2,494 research outputs found
Structure computation and discrete logarithms in finite abelian p-groups
We present a generic algorithm for computing discrete logarithms in a finite
abelian p-group H, improving the Pohlig-Hellman algorithm and its
generalization to noncyclic groups by Teske. We then give a direct method to
compute a basis for H without using a relation matrix. The problem of computing
a basis for some or all of the Sylow p-subgroups of an arbitrary finite abelian
group G is addressed, yielding a Monte Carlo algorithm to compute the structure
of G using O(|G|^0.5) group operations. These results also improve generic
algorithms for extracting pth roots in G.Comment: 23 pages, minor edit
Quantum algorithms for problems in number theory, algebraic geometry, and group theory
Quantum computers can execute algorithms that sometimes dramatically
outperform classical computation. Undoubtedly the best-known example of this is
Shor's discovery of an efficient quantum algorithm for factoring integers,
whereas the same problem appears to be intractable on classical computers.
Understanding what other computational problems can be solved significantly
faster using quantum algorithms is one of the major challenges in the theory of
quantum computation, and such algorithms motivate the formidable task of
building a large-scale quantum computer. This article will review the current
state of quantum algorithms, focusing on algorithms for problems with an
algebraic flavor that achieve an apparent superpolynomial speedup over
classical computation.Comment: 20 pages, lecture notes for 2010 Summer School on Diversities in
Quantum Computation/Information at Kinki Universit
The Hidden Subgroup Problem and Eigenvalue Estimation on a Quantum Computer
A quantum computer can efficiently find the order of an element in a group,
factors of composite integers, discrete logarithms, stabilisers in Abelian
groups, and `hidden' or `unknown' subgroups of Abelian groups. It is already
known how to phrase the first four problems as the estimation of eigenvalues of
certain unitary operators. Here we show how the solution to the more general
Abelian `hidden subgroup problem' can also be described and analysed as such.
We then point out how certain instances of these problems can be solved with
only one control qubit, or `flying qubits', instead of entire registers of
control qubits.Comment: 16 pages, 3 figures, LaTeX2e, to appear in Proceedings of the 1st
NASA International Conference on Quantum Computing and Quantum Communication
(Springer-Verlag
A Generic Approach to Searching for Jacobians
We consider the problem of finding cryptographically suitable Jacobians. By
applying a probabilistic generic algorithm to compute the zeta functions of low
genus curves drawn from an arbitrary family, we can search for Jacobians
containing a large subgroup of prime order. For a suitable distribution of
curves, the complexity is subexponential in genus 2, and O(N^{1/12}) in genus
3. We give examples of genus 2 and genus 3 hyperelliptic curves over prime
fields with group orders over 180 bits in size, improving previous results. Our
approach is particularly effective over low-degree extension fields, where in
genus 2 we find Jacobians over F_{p^2) and trace zero varieties over F_{p^3}
with near-prime orders up to 372 bits in size. For p = 2^{61}-1, the average
time to find a group with 244-bit near-prime order is under an hour on a PC.Comment: 22 pages, to appear in Mathematics of Computatio
Efficient quantum algorithms for some instances of the non-Abelian hidden subgroup problem
In this paper we show that certain special cases of the hidden subgroup
problem can be solved in polynomial time by a quantum algorithm. These special
cases involve finding hidden normal subgroups of solvable groups and
permutation groups, finding hidden subgroups of groups with small commutator
subgroup and of groups admitting an elementary Abelian normal 2-subgroup of
small index or with cyclic factor group.Comment: 10 page
Security Estimates for Quadratic Field Based Cryptosystems
We describe implementations for solving the discrete logarithm problem in the
class group of an imaginary quadratic field and in the infrastructure of a real
quadratic field. The algorithms used incorporate improvements over
previously-used algorithms, and extensive numerical results are presented
demonstrating their efficiency. This data is used as the basis for
extrapolations, used to provide recommendations for parameter sizes providing
approximately the same level of security as block ciphers with
and -bit symmetric keys
- …