Graph Isomorphism, the Hidden Subgroup Problem and Identifying Quantum States
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Note on the Security of CSIDH
A note on the security of CSIDH Jean-Fran¸cois Biasse1, Annamaria Iezzi1, and Michael J. Jacobson, Jr.2 1 Department of Mathematics and Statistics University of South Florida biasse,aiezzi @usf.edu 2 { } Department of Computer Science University of Calgary [email protected] Abstract. We propose an algorithm for computing an isogeny between two elliptic curves E1,E2 defined over a finite field such that there is an imaginary quadratic order satisfying End(Ei) for i = 1, 2. This O O ≃ concerns ordinary curves and supersingular curves defined over Fp (the latter used in the recent CSIDH proposal). Our algorithm has heuris- tic asymptotic run time eO√log(|∆|) and requires polynomial quantum memory and eO√log(|∆|) classical memory, where ∆ is the discriminant of . This asymptotic complexity outperforms all other available method O for computing isogenies. We also show that a variant of our method has asymptotic run time ˜ eO√log(|∆|) while requesting only polynomial memory (both quantum and classical). 1 Introduction Given two elliptic curves E1, E2 defined over a finite field Fq, the isogeny prob- lem is to compute an isogeny φ : E E , i.e. a non-constant morphism that 1 → 2 maps the identity point on E1 to the identity point on E2. There are two dif- ferent types of elliptic curves: ordinary and supersingular. The latter have very particular properties that impact the resolution of the isogeny problem. The first instance of a cryptosystem based on the hardness of computing isogenies arXiv:1806.03656v4 [cs.CR] 1 Aug 2018 was due to Couveignes [12], and its concept was independently rediscovered by Stolbunov [31]. -
Ph 219B/CS 219B
1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): |0i⊗|ψi7→|0i⊗|ψi , |1i⊗|ψi7→|1i⊗U|ψi (1) (where U is a unitary transformation acting on n qubits), we can measure the eigenvalues of U. If the state |ψi is the eigenstate |λi of U with eigenvalue λ = exp(2πiφ), then√ by querying the oracle k times, we can determine φ to accuracy O(1/ k). But suppose that we replace the pure state |ψi in eq. (1) by the max- imally mixed state of n qubits, ρ = I/2n. a) Show that, with k queries, we can estimate both the real part and n the imaginary√ part of tr (U) /2 , the normalized trace of U,to accuracy O(1/ k). b) Given a polynomial-size quantum circuit, the problem of estimat- ing to fixed accuracy the normalized trace of the unitary trans- formation realized by the circuit is believed to be a hard problem classically. Explain how this problem can be solved efficiently with a quantum computer. The initial state needed for each query consists of one qubit in the pure state |0i and n qubits in the maximally mixed state. Surprisingly, then, the initial state of the computer that we require to run this (apparently) powerful quantum algorithm contains only a constant number of “clean” qubits, and O(n) very noisy qubits. 6.2 A generalization of Simon’s problem n Simon’s problem is a hidden subgroup problem with G = Z2 and k H = Z2 = {0,a}. -
Hidden Shift Attacks on Isogeny-Based Protocols
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols P´eterKutas1, Simon-Philipp Merz2, Christophe Petit3;1, and Charlotte Weitk¨amper1 1 University of Birmingham, UK 2 Royal Holloway, University of London, UK 3 Universit´elibre de Bruxelles, Belgium Abstract. Supersingular isogeny Diffie-Hellman key exchange (SIDH) is a post-quantum protocol based on the presumed hardness of com- puting an isogeny between two supersingular elliptic curves given some additional torsion point information. Unlike other isogeny-based proto- cols, SIDH has been widely believed to be immune to subexponential quantum attacks because of the non-commutative structure of the endo- morphism rings of supersingular curves. We contradict this commonly believed misconception in this paper. More precisely, we highlight the existence of an abelian group action on the SIDH key space, and we show that for sufficiently unbalanced and over- stretched SIDH parameters, this action can be efficiently computed (heuris- tically) using the torsion point information revealed in the protocol. This reduces the underlying hardness assumption to a hidden shift problem instance which can be solved in quantum subexponential time. We formulate our attack in a new framework allowing the inversion of one-way functions in quantum subexponential time provided a malleabil- ity oracle with respect to some commutative group action. This frame- work unifies our new attack with earlier subexponential quantum attacks on isogeny-based protocols, and it may be of further interest for crypt- analysis. 1 Introduction The hardness of solving mathematical problems such as integer factorization or the computation of discrete logarithms in finite fields and elliptic curve groups guarantees the security of most currently deployed cryptographic protocols. -
GROUP ACTIONS 1. Introduction the Groups Sn, An, and (For N ≥ 3)
GROUP ACTIONS KEITH CONRAD 1. Introduction The groups Sn, An, and (for n ≥ 3) Dn behave, by their definitions, as permutations on certain sets. The groups Sn and An both permute the set f1; 2; : : : ; ng and Dn can be considered as a group of permutations of a regular n-gon, or even just of its n vertices, since rigid motions of the vertices determine where the rest of the n-gon goes. If we label the vertices of the n-gon in a definite manner by the numbers from 1 to n then we can view Dn as a subgroup of Sn. For instance, the labeling of the square below lets us regard the 90 degree counterclockwise rotation r in D4 as (1234) and the reflection s across the horizontal line bisecting the square as (24). The rest of the elements of D4, as permutations of the vertices, are in the table below the square. 2 3 1 4 1 r r2 r3 s rs r2s r3s (1) (1234) (13)(24) (1432) (24) (12)(34) (13) (14)(23) If we label the vertices in a different way (e.g., swap the labels 1 and 2), we turn the elements of D4 into a different subgroup of S4. More abstractly, if we are given a set X (not necessarily the set of vertices of a square), then the set Sym(X) of all permutations of X is a group under composition, and the subgroup Alt(X) of even permutations of X is a group under composition. If we list the elements of X in a definite order, say as X = fx1; : : : ; xng, then we can think about Sym(X) as Sn and Alt(X) as An, but a listing in a different order leads to different identifications 1 of Sym(X) with Sn and Alt(X) with An. -
Mathematics of the Rubik's Cube
Mathematics of the Rubik's cube Associate Professor W. D. Joyner Spring Semester, 1996{7 2 \By and large it is uniformly true that in mathematics that there is a time lapse between a mathematical discovery and the moment it becomes useful; and that this lapse can be anything from 30 to 100 years, in some cases even more; and that the whole system seems to function without any direction, without any reference to usefulness, and without any desire to do things which are useful." John von Neumann COLLECTED WORKS, VI, p. 489 For more mathematical quotes, see the first page of each chapter below, [M], [S] or the www page at http://math.furman.edu/~mwoodard/mquot. html 3 \There are some things which cannot be learned quickly, and time, which is all we have, must be paid heavily for their acquiring. They are the very simplest things, and because it takes a man's life to know them the little new that each man gets from life is very costly and the only heritage he has to leave." Ernest Hemingway (From A. E. Hotchner, PAPA HEMMINGWAY, Random House, NY, 1966) 4 Contents 0 Introduction 13 1 Logic and sets 15 1.1 Logic................................ 15 1.1.1 Expressing an everyday sentence symbolically..... 18 1.2 Sets................................ 19 2 Functions, matrices, relations and counting 23 2.1 Functions............................. 23 2.2 Functions on vectors....................... 28 2.2.1 History........................... 28 2.2.2 3 × 3 matrices....................... 29 2.2.3 Matrix multiplication, inverses.............. 30 2.2.4 Muliplication and inverses............... -
Arxiv:1805.04179V2
The Hidden Subgroup Problem and Post-quantum Group-based Cryptography Kelsey Horan1 and Delaram Kahrobaei2,3 1 The Graduate Center, CUNY, USA [email protected] 2 The Graduate Center and NYCCT, CUNY 3 New York University, USA [email protected] ⋆ Abstract. In this paper we discuss the Hidden Subgroup Problem (HSP) in relation to post-quantum cryptography. We review the relationship between HSP and other computational problems discuss an optimal so- lution method, and review the known results about the quantum com- plexity of HSP. We also overview some platforms for group-based cryp- tosystems. Notably, efficient algorithms for solving HSP in the proposed infinite group platforms are not yet known. Keywords: Hidden Subgroup Problem, Quantum Computation, Post-Quantum Cryptography, Group-based Cryptography 1 Introduction In August 2015 the National Security Agency (NSA) announced plans to upgrade security standards; the goal is to replace all deployed cryptographic protocols with quantum secure protocols. This transition requires a new security standard to be accepted by the National Institute of Standards and Technology (NIST). Proposals for quantum secure cryptosystems and protocols have been submitted for the standardization process. There are six main primitives currently pro- posed to be quantum-safe: (1) lattice-based (2) code-based (3) isogeny-based (4) multivariate-based (5) hash-based, and (6) group-based cryptographic schemes. arXiv:1805.04179v2 [cs.CR] 21 May 2018 One goal of cryptography, as it relates to complexity theory, is to analyze the complexity assumptions used as the basis for various cryptographic protocols and schemes. A central question is determining how to generate intractible instances of these problems upon which to implement an actual cryptographic scheme. -
Fully Graphical Treatment of the Quantum Algorithm for the Hidden Subgroup Problem
FULLY GRAPHICAL TREATMENT OF THE QUANTUM ALGORITHM FOR THE HIDDEN SUBGROUP PROBLEM STEFANO GOGIOSO AND ALEKS KISSINGER Quantum Group, University of Oxford, UK iCIS, Radboud University. Nijmegen, Netherlands Abstract. The abelian Hidden Subgroup Problem (HSP) is extremely general, and many problems with known quantum exponential speed-up (such as integers factorisation, the discrete logarithm and Simon's problem) can be seen as specific instances of it. The traditional presentation of the quantum protocol for the abelian HSP is low-level, and relies heavily on the the interplay between classical group theory and complex vector spaces. Instead, we give a high-level diagrammatic presentation which showcases the quantum structures truly at play. Specifically, we provide the first fully diagrammatic proof of correctness for the abelian HSP protocol, showing that strongly complementary observables are the key ingredient to its success. Being fully diagrammatic, our proof extends beyond the traditional case of finite-dimensional quantum theory: for example, we can use it to show that Simon's problem can be efficiently solved in real quantum theory, and to obtain a protocol that solves the HSP for certain infinite abelian groups. 1. Introduction The advent of quantum computing promises to solve a number number of problems which have until now proven intractable for classical computers. Amongst these, one of the most famous is Shor's algorithm [Sho95, EJ96]: it allows for an efficient solution of the integer factorisation problem and the discrete logarithm problem, the hardness of which underlies many of the cryptographic algorithms which we currently entrust with our digital security (such as RSA and DHKE). -
An Algebraic Approach to the Weyl Groupoid
An Algebraic Approach to the Weyl Groupoid Tristan Bice✩ Institute of Mathematics Czech Academy of Sciences Zitn´a25,ˇ 115 67 Prague, Czech Republic Abstract We unify the Kumjian-Renault Weyl groupoid construction with the Lawson- Lenz version of Exel’s tight groupoid construction. We do this by utilising only a weak algebraic fragment of the C*-algebra structure, namely its *-semigroup reduct. Fundamental properties like local compactness are also shown to remain valid in general classes of *-rings. Keywords: Weyl groupoid, tight groupoid, C*-algebra, inverse semigroup, *-semigroup, *-ring 2010 MSC: 06F05, 20M25, 20M30, 22A22, 46L05, 46L85, 47D03 1. Introduction 1.1. Background Renault’s groundbreaking thesis [Ren80] revealed the striking interplay be- tween ´etale groupoids and the C*-algebras they give rise to. Roughly speaking, the ´etale groupoid provides a more topological picture of the corresponding C*-algebra, with various key properties of the algebra, like nuclearity and sim- plicity (see [ADR00] and [CEP+19]), being determined in a straightforward way from the underlying ´etale groupoid. Naturally, this has led to the quest to find appropriate ´etale groupoid models for various C*-algebras. Two general methods have emerged for finding such models, namely arXiv:1911.08812v3 [math.OA] 20 Sep 2020 1. Exel’s tight groupoid construction from an inverse semigroup, and 2. Kumjian-Renault’s Weyl groupoid construction from a Cartan C*-subalgebra (see [Exe08], [Kum86] and [Ren08]). However, both of these have their limi- tations. For example, tight groupoids are always ample, which means the cor- responding C*-algebras always have lots of projections. On the other hand, the Weyl groupoid is always effective, which discounts many naturally arising groupoids. -
A Class of Totally Geodesic Foliations of Lie Groups
Proc. Indian Acad. Sci. (Math. Sci.), Vol. 100, No. 1, April 1990, pp. 57-64. ~2 Printed in India. A class of totally geodesic foliations of Lie groups G SANTHANAM School of Mathematics. Tata Institute of Fundamental Research, Homi Bhabha Road, Bombay 400005, India MS received 4 October 1988; revised 25 May 1989 A~traet. This paper is devoted to classifying the foliations of G with leaves of the form .qKh - t where G is a compact, connected and simply connected L,c group and K is a connected closed subgroup of G such that G/K is a rank-I Riemannian symmetric space. In the case when G/K =S", the homotopy type of space of such foliations is also given. Keywords. Foliations; rank-I Riemannian symmetric space; cutlocus. I. Introduction The study of fibrations of spheres by great spheres is a very interesting problem in geometry and it is very important in the theory of Blaschke manifolds. In [l], Gluck and Warner have studied the great circle fibrations of the three spheres. In that paper they have proved very interesting results. When we look at the problem group theoretically, we see that all the results of [1] go through, for foliations of G with leaves of the form gKh- 1 where G is a compact, connected and simply connected Lie group and K is a connected closed subgroup of G such that G/K is a rank- l Riemannian symmetric space (see [-2]), except perhaps the theorem 3 for the pair (G, K) such that G/K=CP n, HP ~ etc. -
Distortion of Dimension by Metric Space-Valued Sobolev Mappings Lecture II
Distortion of dimension by metric space-valued Sobolev mappings Lecture II Jeremy Tyson University of Illinois at Urbana-Champaign Metric Spaces: Analysis, Embeddings into Banach Spaces, Applications Texas A&M University College Station, TX 8 July 2016 Outline Lecture I. Sobolev and quasiconformal mappings in Euclidean space Lecture II. Sobolev mappings between metric spaces Lecture III. Dimension distortion theorems for Sobolev and quasiconformal mappings defined from the sub-Riemannian Heisenberg group f homeo in Rn, n ≥ 2 Gehring metric QC ) analytic QC ) geometric QC modulus) estimates (local) QS f : X ! Y homeo between proper Q-regular mms satisfying Q-PI, Q > 1 0 metric QC HK=)98 QS f : X ! Y homeo between proper Q-regular mms 0 . geometric QC T(98 QS Motivation: quasiconformal mappings in metric spaces The theory of analysis in metric measure spaces originates in two papers of Juha Heinonen and Pekka Koskela: ‘Definitions of quasiconformality', Invent. Math., 1995 `QC maps in metric spaces of controlled geometry', Acta Math., 1998 The latter paper introduced the concept of p-Poincar´einequality on a metric measure space, which has become the standard axiom for first-order analysis. f : X ! Y homeo between proper Q-regular mms satisfying Q-PI, Q > 1 0 metric QC HK=)98 QS f : X ! Y homeo between proper Q-regular mms 0 . geometric QC T(98 QS Motivation: quasiconformal mappings in metric spaces The theory of analysis in metric measure spaces originates in two papers of Juha Heinonen and Pekka Koskela: ‘Definitions of quasiconformality', Invent. Math., 1995 `QC maps in metric spaces of controlled geometry', Acta Math., 1998 The latter paper introduced the concept of p-Poincar´einequality on a metric measure space, which has become the standard axiom for first-order analysis. -
Quantum Factoring, Discrete Logarithms, and the Hidden Subgroup Problem
Q UANTUM C OMPUTATION QUANTUM FACTORING, DISCRETE LOGARITHMS, AND THE HIDDEN SUBGROUP PROBLEM Among the most remarkable successes of quantum computation are Shor’s efficient quantum algorithms for the computational tasks of integer factorization and the evaluation of discrete logarithms. This article reviews the essential ingredients of these algorithms and draws out the unifying generalization of the so-called hidden subgroup problem. uantum algorithms exploit quantum- these issues, including further applications such physical effects to provide new modes as the evaluation of discrete logarithms. I will of computation that are not available outline a unifying generalization of these ideas: Qto “conventional” (classical) comput- the so-called hidden subgroup problem, which is ers. In some cases, these modes provide efficient just a natural group-theoretic generalization of algorithms for computational tasks for which no the periodicity determination problem. Finally, efficient classical algorithm is known. The most we’ll examine some interesting open questions celebrated quantum algorithm to date is Shor’s related to the hidden subgroup problem for non- algorithm for integer factorization.1–3 It provides commutative groups, where future quantum al- a method for factoring any integer of n digits in gorithms might have a substantial impact. an amount of time (for example, in a number of computational steps), whose length grows less rapidly than O(n3). Thus, it is a polynomial time Periodicity algorithm in contrast to the best-known classi- Think of periodicity determination as a par- cal algorithm for this fundamental problem, ticular kind of pattern recognition. Quantum which runs in superpolynomial time of order computers can store and process a large volume exp(n1/3(log n)2/3). -
Graphs of Groups: Word Computations and Free Crossed Resolutions
Graphs of Groups: Word Computations and Free Crossed Resolutions Emma Jane Moore November 2000 Summary i Acknowledgements I would like to thank my supervisors, Prof. Ronnie Brown and Dr. Chris Wensley, for their support and guidance over the past three years. I am also grateful to Prof. Tim Porter for helpful discussions on category theory. Many thanks to my family and friends for their support and encouragement and to all the staff and students at the School of Mathematics with whom I had the pleasure of working. Finally thanks to EPSRC who paid my fees and supported me financially. ii Contents Introduction 1 1 Groupoids 4 1.1 Graphs, Categories, and Groupoids .................... 4 1.1.1 Graphs ................................ 5 1.1.2 Categories and Groupoids ..................... 6 1.2 Groups to Groupoids ............................ 12 1.2.1 Examples and Properties of Groupoids .............. 12 1.2.2 Free Groupoid and Words ..................... 15 1.2.3 Normal Subgroupoids and Quotient Groupoids .......... 17 1.2.4 Groupoid Cosets and Transversals ................. 18 1.2.5 Universal Groupoids ........................ 20 1.2.6 Groupoid Pushouts and Presentations .............. 24 2 Graphs of Groups and Normal Forms 29 2.1 Fundamental Groupoid of a Graph of Groups .............. 29 2.1.1 Graph of Groups .......................... 30 2.1.2 Fundamental Groupoid ....................... 31 2.1.3 Fundamental Group ........................ 34 2.1.4 Normal Form ............................ 35 2.1.5 Examples .............................. 41 2.1.6 Graph of Groupoids ........................ 47 2.2 Implementation ............................... 49 2.2.1 Normal Form and Knuth Bendix Methods ............ 50 iii 2.2.2 Implementation and GAP4 Output ................ 54 3 Total Groupoids and Total Spaces 61 3.1 Cylinders .................................