{"id":380927,"date":"2018-11-06T16:58:13","date_gmt":"2018-11-07T00:58:13","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&#038;p=380927"},"modified":"2018-11-06T16:58:13","modified_gmt":"2018-11-07T00:58:13","slug":"quantum-algorithms-abelian-di%ef%ac%80erence-sets-applications-dihedral-hidden-subgroups","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/quantum-algorithms-abelian-di%ef%ac%80erence-sets-applications-dihedral-hidden-subgroups\/","title":{"rendered":"Quantum algorithms for abelian di?erence sets and applications to dihedral hidden subgroups"},"content":{"rendered":"<p>Di\ufb00erence sets are basic combinatorial structures that have applications in signal processing, coding theory, and cryptography. We consider the problem of identifying a shifted version of the characteristic function of a (known) di\ufb00erence set. We present a generic quantum algorithm that can be used to tackle any hidden shift problem for any di\ufb00erence set in any abelian group. We discuss special cases of this framework where the resulting quantum algorithm is e\ufb03cient. This includes: a) Paley di\ufb00erence sets based on quadratic residues in \ufb01nite \ufb01elds, which allows to recover the shifted Legendre function quantum algorithm, b) Hadamard di\ufb00erence sets, which allows to recover the shifted bent function quantum algorithm, and c) Singer di\ufb00erence sets based on \ufb01nite geometries. The latter class allows us to de\ufb01ne instances of the dihedral hidden subgroup problem that can be e\ufb03ciently solved on a quantum computer<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Di\ufb00erence sets are basic combinatorial structures that have applications in signal processing, coding theory, and cryptography. We consider the problem of identifying a shifted version of the characteristic function of a (known) di\ufb00erence set. We present a generic quantum algorithm that can be used to tackle any hidden shift problem for any di\ufb00erence set in [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":null,"msr_publishername":"Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik","msr_publisher_other":"","msr_booktitle":"Proceedings of the 11th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2016)","msr_chapter":"","msr_edition":"Leibniz International Proceedings in Informatics (LIPIcs)","msr_editors":"","msr_how_published":"","msr_isbn":"","msr_issue":"","msr_journal":"","msr_number":"","msr_organization":"","msr_pages_string":"8:1--8:16","msr_page_range_start":"8:01","msr_page_range_end":"8:16","msr_series":"","msr_volume":"","msr_copyright":"","msr_conference_name":"Proceedings of the 11th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2016)","msr_doi":"10.4230\/LIPIcs.TQC.2016.8","msr_arxiv_id":"","msr_s2_paper_id":"","msr_mag_id":"","msr_pubmed_id":"","msr_other_authors":"","msr_other_contributors":"","msr_speaker":"","msr_award":"","msr_affiliation":"","msr_institution":"","msr_host":"","msr_version":"","msr_duration":"","msr_original_fields_of_study":"","msr_release_tracker_id":"","msr_s2_match_type":"","msr_citation_count_updated":"","msr_published_date":"2016-09-16","msr_highlight_text":"","msr_notes":"Leibniz International Proceedings in Informatics (LIPIcs)","msr_longbiography":"","msr_publicationurl":"http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2016\/6689\/","msr_external_url":"","msr_secondary_video_url":"","msr_conference_url":"","msr_journal_url":"","msr_s2_pdf_url":"","msr_year":0,"msr_citation_count":0,"msr_influential_citations":0,"msr_reference_count":0,"msr_s2_match_confidence":0,"msr_microsoftintellectualproperty":true,"msr_s2_open_access":false,"msr_s2_author_ids":[],"msr_pub_ids":[],"msr_hide_image_in_river":0,"footnotes":""},"msr-research-highlight":[],"research-area":[243138],"msr-publication-type":[193716],"msr-publisher":[],"msr-focus-area":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-380927","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-quantum","msr-locale-en_us"],"msr_publishername":"Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik","msr_edition":"Leibniz International Proceedings in Informatics (LIPIcs)","msr_affiliation":"","msr_published_date":"2016-09-16","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"Proceedings of the 11th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2016)","msr_pages_string":"8:1--8:16","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"Leibniz International Proceedings in Informatics (LIPIcs)","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"380930","msr_publicationurl":"http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2016\/6689\/","msr_doi":"10.4230\/LIPIcs.TQC.2016.8","msr_publication_uploader":[{"type":"file","title":"1608.02005","viewUrl":"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/05\/1608.02005.pdf","id":380930,"label_id":0},{"type":"url","title":"http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2016\/6689\/","viewUrl":false,"id":false,"label_id":0},{"type":"doi","title":"10.4230\/LIPIcs.TQC.2016.8","viewUrl":false,"id":false,"label_id":0}],"msr_related_uploader":"","msr_citation_count":0,"msr_citation_count_updated":"","msr_s2_paper_id":"","msr_influential_citations":0,"msr_reference_count":0,"msr_arxiv_id":"","msr_s2_author_ids":[],"msr_s2_open_access":false,"msr_s2_pdf_url":null,"msr_attachments":[{"id":0,"url":"http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2016\/6689\/"}],"msr-author-ordering":[{"type":"text","value":"Martin Roetteler","user_id":0,"rest_url":false},{"type":"user_nicename","value":"martinro","user_id":32823,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=martinro"}],"msr_impact_theme":[],"msr_research_lab":[],"msr_event":[],"msr_group":[],"msr_project":[170888],"publication":[],"video":[],"msr-tool":[],"msr_publication_type":"inproceedings","related_content":{"projects":[{"ID":170888,"post_title":"Language-Integrated Quantum Operations: LIQUi|&gt;","post_name":"language-integrated-quantum-operations-liqui","post_type":"msr-project","post_date":"2011-12-19 10:19:35","post_modified":"2018-11-02 11:06:22","post_status":"publish","permalink":"https:\/\/www.microsoft.com\/en-us\/research\/project\/language-integrated-quantum-operations-liqui\/","post_excerpt":"LIQUi|&gt; is a software architecture and toolsuite for quantum computing. It includes a programming language, optimization and scheduling algorithms, and quantum simulators. LIQUi|&gt; can be used to translate a quantum algorithm written in the form of a high-level program into the low-level machine instructions for a quantum device. LIQUi|&gt; is being developed by the Quantum Architectures and Computation Group (QuArC)\u00a0at Microsoft Research. About LIQUi|&gt; To aid in the development and understanding of quantum protocols, quantum&hellip;","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170888"}]}}]},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/380927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":4,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/380927\/revisions"}],"predecessor-version":[{"id":548364,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/380927\/revisions\/548364"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=380927"}],"wp:term":[{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=380927"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=380927"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=380927"},{"taxonomy":"msr-publisher","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publisher?post=380927"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=380927"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=380927"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=380927"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=380927"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=380927"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=380927"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=380927"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=380927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}