12,145 research outputs found
Quantum Commuting Circuits and Complexity of Ising Partition Functions
Instantaneous quantum polynomial-time (IQP) computation is a class of quantum
computation consisting only of commuting two-qubit gates and is not universal
in the sense of standard quantum computation. Nevertheless, it has been shown
that if there is a classical algorithm that can simulate IQP efficiently, the
polynomial hierarchy (PH) collapses at the third level, which is highly
implausible. However, the origin of the classical intractability is still less
understood. Here we establish a relationship between IQP and computational
complexity of the partition functions of Ising models. We apply the established
relationship in two opposite directions. One direction is to find subclasses of
IQP that are classically efficiently simulatable in the strong sense, by using
exact solvability of certain types of Ising models. Another direction is
applying quantum computational complexity of IQP to investigate (im)possibility
of efficient classical approximations of Ising models with imaginary coupling
constants. Specifically, we show that there is no fully polynomial randomized
approximation scheme (FPRAS) for Ising models with almost all imaginary
coupling constants even on a planar graph of a bounded degree, unless the PH
collapses at the third level. Furthermore, we also show a multiplicative
approximation of such a class of Ising partition functions is at least as hard
as a multiplicative approximation for the output distribution of an arbitrary
quantum circuit.Comment: 36 pages, 5 figure
PPP-Completeness with Connections to Cryptography
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with
profound connections to the complexity of the fundamental cryptographic
primitives: collision-resistant hash functions and one-way permutations. In
contrast to most of the other subclasses of TFNP, no complete problem is known
for PPP. Our work identifies the first PPP-complete problem without any circuit
or Turing Machine given explicitly in the input, and thus we answer a
longstanding open question from [Papadimitriou1994]. Specifically, we show that
constrained-SIS (cSIS), a generalized version of the well-known Short Integer
Solution problem (SIS) from lattice-based cryptography, is PPP-complete.
In order to give intuition behind our reduction for constrained-SIS, we
identify another PPP-complete problem with a circuit in the input but closely
related to lattice problems. We call this problem BLICHFELDT and it is the
computational problem associated with Blichfeldt's fundamental theorem in the
theory of lattices.
Building on the inherent connection of PPP with collision-resistant hash
functions, we use our completeness result to construct the first natural hash
function family that captures the hardness of all collision-resistant hash
functions in a worst-case sense, i.e. it is natural and universal in the
worst-case. The close resemblance of our hash function family with SIS, leads
us to the first candidate collision-resistant hash function that is both
natural and universal in an average-case sense.
Finally, our results enrich our understanding of the connections between PPP,
lattice problems and other concrete cryptographic assumptions, such as the
discrete logarithm problem over general groups
On implicational bases of closure systems with unique critical sets
We show that every optimum basis of a finite closure system, in D.Maier's
sense, is also right-side optimum, which is a parameter of a minimum CNF
representation of a Horn Boolean function. New parameters for the size of the
binary part are also established. We introduce a K-basis of a general closure
system, which is a refinement of the canonical basis of Duquenne and Guigues,
and discuss a polynomial algorithm to obtain it. We study closure systems with
the unique criticals and some of its subclasses, where the K-basis is unique. A
further refinement in the form of the E-basis is possible for closure systems
without D-cycles. There is a polynomial algorithm to recognize the D-relation
from a K-basis. Thus, closure systems without D-cycles can be effectively
recognized. While E-basis achieves an optimum in one of its parts, the
optimization of the others is an NP-complete problem.Comment: Presented on International Symposium of Artificial Intelligence and
Mathematics (ISAIM-2012), Ft. Lauderdale, FL, USA Results are included into
plenary talk on conference Universal Algebra and Lattice Theory, June 2012,
Szeged, Hungary 29 pages and 2 figure
Computational Complexity for Physicists
These lecture notes are an informal introduction to the theory of
computational complexity and its links to quantum computing and statistical
mechanics.Comment: references updated, reprint available from
http://itp.nat.uni-magdeburg.de/~mertens/papers/complexity.shtm
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory
The present survey reports on the state of the art of the different
cryptographic functionalities built upon the ring learning with errors problem
and its interplay with several classical problems in algebraic number theory.
The survey is based to a certain extent on an invited course given by the
author at the Basque Center for Applied Mathematics in September 2018.Comment: arXiv admin note: text overlap with arXiv:1508.01375 by other
authors/ comment of the author: quotation has been added to Theorem 5.
- …