10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Optimal quantum algorithm for polynomial interpolation

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We consider the number of quantum queries required to determine the coefficients of a degree-d polynomial over GF(q). A lower bound shown independently by Kane and Kutin and by Meyer and Pommersheim shows that d/2+1/2 quantum queries are needed to solve this problem with bounded error, whereas an algorithm of Boneh and Zhandry shows that d quantum queries are sufficient. We show that the lower bound is achievable: d/2+1/2 quantum queries suffice to determine the polynomial with bounded error. Furthermore, we show that d/2+1 queries suffice to achieve probability approaching 1 for large q. These upper bounds improve results of Boneh and Zhandry on the insecurity of cryptographic protocols against quantum attacks. We also show that our algorithm's success probability as a function of the number of queries is precisely optimal. Furthermore, the algorithm can be implemented with gate complexity poly(log q) with negligible decrease in the success probability. We end with a conjecture about the quantum query complexity of multivariate polynomial interpolation.

          Related collections

          Author and article information

          Journal
          2015-09-30
          2016-03-01
          Article
          10.4230/LIPIcs.ICALP.2016.16
          1509.09271
          3261cf04-295a-4e82-985d-d5294b46e11b

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          17 pages, minor improvements, added conjecture about multivariate interpolation
          quant-ph cs.CC cs.CR cs.DS

          Quantum physics & Field theory,Data structures & Algorithms,Theoretical computer science,Security & Cryptology

          Comments

          Comment on this article