36 research outputs found

    The Power of Quantum Fourier Sampling

    Get PDF
    A line of work initiated by Terhal and DiVincenzo and Bremner, Jozsa, and Shepherd, shows that quantum computers can efficiently sample from probability distributions that cannot be exactly sampled efficiently on a classical computer, unless the PH collapses. Aaronson and Arkhipov take this further by considering a distribution that can be sampled efficiently by linear optical quantum computation, that under two feasible conjectures, cannot even be approximately sampled classically within bounded total variation distance, unless the PH collapses. In this work we use Quantum Fourier Sampling to construct a class of distributions that can be sampled by a quantum computer. We then argue that these distributions cannot be approximately sampled classically, unless the PH collapses, under variants of the Aaronson and Arkhipov conjectures. In particular, we show a general class of quantumly sampleable distributions each of which is based on an "Efficiently Specifiable" polynomial, for which a classical approximate sampler implies an average-case approximation. This class of polynomials contains the Permanent but also includes, for example, the Hamiltonian Cycle polynomial, and many other familiar #P-hard polynomials. Although our construction, unlike that proposed by Aaronson and Arkhipov, likely requires a universal quantum computer, we are able to use this additional power to weaken the conjectures needed to prove approximate sampling hardness results

    Fast generalized DFTs for all finite groups

    Get PDF
    For any finite group GG, we give an arithmetic algorithm to compute generalized Discrete Fourier Transforms (DFTs) with respect to GG, using O(Gω/2+ϵ)O(|G|^{\omega/2 + \epsilon}) operations, for any ϵ>0\epsilon > 0. Here, ω\omega is the exponent of matrix multiplication

    A new algorithm for fast generalized DFTs

    Full text link
    We give an new arithmetic algorithm to compute the generalized Discrete Fourier Transform (DFT) over finite groups GG. The new algorithm uses O(Gω/2+o(1))O(|G|^{\omega/2 + o(1)}) operations to compute the generalized DFT over finite groups of Lie type, including the linear, orthogonal, and symplectic families and their variants, as well as all finite simple groups of Lie type. Here ω\omega is the exponent of matrix multiplication, so the exponent ω/2\omega/2 is optimal if ω=2\omega = 2. Previously, "exponent one" algorithms were known for supersolvable groups and the symmetric and alternating groups. No exponent one algorithms were known (even under the assumption ω=2\omega = 2) for families of linear groups of fixed dimension, and indeed the previous best-known algorithm for SL2(Fq)SL_2(F_q) had exponent 4/34/3 despite being the focus of significant effort. We unconditionally achieve exponent at most 1.191.19 for this group, and exponent one if ω=2\omega = 2. Our algorithm also yields an improved exponent for computing the generalized DFT over general finite groups GG, which beats the longstanding previous best upper bound, for any ω\omega. In particular, assuming ω=2\omega = 2, we achieve exponent 2\sqrt{2}, while the previous best was 3/23/2

    Algebraic Problems Equivalent to Beating Exponent 3/2 for Polynomial Factorization over Finite Fields

    Get PDF
    The fastest known algorithm for factoring univariate polynomials over finite fields is the Kedlaya-Umans (fast modular composition) implementation of the Kaltofen-Shoup algorithm. It is randomized and takes O~(n3/2logq+nlog2q)\widetilde{O}(n^{3/2}\log q + n \log^2 q) time to factor polynomials of degree nn over the finite field Fq\mathbb{F}_q with qq elements. A significant open problem is if the 3/23/2 exponent can be improved. We study a collection of algebraic problems and establish a web of reductions between them. A consequence is that an algorithm for any one of these problems with exponent better than 3/23/2 would yield an algorithm for polynomial factorization with exponent better than 3/23/2

    Pseudorandomness of the Sticky Random Walk

    Full text link
    We extend the pseudorandomness of random walks on expander graphs using the sticky random walk. Building on prior works, it was recently shown that expander random walks can fool all symmetric functions in total variation distance (TVD) upto an O(λ(pminf)O(p))O(\lambda(\frac{p}{\min f})^{O(p)}) error, where λ\lambda is the second largest eigenvalue of the expander, pp is the size of the arbitrary alphabet used to label the vertices, and minf=minb[p]fb\min f = \min_{b\in[p]} f_b, where fbf_b is the fraction of vertices labeled bb in the graph. Golowich and Vadhan conjecture that the dependency on the (pminf)O(p)(\frac{p}{\min f})^{O(p)} term is not tight. In this paper, we resolve the conjecture in the affirmative for a family of expanders. We present a generalization of the sticky random walk for which Golowich and Vadhan predict a TVD upper bound of O(λpO(p))O(\lambda p^{O(p)}) using a Fourier-analytic approach. For this family of graphs, we use a combinatorial approach involving the Krawtchouk functions to derive a strengthened TVD of O(λ)O(\lambda). Furthermore, we present equivalencies between the generalized sticky random walk, and, using linear-algebraic techniques, show that the generalized sticky random walk parameterizes an infinite family of expander graphs.Comment: 21 pages, 2 figure

    Special Section On Foundations of Computer Science

    Get PDF
    This special section comprises eight fully refereed papers whose extended abstracts were presented at the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007) in Providence, Rhode Island, October 21–23, 2007. The unrefereed conference versions of these papers were published by IEEE in the FOCS 2007 proceedings

    Which groups are amenable to proving exponent two for matrix multiplication?

    Get PDF
    The Cohn-Umans group-theoretic approach to matrix multiplication suggests embedding matrix multiplication into group algebra multiplication, and bounding ω\omega in terms of the representation theory of the host group. This framework is general enough to capture the best known upper bounds on ω\omega and is conjectured to be powerful enough to prove ω=2\omega = 2, although finding a suitable group and constructing such an embedding has remained elusive. Recently it was shown, by a generalization of the proof of the Cap Set Conjecture, that abelian groups of bounded exponent cannot prove ω=2\omega = 2 in this framework, which ruled out a family of potential constructions in the literature. In this paper we study nonabelian groups as potential hosts for an embedding. We prove two main results: (1) We show that a large class of nonabelian groups---nilpotent groups of bounded exponent satisfying a mild additional condition---cannot prove ω=2\omega = 2 in this framework. We do this by showing that the shrinkage rate of powers of the augmentation ideal is similar to the shrinkage rate of the number of functions over (Z/pZ)n(\mathbb{Z}/p\mathbb{Z})^n that are degree dd polynomials; our proof technique can be seen as a generalization of the polynomial method used to resolve the Cap Set Conjecture. (2) We show that symmetric groups SnS_n cannot prove nontrivial bounds on ω\omega when the embedding is via three Young subgroups---subgroups of the form Sk1×Sk2××SkS_{k_1} \times S_{k_2} \times \dotsb \times S_{k_\ell}---which is a natural strategy that includes all known constructions in SnS_n. By developing techniques for negative results in this paper, we hope to catalyze a fruitful interplay between the search for constructions proving bounds on ω\omega and methods for ruling them out.Comment: 23 pages, 1 figur

    On Multidimensional and Monotone k-SUM

    Get PDF
    The well-known k-SUM conjecture is that integer k-SUM requires time Omega(n^{ceil{k/2}-o(1)}). Recent work has studied multidimensional k-SUM in F_p^d, where the best known algorithm takes time tilde O(n^{ceil{k/2}}). Bhattacharyya et al. [ICS 2011] proved a min(2^{Omega(d)},n^{Omega(k)}) lower bound for k-SUM in F_p^d under the Exponential Time Hypothesis. We give a more refined lower bound under the standard k-SUM conjecture: for sufficiently large p, k-SUM in F_p^d requires time Omega(n^{k/2-o(1)}) if k is even, and Omega(n^{ceil{k/2}-2k(log k)/(log p)-o(1)}) if k is odd. For a special case of the multidimensional problem, bounded monotone d-dimensional 3SUM, Chan and Lewenstein [STOC 2015] gave a surprising tilde O(n^{2-2/(d+13)}) algorithm using additive combinatorics. We show this algorithm is essentially optimal. To be more precise, bounded monotone d-dimensional 3SUM requires time Omega(n^{2-frac{4}{d}-o(1)}) under the standard 3SUM conjecture, and time Omega(n^{2-frac{2}{d}-o(1)}) under the so-called strong 3SUM conjecture. Thus, even though one might hope to further exploit the structural advantage of monotonicity, no substantial improvements beyond those obtained by Chan and Lewenstein are possible for bounded monotone d-dimensional 3SUM
    corecore