-
Accelerating quantum imaginary-time evolution with random measurements
Authors:
Ioannis Kolotouros,
David Joseph,
Anand Kumar Narayanan
Abstract:
Quantum imaginary-time evolution (QITE) is a promising tool to prepare thermal or ground states of Hamiltonians, as convergence is guaranteed when the evolved state overlaps with the ground state. However, its implementation using a a hybrid quantum/classical approach, where the dynamics of the parameters of the quantum circuit are derived by McLachlan's variational principle is impractical as the…
▽ More
Quantum imaginary-time evolution (QITE) is a promising tool to prepare thermal or ground states of Hamiltonians, as convergence is guaranteed when the evolved state overlaps with the ground state. However, its implementation using a a hybrid quantum/classical approach, where the dynamics of the parameters of the quantum circuit are derived by McLachlan's variational principle is impractical as the number of parameters $m$ increases, since each step in the evolution takes $Θ(m^2)$ state preparations to calculate the quantum Fisher information matrix (QFIM). In this work, we accelerate QITE by rapid estimation of the QFIM, while conserving the convergence guarantees to the extent possible. To this end, we prove that if a parameterized state is rotated by a 2-design and measured in the computational basis, then the QFIM can be inferred from partial derivative cross correlations of the probability outcomes. One sample estimate costs only $Θ(m)$ state preparations, leading to rapid QFIM estimation when a few samples suffice. The second family of estimators take greater liberties and replace QFIMs with averaged classical Fisher information matrices (CFIMs). In an extreme special case optimized for rapid (over accurate) descent, just one CFIM sample is drawn. We justify the second estimator family by proving rapid descent. Guided by these results, we propose the random-measurement imaginary-time evolution (RMITE) algorithm, which we showcase and test in several molecular systems, with the goal of preparing ground states.
△ Less
Submitted 17 January, 2025; v1 submitted 3 July, 2024;
originally announced July 2024.
-
Finding dense sub-lattices as low-energy states of a Hamiltonian
Authors:
Júlia Barberà-Rodríguez,
Nicolas Gama,
Anand Kumar Narayanan,
David Joseph
Abstract:
Lattice-based cryptography has emerged as one of the most prominent candidates for post-quantum cryptography, projected to be secure against the imminent threat of large-scale fault-tolerant quantum computers. The Shortest Vector Problem (SVP) is to find the shortest non-zero vector in a given lattice. It is fundamental to lattice-based cryptography and believed to be hard even for quantum compute…
▽ More
Lattice-based cryptography has emerged as one of the most prominent candidates for post-quantum cryptography, projected to be secure against the imminent threat of large-scale fault-tolerant quantum computers. The Shortest Vector Problem (SVP) is to find the shortest non-zero vector in a given lattice. It is fundamental to lattice-based cryptography and believed to be hard even for quantum computers. We study a natural generalization of the SVP known as the $K$-Densest Sub-lattice Problem ($K$-DSP): to find the densest $K$-dimensional sub-lattice of a given lattice. We formulate $K$-DSP as finding the first excited state of a Z-basis Hamiltonian, making $K$-DSP amenable to investigation via an array of quantum algorithms, including Grover search, quantum Gibbs sampling, adiabatic, and Variational Quantum Algorithms. The complexity of the algorithms depends on the basis through which the input lattice is presented. We present a classical polynomial-time algorithm that takes an arbitrary input basis and preprocesses it into inputs suited to quantum algorithms. With preprocessing, we prove that $O(KN^2)$ qubits suffice for solving $K$-DSP for $N$ dimensional input lattices. We empirically demonstrate the performance of a Quantum Approximate Optimization Algorithm $K$-DSP solver for low dimensions, highlighting the influence of a good preprocessed input basis. We then discuss the hardness of $K$-DSP in relation to the SVP, to see if there is reason to build post-quantum cryptography on $K$-DSP. We devise a quantum algorithm that solves $K$-DSP with run-time exponent $(5KN\log{N})/2$. Therefore, for fixed $K$, $K$-DSP is no more than polynomially harder than the SVP.
△ Less
Submitted 7 November, 2024; v1 submitted 28 September, 2023;
originally announced September 2023.
-
On Decoding Cohen-Haeupler-Schulman Tree Codes
Authors:
Anand Kumar Narayanan,
Matthew Weidner
Abstract:
Tree codes, introduced by Schulman, are combinatorial structures essential to coding for interactive communication. An infinite family of tree codes with both rate and distance bounded by positive constants is called asymptotically good. Rate being constant is equivalent to the alphabet size being constant. Schulman proved that there are asymptotically good tree code families using the Lovasz loca…
▽ More
Tree codes, introduced by Schulman, are combinatorial structures essential to coding for interactive communication. An infinite family of tree codes with both rate and distance bounded by positive constants is called asymptotically good. Rate being constant is equivalent to the alphabet size being constant. Schulman proved that there are asymptotically good tree code families using the Lovasz local lemma, yet their explicit construction remains an outstanding open problem. In a major breakthrough, Cohen, Haeupler and Schulman constructed explicit tree code families with constant distance, but over an alphabet polylogarithmic in the length. Our main result is a randomized polynomial time decoding algorithm for these codes making novel use of the polynomial method. The number of errors corrected scales roughly as the block length to the three-fourths power, falling short of the constant fraction error correction guaranteed by the constant distance. We further present number theoretic variants of Cohen-Haeupler-Schulman codes, all correcting a constant fraction of errors with polylogarithmic alphabet size. Towards efficiently correcting close to a constant fraction of errors, we propose a speculative convex optimization approach inspired by compressed sensing.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
Subquadratic time encodable codes beating the Gilbert-Varshamov bound
Authors:
Anand Kumar Narayanan,
Matthew Weidner
Abstract:
We construct explicit algebraic geometry codes built from the Garcia-Stichtenoth function field tower beating the Gilbert-Varshamov bound for alphabet sizes at least 192. Messages are identied with functions in certain Riemann-Roch spaces associated with divisors supported on multiple places. Encoding amounts to evaluating these functions at degree one places. By exploiting algebraic structures pa…
▽ More
We construct explicit algebraic geometry codes built from the Garcia-Stichtenoth function field tower beating the Gilbert-Varshamov bound for alphabet sizes at least 192. Messages are identied with functions in certain Riemann-Roch spaces associated with divisors supported on multiple places. Encoding amounts to evaluating these functions at degree one places. By exploiting algebraic structures particular to the Garcia-Stichtenoth tower, we devise an intricate deterministic ω/2 < 1.19 runtime exponent encoding and 1+ω/2 < 2.19 expected runtime exponent randomized (unique and list) decoding algorithms. Here ω< 2.373 is the matrix multiplication exponent. If ω= 2, as widely believed, the encoding and decoding runtimes are respectively nearly linear and nearly quadratic. Prior to this work, encoding (resp. decoding) time of code families beating the Gilbert-Varshamov bound were quadratic (resp. cubic) or worse.
△ Less
Submitted 13 August, 2018; v1 submitted 28 December, 2017;
originally announced December 2017.
-
Drinfeld Modules with Complex Multiplication, Hasse Invariants and Factoring Polynomials over Finite Fields
Authors:
Javad Doliskani,
Anand Kumar Narayanan,
Éric Schost
Abstract:
We present a novel randomized algorithm to factor polynomials over a finite field $\F_q$ of odd characteristic using rank $2$ Drinfeld modules with complex multiplication. The main idea is to compute a lift of the Hasse invariant (modulo the polynomial $f \in \F_q[x]$ to be factored) with respect to a random Drinfeld module $φ$ with complex multiplication. Factors of $f$ supported on prime ideals…
▽ More
We present a novel randomized algorithm to factor polynomials over a finite field $\F_q$ of odd characteristic using rank $2$ Drinfeld modules with complex multiplication. The main idea is to compute a lift of the Hasse invariant (modulo the polynomial $f \in \F_q[x]$ to be factored) with respect to a random Drinfeld module $φ$ with complex multiplication. Factors of $f$ supported on prime ideals with supersingular reduction at $φ$ have vanishing Hasse invariant and can be separated from the rest. Incorporating a Drinfeld module analogue of Deligne's congruence, we devise an algorithm to compute the Hasse invariant lift, which turns out to be the crux of our algorithm. The resulting expected runtime of $n^{3/2+\varepsilon} (\log q)^{1+o(1)}+n^{1+\varepsilon} (\log q)^{2+o(1)}$ to factor polynomials of degree $n$ over $\F_q$ matches the fastest previously known algorithm, the Kedlaya-Umans implementation of the Kaltofen-Shoup algorithm.
△ Less
Submitted 26 August, 2018; v1 submitted 2 December, 2017;
originally announced December 2017.
-
Algebraic Problems Equivalent to Beating Exponent 3/2 for Polynomial Factorization over Finite Fields
Authors:
Zeyu Guo,
Anand Kumar Narayanan,
Chris Umans
Abstract:
The fastest known algorithm for factoring univariate polynomials over finite fields is the Kedlaya-Umans (fast modular composition) implementation of the Kaltofen-Shoup algorithm. It is randomized and takes $\widetilde{O}(n^{3/2}\log q + n \log^2 q)$ time to factor polynomials of degree $n$ over the finite field $\mathbb{F}_q$ with $q$ elements. A significant open problem is if the $3/2$ exponent…
▽ More
The fastest known algorithm for factoring univariate polynomials over finite fields is the Kedlaya-Umans (fast modular composition) implementation of the Kaltofen-Shoup algorithm. It is randomized and takes $\widetilde{O}(n^{3/2}\log q + n \log^2 q)$ time to factor polynomials of degree $n$ over the finite field $\mathbb{F}_q$ with $q$ elements. A significant open problem is if the $3/2$ exponent can be improved. We study a collection of algebraic problems and establish a web of reductions between them. A consequence is that an algorithm for any one of these problems with exponent better than $3/2$ would yield an algorithm for polynomial factorization with exponent better than $3/2$.
△ Less
Submitted 14 June, 2016;
originally announced June 2016.
-
Factoring Polynomials over Finite Fields using Drinfeld Modules with Complex Multiplication
Authors:
Anand Kumar Narayanan
Abstract:
We present novel algorithms to factor polynomials over a finite field $\F_q$ of odd characteristic using rank $2$ Drinfeld modules with complex multiplication. The main idea is to compute a lift of the Hasse invariant (modulo the polynomial $f(x) \in \F_q[x]$ to be factored) with respect to a Drinfeld module $φ$ with complex multiplication. Factors of $f(x)$ supported on prime ideals with supersin…
▽ More
We present novel algorithms to factor polynomials over a finite field $\F_q$ of odd characteristic using rank $2$ Drinfeld modules with complex multiplication. The main idea is to compute a lift of the Hasse invariant (modulo the polynomial $f(x) \in \F_q[x]$ to be factored) with respect to a Drinfeld module $φ$ with complex multiplication. Factors of $f(x)$ supported on prime ideals with supersingular reduction at $φ$ have vanishing Hasse invariant and can be separated from the rest. A Drinfeld module analogue of Deligne's congruence plays a key role in computing the Hasse invariant lift. We present two algorithms based on this idea. The first algorithm chooses Drinfeld modules with complex multiplication at random and has a quadratic expected run time. The second is a deterministic algorithm with $O(\sqrt{p})$ run time dependence on the characteristic $p$ of $\F_q$.
△ Less
Submitted 2 June, 2016;
originally announced June 2016.
-
Fast Computation of Isomorphisms Between Finite Fields Using Elliptic Curves
Authors:
Anand Kumar Narayanan
Abstract:
We propose a randomized algorithm to compute isomorphisms between finite fields using elliptic curves. To compute an isomorphism between two fields of cardinality $q^n$, our algorithm takes $$n^{1+o(1)} \log^{1+o(1)}q + \max_{\ell} \left(\ell^{n_\ell + 1+o(1)} \log^{2+o(1)} q + O(\ell \log^5q)\right)$$ time, where $\ell$ runs through primes dividing $n$ but not $q(q-1)$ and $n_\ell$ denotes the hi…
▽ More
We propose a randomized algorithm to compute isomorphisms between finite fields using elliptic curves. To compute an isomorphism between two fields of cardinality $q^n$, our algorithm takes $$n^{1+o(1)} \log^{1+o(1)}q + \max_{\ell} \left(\ell^{n_\ell + 1+o(1)} \log^{2+o(1)} q + O(\ell \log^5q)\right)$$ time, where $\ell$ runs through primes dividing $n$ but not $q(q-1)$ and $n_\ell$ denotes the highest power of $\ell$ dividing $n$. Prior to this work, the best known run time dependence on $n$ was quadratic. Our run time dependence on $n$ is at worst quadratic but is subquadratic if $n$ has no large prime factor. In particular, the $n$ for which our run time is nearly linear in $n$ have natural density at least $3/10$. The crux of our approach is finding a point on an elliptic curve of a prescribed prime power order or equivalently finding preimages under the Lang map on elliptic curves over finite fields. We formulate this as an open problem whose resolution would solve the finite field isomorphism problem with run time nearly linear in $n$.
△ Less
Submitted 13 August, 2018; v1 submitted 11 April, 2016;
originally announced April 2016.
-
Polynomial Factorization over Finite Fields By Computing Euler-Poincare Characteristics of Drinfeld Modules
Authors:
Anand Kumar Narayanan
Abstract:
We propose and rigorously analyze two randomized algorithms to factor univariate polynomials over finite fields using rank $2$ Drinfeld modules. The first algorithm estimates the degree of an irreducible factor of a polynomial from Euler-Poincare characteristics of random Drinfeld modules. Knowledge of a factor degree allows one to rapidly extract all factors of that degree. As a consequence, the…
▽ More
We propose and rigorously analyze two randomized algorithms to factor univariate polynomials over finite fields using rank $2$ Drinfeld modules. The first algorithm estimates the degree of an irreducible factor of a polynomial from Euler-Poincare characteristics of random Drinfeld modules. Knowledge of a factor degree allows one to rapidly extract all factors of that degree. As a consequence, the problem of factoring polynomials over finite fields in time nearly linear in the degree is reduced to finding Euler-Poincare characteristics of random Drinfeld modules with high probability. Notably, the worst case complexity of polynomial factorization over finite fields is reduced to the average case complexity of a problem concerning Drinfeld modules. The second algorithm is a random Drinfeld module analogue of Berlekamp's algorithm. During the course of its analysis, we prove a new bound on degree distributions in factorization patterns of polynomials over finite fields in certain short intervals.
△ Less
Submitted 11 July, 2016; v1 submitted 28 April, 2015;
originally announced April 2015.
-
Computing discrete logarithms in subfields of residue class rings
Authors:
Ming-Deh Huang,
Anand Kumar Narayanan
Abstract:
Recent breakthrough methods \cite{gggz,joux,bgjt} on computing discrete logarithms in small characteristic finite fields share an interesting feature in common with the earlier medium prime function field sieve method \cite{jl}. To solve discrete logarithms in a finite extension of a finite field $\F$, a polynomial $h(x) \in \F[x]$ of a special form is constructed with an irreducible factor…
▽ More
Recent breakthrough methods \cite{gggz,joux,bgjt} on computing discrete logarithms in small characteristic finite fields share an interesting feature in common with the earlier medium prime function field sieve method \cite{jl}. To solve discrete logarithms in a finite extension of a finite field $\F$, a polynomial $h(x) \in \F[x]$ of a special form is constructed with an irreducible factor $g(x) \in \F[x]$ of the desired degree. The special form of $h(x)$ is then exploited in generating multiplicative relations that hold in the residue class ring $\F[x]/h(x)\F[x]$ hence also in the target residue class field $\F[x]/g(x)\F[x]$. An interesting question in this context and addressed in this paper is: when and how does a set of relations on the residue class ring determine the discrete logarithms in the finite fields contained in it? We give necessary and sufficient conditions for a set of relations on the residue class ring to determine discrete logarithms in the finite fields contained in it. We also present efficient algorithms to derive discrete logarithms from the relations when the conditions are met. The derived necessary conditions allow us to clearly identify structural obstructions intrinsic to the special polynomial $h(x)$ in each of the aforementioned methods, and propose modifications to the selection of $h(x)$ so as to avoid obstructions.
△ Less
Submitted 26 February, 2014;
originally announced February 2014.
-
On the relation generation method of Joux for computing discrete logarithms
Authors:
Ming-Deh Huang,
Anand Kumar Narayanan
Abstract:
In \cite{joux}, Joux devised an algorithm to compute discrete logarithms between elements in a certain subset of the multiplicative group of an extension of the finite field $\mathbb{F}_{p^n}$ in time polynomial in $p$ and $n$. Shortly after, Barbulescu, Gaudry, Joux and Thome \cite{bgjt} proposed a descent algorithm that in $(p n)^{\mathcal{O}(\log n)}$ time projects an arbitrary element in…
▽ More
In \cite{joux}, Joux devised an algorithm to compute discrete logarithms between elements in a certain subset of the multiplicative group of an extension of the finite field $\mathbb{F}_{p^n}$ in time polynomial in $p$ and $n$. Shortly after, Barbulescu, Gaudry, Joux and Thome \cite{bgjt} proposed a descent algorithm that in $(p n)^{\mathcal{O}(\log n)}$ time projects an arbitrary element in $\mathbb{F}_{p^n}^\times$ as a product of powers of elements in the aforementioned subset. Together, these two algorithms yield a quasi-polynomial time algorithm for computing discrete logarithms in finite fields of small characteristic. The success of both the algorithms are reliant on heuristic assumptions. We identify obstructions that prevent certain heuristic assumptions they make from being true in general. Further, we describe methods to overcome these obstructions.
△ Less
Submitted 23 December, 2013; v1 submitted 5 December, 2013;
originally announced December 2013.
-
Computing Class Groups of Function Fields Using Stark Units
Authors:
Ming-Deh Huang,
Anand Kumar Narayanan
Abstract:
Let $k$ be a fixed finite geometric extension of the rational function field $\mathbb{F}_q(t)$. Let $F/k$ be a finite abelian extension such that there is an $\Fq$-rational place $\infty$ in $k$ which splits in $F/k$ and let $\mathcal{O}_F$ denote the integral closure in $F$ of the ring of functions in $k$ that are regular outside $\infty$. We describe algorithms for computing the divisor class nu…
▽ More
Let $k$ be a fixed finite geometric extension of the rational function field $\mathbb{F}_q(t)$. Let $F/k$ be a finite abelian extension such that there is an $\Fq$-rational place $\infty$ in $k$ which splits in $F/k$ and let $\mathcal{O}_F$ denote the integral closure in $F$ of the ring of functions in $k$ that are regular outside $\infty$. We describe algorithms for computing the divisor class number and in certain cases for computing the structure of the divisor class group and discrete logarithms between Galois conjugate divisors in the divisor class group of $F$. The algorithms are efficient when $F$ is a narrow ray class field or a small index subextension of a narrow ray class field.\\ \\ We prove that for all prime $\ell$ not dividing $q(q-1)[F:k]$, the structure of the $\ell$-part of the ideal class group $\p(\cO_F)$ of $\mathcal{O}_F$ is determined by Kolyvagin derivative classes that are constructed out of Euler systems associated with Stark units. This leads to an algorithm to compute the structure of the $\ell$ primary part of the divisor class group of a narrow ray class field for all primes $\ell$ not dividing $q(q-1)[F:k]$.
△ Less
Submitted 25 March, 2014; v1 submitted 3 November, 2013;
originally announced November 2013.
-
Finding Primitive Elements in Finite Fields of Small Characteristic
Authors:
Ming-Deh Huang,
Anand Kumar Narayanan
Abstract:
We describe a deterministic algorithm for finding a generating element of the multiplicative group of the finite field $\mathbb{F}_{p^n}$ where $p$ is a prime. In time polynomial in $p$ and $n$, the algorithm either outputs an element that is provably a generator or declares that it has failed in finding one. The algorithm relies on a relation generation technique in Joux's heuristically $L(1/4)$-…
▽ More
We describe a deterministic algorithm for finding a generating element of the multiplicative group of the finite field $\mathbb{F}_{p^n}$ where $p$ is a prime. In time polynomial in $p$ and $n$, the algorithm either outputs an element that is provably a generator or declares that it has failed in finding one. The algorithm relies on a relation generation technique in Joux's heuristically $L(1/4)$-method for discrete logarithm computation. Based on a heuristic assumption, the algorithm does succeed in finding a generator. For the special case when the order of $p$ in $(\mathbb{Z}/n\mathbb{Z})^\times$ is small (that is $(\log_p(n))^{\mathcal{O}(1)}$), we present a modification with greater guarantee of success while making weaker heuristic assumptions.
△ Less
Submitted 3 November, 2013; v1 submitted 3 April, 2013;
originally announced April 2013.
-
Folded Algebraic Geometric Codes From Galois Extensions
Authors:
Ming-Deh Huang,
Anand Kumar Narayanan
Abstract:
We describe a new class of list decodable codes based on Galois extensions of function fields and present a list decoding algorithm. These codes are obtained as a result of folding the set of rational places of a function field using certain elements (automorphisms) from the Galois group of the extension. This work is an extension of Folded Reed Solomon codes to the setting of Algebraic Geometri…
▽ More
We describe a new class of list decodable codes based on Galois extensions of function fields and present a list decoding algorithm. These codes are obtained as a result of folding the set of rational places of a function field using certain elements (automorphisms) from the Galois group of the extension. This work is an extension of Folded Reed Solomon codes to the setting of Algebraic Geometric codes. We describe two constructions based on this framework depending on if the order of the automorphism used to fold the code is large or small compared to the block length. When the automorphism is of large order, the codes have polynomially bounded list size in the worst case. This construction gives codes of rate $R$ over an alphabet of size independent of block length that can correct a fraction of $1-R-ε$ errors subject to the existence of asymptotically good towers of function fields with large automorphisms. The second construction addresses the case when the order of the element used to fold is small compared to the block length. In this case a heuristic analysis shows that for a random received word, the expected list size and the running time of the decoding algorithm are bounded by a polynomial in the block length. When applied to the Garcia-Stichtenoth tower, this yields codes of rate $R$ over an alphabet of size $(\frac{1}{ε^2})^{O(\frac{1}ε)}$, that can correct a fraction of $1-R-ε$ errors.
△ Less
Submitted 8 January, 2009;
originally announced January 2009.