This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Quantum algorithms for abelian difference sets
and applications to dihedral hidden subgroups

Martin Roetteler
Microsoft Research
Quantum Architectures and Computation Group
One Microsoft Way, Redmond, WA 98052, U.S.A.
martinro@microsoft.com
Abstract

Difference sets are basic combinatorial structures that have applications in signal processing, coding theory, and cryptography. We consider the problem of identifying a shifted version of the characteristic function of a (known) difference set. We present a generic quantum algorithm that can be used to tackle any hidden shift problem for any difference set in any abelian group. We discuss special cases of this framework where the resulting quantum algorithm is efficient. This includes: a) Paley difference sets based on quadratic residues in finite fields, which allows to recover the shifted Legendre function quantum algorithm, b) Hadamard difference sets, which allows to recover the shifted bent function quantum algorithm, and c) Singer difference sets based on finite geometries. The latter class allows us to define instances of the dihedral hidden subgroup problem that can be efficiently solved on a quantum computer.

1 Introduction

Many exponential speedups in quantum computing are the result of solving problems that belong to either the class of hidden subgroup problems (HSPs) or the class of hidden shift problems. For instance, the problems of factoring integers and of computing discrete logarithms in abelian groups [44] can be reformulated as solving instances of hidden subgroup problems in abelian groups [34, 26, 27, 6, 22, 23]: given a function ff from an abelian group AA to a set, so that ff is constant on the cosets of some subgroup HAH\leq A and takes distinct values on different cosets, the task is to find generators of HH.

Successes of the hidden subgroup framework include period finding over the reals which was used by Hallgren to construct an efficient quantum algorithm for solving Pell’s equation [18, 24] and more recently to the discovery of a quantum algorithm for computing unit groups of number fields of arbitrary degree [12]. Moreover, the hidden subgroup problem over symmetric and dihedral groups are related to the graph isomorphism problem [5, 2, 13, 19] and some computational lattice problems [40]. Constructing efficient algorithms for these problems are two major open questions in quantum algorithms.

As far as hidden shift problems are concerned, the shifted Legendre function problem [47], shifted sphere problems and shifts of other non-linear structures [8], problems of finding shifts of non-linear Boolean functions [43, 7] can be reformulated as solving instances of hidden shift problems in abelian groups: given a pair (f,g)(f,g) of functions from an abelian group AA to a set so that gg is obtained from ff by shifting the argument by an unknown shift sAs\in A, the task is to find this shift. For further background on hidden subgroup and hidden shift problems see [35, 27, 25, 9, 31].

An intriguing connection exists between injective instances of the hidden shift problem over abelian groups AA and the hidden subgroup problem for semidirect products of the form A2A\rtimes\mathbb{Z}_{2} where the action of 2\mathbb{Z}_{2} is given by inversion. This connection includes the special case of the hidden shift problem over the cyclic groups A=NA=\mathbb{Z}_{N}, where NN is a large integer which are related to the dihedral groups DN=N2D_{N}=\mathbb{Z}_{N}\rtimes\mathbb{Z}_{2}. Despite much effort, a fully polynomial-time quantum algorithm for the hidden subgroup problem over the dihedral groups has remained elusive. In this paper we make a step toward solving the hidden subgroup problem over the dihedral groups by exhibiting some instances that can be solved efficiently on a quantum computer. By efficient we mean that the run-time of the quantum part of the computation is bounded polynomially in the input size, which is generally assumed to be logA\log{A}, and the run-time of the classical post-processing part of the computation is also bounded polynomially in the input size.

Refer to caption Refer to caption Refer to caption Refer to caption a) b) c) d)

Figure 1: An example for hidden shift problem g(x)=f(xs)g(x)=f(x\oplus s) over A=2256A=\mathbb{Z}_{2}^{256} where the instance ff is given by a bent function and ff^{\star} is the dual bent function of ff. Shown in a) is the circuit for the correlation-based algorithm from [43], where the red marker denotes the state at the respective point in time during the algorithm’s execution. Shown in b), c), and d) are visualizations of three stages during the algorithm’s execution: b) is the state after the shifted function has been computed into the ±1\pm 1-valued phase. Here black and light blue color stand for (re-normalized) values of +1+1 and 1-1, respectively. Shown in c) is the state after the Fourier transform. As bent functions have a flat spectrum in absolute value, the state is again two valued at this point. Finally, in d) the state after the final Hadamard transform is shown, after which all amplitude is supported on the shift |s|s\rangle. Here black denotes an amplitude of 11 and white an amplitude of 0. The main contribution of this paper, Algorithm 1, can be considered a generalization of this picture to more general classes of hiding functions ff. These are obtained from difference sets which, in a precise sense, generalize the notion of bent functions.

1.1 Our results

Based on the combinatorial structure of difference sets we derive a class of functions that have a two-level Fourier power spectrum. We then consider the hidden shift problem for these functions, following a general algorithm principle that was used earlier to solve the hidden Legendre symbol [47] and the hidden bent function problem [43].

The basic idea underlying all these algorithms is to use the fact that the quantum computer can perform quantum Fourier transforms efficiently. This is used in correlation-based techniques which try to identify a shift by first transforming the function into frequency (Fourier) domain, then performing a point-wise multiplication with the desired target correlator, followed by an inverse Fourier transform and a measurement in the computational basis. After these steps the shift might be obtained, even without further post-processing. An example for this approach is shown in Figure 1 where the underlying group is the Boolean hypercube and the shifted function is a so-called bent function.

A rich theory of difference sets exists and many explicit constructions are known. Furthermore, several applications of difference sets exist in signal processing [38], coding theory [32], cryptography [37], see also [4] for further examples. In this paper we focus on the case of difference sets in abelian groups and show that a correlation-based approach can be successfully applied to several families of difference sets. In one application we consider so-called Singer difference sets, which are difference sets in cyclic groups. These difference sets have parameters

(v,k,λ)=(qd+11q1,qd1q1,qd11q1),(v,k,\lambda)=\left(\frac{q^{d+1}-1}{q-1},\frac{q^{d}-1}{q-1},\frac{q^{d-1}-1}{q-1}\right),

where qq is a constant and dd is a parameter that defines the input size of the problem, and vv, kk, and λ\lambda are characteristic parameters of the difference set. We construct instances of dihedral hidden subgroup problems that can be (query) efficiently solved on a quantum computer. There is one step in our algorithm that requires the implementation of a diagonal operator whose diagonal elements are certain generalized Gauss sums whose flatness follows from a classic result due to Turyn [46]. In general, we do not known how to implement these diagonal operators efficiently and it seems that the actual computational cost has to be determined on a case-by-case basis. However, for the case of q=2q=2, which leads to difference sets in a cyclic group of order N=2d+11N=2^{d+1}-1, we can leverage a result by van Dam and Seroussi [48] to implement a quantum algorithm that is fully efficient in terms of its quantum complexity as well as classical complexity. Classically, the underlying problem of this white-box problem is at least as hard as the discrete logarithm problem over a finite field.

1.2 Related work

Several papers study the dihedral hidden subgroup, however, it is an open whether quantum computers can solve this problem efficiently. There is a quantum algorithm which is fully efficient in its quantum part, which however requires an exponential-time classical post-processing [14]. Furthermore, a subexponential-time quantum algorithm for the dihedral subgroup problem is known [28, 41, 29] based on a sieving idea. The dihedral hidden subgroup problem for adversarially chosen hiding functions is believed to be intractable on a quantum computer, even we are not aware of any evidence stronger for this intuition than reductions from lattice problems [40] and subset sum type problems [40, 1]. The connection between hidden shift problems over abelian groups and hidden subgroup problems over semidirect groups of the mentioned special form is well-known and was one of the reasons why the hidden shift problem has been studied for various groups [14, 47, 15, 33, 10, 21, 9].

The study of hidden shift problems has resulted in quantum algorithms that are of independent interest and have even inspired cryptographic schemes that might be candidates for post-quantum cryptography [39]. Besides the mentioned works, problems of hidden shift type were also studied in [42, 16, 17], in the rejection sampling [36] framework, and in the context of multiregister PGM algorithms for Boolean hidden shift problems [7]. The main result of this paper is Theorem 4 which asserts that there exist instances of the hidden subgroup problem over the dihedral groups DND_{N} that can be solved in O(logN)O(\log N) queries to the hiding function, O(polylog(N))O(polylog(N)) quantum time, O(logN)O(\log N) quantum space, and trivial classical post-processing. Moreover, for N=2n1N=2^{n}-1, where n2n\geq 2, there exist instances of the hidden subgroup problem over the dihedral group D2n1D_{2^{n}-1} for which the hiding function is white-box and for which the entire quantum computation can be performed in O(poly(n))O(poly(n)) quantum time, O(n)O(n) quantum space, and trivial classical post-processing. Moreover, the classical complexity of solving these instances is at least as hard as solving the discrete logarithm problem over finite fields. To the best of our knowledge this is the first exponential size family of instances of the dihedral hidden subgroup problem that can be solved efficiently on a quantum computer, whereas for the same class of instances no efficient classical algorithm is known111It is easy to see that it is possible to find instances of the dihedral hidden subgroup problem that can be solved efficiently on a classical computer, e.g., functions that identify the points of a regular NN-gon that are opposites along a symmetry axis in a linear increasing fashion. On these “taco”-like instances the hidden symmetry axis, and thereby the hidden subgroup, can be found simply by a binary search..

In Corollary 1 we show that for DND_{N} where N=2n1N=2^{n}-1 this theorem implies that there are an expected number of O(2n2)O(2^{n^{2}}) instances of the dihedral HSP (where the hidden subgroup is a reflection) that can be solved efficiently on a quantum computer. This is a small fraction of the set of all instances of such hidden subgroup problems as the number of all instances scales doubly exponential as O(2n2n)O(2^{n2^{n}}). In particular, it seems unlikely that the set of such constructed instances has a non-trivial intersection with the set of instances that can be obtain via Regev’s reduction from gapped unique-SVP lattice problems.

The rest of this paper is organized as follows. First, in Section 2 we introduce some notation and basic definitions such as Fourier transform, convolution, and the basic combinatorial object of study in this paper, namely difference sets in finite abelian groups. Next, in Section 3 we present a quantum algorithm that can be applied to any shifted difference set problem, albeit sometimes with low probability of success. We exhibit some instances of shifted difference set problems that can be solved efficiently. These special cases include the so-called class of Singer difference sets which are then used in Section 4 to construct instances of the dihedral hidden subgroup problem that can be solved efficiently on a quantum computer. Finally, in Section 5 we offer conclusions and end with some open problems.

2 Background

2.1 Quantum Fourier transforms over abelian groups

The main tool we will use are Fourier transforms over abelian groups. In the following we state some basic definitions and properties. Recall that for any abelian group AA the character group A^=Hom(A,×)\widehat{A}={\rm Hom}(A,\mathbb{C}^{\times}) is isomorphic to AA. We denote the irreducible characters of AA by χ:A×\chi:A\rightarrow\mathbb{C}^{\times}.

Definition 1.

The quantum Fourier transform on d\mathbb{C}^{d} is a unitary transformation defined as QFTA:=1|A|aAχA^χ(a)|χa|\mathrm{QFT}_{A}:=\frac{1}{\sqrt{|A|}}\sum_{a\in A}\sum_{\chi\in\widehat{A}}\chi(a)|\chi\rangle\langle a|.

Example 1.

For A=2A=\mathbb{Z}_{2} the QFTA\mathrm{QFT}_{A} is given by the Hadamard transform H:=12(1111)H:=\frac{1}{\sqrt{2}}\bigl{(}\begin{matrix}[r]1&1\\ 1&-1\end{matrix}\bigr{)}.

Definition 2.

The Fourier transform of a (complex-valued) function F:AF:A\to\mathbb{C} is a function F^:A^\hat{F}:\widehat{A}\to\mathbb{C} defined as F^(χ):=χ|QFTA|F\hat{F}(\chi):=\langle\chi|\mathrm{QFT}_{A}|F\rangle where |F:=xAF(x)|x|F\rangle:=\sum_{x\in A}F(x)|x\rangle. Here F^(χ)\hat{F}(\chi) is called the Fourier coefficient of FF at χA^\chi\in\widehat{A}. We can write it explicitly as F^(χ)=1|A|xAχ(x)F(x)\hat{F}(\chi)=\frac{1}{\sqrt{|A|}}\sum_{x\in A}\chi(x)F(x). The set {F^(χ):χA^}\{\hat{F}(\chi):\chi\in\widehat{A}\} is called the Fourier spectrum of FF.

Definition 3.

The convolution of functions F,G:AF,G:A\to\mathbb{C} is a function (FG):A(F*G):A\to\mathbb{C} defined as (FG)(x)=yAF(y)G(xy)(F*G)(x)=\sum_{y\in A}F(y)G(x-y).

Fact 1.

Let F,G,H:AF,G,H:A\to\mathbb{C} denote arbitrary functions. The Fourier transform and convolution have the following basic properties:

  1. 1.

    The Fourier transform is linear: F+G^=F^+G^\widehat{F+G}=\hat{F}+\hat{G}.

  2. 2.

    When applied twice, the Fourier transform satisfies F^^(z)=F(z)\hat{\hat{F}}(z)=F(-z). In particular, for A=2A=\mathbb{Z}_{2} the Fourier transform is self-inverse: F^^=F\hat{\hat{F}}=F. From this property also follows that when the Fourier transform QFTA\mathrm{QFT}_{A} is applied four times then the result is the identity.

  3. 3.

    QFT\mathrm{QFT} is unitary, so the Plancherel identity χA|F^(χ)|2=xA|F(x)|2\sum_{\chi\in A}|\hat{F}(\chi)|^{2}=\sum_{x\in A}|F(x)|^{2} holds.

  4. 4.

    The convolution is commutative: FG=GFF*G=G*F, and associative: (FG)H=F(GH)(F*G)*H=F*(G*H).

  5. 5.

    The Fourier transform and convolution are related through the following identities: (F^G^)/|A|=FG^(\hat{F}*\hat{G})/\sqrt{|A|}=\widehat{FG} and (FG^)/|A|=F^G^(\widehat{F*G})/\sqrt{|A|}=\hat{F}\hat{G}, where FG:AFG:A\to\mathbb{C} is the entry-wise product of functions FF and GG: (FG)(x):=F(x)G(x)(FG)(x):=F(x)G(x).

  6. 6.

    A shift of a function in time domain leads to a point-wise multiplication with a “linear phase” in Fourier domain: If there exists sAs\in A such that for all xAx\in A it holds G(x)=F(xs)G(x)=F(x-s), then for all χA^\chi\in\widehat{A} we have that G^(χ)=χ(s)F^(χ)\hat{G}(\chi)=\chi(s)\hat{F}(\chi). This latter property will be crucial for the hidden shift algorithm presented later in this paper.

2.2 Difference sets

We recall the definition of difference sets in finite groups. We focus on the case of abelian groups in this paper. See also [3, 45, 30] for further information, in particular about the treatment for general, non-abelian groups.

Let AA be a finite abelian group whose group operation we write additively and whose neutral element we denote with 0A0_{A}. Denote the pairwise inequivalent irreducible characters of AA by A^\widehat{A}. For a subset DAD\subseteq A of AA we introduce the notation D:={d:dD}D^{-}:=\{-d:d\in D\} for the set of all inverses and ΔD:=D+D={xy:x,yD}\Delta D:=D+D^{-}=\{x-y:x,y\in D\} for the set of all differences of pairs of elements of DD.

Definition 4 (Difference set).

Let AA be a finite abelian group of size v=|A|v=|A|. A subset DAD\subseteq A of size k=|D|k=|D| is called a (v,k,λ)(v,k,\lambda)-difference set, where λ1\lambda\geq 1, if the following equality holds in the group algebra [A]\mathbb{C}[A] of AA:

ΔD=λ(A{0A})+k0A.\Delta D=\lambda(A\setminus\{0_{A}\})+k0_{A}. (1)

This means that the set of all differences covers each element the same number λ\lambda of times, except for the neutral element, which is covered precisely kk times. A nice feature of difference sets in abelian group is that they allow to construction functions with almost flat spectrum: the following theorem [46] asserts that all Fourier coefficients of the characteristic function of a difference set in an abelian group have the same absolute value, with a possible exception of a peak at the zero frequency:

Theorem 1 (Turyn, 1965).

Let AA be an abelian group of order vv and DD be an (v,k,λ)(v,k,\lambda)-difference set in AA. Let χA^\chi\in\widehat{A} be a non-trivial character. Then

|χ(D)|:=|dDχ(d)|=kλ|\chi(D)|:=\left|\sum_{d\in D}\chi(d)\right|=\sqrt{k-\lambda} (2)

holds. For the trivial character χ0\chi_{0} we have that |χ0(D)|=k|\chi_{0}(D)|=k.

Proof.

We include a proof as it is instructive to see how the difference set condition can be used when interpreted as the identity (1) in the group ring [A]\mathbb{C}[A]. Indeed, when identifying DD with dDd[A]\sum_{d\in D}d\in\mathbb{C}[A], we obtain from eq. (1) that

(dDd)(dDd)=λ(gAg)+(kλ)0A.\left(\sum_{d\in D}d\right)\left(\sum_{d\in D}-d\right)=\lambda\left(\sum_{g\in A}g\right)+(k-\lambda)0_{A}. (3)

Let χA^\chi\in\widehat{A} be non-trivial. Then clearly χ(A)=0\chi(A)=0 holds which implies—by applying χ\chi to both sides of eq. (3)—that χ(D)χ(D)¯=χ(A)+(kλ)χ(0A)=kλ\chi(D)\overline{\chi(D)}=\chi(A)+(k-\lambda)\chi(0_{A})=k-\lambda. From this we obtain that |χ(D)|=kλ|\chi(D)|=\sqrt{k-\lambda} as claimed. ∎

With each difference set DD we can canonically associate an incidence structure called the development of DD, and denoted by Dev(D)Dev(D).

Definition 5.

Let DD be a (v,k,λ)(v,k,\lambda)-difference set in an abelian group AA. Then the points of Dev(D)Dev(D) are given by the elements of AA and the blocks of Dev(D)Dev(D) are given by v+D:={v+a:aD}v+D:=\{v+a:a\in D\}, where vAv\in A.

It is well-known that Dev(D)Dev(D) is a symmetric design. More precisely, we have the following result (for a proof see, e.g., [3], [45] or [30]):

Theorem 2.

Let DD be a (v,k,λ)(v,k,\lambda)-difference set in an abelian group AA. Then Dev(D)Dev(D) is a symmetric balanced-incomplete block design with parameters (v,k,λ)(v,k,\lambda).

Theorem 2 implies that there are |A||A| blocks, that each block has |D||D| elements, that any two elements have precisely λ\lambda blocks in common and that in addition any two blocks intersect in precisely λ\lambda points. Also, it holds that λ=k(k1)/(v1)\lambda=k(k-1)/(v-1), see e.g. [30, Prop. 1.1], implying that λ\lambda is determined by the group order vv of AA and the size kk of DD. This equality allows us also to do a consistency check that the normalized state vector 1kdD|d\frac{1}{\sqrt{k}}\sum_{d\in D}|d\rangle is indeed mapped to a normalized vector under the Fourier transform QFTA{\rm QFT}_{A} for the group AA: using Theorem 1 we find that the length of the transformed vector is given by

1vk2((v1)|χ(D)|2+|χ0(D)|2)\displaystyle\frac{1}{\sqrt{vk}^{2}}\left((v-1)|\chi(D)|^{2}+|\chi_{0}(D)|^{2}\right) =\displaystyle= ((v1)(kλ)+k2)/(vk)\displaystyle((v-1)(k-\lambda)+k^{2})/(vk)
=\displaystyle= ((v1)kk(k1)+k2)/(vk)=1,\displaystyle((v-1)k-k(k-1)+k^{2})/(vk)=1,

as desired.

3 Quantum algorithm for shifted difference sets

Problem 1 (Shifted difference set problem).

Let AA be an abelian group and let sAs\in A. Let DAD\subseteq A be a (known) difference set and let s+Ds+D be given by a membership oracle. The problem is to find ss.

Refer to caption
Figure 2: The oracle for the shifted difference set problem considered in this paper. The oracle allows to test membership of a given test input gAg\in A. The value of the test g?Dg\in^{?}D is XORed onto a bit b{0,1}b\in\{0,1\}.

Similar to [43] we can modify Problem 1 by hiding not only the characteristic function of s+Ds+D via a membership oracle but also the characteristic function of DD itself. In this case we assume that we have access to membership oracles for both DD and s+Ds+D. The following quantum algorithm is a general recipe to tackle instances of the shifted difference set problem specified in Problem 1. As we will show in the following, Algorithm 1 can be used to find the hidden shift ss efficiently in several cases of difference sets for various abelian groups AA. It should be noted, however, that the probability of success crucially depends on the instance (A,D)(A,D) of the problem and there are instances for which the algorithm recovers ss successfully is only exponentially small. The algorithm can be seen as a generalization of correlation-based algorithms for solving hidden shift problems, e.g., [47], [43], and [7].

Algorithm 1.

The input to the algorithm is a membership oracle as in Problem 1.

Step 1: Prepare the input superposition:

|01|A|gA|g.|0\rangle\mapsto\frac{1}{\sqrt{|A|}}\sum_{g\in A}|g\rangle.

Step 2: Query the shifted difference set. This maps the state to:

1|A|gA(1)(g?s+D)|g=1|A|gA|g2|A|d(s+D)|d.\frac{1}{\sqrt{|A|}}\sum_{g\in A}(-1)^{(g\in^{?}s+D)}|g\rangle=\frac{1}{\sqrt{|A|}}\sum_{g\in A}|g\rangle-\frac{2}{\sqrt{|A|}}\sum_{d\in(s+D)}|d\rangle.

Step 3: Apply the quantum Fourier transform for AA. This maps the state to:

|χ02|A|χA^χ(s+D)|χ=(12k|A|)|χ02|A|χχ0χ(D)χ(s)|χ.|\chi_{0}\rangle-\frac{2}{|A|}\sum_{\chi\in\widehat{A}}\chi(s+D)|\chi\rangle=\left(1-\frac{2k}{|A|}\right)|\chi_{0}\rangle-\frac{2}{|A|}\sum_{\chi\not=\chi_{0}}\chi(D)\chi(s)|\chi\rangle.

Step 4: Compute diag(1,χ(D)¯/kλ:χχ0){\rm diag}(1,\overline{\chi(D)}/\sqrt{k-\lambda}:\chi\not=\chi_{0}) into the phase. This maps the state to:

(12k|A|)|χ02(kλ)|A|χχ0χ(s)|χ.\left(1-\frac{2k}{|A|}\right)|\chi_{0}\rangle-\frac{2(k-\lambda)}{|A|}\sum_{\chi\not=\chi_{0}}\chi(s)|\chi\rangle.

Step 5: Apply the inverse quantum Fourier transform for AA. This maps the state to:

1|A|(12(kkλ)|A|)gA|g2kλ|A||s\frac{1}{\sqrt{|A|}}\left(1-\frac{2(k-\sqrt{k-\lambda})}{|A|}\right)\sum_{g\in A}|g\rangle-\frac{2\sqrt{k-\lambda}}{\sqrt{|A|}}|-s\rangle

Step 5: Measure in the standard basis. Obtain s-s with probability p:=4(kλ)|A|p:=\frac{4(k-\lambda)}{|A|} and all other group elements uniformly with probability (1p)/|A|(1-p)/|A|.

3.1 Examples

3.1.1 Paley difference sets and shifted Legendre functions

Let AA be the additive group of the finite field 𝔽q\mathbb{F}_{q}, where q=pnq=p^{n} is a prime power such that q3(mod 4)q\equiv 3\;({\rm mod}\,4). Define D:={x:xis a non-zero square in𝔽q}D:=\{x:x\;\mbox{is a non-zero square in}\;\mathbb{F}_{q}\}. It is well-known [3, 45] that DD is then a difference set in AA. These difference sets are also known as Paley difference sets. The parameters of DD are as follows:

(v,k,λ)=(q,q12,q34).(v,k,\lambda)=\left(q,\frac{q-1}{2},\frac{q-3}{4}\right).
Example 2.

Let q=27q=27 and consider the irreducible polynomial f(x)=x3+x2+x+2𝔽3[x]f(x)=x^{3}+x^{2}+x+2\in\mathbb{F}_{3}[x], defining the finite field 𝔽27𝔽3[x]/(f(x))\mathbb{F}_{27}\cong\mathbb{F}_{3}[x]/(f(x)). Denote by {1,α,α2}\{1,\alpha,\alpha^{2}\} an 𝔽3\mathbb{F}_{3}-basis of 𝔽27\mathbb{F}_{27} where α:=xmodf(x)\alpha:=x\;{\rm mod}\;f(x), the image of xx under the canonical projection. Then DD given by the following 1313 elements

D\displaystyle D =\displaystyle= {1,α,2α2+2α+1,2α+2,α+2,α2+2α,α2+1,2α2+1,\displaystyle\{1,\quad\alpha,\quad 2\alpha^{2}+2\alpha+1,\quad 2\alpha+2,\quad\alpha+2,\quad\alpha^{2}+2\alpha,\quad\alpha^{2}+1,\quad 2\alpha^{2}+1,
α2+α+1,α2,2α2+2α,α2+2α+1,α2+2α+2}\displaystyle\;\;\alpha^{2}+\alpha+1,\quad\alpha^{2},\quad 2\alpha^{2}+2\alpha,\quad\alpha^{2}+2\alpha+1,\quad\alpha^{2}+2\alpha+2\}

defines a (27,13,6)(27,13,6)-difference set in 33\mathbb{Z}_{3}^{3}.

Remark 1.

Applying Algorithm 1 finds the hidden shift with probability of success

psuccess=|2(q12q34)1/2q1/2|21O(1/q).p_{success}=\left|\frac{2\left(\frac{q-1}{2}-\frac{q-3}{4}\right)^{1/2}}{q^{1/2}}\right|^{2}\approx 1-O(1/q).

This means that for large qq, we can efficiently recover the hidden shift. In this case, the Algorithm 1 specializes to the algorithm given in [47]. We recover the result that an unknown shift of the Legendre symbol can be reconstructed with high probability using 11 query.

3.1.2 Hadamard difference sets and shifted bent functions

Let AA be the elementary abelian 22-group A=22nA=\mathbb{Z}_{2}^{2n}, where nn\in\mathbb{N}. Let f:22n2f:\mathbb{Z}_{2}^{2n}\rightarrow\mathbb{Z}_{2} be a bent function. Define D:={x22n:f(x)=1}D:=\{x\in\mathbb{Z}_{2}^{2n}:f(x)=1\}. It is well-known [3, 45] that DD is a difference set in AA. These difference sets are also known as Hadamard difference sets. The parameters of DD are as follows:

(v,k,λ)=(22n, 22n12n1, 22n22n1).(v,k,\lambda)=\left(2^{2n},\;2^{2n-1}-2^{n-1},\;2^{2n-2}-2^{n-1}\right).
Example 3.

Let n=4n=4 and let f(x1,x2,x3,x4)=x1x2x3x4x1𝔽2[x1,x2,x3,x4]f(x_{1},x_{2},x_{3},x_{4})=x_{1}x_{2}\oplus x_{3}x_{4}\oplus x_{1}\in\mathbb{F}_{2}[x_{1},x_{2},x_{3},x_{4}] be a bent function from the Maiorana-McFarland family [11]. Then D={x𝔽24:f(x)=1}D=\{x\in\mathbb{F}_{2}^{4}:f(x)=1\} given by the following 66 elements

D\displaystyle D =\displaystyle= {(1,1,0,0),(1,1,1,0),(1,1,0,1),(0,0,1,1),(1,0,1,1),(0,1,1,1)}\displaystyle\{(1,1,0,0),\quad(1,1,1,0),\quad(1,1,0,1),\quad(0,0,1,1),\quad(1,0,1,1),\quad(0,1,1,1)\}

defines a (16,6,2)(16,6,2)-difference set in 24\mathbb{Z}_{2}^{4}. The blocks of the development Dev(D)Dev(D) of DD are obtained by taking the characteristic function of ff and shifting it under all elements of A=24A=\mathbb{Z}_{2}^{4}. Hence, the incidence matrix of the (16,6,2)(16,6,2)-design Dev(D)Dev(D) is given by

[0001000100011110001000100010110101000100010010111000100010000111000100011110000100100010110100100100010010110100100010000111100000011110000100010010110100100010010010110100010010000111100010001110000100010001110100100010001010110100010001000111100010001000].\left[\begin{array}[]{cccccccccccccccc}0&0&0&1&0&0&0&1&0&0&0&1&1&1&1&0\\ 0&0&1&0&0&0&1&0&0&0&1&0&1&1&0&1\\ 0&1&0&0&0&1&0&0&0&1&0&0&1&0&1&1\\ 1&0&0&0&1&0&0&0&1&0&0&0&0&1&1&1\\ 0&0&0&1&0&0&0&1&1&1&1&0&0&0&0&1\\ 0&0&1&0&0&0&1&0&1&1&0&1&0&0&1&0\\ 0&1&0&0&0&1&0&0&1&0&1&1&0&1&0&0\\ 1&0&0&0&1&0&0&0&0&1&1&1&1&0&0&0\\ 0&0&0&1&1&1&1&0&0&0&0&1&0&0&0&1\\ 0&0&1&0&1&1&0&1&0&0&1&0&0&0&1&0\\ 0&1&0&0&1&0&1&1&0&1&0&0&0&1&0&0\\ 1&0&0&0&0&1&1&1&1&0&0&0&1&0&0&0\\ 1&1&1&0&0&0&0&1&0&0&0&1&0&0&0&1\\ 1&1&0&1&0&0&1&0&0&0&1&0&0&0&1&0\\ 1&0&1&1&0&1&0&0&0&1&0&0&0&1&0&0\\ 0&1&1&1&1&0&0&0&1&0&0&0&1&0&0&0\end{array}\right].

Applying Algorithm 1 to the shifted difference problem for a Hadamard difference set finds the hidden shift with probability of success

psuccess=|2(22n122n2)1/222n1/2|2=1.p_{success}=\left|\frac{2\left(2^{2n-1}-2^{2n-2}\right)^{1/2}}{{2^{2n}}^{1/2}}\right|^{2}=1.

This means that we always recover the hidden shift ss with probability 11. In this case, the Algorithm 1 specializes to the algorithm given in [43]. We recover the result that an unknown shift of a bent function can be reconstructed using 11 query.

3.1.3 Singer difference sets and shifted hyperplanes

Let qq be a prime power, let d1d\geq 1 and let 𝔽qd+1\mathbb{F}_{q^{d+1}} be the finite field with qd+1q^{d+1} elements. The Singer difference sets are constructed from dd-dimensional projective spaces over 𝔽q\mathbb{F}_{q} as follows: consider the trace map tr{\rm tr} from 𝔽qd+1\mathbb{F}_{q^{d+1}} to 𝔽q\mathbb{F}_{q}. Let TT be a transversal of 𝔽q\mathbb{F}_{q}^{*} in 𝔽qd+1\mathbb{F}_{q^{d+1}}^{*} that is chosen in such a way that tr{\rm tr} maps TT onto the values 0 and 11 in 𝔽q\mathbb{F}_{q} only. We can then define a group A:=𝔽qd+1×/𝔽q×A:=\mathbb{F}_{q^{d+1}}^{\times}/\mathbb{F}_{q}^{\times} which turns out to be cyclic. Furthermore, we can define a subset D:={x:xA|tr(x)=0}D:=\{x:x\in A|{\rm tr}(x)=0\}. It turns out [3] that DD is then a difference set in N\mathbb{Z}_{N}, where N=qd+11q1N=\frac{q^{d+1}-1}{q-1}. This difference set has parameters

(v,k,λ)=(qd+11q1,qd1q1,qd11q1).(v,k,\lambda)=\left(\frac{q^{d+1}-1}{q-1},\frac{q^{d}-1}{q-1},\frac{q^{d-1}-1}{q-1}\right). (4)
Example 4.

Let P=PG(2,3)P=PG(2,3) be the two-dimensional projective space over 𝔽3\mathbb{F}_{3}. Then |P|=(331)/(31)=13|P|=(3^{3}-1)/(3-1)=13. By choosing an 𝔽3\mathbb{F}_{3}-basis of 𝔽27\mathbb{F}_{27} we obtain an embedding of 𝔽27×\mathbb{F}_{27}^{\times} into GL(3,𝔽3){\rm GL}(3,\mathbb{F}_{3}). If α𝔽27\alpha\in\mathbb{F}_{27} is a primitive element for 𝔽27/𝔽3\mathbb{F}_{27}/\mathbb{F}_{3}, then the corresponding matrix has order 2626 and therefore generates a cyclic subgroup CC of GL(3,𝔽3){\rm GL}(3,\mathbb{F}_{3}) order 2626. Under the canonical projection π:GL(3,𝔽3)PGL(3,𝔽3)\pi:{\rm GL}(3,\mathbb{F}_{3})\rightarrow{\rm PGL}(3,\mathbb{F}_{3}), the subgroup CC is mapped to a subgroup C¯=σ\overline{C}=\langle\sigma\rangle of PGL(3,𝔽3){\rm PGL}(3,\mathbb{F}_{3}) of order 1313 (see also [20, Kapitel II, Satz 7.3]). This subgroup is sometimes also called the “Singler cycle.” The Singer cycle operates transitively on the points {(x:y:z):x,y,z𝔽3}\{(x:y:z):x,y,z\in\mathbb{F}_{3}\} of the projective space PP. By picking the particular order [σip0:i=0,,12][\sigma^{i}p_{0}:i=0,\ldots,12], where p0p_{0} is the point (0:0:1)(0:0:1), we obtain points that we can identify with [0,1,,12][0,1,\ldots,12]. The image of the hyperplane given by all points p𝔽27p\in\mathbb{F}_{27} with tr(p)=0{\rm tr}(p)=0 is given by the set D:={0,1,3,9}D:=\{0,1,3,9\}. Then DD is a (13,4,1)(13,4,1)-difference set in the cyclic group 13\mathbb{Z}_{13}. The development Dev(D)Dev(D) is given by:

[1000100000101110001000001001100010000011011000100000010110001000000101100010000001011000100000010110001000000101100011000001011000010000010110000100000101100001000001011].\left[\begin{array}[]{ccccccccccccc}1&0&0&0&1&0&0&0&0&0&1&0&1\\ 1&1&0&0&0&1&0&0&0&0&0&1&0\\ 0&1&1&0&0&0&1&0&0&0&0&0&1\\ 1&0&1&1&0&0&0&1&0&0&0&0&0\\ 0&1&0&1&1&0&0&0&1&0&0&0&0\\ 0&0&1&0&1&1&0&0&0&1&0&0&0\\ 0&0&0&1&0&1&1&0&0&0&1&0&0\\ 0&0&0&0&1&0&1&1&0&0&0&1&0\\ 0&0&0&0&0&1&0&1&1&0&0&0&1\\ 1&0&0&0&0&0&1&0&1&1&0&0&0\\ 0&1&0&0&0&0&0&1&0&1&1&0&0\\ 0&0&1&0&0&0&0&0&1&0&1&1&0\\ 0&0&0&1&0&0&0&0&0&1&0&1&1\\ \end{array}\right].

If in eq. (4) we consider qq to be constant and dd be a parameter that corresponds to the input size of a hidden shift problem over N\mathbb{Z}_{N}, we can use Algorithm 1 to solve the hidden shift problem over N\mathbb{Z}_{N} with probability of success

psuccess=|4(qdqd1)1/2(qd+11)1/2|2=2q+O(1/q2).p_{success}=\left|\frac{4(q^{d}-q^{d-1})^{1/2}}{(q^{d+1}-1)^{1/2}}\right|^{2}=\frac{2}{q}+O(1/q^{2}).

This means that for constant qq, we can efficiently recover the hidden shift from a constant number of trials. In Section 4 we show how we can use the instances of hidden difference problems of Singer type to construct efficiently solvable instances of the dihedral hidden subgroup problem.

Remark 2.

We note that not all shifted difference set problems can be solved efficiently by using Algorithm 1. An example is given by the projective planes (q2+q+1,q+1,1)(q^{2}+q+1,q+1,1) of order qq. In this case the input size is given by logq\log{q} and the probability of success can be computed to be psuccess=|2q1/2(q2+q+1)1/2|22q+O(1/q2)p_{success}=|\frac{2q^{1/2}}{(q^{2}+q+1)^{1/2}}|^{2}\approx\frac{2}{q}+O(1/q^{2}), i.e., the probability of success is exponentially small in this case. It is an open problem if cases like this can be tackled, e.g., by considering multi-register algorithms.

3.2 Injectivization

As mentioned in the introduction, it is well known that the hidden subgroup problem over semidirect products of the form A2A\rtimes\mathbb{Z}_{2}, where the action of 2\mathbb{Z}_{2} is given by inversion, and the hidden shift problem over AA are closely related. More precisely, there is a one-to-one correspondence between instances of the hidden subgroup problem in which the subgroup is a conjugate of the order 22 subgroup H=(0,1)H=\langle(0,1)\rangle and instances of injective hidden shift problems over AA.

This leads to the question whether it is possible to relate instances of hidden shift problems where the hiding function f:ASf:A\rightarrow S is not injective to the injective case. Thankfully, as shown in [17] such a connection indeed exists. We briefly review this construction.

For given f:ASf:A\rightarrow S, and a set V:={v1,,vm}AV:=\{v_{1},\ldots,v_{m}\}\subseteq A of mm elements of AA we define a new function fV(x):=(f(x+v1),,f(x+vm))f_{V}(x):=(f(x+v_{1}),\ldots,f(x+v_{m})). Gharibi showed in [17] that if the set VV is chosen uniformly at random, then the probability that the function fVf_{V} is not injective can be upper bounded as

PrV(fVnot injective)|A|2(1γmin)m,Pr_{V}(f_{V}\;\mbox{not injective})\leq|A|^{2}(1-\gamma_{min})^{m}, (5)

where γmin:=minv0(γv(f))\gamma_{min}:=\min_{v\not=0}(\gamma_{v}(f)) and for all vAv\in A the so-called influences γv(f)\gamma_{v}(f) of ff at vv are defined as γv(f):=Prx(f(x)f(x+v))\gamma_{v}(f):=Pr_{x}(f(x)\not=f(x+v)), i.e., the probability that ff changes its value when the input is toggled by vv.

We now show that for instances of shifted difference set problems these influences can be bounded by the parameters of the difference set alone. This in turn allows to establish a bound on the overall number of copies mm that are needed to make the hiding function injective, namely a bound that grows proportional to log|A|\log|A|.

Lemma 1.

Let f:A{0,1}f:A\rightarrow\{0,1\} be a hiding function corresponding to the characteristic function a (v,k,λ)(v,k,\lambda)-difference set in an abelian group AA. Then for all vA{0}v\in A\setminus\{0\} we have that γv(f)=2(kλ)|A|\gamma_{v}(f)=\frac{2(k-\lambda)}{|A|}.

Proof.

Note that

Prx(f(x)f(x+v))\displaystyle Pr_{x}(f(x)\not=f(x+v)) =\displaystyle= 1|A|xA(f(x)f(x+v))2\displaystyle\frac{1}{|A|}\sum_{x\in A}\left(f(x)-f(x+v)\right)^{2} (6)
=\displaystyle= 1|A|(|D|+|v+D|2|D(v+D)|)\displaystyle\frac{1}{|A|}\left(|D|+|v+D|-2|D\cap(v+D)|\right) (7)
=\displaystyle= 1|A|(2|D|2λ)=2(kλ)|A|,\displaystyle\frac{1}{|A|}(2|D|-2\lambda)=\frac{2(k-\lambda)}{|A|}, (8)

where in the second equation we used the fact that only elements in the intersection contribute to f(x)f(x+v)f(x)f(x+v) and in the third equation we used Theorem 2 which implies that |D(v+D)|=λ|D\cap(v+D)|=\lambda for all v0v\not=0. ∎

We can now establish the claimed result that the number of copies only grows with the log of the group size.

Theorem 3.

Let DD be a (v,k,λ)(v,k,\lambda)-difference set in an abelian group AA and f:A{0,1}f:A\rightarrow\{0,1\} an instance of a hidden difference set problem for DD. Then m=O(log|A|)m=O(\log{|A|}) copies are enough to obtain an injective instance fVf_{V} with probability greater than 11641-\frac{1}{64}.

Proof.

From the cited bound (5) we obtain that

Pr(finjective)1|A|2(1γmin(f))mPr(f\;\mbox{injective})\geq 1-{|A|}^{2}(1-\gamma_{min}(f))^{m}

It is easy to see that lower bounding the right hand side in this expression by 11641-\frac{1}{64} is equivalent to choosing m1log(1γmin(f))(62log2(|A|))m\geq\frac{1}{\log(1-\gamma_{min}(f))}(-6-2\log_{2}(|A|)). Now, from Lemma 1 we have that γmin(f)=2(kλ)|A|\gamma_{min}(f)=\frac{2(k-\lambda)}{|A|} from which we can conclude that in particular |A|2(kλ)|A|\geq 2(k-\lambda) holds. Using the fact that log2(1x)x\log_{2}(1-x)\leq-x holds for x[0,1)x\in[0,1), this implies that

m\displaystyle m \displaystyle\geq 1log2(12(kλ)|A|)(62log2|A|)\displaystyle\Big{\lceil}\frac{1}{\log_{2}\left(1-\frac{2(k-\lambda)}{|A|}\right)}(-6-2\log_{2}{|A|})\Big{\rceil} (9)
\displaystyle\geq |A|2(kλ)(62log2|A|)2log2|A|+6.\displaystyle\Big{\lceil}-\frac{|A|}{2(k-\lambda)}(-6-2\log_{2}{|A|})\Big{\rceil}\geq 2\log_{2}{|A|}+6. (10)

Hence m=O(log|A|)m=O(\log{|A|}) copies are enough to guarantee that for V={v1,vm}V=\{v_{1},\ldots v_{m}\} chosen uniformly at random, the probability of fVf_{V} being injective is at least 11641-\frac{1}{64}. ∎

4 Efficiently solvable dihedral hidden subgroup problems

Theorem 4.

There exist instances of the hidden subgroup problem over the dihedral groups DND_{N} that can be solved in O(logN)O(\log N) queries to the hiding function, O(polylog(N))O(polylog(N)) quantum time, O(logN)O(\log N) quantum space, and trivial classical post-processing. Moreover, for N=2n1N=2^{n}-1, where n2n\geq 2, there exist instances of the hidden subgroup problem over the dihedral group D2n1D_{2^{n}-1} for which the hiding function is white-box and for which the entire quantum computation can be performed in O(poly(n))O(poly(n)) quantum time, O(n)O(n) quantum space, and trivial classical post-processing. Moreover, the classical complexity of solving these instances is at least as hard as solving the discrete logarithm problem over finite fields.

Proof.

To construct the instances that can be solved efficiently we proceed in three steps: (i) first, we show that a particular set of hidden shift problems over N\mathbb{Z}_{N} can be obtained from hiding functions that are indicator functions of hyperplanes and that these indicator functions can be implemented efficiently, (ii) next we show that Algorithm 1 is query, time, and space efficient for these instances; (iii) finally, we show that it is possible to construct instances of the hidden subgroup problem in DND_{N} from the hidden shift instances constructed in (i) and that these instances are unlikely to be solvable on a classical computer, unless computing finite field discrete logarithms is possible in polynomial-time.

Step (i): We instantiate the abelian difference set quantum algorithm for the case of the cyclic group A=NA=\mathbb{Z}_{N}, where N=(qd+11)/(q1)=qd+qq1++1N=(q^{d+1}-1)/(q-1)=q^{d}+q^{q-1}+\ldots+1. Here qq is constant and dd is a parameter that corresponds to the input size of the problem. We use the explicitly (white-box) description of the function f(x)=tr(αx)f(x)={\rm tr}(\alpha^{x}), where tr{\rm tr} denotes the trace map from 𝔽qd+1\mathbb{F}_{q}^{d+1} to 𝔽q\mathbb{F}_{q} and where α\alpha is a primitive element in 𝔽q\mathbb{F}_{q}. Now, the instance of the shifted difference set problem is defined by the hiding function g(x)=tr(αx+s)g(x)={\rm tr}(\alpha^{x+s}), where sNs\in\mathbb{Z}_{N}. This function can be given as a white-box function by providing the element β:=αs𝔽qd+1\beta:=\alpha^{s}\in\mathbb{F}_{q^{d+1}} so that gg can then be evaluated as g(x)=tr(αxβ)g(x)={\rm tr}(\alpha^{x}\beta). Note that the set {xA:tr(x)=0}\{x\in A:{\rm tr}(x)=0\} defines a hyperplane and therefore a difference set DD of Singer type.

Step (ii): We now go through each step of Algorithm 1 and check that the steps are time- and space-efficient. In the first step, a Fourier transform is applied to create the equal superposition of all elements of AA. As AA is abelian, this can clearly be done efficiently. In the second step, we have to evaluate the function gg in superposition. Again, as there is an explicit description of the trace which can be computed as sum of powers of the relative Frobenius from 𝔽qd+1\mathbb{F}_{q^{d+1}} to 𝔽q\mathbb{F}_{q} as follows tr(x)=x+xq++xqd{\rm tr}(x)=x+x^{q}+\ldots+x^{q^{d}} we can evaluate g(x)=tr(αxβ)g(x)={\rm tr}(\alpha^{x}\beta) by first constructing a circuit for exponentiation xαx𝔽qd+1x\mapsto\alpha^{x}\in\mathbb{F}_{q^{d+1}} followed by scalar multiplication with β\beta, followed by the application of the trace map. Clearly, all these operations can be efficiently implemented by means of a classical Boolean circuit whose size and depth are polynomial in dd. Hence, by applying standard techniques from reversible computing, we can derive quantum circuits for the evaluation of ff and gg. Therefore we can compute Step 2 efficiently on a quantum computer.

Step 3 is another application of a quantum Fourier transform over the abelian group AA which as in Step 1 can be done efficiently. Step 4 is the most challenging step in the entire algorithm. If we were just interested in the query complexity of the problem we would be done as we could simply apply the diagonal unitary operator Δ:=diag(1,χ1(D)¯,,χN1(D)¯)\Delta:={\rm diag}(1,\overline{\chi_{1}(D)},\ldots,\overline{\chi_{N-1}(D)}), where χ1,,χN1\chi_{1},\ldots,\chi_{N-1} runs through all non-trivial characters of N\mathbb{Z}_{N}. This argument is sufficient to establish the first claimed statement in the theorem, i.e., the query complexity result.

For the white-box statement, we are interested in the time- and space-efficiency of the algorithm, i.e., we have to show that Δ\Delta can be implemented efficiently. For this we have to assume N=2n1N=2^{n}-1 as required by one of the subsequent steps (and we highlight where). First we use a result due to van Dam and Seroussi [48] establishing that finite field Gauss sums can be approximated efficiently on a quantum computer. The connection to our situation is that the elements of Δ\Delta are Gauss sums. We briefly review the van Dam/Seroussi algorithm and then argue that we can apply it in superposition in order to compute Δ\Delta.

Let 𝔽q\mathbb{F}_{q} be a finite field where q=pd+1q=p^{d+1} and pp prime. Let ψ:=𝔽p×\psi:=\mathbb{F}_{p}\rightarrow\mathbb{C}^{\times} be a non-trivial additive character and let χ:𝔽q×C×\chi:\mathbb{F}_{q}^{\times}\rightarrow C^{\times} be a non-trivial multiplicative character. Then the Gauss sum G(ψ,χ)G(\psi,\chi) is defined as

G(ψ,χ)=x𝔽q×χ(x)ψ(tr(x)).G(\psi,\chi)=\sum_{x\in\mathbb{F}_{q}^{\times}}\chi(x)\psi({\rm tr}(x)).

The additive and multiplicative characters of 𝔽q\mathbb{F}_{q} have a simple description: For nn\in\mathbb{N} denote a primitive nn-th root of unity in ×\mathbb{C}^{\times} with ωn\omega_{n}. Then the additive characters take the form ψμ(x):=ωptr(μx)\psi_{\mu}(x):=\omega_{p}^{{\rm tr}(\mu x)}, where μ𝔽q\mu\in\mathbb{F}_{q} runs through all elements of 𝔽q\mathbb{F}_{q}. The multiplicative characters can be described using a primitive elements α𝔽pd+1\alpha\in\mathbb{F}_{p^{d+1}} as follows: χβ(αi):=ωpd+11βi\chi_{\beta}(\alpha^{i}):=\omega_{p^{d+1}-1}^{\beta i}, where β\beta runs through all non-zero elements of 𝔽pd+1\mathbb{F}_{p^{d+1}}. This means that evaluation χβ(x)=ωβlogα(x)\chi_{\beta}(x)=\omega^{\beta\log_{\alpha}(x)} requires the computation of a discrete log over the multiplicative group of the field.

It is known that for non-trivial ψ\psi and χ\chi, the absolute value of the Gauss sum G(ψ,χ)G(\psi,\chi) evaluates to |G(ψ,χ)|=q|G(\psi,\chi)|=\sqrt{q}, i.e., G(ψ,χ)=qeiθG(\psi,\chi)=\sqrt{q}e^{i\theta}, where θ[0,2π)\theta\in[0,2\pi). The paper [48] established that θ\theta can be approximated with precision ε\varepsilon by a quantum algorithm in time O(1εpolylog(q))O(\frac{1}{\varepsilon}polylog(q)). As we are overall only looking for a quantum algorithm that can solve the hidden shift problem over N\mathbb{Z}_{N} with bounded probability of success, it will be enough to approximate the diagonal elements of Δ\Delta with constant precision, i.e., we can use the van Dam/Seroussi algorithm to estimate G(ψ,χ)G(\psi,\chi). A minor complication is the fact that in [48] only the case of known character χ\chi is considered, however, by making all steps of the algorithm conditioned on the character χ\chi it can be easily seen that the transformation |χG(χ,ψ)/q|χ|\chi\rangle\mapsto G(\chi,\psi)/\sqrt{q}|\chi\rangle can also be implemented coherently, i.e., on superposition of inputs χ\chi. The final step is to show how to relate χ(D)\chi(D) and G(χ,ψ)G(\chi,\psi). For this we make the restriction that p=2p=2 so that our parameters always take the form N=2d+11N=2^{d+1}-1. We then obtain that

χ(D)\displaystyle\chi(D) =\displaystyle= x:tr(x)=0χ(x)=x𝔽q×χ(x)(1+(1)tr(x))=x𝔽q×χ(x)+x𝔽q×χ(x)(1)tr(x)\displaystyle\sum_{x:{\rm tr}(x)=0}\chi(x)=\sum_{x\in\mathbb{F}_{q}^{\times}}\chi(x)(1+(-1)^{{\rm tr}(x)})=\sum_{x\in\mathbb{F}_{q}^{\times}}\chi(x)+\sum_{x\in\mathbb{F}_{q}^{\times}}\chi(x)(-1)^{{\rm tr}(x)}
=\displaystyle= x𝔽q×χ(x)(1)tr(x)=G(ψ,χ),\displaystyle\sum_{x\in\mathbb{F}_{q}^{\times}}\chi(x)(-1)^{{\rm tr}(x)}=G(\psi,\chi),

where ψ\psi denotes the additive character ψ(x):=(1)tr(x)\psi(x):=(-1)^{{\rm tr}(x)} of 𝔽2n\mathbb{F}_{2^{n}} and χ(x)\chi(x) denotes a multiplicative character of 𝔽2n×\mathbb{F}_{2^{n}}^{\times}. This argument establishes that we can approximate the operator Δ\Delta efficiently on a quantum computer with constant precision ε\varepsilon.

The final two steps of the algorithm are easy to do: Step 5 is just another Fourier transform and Step 6 a measurement in the computational basis, both of which can be done efficiently.

Step (iii): To construct the desired instances of the hidden subgroup problem from the hidden shift problem, we apply the results from Subsection 3.2 and specialize them to the case of the Singer difference sets. We pick m=2(d+1)+6m=2(d+1)+6 random elements v1,,vm𝔽qd+1v_{1},\ldots,v_{m}\in\mathbb{F}_{q^{d+1}} and construct the hiding function gv1,,vm(x):=(g(x+v1),,g(x+vm))g_{v_{1},\ldots,v_{m}}(x):=(g(x+v_{1}),\ldots,g(x+v_{m})) which according to Theorem 3 is injective with probability greater than 11641-\frac{1}{64}. We then apply another standard construction [15, 28] which allows to turn an instance of an injective hidden shift problem into a hidden subgroup problem. Indeed, if f,g:ASf,g:A\rightarrow S is an injective instance of a hidden shift problem with shift sAs\in A, then the corresponding hidden subgroup problem over A2A\rtimes\mathbb{Z}_{2} is given by the hiding function F((a,0)):=f(a)F((a,0)):=f(a) and F((a,1)):=g(a)F((a,1)):=g(a), where (a,t)(a,t) is an encoding of the elements, i.e., aAa\in A and t2t\in\mathbb{Z}_{2}. Conversely, if F:A2SF:A\rtimes\mathbb{Z}_{2}\rightarrow S is a defining function of a hidden subgroup problem with hidden subgroup H=(a,1)H=\langle(a,1)\rangle of order 22, then f(x):=F(x,0)f(x):=F(x,0) and g(x):=F(x,1)g(x):=F(x,1) defines a hidden shift problem over AA.

Overall, we established the claimed result of the existence of an efficient quantum algorithm to solve the hidden subgroup problem. The classical complexity of finding the shift ss from β\beta clearly is as least as hard as solving the discrete logarithm over a finite field. ∎

Corollary 1.

Let N=2n1N=2^{n}-1, where n2n\geq 2, there there exist an expected number of 2n22^{n^{2}} instances of hidden subgroup problems over DND_{N} that can be solved efficiently on a quantum computer.

Proof.

From the proof of Theorem 4 we see that in step (iii) for each random choice of m=O(log|A|)m=O(\log{|A|}) elements, where |A|=|2n1|=2n1|A|=|\mathbb{Z}_{2^{n}-1}|=2^{n}-1, we obtain a valid injectivization of the hidden shift function. There are an expected number of O(|A|m)=O((2log2(|A|))m)=O(2n2)O(|A|^{m})=O((2^{\log_{2}(|A|)})^{m})=O(2^{n^{2}}) such functions. ∎

5 Conclusions

We showed that the property of difference sets to give rise to functions with two level Fourier (power) spectrum which makes them useful for classical applications also allows to define hidden shift problems which can then be tackled on a quantum computer. While a solution to general hidden shift problems for arbitrary difference sets remains elusive, we showed that several interesting special cases can indeed be solved efficiently on a quantum computer. This includes the known cases of the Legendre symbol which we show to be an instantiation of our framework for the case of a Paley difference set. Furthermore, it includes the case of hidden bent functions which we show to be special cases of Hadamard difference sets. The case of Singer difference sets appears to be new and allows us to construct white-box instances of dihedral hidden subgroup problems that can be solved fully efficiently on a quantum computer, both in the quantum and in the classical parts of the algorithm.

Open problems include whether these findings have any consequence for more general classes of instances of the dihedral hidden subgroup problem and the hidden subgroup problem in other semidirect products of a similar form. Other open problems include whether it is possible to solve the shifted difference set problem for projective planes which we mentioned cannot be solved by our main algorithm with better than exponentially small probability of success. One possible avenue for future research is to consider multi-register algorithms to tackle this problem. Another open problem is the case of hidden shift problems over abelian groups for functions that have approximately constant spectra, possibly with the exception of the zero frequency as in case of the functions arising from difference sets considered in this paper.

Acknowledgments

The author would like to thank Schloss Dagstuhl for hosting Seminar 15371, during which part of this research was carried out.

References

  • [1] Dave Bacon, Andrew M. Childs, and Wim van Dam. Optimal measurements for the dihedral hidden subgroup problem. Chicago Journal of Theoretical Computer Science, 2006(2), Oct 2006. quant-ph/0501044.
  • [2] Robert Beals. Quantum computation of Fourier transforms over symmetric groups. In Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, STOC ’97, pages 48–53, New York, NY, USA, 1997. ACM.
  • [3] Thomas Beth, Dieter Jungnickel, and Hanfried Lenz. Design Theory, volume I. Cambridge University Press, 2nd edition, 1999.
  • [4] Thomas Beth, Dieter Jungnickel, and Hanfried Lenz. Design Theory, volume II. Cambridge University Press, 2nd edition, 1999.
  • [5] Dan Boneh and Richard Lipton. Quantum cryptanalysis of hidden linear functions. In Advances in Cryptology — CRYPT0’ 95, volume 963 of Lecture Notes in Computer Science, pages 424–437. Springer, 1995.
  • [6] Gilles Brassard and Peter Høyer. An exact polynomial–time algorithm for Simon’s problem. In Proceedings of Fifth Israeli Symposium on Theory of Computing and Systems, pages 12–33. ISTCS, IEEE Computer Society Press, 1997. Also: ArXiv prnote quant–ph/9704027.
  • [7] Andrew M. Childs, Robin Kothari, Maris Ozols, and Martin Roetteler. Easy and hard functions for the Boolean hidden shift problem. In 8th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2013, May 21-23, 2013, Guelph, Canada, pages 50–79, 2013.
  • [8] Andrew M. Childs, Leonard J. Schulman, and Umesh V. Vazirani. Quantum algorithms for hidden nonlinear structures. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pages 395–404, 2007.
  • [9] Andrew M. Childs and Wim van Dam. Quantum algorithms for algebraic problems. Rev. Mod. Phys., 82:1–52, Jan 2010. 0812.0380.
  • [10] Andrew M. Childs and Pawel Wocjan. On the quantum hardness of solving isomorphism problems as nonabelian hidden shift problems. Quantum Information and Computation, 7(5):504–521, Jul 2007. quant-ph/0510185.
  • [11] John F. Dillon. A survey of bent functions. The NSA technical journal, pages 191–215, 1972.
  • [12] Kirsten Eisenträger, Sean Hallgren, Alexei Kitaev, and Fang Song. A quantum algorithm for computing the unit group of an arbitrary degree number field. In Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 293–302, 2014.
  • [13] Mark Ettinger and Peter Høyer. A quantum observable for the graph isomorphism problem. quant-ph/9901029, 1999.
  • [14] Mark Ettinger and Peter Høyer. On quantum algorithms for noncommutative hidden subgroups. Advances in Applied Mathematics, 25(3):239–251, 2000. quant-ph/9807029.
  • [15] Katalin Friedl, Gábor Ivanyos, Frédéric Magniez, Miklos Santha, and Pranab Sen. Hidden translation and orbit coset in quantum computing. In Proceedings of the 35fth Annual ACM Symposium on Theory of Computing (STOC’03), pages 1–9. ACM, 2002. quant-ph/0211091.
  • [16] Dmitry Gavinsky, Martin Roetteler, and Jérémie Roland. Quantum algorithm for the boolean hidden shift problem. In Computing and Combinatorics, volume 6842 of Lecture Notes in Computer Science, pages 158–167. Springer Berlin / Heidelberg, 2011. 1103.3017.
  • [17] Mirmojtaba Gharibi. Reduction from non-injective hidden shift problem to injective hidden shift problem. Quantum Information and Computation, 13(3&4):212–230, 2013.
  • [18] Sean Hallgren. Polynomial-time quantum algorithms for Pell’s equation and the principal ideal problem. J. ACM, 54(1):4:1–4:19, Mar 2007.
  • [19] Sean Hallgren, Cris Moore, Martin Roetteler, Alex Russell, and Pranab Sen. Limitations of quantum coset states for graph isomorphism. Journal of the ACM, 57(6):34:1–34:33, 2010.
  • [20] Bertram Huppert. Endliche Gruppen I. Springer, 1967.
  • [21] Gábor Ivanyos. On solving systems of random linear disequations. Quantum Information and Computation, 8(6&7):579–594, 2008. 0704.2988.
  • [22] Richard Jozsa. Quantum algorithms and the Fourier transform. Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences, 454(1969):323–337, 1998. quant-ph/9707033.
  • [23] Richard Jozsa. Quantum factoring, discrete logarithms, and the hidden subgroup problem. Computing in Science Engineering, 3(2):34–43, Mar/Apr 2001. quant-ph/0012084.
  • [24] Richard Jozsa. Quantum computation in algebraic number theory: Hallgren’s efficient quantum algorithm for solving Pell’s equation. Annals of Physics, 306(2):241–279, 2003. quant-ph/0302134.
  • [25] Phillip Kaye, Raymond Laflamme, and Michele Mosca. An Introduction to Quantum Computing. Oxford University Press, 2007.
  • [26] Alexei Yu. Kitaev. Quantum measurements and the abelian stabilizer problem. 1995. quant-ph/9511026.
  • [27] Alexei Yu. Kitaev, Alexander Shen, and Mikhail N. Vyalyi. Classical and Quantum Computation, volume 47 of Graduate Studies in Mathematics. American Mathematical Society, 2002.
  • [28] Greg Kuperberg. A subexponential-time quantum algorithm for the dihedral hidden subgroup problem. SIAM Journal on Computing, 35(1):170–188, 2005. quant-ph/0302112.
  • [29] Greg Kuperberg. Another subexponential-time quantum algorithm for the dihedral hidden subgroup problem. 1112.3333, 2011.
  • [30] Eric S. Ladner. Symmetric Designs: An Algebraic Approach, volume 74 of London Mathematical Society Lecture Note Series. Cambridge University Press, 1983.
  • [31] Chris Lomont. The hidden subgroup problem - review and open problems. quant-ph/0411037, 2004.
  • [32] F. J. MacWilliams and N. J. A. Sloane. The theory of error–correcting codes. North–Holland, Amsterdam, 1977.
  • [33] Cristopher Moore, Daniel Rockmore, Alexander Russell, and Leonard J. Schulman. The power of strong Fourier sampling: Quantum algorithms for affine groups and hidden shifts. SIAM J. Comput., 37(3):938–958, Jun 2007. quant-ph/0503095.
  • [34] Michele Mosca and Artur Ekert. The hidden subgroup problem and eigenvalue estimation on a quantum computer. In Quantum Computing and Quantum Communications, volume 1509 of Lecture Notes in Computer Science, pages 174–188. Springer, 1999. quant-ph/9903071.
  • [35] Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 2010.
  • [36] Maris Ozols, Martin Roetteler, and Jérémie Roland. Quantum rejection sampling. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS ’12, pages 290–308, New York, NY, USA, 2012. ACM. 1103.2774.
  • [37] Josef Pieprzyk, Thomas Hardjono, and Jennifer Seberry. Fundamentals of computer security. Springer, 2003.
  • [38] Alexander Pott, Vijay Kumar, Tor Helleseth, and Dieter Jungnickel, editors. Difference sets, sequences, and their correlations, volume 542 of NATO Science Series. Kluwer, 1998.
  • [39] Oded Regev. New lattice-based cryptographic constructions. J. ACM, 51(6):899–942, 2004.
  • [40] Oded Regev. Quantum computation and lattice problems. SIAM Journal on Computing, 33(3):738–760, 2004.
  • [41] Oded Regev. A subexponential time algorithm for the dihedral hidden subgroup problem with polynomial space. quant-ph/0406151, 2004.
  • [42] Martin Roetteler. Quantum algorithms to solve the hidden shift problem for quadratics and for functions of large Gowers norm. In Proceedings of the 34st International Symposium on Mathematical Foundations of Computer Science (MFCS’09), volume 5734 of Lecture Notes in Computer Science, pages 663–674. Springer, 2009. 0911.4724.
  • [43] Martin Roetteler. Quantum algorithms for highly non-linear Boolean functions. In Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA’10), pages 448–457, 2010. 0811.3208.
  • [44] Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5):1484–1509, 1997. Preliminary version in FOCS 1994.
  • [45] Douglas R. Stinson. Combinatorial Designs: Constructions and Analysis. Springer, 2003.
  • [46] Richard J. Turyn. Character sums and difference sets. Pacific Journal of Mathematics, 15(1):319–346, 1965.
  • [47] Wim van Dam, Sean Hallgren, and Lawrence Ip. Quantum algorithms for some hidden shift problems. SIAM Journal on Computing, 36(3):763–778, 2006. quant-ph/0211140.
  • [48] Wim van Dam and Gadiel Seroussi. Quantum algorithms for estimating Gauss sums. quant-ph/0207131, 2002.