{"id":899,"date":"2005-05-04T07:41:03","date_gmt":"2005-05-04T14:41:03","guid":{"rendered":"http:\/\/dabacon.org\/pontiff\/?p=899"},"modified":"2005-05-04T07:41:03","modified_gmt":"2005-05-04T14:41:03","slug":"did-we-overgeneralize-the-hidden-subgroup-problem","status":"publish","type":"post","link":"https:\/\/dabacon.org\/pontiff\/2005\/05\/04\/did-we-overgeneralize-the-hidden-subgroup-problem\/","title":{"rendered":"Did We Overgeneralize to the Hidden Subgroup Problem?"},"content":{"rendered":"<p>The most famous problem in quantum computing is the hidden subgroup problem.  In the hidden subgroup problem you are given access to an oracle which computers a function f.  This function is a function from a group G to some set with a promise on the function.  The promise is that f is constant and distinct on left cosets of some subgroup H of G.  The goal of the hidden subgroup problem is, by querring the function, to determine a generating set for the subgroup H.  We say that an algorithm for the hidden subgroup problem is efficient if it uses resources proportional to a polynomial in  the logarithm of the size of the group.<br \/>\nThe reason the hidden subgroup problem is famous is threefold.  The first reason is that when G is Abelian, efficiently solving the hidden subgroup problem leads to an efficient algorithm for factoring integers and for the discrete logarithm problem, i.e. to Shor&#8217;s algorithm(s).  The second reason is that efficiently solving the hidden subgroup problem when G is the symmetric group would lead to an efficient algorithm for the graph isomorphism problem.  The third reason is that efficiently solving the hidden subgroup problem when G is the dihedral group would lead to an efficient algorithm for certain shortest vector in a lattice problems.  The first of these reasons is a concrete reason: a quantum algorithm worked!  But for the second and third, no efficient quantum algorithm is known.<br \/>\nNow what I find interesting, is that for the second of these reasons, for graph isomorphism, one can get by with solving a much more restricted version of the hidden subgroup problem than the full hidden subgroup problem over the symmetric group.  The way to do this is to modify the problem to a problem I call the hidden subgroup conjugacy problem.  Call two subgroups, H and K conjugate to each other if there exists an element g of the group G such that gHg^{-1}=K.  In the hidden subgroup conjugacy problem, instead of identifying the subgroup (by returning a set of generators, for example) we require that you only identify which conjugacy the subgroup belongs to, i.e. the setup is the same: you are given an f which hides a subgroup H, but now instead of identifying the subgroup you only want to know which conjugacy class the subgroup belongs to.  It is easy to see that for the Ableian case, this reduces to the hidden subgroup problem: gHg^{-1}=H for all g in this case.  For graph isomorphism, the standard reduction to the hidden subgroup problem reduces to distinguishing between the subgroup being a trivial subgroup and the subgroup being a order two subgroup.  So efficiently solving the hidden subgroup conjugacy problem would lead to an efficient algorithm for graph isomorphism.  Interesting, the same does not seem to be true for the reduction from the hidden subgroup to certain shortest vector in a lattice problems,  although I haven&#8217;t thought hard about this.<br \/>\nSo the question I ask is, did we overgeneralize the hidden subgroup problem?  Did we generalize ourselves into a problem which is just too hard, while efficiently solving a smaller variant would lead to interesting new quantum algorithms?  I leave history to judge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The most famous problem in quantum computing is the hidden subgroup problem. In the hidden subgroup problem you are given access to an oracle which computers a function f. This function is a function from a group G to some set with a promise on the function. The promise is that f is constant and &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/dabacon.org\/pontiff\/2005\/05\/04\/did-we-overgeneralize-the-hidden-subgroup-problem\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Did We Overgeneralize to the Hidden Subgroup Problem?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,63],"tags":[],"class_list":["post-899","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-quantum"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/comments?post=899"}],"version-history":[{"count":0,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/899\/revisions"}],"wp:attachment":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/media?parent=899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/categories?post=899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/tags?post=899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}