The most famous problem in quantum computing is the hidden subgroup problem. In the hidden subgroup problem you are given access to an oracle which computers a function f. This function is a function from a group G to some set with a promise on the function. The promise is that f is constant and distinct on left cosets of some subgroup H of G. The goal of the hidden subgroup problem is, by querring the function, to determine a generating set for the subgroup H. We say that an algorithm for the hidden subgroup problem is efficient if it uses resources proportional to a polynomial in the logarithm of the size of the group.
The reason the hidden subgroup problem is famous is threefold. The first reason is that when G is Abelian, efficiently solving the hidden subgroup problem leads to an efficient algorithm for factoring integers and for the discrete logarithm problem, i.e. to Shor’s algorithm(s). The second reason is that efficiently solving the hidden subgroup problem when G is the symmetric group would lead to an efficient algorithm for the graph isomorphism problem. The third reason is that efficiently solving the hidden subgroup problem when G is the dihedral group would lead to an efficient algorithm for certain shortest vector in a lattice problems. The first of these reasons is a concrete reason: a quantum algorithm worked! But for the second and third, no efficient quantum algorithm is known.
Now what I find interesting, is that for the second of these reasons, for graph isomorphism, one can get by with solving a much more restricted version of the hidden subgroup problem than the full hidden subgroup problem over the symmetric group. The way to do this is to modify the problem to a problem I call the hidden subgroup conjugacy problem. Call two subgroups, H and K conjugate to each other if there exists an element g of the group G such that gHg^{-1}=K. In the hidden subgroup conjugacy problem, instead of identifying the subgroup (by returning a set of generators, for example) we require that you only identify which conjugacy the subgroup belongs to, i.e. the setup is the same: you are given an f which hides a subgroup H, but now instead of identifying the subgroup you only want to know which conjugacy class the subgroup belongs to. It is easy to see that for the Ableian case, this reduces to the hidden subgroup problem: gHg^{-1}=H for all g in this case. For graph isomorphism, the standard reduction to the hidden subgroup problem reduces to distinguishing between the subgroup being a trivial subgroup and the subgroup being a order two subgroup. So efficiently solving the hidden subgroup conjugacy problem would lead to an efficient algorithm for graph isomorphism. Interesting, the same does not seem to be true for the reduction from the hidden subgroup to certain shortest vector in a lattice problems, although I haven’t thought hard about this.
So the question I ask is, did we overgeneralize the hidden subgroup problem? Did we generalize ourselves into a problem which is just too hard, while efficiently solving a smaller variant would lead to interesting new quantum algorithms? I leave history to judge.
Seattlite
Sounds a bit like “satellite”, doesn’t it? Well, I made it to the big city of Seattle. My original route had to take a bit of a detour because I-80 was shut down in Wyoming due to snow storms. So instead I had to detour through Colorado where it snowed on me. Not that I got out of the car, except at gas stations.
Adios
Goodbye Santa Fe.
Tomorrow I head for the hills. Well actually I go around the hills at first and then over some hills and then over some more hills, and, well you get the picture.
I will miss green chiles, the “speculation” section at Borders, crystals with magical magical powers, the high mountain air, the aspin groves in fall, the good scientists at the Santa Fe Institute, tea time at the Institute, the convenient and terrific skiing, and the beautiful vistas of New Mexico.
I will not miss the running of red lights, the roads, crystals with magical magical powers, the hour long drive to 7a.m. flights in Albuquerque, and most of all, the fact that every metalic object I touch in this state gives me a nasty shock.
Bound Secrecy
One of the most fascinating early endeavours in quantum information theory was the discovery that pure bipartite quantum entanglement is a quantifiable resource. Thus, for instance, one can take many copies of the standard currency for bipartite pure entanglement, the singlet state, and create many copies of any other non-maximally entangled bipartite pure state. Similarly one can take many copies of a non-maximally entangled bipartite pure state and distill out copies of a singlet. The rates of these conversion processes is quantified by the Shannon entropy of one half of the non-maximally entangled state.
The situation, however, for mixed states is different. Here we find that there are states for which no pure entanglement can be distilled, but these mixed states are in fact entangled. These states are called bound entangled states because they require some pure entanglement in order to create them (thus the entanglement is bound into the mixed state.) Bound entangled states are strange beasts, being entangled, and yet not being able to be converted back to any sort of pure state entanglement currency.
One interesting use of a standard currency for bipartite pure state entanglement is in key generation. In these protocols, Alice and Bob distill noisy quantum states to obtain pure entangled states of some standard currency which can then be used to share a private key. Since an essential part of these protocols has been to distill pure entangled states, it seems, when you first think about it, that bound entangled states would not be useful for private key generation. However, this turns out to not be correct! Karol Horodecki, Michal Horodecki, Pawel Horodecki and Jonathan Oppenheim have shown (PRL 094, 160502 (2005), quant-ph/0309110) that one can obtain a secure key from bound entangled states! So, while bound entangled states often don’t like your standard non-bound entangled states, it turns out that for secret key generation, they are useful.
Talks
I’m beginning the process of putting my powerpoint talks online in powerpoint and html format. The first one is up and can be accessed by clicking on the cute little talks tab above. Or by clicking here
Weekend Wedding
Last weekend I went to a wedding in Redondo Beach for my friends Mel and West who I’ve known since my days back at Caltech. As you can guess, the maturity level of a group of Techers is very high:

Here we see my friend Lon and I playing with our food. Note that I grabbed an orange, while Lon grabbed a lemon. Poor Lon.
Here is a picture of my rental car being towed because I lost the key to the car.

Note that during that Bachelor party for this wedding I lost my cell phone and my drivers license.
If you decide to stop reading this blog because of the above damning information, I don’t blame you.
New Host
Back up and running. The reason for the downtime was not my being hacked (which I think was due to an insecurity in the WordPress version I was running and resulted in my index page being written over), but instead because I am transferring hosts in preparation for my move to Seattle. I found a pretty amazing deal at dreamhost.com where you can sign up for a year of hosting for like $9. The trick is to use the promotional code 777. Let me know if anyone detects anything funny about the host.
Hacked!
I’ve been hacked! Upgrading and securing. Stay with me.
Update: I’ll fix the style files tomorrow. Now I have to finish writing my talk for tomorrow.
Santa Fe, NM to Seattle, WA
At the end of next week, I’m driving from Santa Fe to Seattle. Today I googled a map of the trip.

Ouch.
Insulting Grandma
Doh! I too have been tying a granny knot instead of a reef knot.
Update: For extra protection, check out Ian’s secure knot
