F[T ] has degree d i, for all i = 1,..., n. Again by construction, any b F n satisfying f(x, b ) = f(x, b) satisfies the system of polynomial equations P i (x, f(x, b), b i ) = 0 for i = 1,..., n, which has at most D := i d i solutions. We conclude that the fiber of f(x, ) over f(x, b) has cardinality at most D, and therefore f({x} F n ) {b Fn q(b) 0} D The Schwartz-Zippel theorem applied to q shows that the right-hand side of this inequality is at least ( F n e F n 1 )/D. From this the existence of γ follows. 2 This condition on f says that generic morphisms in this family are dominant. When we work over algebraically closed fields F this means that the image is dense in F n. The proposition states that over finite fields the generic morphism still hits a large subset of F n. 3 If P Q(X)[W 1,..., W n ] is of minimal degree with P (f) = P (f 1,..., f n ) = 0, then differentiation with respect to B j and the chain rules gives i P W i (f) fi B j Jacobian matrix, and non-zero by minimality of deg(p ) whence det( fi B j ) = 0. 7 = 0, so that ( P W i (f)) i is in the row kernel of the

8 Note that the polynomials P i, g, and h can all be computed effectively, e.g., using Gröbner basis methods [10]. In general, the running time will depend very strongly on the particular form of the morphism f, but is independent of the field size d, which is sufficient for our purposes. It is possible that a more refined analysis taking into account the structure of f could lead to an improved performance for certain types of morphisms. We emphasize that we cannot rule out that the polynomial g Z[X] is zero when considered as a polynomial over F. This can only happen if all coefficients of g are multiples of the characteristic p of F. For this reason, we have to assume that p is sufficiently large so that this case can be excluded. In what follows we will use the additional notation: X good := {x F m g(x) 0}, W x good := {w F n h(x, w) 0} for x X good, and B x good := {b F n f(x, b) W x good } for x X good. If the image of g in F[X] is non-zero then by the Schwartz-Zippel theorem at least F m deg(g) F m 1 of the elements x F m lie in X good. Similarly, for all x X good most w F n lie in Wgood x, and for such w the fiber Sx w of f(x, ) has at most d elements and also most b F n are in Bgood x. For x X good and w Wgood x the fiber Sx w can be computed efficiently: By computing the zeros of the univariate polynomials P i (x, w, T ) in F we find the possible values for each of the b i, and then we need only to determine 4 those combinations that are mapped to w. In our application we have m = n and the Jacobian determinant det( f i / B j ) is non-zero as after specializing all X i to 1 it is a non-zero scalar times the Vandermonde determinant det(bj i 1 ) ij, which is a non-zero polynomial. So the above results apply. 5 Approximate Measurement Assume we have obtained x X good in the first measurement step. Let P good be the projector onto the subspace spanned by b for all b Bgood x. Clearly, the measurement with respect to this decomposition can be carried out efficiently as membership in Wgood x can be tested efficiently. The probability to be in the good subspace is ) Tr (P good ρ x QP good = Bx good d k and the resulting reduced density operator is ρ x Q,good := 1 ( η Bgood x χ q w q v ) x w ηv x Sw S x v x. (8) w,v W x good In the following we use the fact that for x X good and all w Wgood x the cardinality ηw x is bounded from above by a constant independent of the field size d and that the 4 This can be done more efficiently by the replacement of the P i with a triangular system that can be used to find the elements of S x w consecutively. 8

9 elements of the sets S x w can be computed efficiently. In this case we have an efficiently computable bijection between S x w and the set {(w, j) : j = 0,..., η x w 1}. It is obtained by sorting the elements of S x w according to the lexicographic order on F k and associating to each b S x w the unique j {0,..., η x w 1} corresponding to its position in S x w. We now show how to efficiently implement V x satisfying V x S x w = w. Implement a transformation with b 0 0 w j η x w (9) for all b Bgood x. To make it unitary we can simply map all b Bx good onto some vectors which are orthogonal (e.g., by simply flipping some additional qubit saying that they are bad). Note that b and x determine j and w uniquely and vice versa. Furthermore, we can compute w and j efficiently since ηw x is bounded from above by a constant. Consequently, V x acts on the states Sw x as follows 1 η x w Apply the unitary η x w 1 b S x w b η x w w (F l+1 I d k l 1) l l + l=0 d k 1 l=η x w ηw x j ηw x (10) j=1 I d k l l on the second and third register. This implements the embedded Fourier transform F l of size l controlled by the second register in order to map the superposition of all j with j {0,..., l 1} to 0. The resulting state is w 0 η x w. Uncompute η x w in the third register with the help of w and x. This leads to the state w 0 0 We apply V x to the state of Eq. (8) and obtain V x ρ x Q,good V x 1 ( η = Bgood x χ q w q v ) x w ηv x w v. w,v W x good We measure in the Fourier basis ψ Q defined in Eq. (5). Analogously to the ideal situation we obtain that the probability for the correct detection of the state ρ x Q is ψ Q V x ρ x Q,good V x ψ Q = 1 1 d n Bgood x The overall success probability is 1 d n x X good B x good d n ψ Q V x ρ x Q,good V x ψ Q = 1 d 3n w W x good x F n 2 η x w. (11) w W x good The first factor 1/d n is the probability that we obtain a specific x. 9 2 η x w. (12)

10 Corollary 5.1. Assume that the image of g in F[X] is non-zero. Then the success probability is bounded from below by the expression 1 2 η d 3n x w (13) x X good w W x good which is a positive and non-zero constant independent of d. Proof. By Proposition 4.1, for all x X good the image f({x} F n ) has at least γd n elements. This means that the inner sum in expression (13) is also at least γd n. Therefore, the expression is at least 1 d 3n X good γ 2 d 2n 1 d 3n (dn deg(g) d n 1 ) γ 2 d 2n, whence the corollary follows. Remark 5.2. For the preceding analysis we assumed that the characteristic of F is sufficiently large. For quadratic and cubic polynomials, an alternative analysis based on Gröbner bases shows that our results hold for arbitrary characteristics [8]. This completes the proof of Theorem 2.2 by showing that Hidden Polynomial Function Graph problem for univariate polynomials can be solved by a quantum algorithm whose query complexity is n and whose running time is polylogarithmic in d. 6 Conclusion and Outlook We have shown that the hidden polynomial function graph problem can be solved efficiently on a quantum computer for fixed total degree n and fixed number m of indeterminates provided that the characteristic of the underlying finite field is sufficiently large. We have proved that it suffices to query the black box n m +n m n times. This result relies on a classical reduction of the multivariate problem to the univariate one for which we have provided an efficient quantum algorithm making n queries. The extension of our results to more general algebraic structures, e.g., rings with Fourier transforms, and the extension to a broader class of functions such as rational functions are possible directions of future research. Additionally, it would be important to find other polynomial black-boxes with efficient quantum algorithms and to explore if interesting real-life problems can be reduced efficiently to such black box problems. TD was supported under the ARO/DTO/NSA quantum algorithms grant number W911NSF JD was supported by DIAMANT, a mathematics cluster funded by NWO, the Netherlands Organization for Scientific Research. Appendix: Standard Approach Most quantum algorithms for HSP are based on the standard approach which reduces black box problems to state distinguishing problems. We apply this approach to the Hidden Polynomial Function Graph Problem in the following. 10

11 Evaluate the black-box function on an equally weighted superposition of all (r 1, r 2,..., r m, s) F m+1. The resulting state is 1 d m+1 r 1,r 2,...,r m,s F r 1, r 2,..., r m s B(r 1, r 2,..., r m, s) Measure and discard the third register. Assume we have obtained the result π(z). Then the state on the first and second register is ρ Q,z := φ Q,z φ Q,z where φ Q,z := 1 d m r 1,r 2,...,r m F r 1, r 2,..., r m Q(r 1, r 2,..., r m, s) + z with the unknown polynomial Q hidden by B, and z is uniformly at random. The corresponding density matrix is ρ Q := 1 φ Q,z φ Q,z. (14) d z F We refer to the states ρ Q as polynomial function states. We have to distinguish these states in order to solve the black box problem. References [1] D. Bacon, A. Childs, and W. van Dam, Optimal measurements for the dihedral hidden subgroup problem, Chicago Journal of Theoretical Computer Science, Article 2, [2] D. Bacon, A. Childs, and W. van Dam, From optimal measurements to efficient quantum algorithms for the hidden subgroup problem over semidirect product groups, Proc. of the 46th Symposium on Foundations of Computer Science, pp , [3] R. Boneh and R. Lipton, Quantum cryptanalysis of hidden linear functions, Proc. Advances in Cryptology, Lecture Notes in Computer Science 963, pp , [4] A. Childs and W. van Dam, Quantum algorithm for a generalized hidden shift problem, Proc. 18th ACM-SIAM Symposium on Discrete Algorithms, pp , [5] A. Childs, L. Schulman, and U. Vazirani, Quantum algorithms for hidden nonlinear structures, Personal communication and talk given at the QIP Workshop 2007, Brisbane, Australia, January 30 February 3, [6] A. Childs, L. Schulman, U. Vazirani, Quantum algorithms for hidden nonlinear structures, arxiv: v1, [7] W. van Dam, S. Hallgren, L. Ip, Quantum Algorithms for some Hidden Shift Problems, SIAM Journal on Computing, Volume 36, Issue 3, pp , [8] T. Decker, P. Wocjan, Efficient Quantum Algorithm for Hidden Quadratic and Cubic Polynomial Function Graphs, arxiv: quant-ph/ v3 11

12 [9] M. Ettinger and P. Høyer, A quantum observable for the graph isomorphism problem, quant-ph/ [10] J. von zur Gathen, J. Gerhard: Modern Computer Algebra, Cambridge University Press, [11] S. Hallgren, Polynomial-time quantum algorithms for Pell s equation and the principal ideal problem, Proc. 34th ACM Symposium on Theory of Computing, pp , [12] S. Hallgren, Fast quantum algorithms for computing the unit group and class group of a number field, Proc. 37th ACM Symposium on Theory of Computing, pp , [13] S. Hallgren, C. Moore, M. Rötteler, A. Russell, and P. Sen, Limitations of quantum coset states for graph isomorphism, Proc. of 38th ACM Symposium on Theory of Computing, pp , [14] A. Harrow, A. Winter, How many copies are needed for state discrimination?, [15] G. Ivanyos, L. Sanselme, and M. Santha, Quantum algorithm for the hidden subgroup problem in extraspecial groups, Proc. of 24th Annual Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science 4393, pp , [16] R. Motwani and P. Raghavan, Randomized algorithms, Cambridge University Press, [17] A. Schmidt and U. Vollmer, Polynomial time quantum algorithm for the computation of the unit group of a number field, Proc. 37th ACM Symposium on Theory of Computing, pp , [18] P. W. Shor, Polynomial-time algorithms for prime factorizations and discrete logarithms on a quantum computer, SIAM Journal on Computing 26, pp , [19] O. Regev, Quantum computation and lattice problems, Proc. 43rd Symposium on Foundations of Computer Science, pp ,

Quantum Algorithm for Identifying Hidden Polynomial Function Graphs

Quantum Algorithm for Identifying Hidden Polynomial Function Graphs Quantum Algorithm for Identifying Hidden Polynomial Function Graphs Thomas Decker Jan Draisma Pawel Wocjan arxiv:0706.1219v1 [quant-ph] 8 Jun 2007 Abstract In a recent paper we studied the Hidden Polynomial

More information

Efficient Quantum Algorithm for Identifying Hidden Polynomials

Efficient Quantum Algorithm for Identifying Hidden Polynomials Efficient Quantum Algorithm for Identifying Hidden Polynomials arxiv:0706.1219v3 [quant-ph] 2 Sep 2008 Thomas Decker Jan Draisma Pawel Wocjan September 2, 2008 Abstract We consider a natural generalization

More information

Quantum algorithms for hidden nonlinear structures

Quantum algorithms for hidden nonlinear structures Quantum algorithms for hidden nonlinear structures Andrew Childs Waterloo Leonard Schulman Caltech Umesh Vazirani Berkeley Shor s algorithm finds hidden linear structures [Shor 94]: Efficient quantum algorithms

More information

The Hunt for a Quantum Algorithm for Graph Isomorphism

The Hunt for a Quantum Algorithm for Graph Isomorphism The Hunt for a Quantum Algorithm for Graph Isomorphism Cristopher Moore, University of New Mexico Alexander Russell, University of Connecticut Leonard J. Schulman, Caltech The Hidden Subgroup Problem Given

More information

Graph isomorphism, the hidden subgroup problem and identifying quantum states

Graph isomorphism, the hidden subgroup problem and identifying quantum states 1 Graph isomorphism, the hidden subgroup problem and identifying quantum states Pranab Sen NEC Laboratories America, Princeton, NJ, U.S.A. Joint work with Sean Hallgren and Martin Rötteler. Quant-ph 0511148:

More information

Hidden Symmetry Subgroup Problems

Hidden Symmetry Subgroup Problems 1/27 Hidden Symmetry Subgroup Problems Miklos Santha CNRS, Université Paris Diderot, France and Centre for Quantum Technologies, NUS, Singapore joint work with Thomas Decker Gábor Ivanyos Pawel Wocjan

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem

From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem Curtis Bright December 9, 011 Abstract In Quantum Computation and Lattice Problems [11] Oded Regev presented the first known connection

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 6: Quantum query complexity of the HSP

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 6: Quantum query complexity of the HSP Quantum algorithms (CO 78, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 6: Quantum query complexity of the HSP So far, we have considered the hidden subgroup problem in abelian groups.

More information

Quantum algorithm for a generalized hidden shift problem

Quantum algorithm for a generalized hidden shift problem Quantum algorithm for a generalized hidden shift problem Andrew M. Childs Wim van Dam Abstract Consider the following generalized hidden shift problem: given a function f on {0,...,M } Z promised to be

More information

Solution to the Hidden Subgroup Problem for a Class of Noncommutative Groups

Solution to the Hidden Subgroup Problem for a Class of Noncommutative Groups Solution to the Hidden Subgroup Problem for a Class of Noncommutative Groups Demerson N. Gonçalves 1,2, Renato Portugal 2, arxiv:1104.1361v1 [quant-ph] 7 Apr 2011 1 Universidade Católica de Petrópolis

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009 1 Ph 219b/CS 219b Exercises Due: Wednesday 11 February 2009 5.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n ABSTRACT Title of Thesis: GRÖBNER BASES WITH APPLICATIONS IN GRAPH THEORY Degree candidate: Angela M. Hennessy Degree and year: Master of Arts, 2006 Thesis directed by: Professor Lawrence C. Washington

More information

Math 121 Homework 5: Notes on Selected Problems

Math 121 Homework 5: Notes on Selected Problems Math 121 Homework 5: Notes on Selected Problems 12.1.2. Let M be a module over the integral domain R. (a) Assume that M has rank n and that x 1,..., x n is any maximal set of linearly independent elements

More information

Rings and groups. Ya. Sysak

Rings and groups. Ya. Sysak Rings and groups. Ya. Sysak 1 Noetherian rings Let R be a ring. A (right) R -module M is called noetherian if it satisfies the maximum condition for its submodules. In other words, if M 1... M i M i+1...

More information

arxiv: v1 [quant-ph] 23 Apr 2007

arxiv: v1 [quant-ph] 23 Apr 2007 On solving systems of random linear disequations arxiv:0704.2988v [quant-ph] 23 Apr 2007 Gábor Ivanyos October 22, 208 Abstract An important subcase of the hidden subgroup problem is equivalent to the

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students

More information

Elementary linear algebra

Elementary linear algebra Chapter 1 Elementary linear algebra 1.1 Vector spaces Vector spaces owe their importance to the fact that so many models arising in the solutions of specific problems turn out to be vector spaces. The

More information

An Improved Quantum Fourier Transform Algorithm and Applications

An Improved Quantum Fourier Transform Algorithm and Applications An Improved Quantum Fourier Transform Algorithm and Applications Lisa Hales Group in Logic and the Methodology of Science University of California at Berkeley hales@cs.berkeley.edu Sean Hallgren Ý Computer

More information

An Additive Characterization of Fibers of Characters on F p

An Additive Characterization of Fibers of Characters on F p An Additive Characterization of Fibers of Characters on F p Chris Monico Texas Tech University Lubbock, TX c.monico@ttu.edu Michele Elia Politecnico di Torino Torino, Italy elia@polito.it January 30, 2009

More information

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is

More information

The non-injective hidden shift problem

The non-injective hidden shift problem The non-injective hidden shift problem by Mirmojtaba Gharibi A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Mathematics in Computer

More information

Discrete quantum random walks

Discrete quantum random walks Quantum Information and Computation: Report Edin Husić edin.husic@ens-lyon.fr Discrete quantum random walks Abstract In this report, we present the ideas behind the notion of quantum random walks. We further

More information

Quantum Algorithms Lecture #2. Stephen Jordan

Quantum Algorithms Lecture #2. Stephen Jordan Quantum Algorithms Lecture #2 Stephen Jordan Last Time Defined quantum circuit model. Argued it captures all of quantum computation. Developed some building blocks: Gate universality Controlled-unitaries

More information

Spectra of Semidirect Products of Cyclic Groups

Spectra of Semidirect Products of Cyclic Groups Spectra of Semidirect Products of Cyclic Groups Nathan Fox 1 University of Minnesota-Twin Cities Abstract The spectrum of a graph is the set of eigenvalues of its adjacency matrix A group, together with

More information

Lecture 15: The Hidden Subgroup Problem

Lecture 15: The Hidden Subgroup Problem CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry

More information

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................

More information

D-MATH Algebraic Geometry FS 2018 Prof. Emmanuel Kowalski. Solutions Sheet 1. Classical Varieties

D-MATH Algebraic Geometry FS 2018 Prof. Emmanuel Kowalski. Solutions Sheet 1. Classical Varieties D-MATH Algebraic Geometry FS 2018 Prof. Emmanuel Kowalski Solutions Sheet 1 Classical Varieties Let K be an algebraically closed field. All algebraic sets below are defined over K, unless specified otherwise.

More information

QIP Note: On the Quantum Fourier Transform and Applications

QIP Note: On the Quantum Fourier Transform and Applications QIP ote: On the Quantum Fourier Transform and Applications Ivan Damgård 1 Introduction This note introduces Fourier transforms over finite Abelian groups, and shows how this can be used to find the period

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013 1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

Lecture 21: HSP via the Pretty Good Measurement

Lecture 21: HSP via the Pretty Good Measurement Quantum Computation (CMU 5-859BB, Fall 205) Lecture 2: HSP via the Pretty Good Measurement November 8, 205 Lecturer: John Wright Scribe: Joshua Brakensiek The Average-Case Model Recall from Lecture 20

More information

arxiv:quant-ph/ v1 2 Feb 2001

arxiv:quant-ph/ v1 2 Feb 2001 Efficient quantum algorithms for some instances of the non-abelian hidden subgroup problem Gábor Ivanyos Frédéric Magniez Miklos Santha arxiv:quant-ph/0102014v1 2 Feb 2001 October 15, 2018 Abstract Inthispaperweshowthatcertainspecialcasesofthehidden

More information

Gábor Ivanyos SZTAKI, Hungarian Academy of Sciences, H-1111 Budapest, Hungary. CNRS LRI, UMR 8623, Université Paris Sud, Orsay, France

Gábor Ivanyos SZTAKI, Hungarian Academy of Sciences, H-1111 Budapest, Hungary. CNRS LRI, UMR 8623, Université Paris Sud, Orsay, France International Journal of Foundations of Computer Science c World Scientific Publishing Company Efficient quantum algorithms for some instances of the non-abelian hidden subgroup problem Gábor Ivanyos SZTAKI,

More information

TEST CODE: PMB SYLLABUS

TEST CODE: PMB SYLLABUS TEST CODE: PMB SYLLABUS Convergence and divergence of sequence and series; Cauchy sequence and completeness; Bolzano-Weierstrass theorem; continuity, uniform continuity, differentiability; directional

More information

where m is the maximal ideal of O X,p. Note that m/m 2 is a vector space. Suppose that we are given a morphism

where m is the maximal ideal of O X,p. Note that m/m 2 is a vector space. Suppose that we are given a morphism 8. Smoothness and the Zariski tangent space We want to give an algebraic notion of the tangent space. In differential geometry, tangent vectors are equivalence classes of maps of intervals in R into the

More information

OPTIMAL MEASUREMENTS FOR THE DIHEDRAL HIDDEN SUBGROUP PROBLEM

OPTIMAL MEASUREMENTS FOR THE DIHEDRAL HIDDEN SUBGROUP PROBLEM OPTIMAL MEASUREMETS FOR THE DIHEDRAL HIDDE SUBGROUP PROBLEM DAVE BACO, ADREW M. CHILDS, AD WIM VA DAM Abstract. We consider the dihedral hidden subgroup problem as the problem of distinguishing hidden

More information

Algebra Exam Topics. Updated August 2017

Algebra Exam Topics. Updated August 2017 Algebra Exam Topics Updated August 2017 Starting Fall 2017, the Masters Algebra Exam will have 14 questions. Of these students will answer the first 8 questions from Topics 1, 2, and 3. They then have

More information

Representations and Linear Actions

Representations and Linear Actions Representations and Linear Actions Definition 0.1. Let G be an S-group. A representation of G is a morphism of S-groups φ G GL(n, S) for some n. We say φ is faithful if it is a monomorphism (in the category

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006 1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ

More information

Algebraic structures I

Algebraic structures I MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one

More information

FILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS.

FILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS. FILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS. Let A be a ring, for simplicity assumed commutative. A filtering, or filtration, of an A module M means a descending sequence of submodules M = M 0

More information

Algebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3...

Algebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3... Algebra Exam Fall 2006 Alexander J. Wertheim Last Updated: October 26, 2017 Contents 1 Groups 2 1.1 Problem 1..................................... 2 1.2 Problem 2..................................... 2

More information

(January 14, 2009) q n 1 q d 1. D = q n = q + d

(January 14, 2009) q n 1 q d 1. D = q n = q + d (January 14, 2009) [10.1] Prove that a finite division ring D (a not-necessarily commutative ring with 1 in which any non-zero element has a multiplicative inverse) is commutative. (This is due to Wedderburn.)

More information

Exercise Sheet 1.

Exercise Sheet 1. Exercise Sheet 1 You can download my lecture and exercise sheets at the address http://sami.hust.edu.vn/giang-vien/?name=huynt 1) Let A, B be sets. What does the statement "A is not a subset of B " mean?

More information

COMPLEX VARIETIES AND THE ANALYTIC TOPOLOGY

COMPLEX VARIETIES AND THE ANALYTIC TOPOLOGY COMPLEX VARIETIES AND THE ANALYTIC TOPOLOGY BRIAN OSSERMAN Classical algebraic geometers studied algebraic varieties over the complex numbers. In this setting, they didn t have to worry about the Zariski

More information

12. Hilbert Polynomials and Bézout s Theorem

12. Hilbert Polynomials and Bézout s Theorem 12. Hilbert Polynomials and Bézout s Theorem 95 12. Hilbert Polynomials and Bézout s Theorem After our study of smooth cubic surfaces in the last chapter, let us now come back to the general theory of

More information

On the Complexity of Computing Units in a Number Field

On the Complexity of Computing Units in a Number Field On the Complexity of Computing Units in a Number Field V. Arvind and Piyush P Kurur Institute of Mathematical Sciences C.I.T Campus,Chennai, India 600 113 {arvind,ppk}@imsc.res.in August 2, 2008 Abstract

More information

10. Smooth Varieties. 82 Andreas Gathmann

10. Smooth Varieties. 82 Andreas Gathmann 82 Andreas Gathmann 10. Smooth Varieties Let a be a point on a variety X. In the last chapter we have introduced the tangent cone C a X as a way to study X locally around a (see Construction 9.20). It

More information

x by so in other words ( )

x by so in other words ( ) Math 210B. Norm and trace An interesting application of Galois theory is to help us understand properties of two special constructions associated to field extensions, the norm and trace. If L/k is a finite

More information

Algebraic Geometry (Math 6130)

Algebraic Geometry (Math 6130) Algebraic Geometry (Math 6130) Utah/Fall 2016. 2. Projective Varieties. Classically, projective space was obtained by adding points at infinity to n. Here we start with projective space and remove a hyperplane,

More information

1. Group Theory Permutations.

1. Group Theory Permutations. 1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7

More information

MATH 8253 ALGEBRAIC GEOMETRY WEEK 12

MATH 8253 ALGEBRAIC GEOMETRY WEEK 12 MATH 8253 ALGEBRAIC GEOMETRY WEEK 2 CİHAN BAHRAN 3.2.. Let Y be a Noetherian scheme. Show that any Y -scheme X of finite type is Noetherian. Moreover, if Y is of finite dimension, then so is X. Write f

More information

Formal Groups. Niki Myrto Mavraki

Formal Groups. Niki Myrto Mavraki Formal Groups Niki Myrto Mavraki Contents 1. Introduction 1 2. Some preliminaries 2 3. Formal Groups (1 dimensional) 2 4. Groups associated to formal groups 9 5. The Invariant Differential 11 6. The Formal

More information

Moreover this binary operation satisfies the following properties

Moreover this binary operation satisfies the following properties Contents 1 Algebraic structures 1 1.1 Group........................................... 1 1.1.1 Definitions and examples............................. 1 1.1.2 Subgroup.....................................

More information

Quantum Algorithms Lecture #3. Stephen Jordan

Quantum Algorithms Lecture #3. Stephen Jordan Quantum Algorithms Lecture #3 Stephen Jordan Summary of Lecture 1 Defined quantum circuit model. Argued it captures all of quantum computation. Developed some building blocks: Gate universality Controlled-unitaries

More information

18. Cyclotomic polynomials II

18. Cyclotomic polynomials II 18. Cyclotomic polynomials II 18.1 Cyclotomic polynomials over Z 18.2 Worked examples Now that we have Gauss lemma in hand we can look at cyclotomic polynomials again, not as polynomials with coefficients

More information

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch Definitions, Theorems and Exercises Abstract Algebra Math 332 Ethan D. Bloch December 26, 2013 ii Contents 1 Binary Operations 3 1.1 Binary Operations............................... 4 1.2 Isomorphic Binary

More information

2. Intersection Multiplicities

2. Intersection Multiplicities 2. Intersection Multiplicities 11 2. Intersection Multiplicities Let us start our study of curves by introducing the concept of intersection multiplicity, which will be central throughout these notes.

More information

4.6. Linear Operators on Hilbert Spaces

4.6. Linear Operators on Hilbert Spaces 4.6. Linear Operators on Hilbert Spaces 1 4.6. Linear Operators on Hilbert Spaces Note. This section explores a number of different kinds of bounded linear transformations (or, equivalently, operators

More information

ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS

ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS J. WARNER SUMMARY OF A PAPER BY J. CARLSON, E. FRIEDLANDER, AND J. PEVTSOVA, AND FURTHER OBSERVATIONS 1. The Nullcone and Restricted Nullcone We will need

More information

Quantum pattern matching fast on average

Quantum pattern matching fast on average Quantum pattern matching fast on average Ashley Montanaro Department of Computer Science, University of Bristol, UK 12 January 2015 Pattern matching In the traditional pattern matching problem, we seek

More information

18.S34 linear algebra problems (2007)

18.S34 linear algebra problems (2007) 18.S34 linear algebra problems (2007) Useful ideas for evaluating determinants 1. Row reduction, expanding by minors, or combinations thereof; sometimes these are useful in combination with an induction

More information

Finite-dimensional spaces. C n is the space of n-tuples x = (x 1,..., x n ) of complex numbers. It is a Hilbert space with the inner product

Finite-dimensional spaces. C n is the space of n-tuples x = (x 1,..., x n ) of complex numbers. It is a Hilbert space with the inner product Chapter 4 Hilbert Spaces 4.1 Inner Product Spaces Inner Product Space. A complex vector space E is called an inner product space (or a pre-hilbert space, or a unitary space) if there is a mapping (, )

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Outline of the Seminar Topics on elliptic curves Saarbrücken,

Outline of the Seminar Topics on elliptic curves Saarbrücken, Outline of the Seminar Topics on elliptic curves Saarbrücken, 11.09.2017 Contents A Number theory and algebraic geometry 2 B Elliptic curves 2 1 Rational points on elliptic curves (Mordell s Theorem) 5

More information

Representation Theory

Representation Theory Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 Paper 1, Section II 19I 93 (a) Define the derived subgroup, G, of a finite group G. Show that if χ is a linear character

More information

Lecture 12: Lower Bounds for Element-Distinctness and Collision

Lecture 12: Lower Bounds for Element-Distinctness and Collision Quantum Computation (CMU 18-859BB, Fall 015) Lecture 1: Lower Bounds for Element-Distinctness and Collision October 19, 015 Lecturer: John Wright Scribe: Titouan Rigoudy 1 Outline In this lecture, we will:

More information

Course Summary Math 211

Course Summary Math 211 Course Summary Math 211 table of contents I. Functions of several variables. II. R n. III. Derivatives. IV. Taylor s Theorem. V. Differential Geometry. VI. Applications. 1. Best affine approximations.

More information

MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11

MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11 MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11 3. Examples I did some examples and explained the theory at the same time. 3.1. roots of unity. Let L = Q(ζ) where ζ = e 2πi/5 is a primitive 5th root of

More information

Since G is a compact Lie group, we can apply Schur orthogonality to see that G χ π (g) 2 dg =

Since G is a compact Lie group, we can apply Schur orthogonality to see that G χ π (g) 2 dg = Problem 1 Show that if π is an irreducible representation of a compact lie group G then π is also irreducible. Give an example of a G and π such that π = π, and another for which π π. Is this true for

More information

Introduction to Arithmetic Geometry Fall 2013 Lecture #17 11/05/2013

Introduction to Arithmetic Geometry Fall 2013 Lecture #17 11/05/2013 18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #17 11/05/2013 Throughout this lecture k denotes an algebraically closed field. 17.1 Tangent spaces and hypersurfaces For any polynomial f k[x

More information

Tangent spaces, normals and extrema

Tangent spaces, normals and extrema Chapter 3 Tangent spaces, normals and extrema If S is a surface in 3-space, with a point a S where S looks smooth, i.e., without any fold or cusp or self-crossing, we can intuitively define the tangent

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

MATH 223A NOTES 2011 LIE ALGEBRAS 35

MATH 223A NOTES 2011 LIE ALGEBRAS 35 MATH 3A NOTES 011 LIE ALGEBRAS 35 9. Abstract root systems We now attempt to reconstruct the Lie algebra based only on the information given by the set of roots Φ which is embedded in Euclidean space E.

More information

EXERCISES IN MODULAR FORMS I (MATH 726) (2) Prove that a lattice L is integral if and only if its Gram matrix has integer coefficients.

EXERCISES IN MODULAR FORMS I (MATH 726) (2) Prove that a lattice L is integral if and only if its Gram matrix has integer coefficients. EXERCISES IN MODULAR FORMS I (MATH 726) EYAL GOREN, MCGILL UNIVERSITY, FALL 2007 (1) We define a (full) lattice L in R n to be a discrete subgroup of R n that contains a basis for R n. Prove that L is

More information

Honors Algebra II MATH251 Course Notes by Dr. Eyal Goren McGill University Winter 2007

Honors Algebra II MATH251 Course Notes by Dr. Eyal Goren McGill University Winter 2007 Honors Algebra II MATH251 Course Notes by Dr Eyal Goren McGill University Winter 2007 Last updated: April 4, 2014 c All rights reserved to the author, Eyal Goren, Department of Mathematics and Statistics,

More information

LINEAR EQUATIONS WITH UNKNOWNS FROM A MULTIPLICATIVE GROUP IN A FUNCTION FIELD. To Professor Wolfgang Schmidt on his 75th birthday

LINEAR EQUATIONS WITH UNKNOWNS FROM A MULTIPLICATIVE GROUP IN A FUNCTION FIELD. To Professor Wolfgang Schmidt on his 75th birthday LINEAR EQUATIONS WITH UNKNOWNS FROM A MULTIPLICATIVE GROUP IN A FUNCTION FIELD JAN-HENDRIK EVERTSE AND UMBERTO ZANNIER To Professor Wolfgang Schmidt on his 75th birthday 1. Introduction Let K be a field

More information

Lecture 8: Finite fields

Lecture 8: Finite fields Lecture 8: Finite fields Rajat Mittal IIT Kanpur We have learnt about groups, rings, integral domains and fields till now. Fields have the maximum required properties and hence many nice theorems can be

More information

Math 121 Homework 2 Solutions

Math 121 Homework 2 Solutions Math 121 Homework 2 Solutions Problem 13.2 #16. Let K/F be an algebraic extension and let R be a ring contained in K that contains F. Prove that R is a subfield of K containing F. We will give two proofs.

More information

CS 6815: Lecture 4. September 4, 2018

CS 6815: Lecture 4. September 4, 2018 XS = X s... X st CS 685: Lecture 4 Instructor: Eshan Chattopadhyay Scribe: Makis Arsenis and Ayush Sekhari September 4, 208 In this lecture, we will first see an algorithm to construct ɛ-biased spaces.

More information

COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS

COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS ROBERT S. COULTER AND MARIE HENDERSON Abstract. Strong conditions are derived for when two commutative presemifields are isotopic. It is then shown that any commutative

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

Each is equal to CP 1 minus one point, which is the origin of the other: (C =) U 1 = CP 1 the line λ (1, 0) U 0

Each is equal to CP 1 minus one point, which is the origin of the other: (C =) U 1 = CP 1 the line λ (1, 0) U 0 Algebraic Curves/Fall 2015 Aaron Bertram 1. Introduction. What is a complex curve? (Geometry) It s a Riemann surface, that is, a compact oriented twodimensional real manifold Σ with a complex structure.

More information

From the shortest vector problem to the dihedral hidden subgroup problem

From the shortest vector problem to the dihedral hidden subgroup problem From the shortest vector problem to the dihedral hidden subgroup problem Curtis Bright University of Waterloo December 8, 2011 1 / 19 Reduction Roughly, problem A reduces to problem B means there is a

More information

Efficient random number generation on FPGA-s

Efficient random number generation on FPGA-s Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 313 320 doi: 10.14794/ICAI.9.2014.1.313 Efficient random number generation

More information

CHARACTER THEORY OF FINITE GROUPS. Chapter 1: REPRESENTATIONS

CHARACTER THEORY OF FINITE GROUPS. Chapter 1: REPRESENTATIONS CHARACTER THEORY OF FINITE GROUPS Chapter 1: REPRESENTATIONS G is a finite group and K is a field. A K-representation of G is a homomorphism X : G! GL(n, K), where GL(n, K) is the group of invertible n

More information

Curtis Heberle MTH 189 Final Paper 12/14/2010. Algebraic Groups

Curtis Heberle MTH 189 Final Paper 12/14/2010. Algebraic Groups Algebraic Groups Curtis Heberle MTH 189 Final Paper 12/14/2010 The primary objects of study in algebraic geometry are varieties. Having become acquainted with these objects, it is interesting to consider

More information

Classical simulations of non-abelian quantum Fourier transforms

Classical simulations of non-abelian quantum Fourier transforms Classical simulations of non-abelian quantum Fourier transforms Diploma Thesis Juan Bermejo Vega December 7, 2011 Garching First reviewer: Prof. Dr. J. Ignacio Cirac Second reviewer: Prof. Dr. Alejandro

More information

Resolution of Singularities in Algebraic Varieties

Resolution of Singularities in Algebraic Varieties Resolution of Singularities in Algebraic Varieties Emma Whitten Summer 28 Introduction Recall that algebraic geometry is the study of objects which are or locally resemble solution sets of polynomial equations.

More information

Algebra SEP Solutions

Algebra SEP Solutions Algebra SEP Solutions 17 July 2017 1. (January 2017 problem 1) For example: (a) G = Z/4Z, N = Z/2Z. More generally, G = Z/p n Z, N = Z/pZ, p any prime number, n 2. Also G = Z, N = nz for any n 2, since

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Ashley Montanaro School of Mathematics, University of Bristol 20 October 2016 Quantum computers University of Bristol IBM UCSB / Google University of Oxford Experimental

More information

The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t

The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t Wiebke S. Diestelkamp Department of Mathematics University of Dayton Dayton, OH 45469-2316 USA wiebke@udayton.edu

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

QUANTUM COMPUTATION AND LATTICE PROBLEMS

QUANTUM COMPUTATION AND LATTICE PROBLEMS QUATUM COMPUTATIO AD LATTICE PROBLEMS ODED REGEV Abstract. We present the first explicit connection between quantum computation and lattice problems. amely, our main result is a solution to the Unique

More information

AN INTRODUCTION TO AFFINE TORIC VARIETIES: EMBEDDINGS AND IDEALS

AN INTRODUCTION TO AFFINE TORIC VARIETIES: EMBEDDINGS AND IDEALS AN INTRODUCTION TO AFFINE TORIC VARIETIES: EMBEDDINGS AND IDEALS JESSICA SIDMAN. Affine toric varieties: from lattice points to monomial mappings In this chapter we introduce toric varieties embedded in

More information

Modern Computer Algebra

Modern Computer Algebra Modern Computer Algebra Exercises to Chapter 25: Fundamental concepts 11 May 1999 JOACHIM VON ZUR GATHEN and JÜRGEN GERHARD Universität Paderborn 25.1 Show that any subgroup of a group G contains the neutral

More information

REPRESENTATION THEORY OF S n

REPRESENTATION THEORY OF S n REPRESENTATION THEORY OF S n EVAN JENKINS Abstract. These are notes from three lectures given in MATH 26700, Introduction to Representation Theory of Finite Groups, at the University of Chicago in November

More information

Polynomial Interpolation Part II

Polynomial Interpolation Part II Polynomial Interpolation Part II Prof. Dr. Florian Rupp German University of Technology in Oman (GUtech) Introduction to Numerical Methods for ENG & CS (Mathematics IV) Spring Term 2016 Exercise Session

More information

Modular Counting of Rational Points over Finite Fields

Modular Counting of Rational Points over Finite Fields Modular Counting of Rational Points over Finite Fields Daqing Wan Department of Mathematics University of California Irvine, CA 92697-3875 dwan@math.uci.edu Abstract Let F q be the finite field of q elements,

More information