Can Quantum Machines Do It All?
What keeps SAT out of BQP?
Dan Boneh is an expert on cryptography, especially the use of advanced number theory, such as the Weil pairing. He is famous for his seminal work on identity based encryption with Matt Franklin, which uses the Weil pairing.
Today I want to recall an old result Dan and I proved years ago and mix in a new result.
When Peter Shor announced in 1994 his instantly famous result that there is a quantum factoring algorithm that runs in polynomial time, many of us were amazed. We quickly read his paper, tried to understand why it worked, and followed the proofs step-by-step. It was—is still—a beautiful result.
Yet there was something about the result that troubled me. Perhaps no one else was troubled, but I did not really understand why the theorem was true. Yes I could follow the steps, yes I could explain the result to my students, but I did not really understand it.
I have discussed this phenomenon before: proofs are not just a mechanical means to move a statement from the conjecture pile to the proved pile. No, proofs are much more—they need to convey why the result is really true. They need to not seem magical, which Peter’s proof seemed to me. Proofs need to explain what is really happening.
Now I will say that Scott Aaronson’s well-noted explanation does this for the central idea, but back then Dan and I had no Scott to guide us. So we did something else.
In order to understand what was going on, Dan and I decided the best way would be to try and generalize Peter’s theorem. This is a standard method in mathematics: one way to really see what is happening is to generalize a theorem. Doing this can often shed new light on why the original theorem is true, and also can be interesting in its own right.
I could give countless examples of this method, it is used so often in math. Here is an example from number theory that is later explained better—I believe—by a classic result from group theory. Consider Fermat’s Little Theorem:
Theorem:
Ifis a prime and
is an integer not divisible by
, then
There are many proofs of this fundamental theorem. See our friends at Wikipedia here for several proofs: They have proofs based on: counting necklaces, using modular arithmetic, using the binomial theorem, and using dynamical systems.
Each proof gives a different insight into why must be prime, why
cannot divide
, and why the theorem is true.
The proof that I personally feel best explains what is happening is the one based on Lagrange’s Theorem:
Theorem: In any finite group, the order of an element divides the order of the group.
As an aside Joseph Lagrange did not prove his theorem, but only discussed special cases in 1771. It was finally proved by Pietro Abbati and published in 1803. The proof of Fermat’s Little Theorem now follows since when is prime, the set of numbers
form a group under multiplication modulo .
Hidden Linear Functions
Dan and I began to look at what we called the hidden linear problem. A function from has period
provided
for all . We say that
is m-to-one provided at most
integers in the set
map to the same value in
. Note, if
is one-to-one, then it is m-to-one with
.
Let be a function from the integers
to some arbitrary set
. Say that f has hidden linear structure over
provided there are integers and some function
of period
so that
for all integers . Further we say that
is m-to-one provided
is.
Our conjecture, which eventually became a theorem is:
Theorem:
Suppose thatis a function that has a hidden linear structure over
which is at most m-to-one. Assume the conditions:
- Let
, so that
and
are at most polynomial in
.
- Let
be the smallest prime divisor of
, so that
.
For such a function
, in quantum polynomial time in
we can recover the values of
modulo
from an oracle for
.
Note that the added conditions are critical. If the function were constant then there would be no way to reconstruct the
‘s: there must be some limit on how much it collapses. The second condition makes the values of the
‘s make sense modulo
.
Look at our paper for details. The above theorem is strong enough to prove both factoring and discrete logarithm are in polynomial quantum time. This already indicated that we had made some progress. In Shor’s paper he uses different but similar arguments to handle factoring and the discrete logarithm. I personally thought that our proof helped me have a greater understanding of Shor’s brilliant work.
By the way, proving this theorem was hard. We used the same type of quantum algorithm that Peter did. But the fact that was not one-to-one created serious difficulties for us.
Sometimes relaxing from a constant to `polynomial’ is a walk in the park, but not this time… I recall many times that one of us wanted to give up, but eventually we found the key trick. In the one-to-one case—the case that occurs in Peter’s theorems—there is an exponential sum that must be estimated. This sum is quite easy to handle. However, in the poly-to-one case the sum that arose was much harder to bound. We finally found a trick: when trying to bound a sum, change the sum. More on this another time.
Quantum Detection of Periods
Dan and I could also prove the following theorem:
Theorem:
Suppose thathas period
, and no smaller period. Also let
be m-to-one. Add the conditions:
- Let
, so that
and
are at most polynomial in
.
- Let
be the smallest prime divisor of
, so that
.
For such a function
, in quantum polynomial time in
we can recover the the period
.
In Shor’s paper this theorem is essentially proved with : the so called bijective case. Obviously our result is a modest generalization to the case where the function can fail to be one-to-one, but a value in the range can only have a polynomial number of pre-images. Since then there have been much better improvements to the period solving problem. The current best results can recover the period provided the function
has small auto-correlation—see this for details. Indeed for quantum algorithms that only use
as an oracle, the current results are essentially best possible.
SAT
There is another reason that there may be no quantum algorithm for solving the general period finding problem. That is, given a small circuit—not an oracle—for the function , find its period. The reason is that the following is a theorem:
Theorem: The following two problems are equivalent via a random reduction:
- Finding an assignment to a
instance.
- Finding the period of a Boolean valued function given by a small circuit.
Note, the lower bounds of quantum complexity theory are mostly based on a black box argument—they assume that only oracle access is available to the function whose period you want. There is no way known to show that they apply when the function is given by a circuit. This follows since if
one could guess the period.
This will be an example of “evolving” a theorem from a trivial beginning to more-meaningful forms. At issue first are: how small is `small’ and what is the time on the reduction? Then the main issue will become, how close are the resulting cases of period-finding to ones that quantum algorithms can handle?
First we prove a version where `small’ means polynomial, the reduction is deterministic polynomial time, and the cases of periodicity involved are trivial. Namely, given an instance formula for
, let
be the circuit that on input an assignment
outputs
. If
is not satisfiable then the function
computed by
is identically zero and so has period
. If
is true on the all-
assignment then we say yes. Else,
is satisfiable, so
but
for some other
, so
does not have period
. It may not have any period, which is what makes this trivial. But we certainly know
has period
.
Amplifying Periods
Now we want always to have a period, in the case where
. This can be done by a simple padding trick. Let us use some number
of variables defining a value
, and define the circuit
by
. Then the function
always has a period dividing
—the question is whether that period is
or something larger.
Thus finding the period of a periodic function given by poly-size circuits is
-hard. Of course this
is far from bijective—it is just 0-1 valued. If we could make
bijective on this period, at least when the formula is satisfiable, then we would put
into
. How close can we come?
We start by arranging that when , with high probability at least one
we run across has a period of some prime order
, where finding
for this
is enough to say
. Take the above circuit
; we wish to see if it has an input
so that
. We can assume that
is unique, if it exists by using the famous result of Leslie Valiant and Vijay Vazirani.
A further simple random argument shows that we can also assume that the solution is a prime number. Here’s why: Consider flipping each input bit of
independently: since the proportion of primes up to
is order-of
, this will map the
to a prime number with reasonable probability, and we only need that our test succeeds on it once. In summary we can assume that
is either unsatisfiable or has some prime
as the unique solution.
Now let be the function
where is over all prime divisors of
. Then it is easy to see the following: If
is unsatisfiable, then
is identically
and has period
. If there is a unique prime
so that
, then
has period
. Therefore we have reduced solving
to period finding—where we can restrict attention to positive cases where the period has prime length and the function is
except for a
on the period start.
There is a small point, really a BIG point: the function does not have a poly-size circuit. In order to compute it we must factor
into it prime factors and then check each one,
, to see it makes
. However, factoring, currently, has algorithms that run in time roughly order-of
for
. Thus
will have circuits of this order of sub-exponential size, where the circuits themselves are also succinct. So long as `small’ means size
for some known
, we are OK.
With that point on hold, we can finally try to work on the period structure we have achieved. For arguments where
, we would like to provide values in
, or at least provide
different values. Not knowing
in advance may be a problem, but possibly inside the details of reducing to factoring in the previous paragraph, we may be able to assume that
is known.
Here is where we pause and say we’ve at least posed a non-trivial research idea. We may work on it tomorrow and find it doesn’t go any further. We might not put it in a paper yet. But in a blog at least we can see how many ideas get their birth and first steps, where hard theorems successfully raised in the past may give some fostering.
Open Problems
Is in
? This is the motivating question.
What other ideas for creating and modifying periods might be relevant?




Reminds me a bit of an approach that didn’t quite work: http://arxiv.org/abs/quant-ph/0105005 cool that the archive keeps all versions 🙂
h(x) does have a poly-size quantum circuit.
But making it injective on Z/q is still going to be hard.
This is more rigorous version of the theorem. The rest depends on your free will to understand.
Theorem
where
are polynomials at most degree 2.
For the polynomial
Proof
Let
Polynomial
By Cholesky decomposition
Now, why small fraction of people working on sum of squares programs did not go here. First, people realized that quartic polynomials of certain form encode NP-complete problem and did not look further. For example, Monique Laurent in her review about SOS state quartic polynomial encoding, but does not show anywhere, that it cannot be represented as sum of squares of other polynomials. Second, the major direction there is Positivestelensatz arising as a solution to Hilbert 17th problem, i.e. every positive polynomial can be represented as sum of squared polynomial fractions. If someone find the efficient way to solve it, than there would be an algorithm to find minimum of arbitrary polynomial. This is much more general case (and therefore much more difficult). For establishing P=NP it is sufficient to find a class of polynomials that can be solved by SOS and that encode all instances of some NP-complete problem, that is within framework of NZ Shor 1987 and Parrilo thesis 2000, another relevant reference Parrilo Sturmfels 2003.
The asymmetry arising from the enormous bias toward
multiplied by the attraction produced by Clay prize, and all-corner advertisement of the importance of the problem renders collaborative approach toward solving this problem almost impossible. The polymath atmosphere, where everyone can draw random crazy idea is immediately kicked back by the guards of the field. Therefore, the intention of drawing huge attention to the problem with relatively small monetary prize given the commonly assumed risks, and the absence of “polymath” atmosphere, seems to me unethical. Therefore, I consciously will not write any form of formal paper on P=NP, for at least formally be ineligible for the prize. Even if the proof above is not rigorous enough, from this point I think it is easy to patch it. This is cranky, and therefore,
Sincerely yours,
Crackpot Trisector
this is a great one………………..
Thanks for patching. The mental illness is not when you talk to yourself, but when then no one understands you. Relax for a moment, the proof is wrong. e.g.
can be negative, since vectors
are not orthogonal. By subtracting more and more of matrix
it is possible to bring
to another global minimum, then repeat that with all the axes that are still negative definite, until there are
zeros with
orthogonal to each other. Then one need to construct a sum of squares representation of that minimal polynomial (could we say extreme? I think they are extreme in more narrow sense that Choi and Lam definition), or find counter example. I do not have that construction right now. You can help me finding counter example.
People, this is my last post. Besides emotions I was trying to be as constructive as my limited ability to think allows. There is no place to discuss this issues, and I’m too stupid to run polymath. The question whether
is sum of squares for polynomials
real symmetric matrix. This is easy to formulate, and should not require very high-ended math to solve it, it is also very concrete. Positive answer settles down P vs NP question. To my little knowledge, the problem is still open. I’m offering $200 for the first one who will provide counter-example. I’m giving you some hints to make your life easier. If you ever prove (will not be lazy) there are no counter-examples (e.g.
that is not sum of squares), you do not have my permission to use my name in connection to this and related problems (laugh here). I removed all the posts from my blog, in couple of month search engine cash will gone, and you are free to go.
For arbitrary set of linearly independent vectors
and
, for the set of orthogonal vectors it is easy to find 
A friend of mine said that Sakai and Kasahara invented Identity-based Cryptography based on the Weil Pairing. They presented their work on a Japanese conference called SCIS, I guess.
I just think that it is really sad that these guys didn’t had their work recognized. Someone should try to invalidate Boneh’s patent.
That’s just my opinion, the opinion of a student.
In the references of this paper by Sakai and Kasahara, citation [4] is Sakai-Ohgishi-Kasahara, “Cryptosystems based on pairing over Elliptic Curve”, SCIS Jan 2001, while citation [5] is Boneh-Franklin, CRYPTO August 2001. Citation [2] is Sakai-Ohgishi-Kasahara, “Cryptosystems Based on Pairing” from SCIS 2000, while reference [1] is a TR version from 1999 that mentions elliptic curves.
The Boneh-Franklin paper (2003 journal version) cites the 2000 paper as using the pairing for key-exchange. So does this paper by Boneh and Boyen, in its first paragraph which shows key-exchange as one possible application.
This 2010 paper by Aniket Kate and Ian Goldberg says in its abstract, “In this paper, we design distributed PKG setup and private key extraction protocols for three important IBE schemes; namely, Boneh and Franklin’s BF-IBE, Sakai and Kasahara’s SK-IBE, and Boneh and Boyen’s BB1-IBE.” Perhaps they are regarded today as intrinsically different schemes.
Anyway, this shows the authors recognizing each other and their work being recognized separately by a third party. We have discoursed on independent discovery several times in this blog, where the community has reached equitable conclusions different from your opinion.
Dear KW Regan.
Thanks for the enlightment. It made me feel better about academic ethics.