Abstract 1 Introduction 2 Preliminaries 3 Quantum algorithm for testing subgraph-freeness 4 Collision-freeness lower bound 5 Testing 𝟑-colorability References

Quantum Property Testing in Sparse Directed Graphs

Simon Apers ORCID Université Paris Cité, CNRS, IRIF, Paris, France Frédéric Magniez ORCID Université Paris Cité, CNRS, IRIF, Paris, France Sayantan Sen ORCID Centre for Quantum Technologies, National University of Singapore, Singapore Dániel Szabó ORCID Université Paris Cité, CNRS, IRIF, Paris, France
Abstract

We initiate the study of quantum property testing in sparse directed graphs, and more particularly in the unidirectional model, where the algorithm is allowed to query only the outgoing edges of a vertex. In the classical unidirectional model, the problem of testing k-star-freeness, and more generally k-source-subgraph-freeness, is almost maximally hard for large k. We prove that this problem has almost quadratic advantage in the quantum setting. Moreover, we show that this advantage is nearly tight, by showing a quantum lower bound using the method of dual polynomials on an intermediate problem for a new, property testing version of the k-collision problem that was not studied before.

To illustrate that not all problems in graph property testing admit such a quantum speedup, we consider the problem of 3-colorability in the related undirected bounded-degree model, when graphs are now undirected. This problem is maximally hard to test classically, and we show that also quantumly it requires a linear number of queries.

Keywords and phrases:
property testing, quantum computing, bounded-degree directed graphs, dual polynomial method, collision finding
Category:
RANDOM
Copyright and License:
[Uncaptioned image] © Simon Apers, Frédéric Magniez, Sayantan Sen, and Dániel Szabó; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Streaming, sublinear and near linear time algorithms
; Theory of computation Quantum query complexity
Related Version:
Full Version: https://arxiv.org/abs/2410.05001 [9]
Acknowledgements:
The authors would like to thank the anonymous reviewers for their comments which improved the presentation of the paper.
Funding:
Research supported in part by the ERC Advanced Grant PARQ (grant agreement No 885394), the European QuantERA project QOPT (ERA-NET Cofund 2022-25), the French PEPR integrated projects EPiQ (ANR-22-PETQ-0007) and HQI (ANR-22-PNCQ-0002), the French ANR project QUOPS (ANR-22-CE47-0003-01), the National Research Foundation, Singapore through the National Quantum Office, hosted in A*STAR, under its Centre for Quantum Technologies Funding Initiative (S24Q2d0009), and the CQT Young Researcher Career Development Grant.
Editors:
Alina Ene and Eshan Chattopadhyay

1 Introduction

1.1 Context

In this modern big data era, the size of inputs has grown so much that even just reading the full input has become extremely expensive computationally. To tackle this challenge, the framework of property testing was initiated. It focuses on designing ultrafast algorithms (also known as “testers”) that read only a small part of the input, and distinguish inputs that satisfy some property from inputs that are “far” from satisfying it. As a possible use-case, when the exact computation is expensive, one can use property testing algorithms as a precursor to running the final algorithm. If the input does not pass the property testing test, we can safely reject it, without running the expensive final computation.

At the same time, the field of quantum computing has significantly influenced many computer science paradigms, including cryptography, algorithms, and large-scale data processing. This new perspective on computer science based on quantum physics has sparked many fresh research directions. This includes the topic of this work, which combines quantum computing and property testing. More specifically, we consider quantum algorithms for graph property testing.

Graphs are of paramount importance for instance when it comes to understanding large datasets, since they provide a natural way to represent and analyze complex relationships inside datasets. Goldreich, Goldwasser, and Ron [28] were the first to consider graphs in the context of property testing. Formally, given some form of query access to an unknown graph G on N vertices, and a property 𝒫 of interest, the goal is to distinguish with high probability if G satisfies the property 𝒫, or whether it is “far” from all graphs that satisfy 𝒫, with a suitable notion of farness. In [28], the “dense” model was considered, where a graph is accessed through adjacency queries: for a pair of vertices (u,v), the query reveals whether (u,v) is an edge in the graph. In this model, a graph G is ε-far from satisfying 𝒫 if one needs to add or remove at least εN2 edges of G to obtain a graph that satisfies 𝒫.

In a later work, Goldreich and Ron [29] introduced the “bounded-degree” model for testing sparse graphs, focusing on the properties of bipartiteness and expansion. In this model, a d-bounded degree graph G with N vertices is accessed by performing neighbor queries: for a vertex v and an integer i[d], the query (v,i) returns either the i-th neighbor of v, or some special symbol if v has less than i neighbors. The graph G is said to be ε-far from some property 𝒫, if one needs to add or delete at least εdN edges of G to obtain a graph that satisfies 𝒫. Over the last two decades, there has been a significant number of works in this model, and we refer the interested reader to the books by Goldreich [26] and Bhattacharyya and Yoshida [14] and several surveys [24, 40, 23, 41].

Some researchers have considered efficient quantum algorithms for testing both classical and quantum objects, see for instance [18, 6, 31, 12, 10] and the survey [36]. Notably, the authors in [7] initiated the study of bounded degree graph property testing in the quantum model. One important result in this context is the result of [12], who proved that there can be exponential quantum advantage in the bounded degree graph model of property testing. However, as mentioned in their paper, the graph property admitting the exponential quantum advantage is not a natural one.

1.2 Property testing of directed bounded degree graphs

While all of the aforementioned works consider undirected graphs, many real-world instances (such as the world wide web) actually correspond to directed graphs. Consequently, Bender and Ron [13] introduced a model of property testing for directed graphs, focusing on the properties of acyclicity and connectivity. Following that work, we open a new research line by studying quantum algorithms for testing directed graphs. As we will see, by doing so, we address new fundamental questions in the field of quantum complexity. Answering them requires using recent techniques and partially answering some new or open questions.

As described in [13], for bounded-degree directed graphs there are two natural query models: (i) the unidirectional model, where the algorithm is allowed to query the outgoing edges of a vertex, but not the incoming edges, and (ii) the bidirectional model, where the algorithm can query both the incoming and outgoing edges of a vertex. Interestingly, [13] showed that strong connectivity is testable in the bidirectional model (i.e., it can be tested with a number of queries that depends on ε but not on N), but it requires Ω(N) queries in the unidirectional model. Later, the testability of other graph properties like Eulerianity, vertex and edge connectivity [37, 46, 25, 21] was also shown in the bidirectional model. While there is a clear distinction between the two models, Czumaj, Peng and Sohler [22] showed that if a property is testable in the bidirectional model, then it has a tester with sublinear (i.e., o(N)) query complexity in the unidirectional model.

In this work, we consider a particularly important problem in the unidirectional model: the problem of testing subgraph-freeness. More precisely, we examine the problem of testing “k-source-subgraph-freeness”, where the goal is to test H-freeness for some constant-sized subgraph H with k “source components”, where a source component is a strongly connected subgraph that has no incoming edges. This problem was first studied by Hellweg and Sohler [32], and they provided a testing algorithm that performs O(N11/k) queries. They also proved a tight lower bound of Ω(N2/3) for the k=3 case (see [32, Theorem 1 and Theorem 3]). Very recently, Peng and Wang [38] proved a matching lower bound for any constant k. In particular, they showed that Ω(N11k) queries are necessary for testing k-star-freeness (which is a special case of testing k-source-subgraph-freeness) in the unidirectional model, for arbitrary k (see [38, Theorem 1.2]). Notice that asymptotically the complexity of testing k-star-freeness becomes Ω(N). This also proves that the aforementioned reduction of [22] can not be made much stronger: for the property of k-star-freeness, the separation between the query complexities in the bi- and unidirectional models is maximal, as this property can be tested using constant many queries in the bidirectional model.

1.3 Related works on collision finding

A closely related problem to finding k-stars in graphs is finding k-collisions in integer sequences. The two mentioned classical papers on subgraph-freeness testing [32, 38] actually consider a collision-type intermediate problem for proving their lower bounds. As we are also going to do so, let us look at some related, known results.

The problem of collision finding is a ubiquitous problem in the field of algorithm theory with wide applications in cryptography. Here, given a sequence s of N integers, the goal is to find a duplicate in s. If one has the guarantee that Θ(N) elements of the sequence are duplicated, which is the case for instance when the sequence consists of uniformly random integers from [N], it is well-known that classically Θ(N) queries are necessary and sufficient due to the birthday paradox. In the quantum model, this can be solved with query complexity Θ(N1/3) by the algorithm of Brassard, Høyer and Tapp [17]. The matching lower bound was first stated for a specific set of hard instances known as 2-to-1 (i.e., each integer appears exactly twice or not at all) by Aaronson and Shi [3]. For some constant integer k3, those results can be further extended to finding k-collisions in a random input with suitable alphabet size, so that it contains Θ(N) k-duplicates with high probability. The classical query complexity for this problem is Θ(N11/k) [32, 38], and quantumly it is Θ(N12(112k1)) [34]. The situation is more complex for non-random inputs.

Remarkably, the complexity of testing k-collision-freeness (i.e., the absence of k-collisions) is harder to settle on the lower bound side than the finding version. In this work, we are going to focus on the hardness of distinguishing inputs that have linearly many collisions from those that do not have any. For k=2, the two problems have the same complexity, since intuitively the only way to distinguish is to find a collision. This can be formalized easily in the classical case. Quantumly, this is more challenging, but the lower bound in [3] proved the hardness of distinguishing between 2-to-1 instances and ones with no duplicate.

However, for larger k, distinguishing such inputs might be easier than finding a collision. The classical upper bound of O(N11/k) queries is straightforward for the finding variant. In the lower bounds of [32, 38], the authors consider the distinguishing version, so classically the question is settled. But in the quantum setting, the upper and lower bounds of [34] are tight only for finding k-collisions in random inputs, and for the distinguishing variant, we are not currently aware of anything better than the Ω(N1/3) lower bound corresponding to the k=2 case. To our knowledge, this problem has not yet been studied in the quantum setting.

1.4 Our results

In this work, we present two lines of results for quantum property testing of graph properties.

In the first line, we consider the problem of testing k-source-subgraph-freeness in the unidirectional model. This problem is almost maximally hard for large k in the classical regime, and we show that it admits an almost quadratic advantage in the quantum setting.

Theorem 1 (Restated in Theorem 13).

The quantum query complexity of testing k-source-subgraph-freeness in the unidirectional model is O(N12(112k1)).

In order to prove the above result, we connect it to the problem of finding k-collisions. In [34], an algorithm is given for finding k-collisions in sequences of random integers. We generalize this to the context of graph property testing in two ways: finding a subgraph (instead of a collision); and considering graphs that are far from being H-free (instead of random).

Moreover, we prove that this quantum advantage is nearly tight, by showing a quantum lower bound using the method of dual polynomials.

Theorem 2 (Corollary of Theorem 3).

The quantum query complexity of testing k-source-subgraph-freeness in the unidirectional model is Ω~(N12(11k)).

For proving graph property testing lower bounds, both the classical works of [32] and [38] prove collision testing lower bounds using the proportional moments technique of [39]. At the heart of this technique is a construction of two positive integer random variables, X1 and X2, with different expectations but with the following conditions on the first k1 moments: 𝔼[X1]/𝔼[X2]=𝔼[X12]/𝔼[X22]==𝔼[X1k1]/𝔼[X2k1]. Such a construction leads to a randomized query complexity lower bound of Ω(N11k) for various property testing problems such as k-collision-freeness [38]. Having a quantum version of this technique has been identified as an important open problem [6], since this could be used to pave the way to stronger quantum lower bounds in related settings. We modestly made progress to this quest for the special case of testing k-collision-freeness.

In [34], in addition to the algorithm we mentioned, they also prove a matching lower bound showing that their algorithm for finding k-collisions in random inputs is optimal. However, this time we cannot reuse those techniques for our purpose for two main reasons. First, the property testing variant of this problem could be easier. Moreover, their lower bound technique requires random inputs and hence it does not apply to our case. This is why we use yet another method, that of dual polynomials, to prove our lower bound.

Theorem 3 (Restated in Theorem 14).

The quantum query complexity of testing k-collision-freeness is Ω~(N12(11k)).

In the second line of results, we show that not all problems in graph property testing admit such a quantum speedup. This fact even remains valid for the case of undirected graphs. For this, we consider the property testing variant of the famous problem of 3-colorability: namely, distinguishing whether an unknown undirected graph G can be properly colored with 3 colors, or one needs to modify a large fraction of its edges to make it 3-colorable. In the classical bounded degree setting, this problem has been studied by [15], who proved a lower bound of Ω(N) queries. In this work, we present a simple argument that proves that there exists no sublinear quantum tester either for this problem. Our result is stated as follows:

Theorem 4 (Restated in Theorem 31).

The quantum query complexity of testing of 3-colorability of undirected bounded-degree graphs is Ω(N).

1.5 Technical overview

1.5.1 Subgraph-finding algorithm

We start by describing how to prove the upper bound result of Theorem 1 for testing k-source-subgraph-freeness. We view the problem as a generalization of the problem of finding k-collisions and adapt an existing quantum algorithm for the latter problem. In [34], an algorithm is given for finding k-collisions in length-N sequences of integers that contain Ω(N) k-collisions (e.g. k-to-1, or random sequence with appropriate parameters). Their algorithm generalizes the well-known collision finding algorithm of [17]. On a high level, the [34] algorithm first finds several 2-collisions using Grover search like in [17], extends some of them to 3-collisions in a similar way, and so on until a k-collision is found.

On the one hand, instead of random inputs, we consider the problem in the property testing context; and on the other hand, we generalize collision-finding to subgraph-finding. As a first step let us look at what happens when we consider the property testing version of the k-collision problem. In order to be able to use the algorithm of [34], we have to prove that if a length-N sequence is far from k-collision-freeness then it contains many k-collisions. Notice that the collisions are not necessarily distinct: if the input only contains the same integer N times, it only contains one huge collision, but it is still ε-far from k-collision-freeness for any ε<1k/N. Thus, what we need to show is that there are Ω(N) many disjoint size-k sets of indices such that for each set, the sequence contains the same character at the positions of the set. This statement is true because otherwise, by modifying all the characters that are in positions contained in a set (o(N) characters in total), we could get a k-collision-free sequence which contradicts being far from k-collision-freeness.

When we make the second step of turning to testing of subgraph-freeness, we need to prove a variant of this statement: if an N-vertex graph G is far from H-freeness (for some constant-sized subgraph H) then it contains Ω(N) many “source-disjoint” H-subgraphs. This means that there are Ω(N) many such H-subgraphs in G that the set of vertices in the source components of each H-subgraph are disjoint. We prove this fact in Proposition 12 and this allows us to further generalize the approach of [34]: first find several partial solutions where only a few source components of an H-subgraph are explored, and gradually extend these (using Grover search and constant-depth BFS) until a complete H-subgraph is found.

Notice that this way our algorithm finds an H-subgraph in G promised that G is far from H-freeness. This task is at least as difficult as property testing, where the algorithm only has to distinguish whether G is H-free or far from any H-free graph. So our algorithm provides an upper bound on the property testing variant of H-freeness.

1.5.2 Collision-freeness lower bound

Now we will discuss our approach to proving the lower bounds of collision-freeness (Theorem 2) and k-source-subgraph-freeness (Theorem 3). We first give a simple reduction from k-collision-freeness to k-star-freeness, which is a special case of k-source-subgraph-freeness. This way, it is enough to prove a lower bound on testing k-collision-freeness, and it implies the same result on testing k-source-subgraph-freeness. Since our lower bound approach crucially depends on the (dual) polynomial method, let us start by briefly discussing it.

The (dual) polynomial method

The polynomial method is a common way to prove quantum query complexity lower bounds. It relies on the fact that the acceptance probability of a T-query bounded-error quantum algorithm is a polynomial of degree at most 2T [11]. This way, for proving a quantum query complexity lower bound on calculating a function f, it suffices to argue that any approximating polynomial of f has large degree. One of the key properties that such lower bounds exploit is the symmetry that the function f may exhibit, such as invariance under some permutation of the input. For example, the first tight lower bound of Ω(n1/3) for the collision problem was proved in this way [3].

The polynomial method can be written in the form of a linear program, of which one can take the dual. By weak LP-duality, when using this dual characterization for proving a lower bound on function f, one needs to provide a “witness” of the approximating polynomial’s high degree, say Δ. This witness is called the dual polynomial ψ and, in the easiest case of total Boolean111We use {1,1} where 1 corresponds to the “true value”. functions f:{1,1}n{1,1}, it needs to have three properties:

  1. (i)

    High correlation with f: xf(x)ψ(x)>δ;

  2. (ii)

    Normalization: x|ψ(x)|=1;

  3. (iii)

    Pure high degree Δ: xp(x)ψ(x)=0, for every polynomial p with degree <Δ,

where the summations are all over x{1,1}n.

When the function f is partial, i.e., only defined on a subset D{1,1}n, there is some subtlety that could be handled in two ways (or even in a mixture or both): zero-out the dual polynomial outside D (corresponding to “unbounded degree”); or rewrite condition (i) accordingly (corresponding to “bounded degree”):

  1. (i’)

    High correlation with f: xDf(x)ψ(x)xD|ψ(x)|>δ.

Collision function

The paper of [19] also used the dual polynomial method for proving quantum lower bounds for many problems, most of them being open before that work. Similarly to that paper, we need to take several steps to be able to use the dual polynomial method for the problem of property testing k-collision-freeness. This problem was not addressed in [19].

One of the main conceptual ideas in [19] is to re-formulate the problem we study as a composition of two simple Boolean functions. In that paper, powerful techniques are also developed in order to design dual polynomials for simple functions that can be composed. A common way of composing dual polynomials (called dual block composition) dates back to [44, 33, 43], but [19] provides new tools for handling it efficiently. We are going to reuse some of them, and also extend one in a way.

The first step is to find the right problem that can fit in the framework. We introduce a partial symmetric function F defined on input strings s=(s1,,sN)[R]N. The domain of F corresponds to the following promise: either F has no k-collision, or it has many k-collisions occurring for distinct values. More formally,

F(s)={1if no integer occurs at least k times in s,1if more than γR distinct integers occur at least k times in s,undefinedotherwise.

This partial function is not a property testing problem, however it corresponds to a special case of testing k-collision-freeness, which is therefore enough to prove lower bounds.

Binary encoding

Now we encode the input string s=(s1,,sN)[R]N into binary variables xi,j storing whether si=j, as in [1]. Doing so, starting from the function F above, we end up with a function f defined over binary variables satisfying several symmetries, under the permutation of either i or j in xi,j.

Moreover, the symmetries of f allow the extension of the initial function f from the very restricted set of binary inputs correspond to valid strings, to the more general set of binary inputs of Hamming weight N [6]. With further technicalities one can also extend f to all binary inputs of Hamming weight at most N [20]. This is fundamental because instead of being forced to zero out the dual polynomial outside the domain of f, we only need to do so on inputs of Hamming weight higher than N. Using the symmetry of f, it can be shown that a lower bound on this modified, Boolean version implies a lower bound on the original k-collision problem.

This way we end with two promises on the binary encoding of the input. The first one comes from the function F itself: we have the promise that the input contains either no k-collision or it has many ones with different values. The second promise is the consequence of the encoding: we want the binary encoding to have Hamming weight at most N. Let D denote the set of binary strings satisfying both promises, and let HN denote the set of binary strings with Hamming weight at most N. For this case we use the “double-promise” version of the dual polynomial method, where, in order to prove that every δ-approximating polynomial of f has degree at least Δ, the dual polynomial has to satisfy four conditions, where the fourth one corresponds to zeroing out ψ on large Hamming weight inputs [19]:

(i’)

High correlation with f: xDf(x)ψ(x)xHND|ψ(x)|>δ;

(ii)

Normalization: x|ψ(x)|=1;

(iii)

Pure high degree Δ: xp(x)ψ(x)=0, for every polynomial p with degree <Δ;

(iv)

No support on inputs with large Hamming weight: ψ(x)=0, for every xHN.

Composition

Coming back now to the definition of our Boolean function f, one can rewrite it as a composition of simpler functions: GapORRγTHRNk, where by composition we mean (gh)(x)=g(h(x1),,h(xn)) (where x=(x1,,xn) and each xi is a binary vector of appropriate dimension) and the domain is restricted to bit strings of Hamming weight at most N. Note that here, xj=(x1,j,x2,j,,xN,j). Above, THRNk is the threshold function: it is 1 if the input bitstring contains at least k many 1 (true) values, and is 1 otherwise; and GapORRγ is the gap version of OR, which is 1 if the input is all-1, 1 if the input contains at least γR many 1 values, and is undefined otherwise.

In order to give a dual polynomial for this composed function, we start from a dual polynomial for each part of the composition (ϕ and ψ), which were already given in [19] (in different contexts). Then we use a known way [44, 33, 43] of composing dual polynomials called the dual block composition, which provides a nearly good dual polynomial ϕψ for GapORRγTHRNk. Indeed, by construction, the normalization (ii) and the pure high degree (iii) are guaranteed. However, the issue is that it is not 0 on bitstrings of large Hamming weight thus (iv) is not satisfied, and and the high correlation (i’) still has to be proved.

To fix (iv), we use another result of [19] which provides another dual polynomial ζ, that is close to ϕψ and that is 0 on inputs having Hamming weight larger than N. Also, it only changes the pure high degree by a polylogarithmic factor. Now the only remaining task is to prove a large enough correlation (i’) of ϕψ and GapORRγTHRNk so that ζ still has high enough correlation. This high correlation proof (Lemma 30) is the most technical part of our paper.

High correlation: proof of Lemma 30

The statement we prove is the following high correlation bound:

xD(ϕψ)(x)(GapORRγTHRNk)(x)xD|(ϕψ)(x)|9/10.

In the proof of this lemma, that is deferred to the full version of the paper [9], we use a proposition that is a more general statement of some techniques used in several proofs of [19]. But then we need to diverge from their proof because it crucially relies on a certain one-sided error property (in the sense of [19, Lemma 6.11]) of the inner function of the composition which is OR function in their case. Our inner function is the threshold function which does not satisfy this property, so we have to use some other properties of the dual polynomials in our proof. This different proof technique could be a step towards obtaining a more general lower bound technique.

1.5.3 3-colorability lower bound

Let us now discuss our approach to proving the linear lower bound on quantum query complexity of testing 3-colorability (Theorem 4). Before proceeding to present our approach, let us briefly discuss the classical lower bound of testing 3-colorability. To prove the classical lower bound of 3-colorability, the authors in [15] first studied another problem called E(3,c)LIN-2, a problem related to deciding the satisfiability of a system of linear equations. More formally, E(3,c)LIN-2 considers a system of linear equations modulo 2, where each equation has 3 variables and every variable appears in at most c equations. Given such a system of linear equations, the goal is to distinguish if it is satisfiable, or at least some suitable fraction of the equations need to be modified to satisfy it. [15] proved that Ω(N) classical queries to the system of linear equations are necessary for testing E(3,c)LIN-2.

After this, they designed a reduction from E(3,c)LIN-2 to 3-colorability such that satisfying instances of E(3,c)LIN-2 are reduced to 3-colorable graphs, and far from satisfiable instances of E(3,c)LIN-2 are mapped to far from 3-colorable graphs. Combining these two arguments, the authors in [15] proved that Ω(N) classical queries are necessary for testing 3-colorability for bounded degree graphs.

The authors in [15] used Yao’s minimax method to prove the linear lower bound in testing E(3,c)LIN-2. In particular, they designed two distributions Dyes and Dno such that the systems of linear equations in Dyes are satisfiable, whereas the systems of linear equations in Dno are far from being satisfiable. A crucial ingredient of their lower bound proof is a construction of a system of linear equations (represented as a matrix) that are far from being satisfiable, but any δN rows of the matrix are linearly independent. Hence, any subset of δN entries of the matrix will look uniformly random, and therefore hard to distinguish from a satisfiable instance.

It is a known fact that distinguishing between a uniformly random string and a -wise independent string, for an appropriate integer , is hard for quantum algorithms (see e.g. [8]). Using this result, we can construct suitable hard instances for E(3,c)LIN-2 such that testing E(3,c)LIN-2 remains maximally hard (requires Ω(N) queries) for any quantum algorithm. Combining this hardness result with the reduction from E(3,c)LIN-2 to 3-colorability, we finally prove that Ω(N) quantum queries are necessary for testing 3-colorability.

In [45], the authors used various reductions from 3-colorability to argue that some other important problems including testing Hamiltonian Path/Cycle, approximating Independent Set/Vertex Cover size etc, are maximally hard to test in the classical model. Our quantum lower bound implies that these problems have maximal quantum query complexity too.

1.6 Open problems

Our work raises several important open questions. First, there is still a gap between our lower and upper bounds on the quantum query complexity of testing k-collision-freeness. In [35], the authors keep using the dual polynomial method to improve the lower bound of [19] for the k-distinctness problem. They achieve this by using a slightly different dual polynomial for THRNk, where they allow more weight on the false positive inputs. This makes it impossible to prove the high correlation of the dual and the primal functions, so they use a modified block composition. Our technique might be combined with this other approach to improve our lower bound to Ω~(N1/21/(4k)).

The authors in [6] stated it as an open question if one could use a variant of the proportional moments result of [39] to prove lower bounds on quantum algorithms. We leave this question open, and conjecture that a similar result holds in the quantum setting with a lower bound of Ω(N12(11k)). This work may be considered as a proof of this conjecture for the special case of k-collision-freeness, and we hope that it will serve as a step towards proving it in general.

In [22], it was proved that if a graph property can be tested with O(1) queries in the bidirectional model, then it can be tested using O(N1Ω(1)) queries in the unidirectional model. It would be very interesting to investigate if it also implies a quantum tester with query complexity, say O(N1/2Ω(1)).

2 Preliminaries

2.1 Notations and basic definitions

Let us denote [n]={1,,n} and [n]0={0,,n}. When dealing with Boolean variables, we will usually use b{1,1} instead of b{0,1}. We can get to one from the other easily with the mapping b12b, or its inverse, which means that 1 is going to be treated as the “true” or “accepting” value. The reason for using {1,1} is that when dealing with dual polynomials, it is easier to use this notation.

We denote by 1n the length-n binary vector made only of 1s, and respectively 1n. The Hamming weight |x| of x{1,1}n is then defined as the number of 1s in x, that is |x|=#{i[n]:xi=1}. Let Hwn={x{1,1}n:|x|w} denote the set of length-n binary vectors with Hamming weight at most w. For any x, sgn(x)=1 when x0, and 1 otherwise.

For a polynomial p, let deg(p) denote its degree. The composition fg:{1,1}nm{1,1} of two Boolean functions f:{1,1}n{1,1} and g:{1,1}m{1,1} is defined as (fg)(x)=f(g(x1),,g(xn)) where x=(x1,,xn) with each xi{1,1}m.

A directed graph or digraph G=(V,E) is a pair of a vertex set V and an edge set E. The latter consists of directed edges that are ordered pairs of vertices: we say that (u,v)E is directed from u to v where u,vV. We say that there is a directed path from s=v0 to t=vl+1 (with s,tV) if there exists an integer and vertices v1,,vV such that i[]0:(vi,vi+1)E. A digraph G=(V,E) is called strongly connected if for every uV and vV{u}, there exists a directed path from u to v. A subgraph of a graph G=(V,E) is any graph G=(V,E) satisfying VV, EE and EV×V.

Finally, throughout this work, notations O() and Ω() will be hiding the dependencies on parameters ε, k and d that we consider to be constants. Additionally, we will use O~() and Ω~(), where we hide poly-logarithmic dependencies on the parameters.

2.2 Query complexity

In query complexity, we consider inputs xΣI over a finite alphabet Σ and indexed by a set I. They are not given explicitly to the algorithm. Instead, the algorithm has query access to an input oracle 𝒪x:IΣ encoding x by 𝒪x(i)=xi. Quantumly, the query access is described by the unitary operator Ox|i|z=|i|zxi, for zΣ and iI, where is usually the bit-wise exclusive-OR operation up to some binary encoding of the elements of Σ. But our lower bound technique applies to any reversible operation .

Query complexity measures the minimum number of queries that an algorithm has to make in order to decide whether a property 𝒫:D𝒫ΣI{1,1} is satisfied, for an arbitrary input xD𝒫. Since the work of [11], it has been known that in the Boolean case (i.e., when Σ={1,1}), the acceptance probability of a T-query bounded-error quantum algorithm is a multivariate polynomial (in all the xi’s) of degree at most 2T.

In this work, two kinds of inputs are going to play a crucial role. When the input is a sequence s=(s1,,sN) of positive integers R, then I=[N] and Σ=[R].

In the undirected bounded-degree graph model, we have query access to the adjacency list of an undirected graph G=(V,E) with maximum degree d, represented as an oracle 𝒪G:V×[d]V{}. Then we can set I=V×[d] and Σ=V{}, such that for any vV and i[d], we have the following:

𝒪G(v,i)={w,if wV is the i-th neighbor of v;,if deg(v)<i.

For bounded-degree directed graphs, there exist two query models. In the bidirectional model, we have access to both the outgoing and incoming edges of each vertex. Correspondingly, it is imposed that both the in- and out-degrees of a vertex are bounded by d. In the unidirectional model, we can only make queries to the adjacency list of the outgoing edges, and we impose only that the out-degrees of a vertex are bounded by d. Since in this work the primary focus will be on the latter model, let us formally define it below.

In the unidirectional bounded-degree graph model, we have query access to the adjacency list of a digraph G=(V,E) where the out-degree of every vertex is at most dout: for all vV: degout(v)dout. This access is represented as an oracle 𝒪Gout:V×[dout]V{}. Then we can set I=V×[dout] and Σ=V{}, such that for any vV and i[dout], we have the following:

𝒪Gout(v,i)={w,if wV is the i-th out-neighbor of v;,degout(v)<i.

For completeness, we note that in some of the previous works on the unidirectional model, the authors do impose the degree bound on both the out- and in-degree (see, e.g., [22]). This is mostly because this makes for an easier comparison between the uni- and bidirectional models, as this way they allow the same set of graphs. In this work, we assume that only the out-degrees of the vertices are bounded by d.

2.3 Property testing

In total decision problems, the algorithm has to decide if the input satisfies a property or not. In the case of property testing, the question is relaxed: the algorithm has to distinguish inputs that satisfy the property from those that are “far” (according to some distance measure) from any input that satisfies it.

The choice of distance measure usually depends on the query model considered. As discussed before, the general query access can be viewed as black box access to the input xΣI where querying an index iI reveals xiΣ. This way, the distance of two objects is described as the proportion of positions where they differ:

x is ε-far from y|{iI:xiyi}|ε|I|.

Applying this to the case of bounded-degree graphs with degree bound d and query access to the adjacency list, the distance of two graphs is the number of edges where they differ divided by |V|d. The distance of an object x from a property 𝒫 is the minimum distance between x and any object that satisfies 𝒫.

Definition 5 (Property Testing).

Let 0<ε<1 be a constant. An algorithm 𝒜 is an ε-tester for the property 𝒫 if

  1. 1.

    For all x𝒫: Pr[𝒜(x)=accept]2/3;

  2. 2.

    For all x that are ε-far from 𝒫: Pr[𝒜(x)=accept]1/3.

Notice that no restriction is given on the acceptance probability of the algorithm for inputs that do not satisfy 𝒫 but are ε-close to it.

2.4 Grover search

We are not going into details about quantum computing, because for this paper, it suffices to state very few results in the field and use them in a black box way. One of the most important results in quantum computing is Grover’s algorithm for unordered search [30]: finding a marked element in an unordered database of size N takes Θ(N) queries classically, but the quantum query complexity of the same task is Θ(N). We are going to use a particular variant of this result that has been used many times in the literature (see e.g., [4, Item 3 in Section 2.2], which was implicitly proved in [16]).

Theorem 6.

Let 1t0N. There exists a quantum algorithm that, given t0 and query access to any function f:S{0,1}, makes O(N/t0) queries to f and outputs either “not found” or an element uniformly at random in f1(1). Moreover, when |f1(1)|t0 the later occurs with high constant probability.

 Remark 7.

In practice, we will use this theorem when querying f(z), for zS, requires making c queries to an input graph G with vertex set S. In that case the total query complexity to G is O(cN/t0).

2.5 Problem definitions

We now formally define the problems we study and argue about certain relations between them. While the problems are phrased as decision problems, ultimately we will care about the quantum query complexity for testing the corresponding properties. The complexity is going to be parameterized by a parameter k. Moreover, the parameters k,ε and the degree bound d are all considered to be constants throughout this paper.

Let us start with some definitions that will be useful to define our problems precisely.

Definition 8 (Source component).

Let H=(V,E) be a digraph. A set SV is called a source component if it induces a strongly connected subgraph in H, and there is no edge from VS to S in H.

Definition 9 (k-star).

A k-star is a digraph on k+1 vertices and k edges with one center vertex, and k source vertices connected to the center vertex.

Notice that a k-star has k source components each consisting of a single vertex.

We will now state the decision variants of several problems. The “property” corresponding to a decision problem is the set of inputs that should be accepted in the decision problem.

𝒌-Source-Subgraph-Freeness
Parameter:

Graph H of constant size with at most k source components

Query access:

d-bounded out-degree directed graph G on N vertices (unidirectional model)

Task:

Accept iff G is H-free, that is, no subgraph of G is isomorphic to H

In [32, 38], the authors examine the classical query complexity of testing k-source-subgraph-freeness. They consider the bounded-degree unidirectional model, albeit with a bound on both the in- and out-degrees.

For proving a lower bound, we will look at a special case of the main problem: k-star-freeness. Notice that since a k-star has k source components, a lower bound for this problem implies the same lower bound for the more general k-source-subgraph-freeness problem.

𝒌-Star-Freeness
Parameter:

Integer k2

Query access:

d-bounded out-degree directed graph G on N vertices (unidirectional model)

Task:

Accept iff G is k-star-free, that is, no subgraph of G is isomorphic to the k-star

For the lower bound on k-star-freeness testing, we are going to use as a “helper problem” the testing variant of the k-collision problem.

𝒌-Collision-Freeness
Parameter:

Integer k2

Query access:

Sequence of integers s=(s1,,sN)[R]N

Task:

Accept iff s is k-collision-free, i.e., there is no i1,,ik[N] with si1==sik

As discussed in the introduction (Section 1.3), very little was known about the property testing version of this problem prior to this work. We only know the that the complexity is Θ(N1/3) when k=2, and it is between Ω(N1/3) and O(N12(112k1)) for larger k.

Reduction from 𝒌-collision-freeness to 𝒌-star-freeness

Now we are going to prove that testing k-collision-freeness can be reduced to testing k-star-freeness (or more generally to testing k-source-subgraph-freeness). Thus, a lower bound on testing k-collision-freeness yields a lower bound on testing k-source-subgraph-freeness. Also, an algorithm for testing k-source-subgraph-freeness yields an upper bound on testing k-collision-freeness.

While the proof goes similarly to [32, Theorem 3], our reduction is not identical because we have a slightly different “helper problem”. Since they consider that the in-degree of vertices to be bounded as well, for the collision problem, they assume that the sequence does not contain any collision of size larger than k (defined as k-occurrence-freeness).

Proposition 10.

The problem of ε-testing k-collision-freeness of a sequence from [R]N can be reduced to εNd(N+R)-testing k-star-freeness of an (N+R)-vertex sparse directed graph with out-degree bound d1.

The proof is rather standard and it can be found in the full version of the paper [9].

3 Quantum algorithm for testing subgraph-freeness

In this section, we prove that there is a quantum speedup for testing H-freeness in directed graphs with d-bounded out-degree, for any graph H that has k source components. For large but constant k, the speedup is near-quadratic. This problem was studied in [29] in the classical setting. Our algorithm can be seen as a generalization of the one in [34] to graphs. Let us start with the definition of source-disjointness which will be used in the analysis of our algorithm.

Definition 11 (Source-disjointness).

Let G be a directed graph such that it contains two subgraphs H1 and H2. We say that H1 and H2 are source-disjoint if the union of the source components of H1 is disjoint from the union of the source components of H2.

Moreover, we need the following simple proposition, that is proved in the full version of the paper [9]. It shows that if G is far from being H-free, then it contains many source-disjoint copies of H, that is, copies of H that are source-disjoint subgraphs of G.

Proposition 12.

Let H be an h-vertex graph with k source components. Assume that a d-bounded out-degree directed graph G on N vertices is ε-far from H-free. Then G contains at least εN/h=Ω(N) source-disjoint copies of H.

We will use Breadth-first search (BFS) in order to explore G layer by layer: starting from a given vertex, first it explores its direct (out-)neighbors, then their unexplored (out-)neighbors etc. We will run BFS up to some limited depth , so that the depth- BFS algorithm has query complexity at most d where d is the maximum (out-)degree of G. In our application, d and are constants, and thus the query complexity is d=O(1).

3.1 The algorithm for 𝒌=𝟐

To illustrate our algorithm, we first consider the k=2 case to build some intuition. Here, our algorithm generalizes the BHT algorithm for collision finding [17] in the context of graphs. The high level idea is that if we manage to sample a vertex from each of the two source components of an H-subgraph (a collision), then by querying their “surroundings” we will discover the H-instance. In the following, we set h=|V(H)|, the number of vertices in H.

  1. 1.

    Sample a uniformly random vertex subset 𝒮 of size t=Θ(N1/3) in G. Perform a depth-h BFS from every vertex in 𝒮.

  2. 2.

    Perform Grover search over the remaining vertices V\𝒮 in the following way. A vertex v is marked if there exists another vertex u𝒮 such that u and v are from the 2 different source components of an H subgraph of G.

  3. 3.

    If any occurrence of H in G is found, output Reject. Otherwise, output Accept.

Note that if G is H-free, then the above algorithm will always accept. Now we need to argue that if G is ε-far from being H-free, then with constant probability, the above algorithm will find a copy of H and thus will output reject.

By Proposition 12, with high probability, a constant fraction of the t vertices in 𝒮 are part of a source component in source-disjoint H-subgraphs of G. For such vertices, the BFS in step 1 will discover the entire source component, as well as all other vertices reachable from that source component in H. Then, in step 2 we search for a vertex that is in the remaining source component of such an instance of H that we already partly discovered. This can be verified by doing a depth-h BFS from it and checking if this completes an H-instance with one of the previously sampled vertices’ neighborhoods. As we mentioned, by Proposition 12 with high probability there are Ω(t) many marked vertices. This proves the correctness of the algorithm.

Finally, we bound the algorithm’s query complexity. Step 1 makes O(t)=O(N1/3) many (classical) queries. In step 2 we use Theorem 6 and Remark 7: checking whether a vertex is marked requires running a depth-h BFS from it, which costs c=O(1) queries. We argued that there are Ω(t) many marked vertices, so Grover search makes O(N/t)=O(N1/3) quantum queries.

3.2 The algorithm for general 𝒌

We are now ready to state our general upper bound result.

Theorem 13 (Restatement of Theorem 1).

Let H be a digraph of constant size with k source components. The quantum query complexity of testing H-freeness of an N-vertex graph with bounded out-degree in the unidirectional model is O(N12(112k1)).

The algorithm and proof follow the same lines as the k=2 case. In order to extend the k=2 case described above to larger k, we first try to find many partial H-instances with k1 source components found, and then extend one of them to a complete H-instance. We present a brief description of our algorithm, where h is the number of vertices of H:

  1. 1.

    Sample a uniformly random vertex subset 𝒮1 in G of size t1. Perform a depth-h BFS from every vertex in 𝒮1. Let 𝒮1=𝒮1.

  2. 2.

    For iterations i=2 to k1, do the following:

    1. (a)

      Perform a Grover search ti times on the vertices V𝒮i1 in the following way. A vertex v is marked if there exist i1 other vertices uj𝒮j for each j[i1] such that u1,,ui1 and v are from i different source components of an H subgraph of G. If we do not find ti vertices like this, output Reject, otherwise let 𝒮i denote the set of the vertices v that we found.

    2. (b)

      Set 𝒮i=𝒮i1𝒮i.

  3. 3.

    Perform Grover search on V\𝒮k1 to find a complete H-instance. I.e., a vertex v is marked if there exist k1 other vertices uj𝒮j for each j[k1] such that u1,,uk1 and v are from the k different source components of an H subgraph of G.

  4. 4.

    If any occurrence of H in G is found, output Reject and terminate the algorithm. Otherwise, output Accept.

The correctness proof can be found in the full version of the paper [9].

4 Collision-freeness lower bound

As discussed in Section 2, we are going to prove a lower bound on the problem of testing k-collision-freeness.

Theorem 14 (Restatement of Theorem 3).

Let k3 and 0<ε<1/(4k120(2k)k/2) be constants and N be a large enough positive integer. Then the quantum query complexity of the ε-testing of k-collision-freeness of a sequence of integers S=(s1,,sN)[N]N with parameter ε is Ω(N1/21/(2k)/ln2N).

The proof of the theorem is at the end of Section 4.3. Observe that Theorem 2 is implied by Theorem 14 and the reduction in Proposition 10. Our proof mostly follows the structure of [19, Section 6.1], and in particular it uses the notion of dual polynomial for non-Boolean partial symmetric functions. Our main technical contribution in this section is the proof of Lemma 30, because the corresponding proof in [19] crucially relies on a fact that does not hold for our problem. We will discuss it in detail below.

In the following, we first state some general results related to the polynomial method for non-Boolean functions, then we use these results for our problem to state the exact statement that we prove in the technical part.

4.1 The (dual) polynomial method

For Boolean functions

We consider a property on Boolean vectors as a function f:D{1,1}n{1,1}. Since the work of [11], it has been known that the acceptance probability 𝖺𝖼𝖼(x) of a T-query bounded-error quantum algorithm on input xD is a polynomial of degree at most 2T. Thus, the polynomial p(x)=12𝖺𝖼𝖼(x) must be a good approximation of f. Observe that p(x) remains bounded outside D since 𝖺𝖼𝖼(x) remains a probability defined by the algorithm, with no constraint.

In order to formalize this, we first define the notion of approximate degree of a Boolean function, and then relate it to its query complexity.

Definition 15 (Approximate bounded degree).

Let f:D{1,1}n{1,1} and δ>0. A polynomial p:{1,1}n δ-approximates f on D if

xD:|f(x)p(x)|<δ and x{1,1}nD:|p(x)|<1+δ.

Moreover, the δ-approximate bounded degree bdegδ(f) of f on D is the smallest degree of such a polynomial.

The following lemma connects quantum query complexity to approximate bounded degree.

Lemma 16 ([11, 2]).

Let f:D{1,1}n{1,1} and δ>0. If a quantum algorithm computes f on D with error δ using T queries, then there is a polynomial p of degree at most 2T that 2δ-approximates f on D.

This implies that the quantum query complexity for computing f with error δ is bdeg2δ(f)/2, and so we will focus on proving lower bounds on the approximate bounded degree.

We now turn to a dual characterization of this polynomial approximation. This method of dual polynomials dates back to [42, 44] for initially studying communication complexity. Below we refer to some results stated in [19] for studying query complexity.

Definition 17 (Pure high degree).

A function ψ:{1,1}n has pure high degree at least Δ if for every polynomial p:{1,1}n with deg(p)<Δ it satisfies x{1,1}np(x)ψ(x)=0. We denote this as phd(ψ)Δ.

One can observe that phd(ψ)Δ is equivalent to the fact that all the monomials of ψ are of degree at least Δ. Then by weak LP duality we get the following result.

Theorem 18 ([19, Proposition 2.3]).

Let f:D{1,1}n{1,1} and δ>0. Then bdegδ(f)Δ iff there exists a function ψ:{1,1}n such that

xDψ(x)f(x)x{1,1}nD|ψ(x)|>δ; (1)
ψ1=x{1,1}n|ψ(x)|=1; (2)
phd(ψ)Δ. (3)

Now we are going to discuss how to extend these results to non-boolean functions, which is the interesting case for us.

For non-Boolean partial symmetric functions

We now consider a property of a sequence of integers as a function F:D[R]0N{1,1}. The symbol 0 will play a special role that will be exhibited later on. Unfortunately one cannot just take the polynomial of those integers. The standard approach (see [1]) is to encode s=(s1,,sN)[R]0N into binary variables x=(xi,j)i[N],j[R]0{1,1}N(R+1) encoding whether si=j as follows: xi,j=1 if si=j, and xi,j=1 otherwise. Let HbN(R+1){1,1}N(R+1) be the set of all possible encodings of vectors s, that is, for every i[N] there is exactly one j[R]0 such that xi,j=1.

This way we can represent F as a function Fb:Db{1,1} where DbHbN(R+1) is the set of valid encodings of D. More precisely, each xDb satisfies two constraints: (1) xHbN(R+1); and (2) x encodes some sD. Since only inputs xHbN(R+1) correspond to possible input sequences of an algorithm, the polynomials derived from a quantum query algorithm might not be bounded outside of that set. This implies a slight modification on the definition of approximate degree, in order to relate it to query complexity as in [1].

But before doing this, we are going to relax the constraints on the domain Db in the case of symmetric functions, while we decrease its dimension. When F is symmetric (i.e., F(s)=F(sπN) for any permutation πN of [N]), one can instead define a function FN with weaker constraints by removing the variables corresponding to the symbol 0. Define HNNR as the set of length-(NR) binary vectors with Hamming weight at most N. Given any xHNNR, we define its frequency vector z(x)=(z0,z1,,zR) with zj=#{i:xij=1}, for 1jR, and z0=Nz1zR. From the vector z(x), one can define a valid sequence of integers s(x)[R]0N: it can be any sequence from [R]0N that has frequency vector z(x). Now we can define FN on domain DN as

DN={xHNNR:s(x)D} and FN(x)=F(s(x)).

In fact, for the special case of total symmetric functions F, we can transform Fb on HbN(R+1) to FN on HNNR due to the symmetry of F.

In [5] it was proved implicitly that for symmetric F, both Fb and FN variants are equally hard to approximate by polynomials. We now define the appropriate notion of approximate degree for FN and relate it to the query complexity of F as in [19, Theorem 6.5].

Definition 19 (Double-promise approximate degree).

Let F:D[R]0N{1,1} be symmetric and δ>0. Define HNNR{1,1}NR and FN:DNHNNR{1,1} as above. A polynomial p:{1,1}NR double-promise δ-approximates F on D if

xDN:|FN(x)p(x)|<δ and xHNNRDN:|p(x)|<1+δ.

Moreover, the double-promise δ-approximate degree dpdegδ(FN) of FN on DN is the smallest degree of such a polynomial.

The following lemma connects the quantum query complexity and double-promise approximate degree.

Lemma 20 ([1, 5],[20, Theorem 3.9]).

Let F:D[R]0N{1,1} be symmetric and δ>0. Define HNNR{1,1}NR and FN:DNHNNR{1,1} as above. If a quantum algorithm computes F on D with error δ using T queries, then there is a polynomial p of degree at most 2T that double-promise 2δ-approximates FN on DN.

As for the Boolean case, this implies that a quantum algorithm computing F with error δ must make at least dpdeg2δ(FN)/2 queries. We can now also take the dual of this characterization.

Theorem 21 ([19, Proposition 6.6]).

Let F:D[R]0N{1,1} be symmetric. Define FN:DN{1,1} as above. Then dpdegδ(FN)Δ iff there exists a function ψ:{1,1}NR such that

x{1,1}NRHNNR,ψ(x)=0; (4)
xDNψ(x)FN(x)xHNNRDN|ψ(x)|>δ; (5)
ψ1=1 and phd(ψ)Δ. (6)

4.2 Preparation

Technically, the problem we use in the proof of Theorem 14 is slightly more restricted than k-collision-freeness: we want to distinguish no k-collision from many distinct collisions of size at least k.

Definition 22 (Collision function).

Let γ(0,1). The symmetric function CollisionN,Rk,γ:DCollisionN,Rk,γ[R]N{1,1} is defined by CollisionN,Rk,γ(s)=1 if no integer occurs at least k times in s, CollisionN,Rk,γ(s)=1 if there are more than γR distinct integers that occur at least k times in s, and it is undefined otherwise.

Notice that this problem is not a property testing problem, as the outcome is not determined based on the distance between inputs. Nevertheless, it is a valid promise problem and a special case of testing k-collision-freeness, which we use to prove lower bounds on the other problems of interest.

To prove a bound on the Collision function, we will actually relate it to the composition of two more elementary functions g,h, where by composition we mean (gh)(x)=g(h(x1),,h(xn)) (where x=(x1,,xn) and each xi is a binary vector of appropriate dimension). Let us define (i) the threshold function THRNk:{1,1}N{1,1} which is 1 if the input bitstring contains at least k many 1s, and it is 1 otherwise; and (2) the gap version of OR, that is GapORRγ:DGapORRγ{1,1}R{1,1} which takes value 1 if the input is 1R, 1 if the input contains at least γR many 1s, and is undefined otherwise. We show that the double-promise approximate degree of GapORRγTHRNk lower bounds the quantum query complexity of the collision problem.

Lemma 23.

Let k3, 0<γ<1, δ>0 and c>2 be constants such that N/cRN/2. If the double-promise δ-approximate degree of GapORRγTHRNk on domain further restricted to HNNR is at least Δ, then every quantum algorithm computing CollisionN,Nk,γ/c with error δ/2 must require at least Δ/2 queries.

Before proving this lemma, we prove some helper propositions. In order to apply the dual polynomial method for partial symmetric functions, we start by proving that CollisionN,Rk,γ is at least as hard as a very similar problem. We introduce a “dummy-augmented” version dCollisionN,Rk,γ:DdCollisionN,Rk,γ[R]0N{1,1} of the problem CollisionN,Rk,γ for the purpose of proving Lemma 23, where now the input sequence can have integer 0, but those 0s are just ignored when they occur. We show that it is enough to prove a lower bound for this second version.

Proposition 24.

Let k3, 0<γ<1 and c>2 be constants such that N/cRN/2. Then dCollisionN,Rk,γ can be reduced to CollisionN,Nk,γ/c.

The proof is deferred to the full version of the paper [9]. The following proposition relates dCollision to GapORTHR.

Proposition 25.

The domain of GapORRγTHRNk is

DGapORRγTHRNk={x{1,1}NR:(THRNk(x1),,THRNk(xR))HγRR{1R}}.

where x=(x1,,xR) with each xi{1,1}N.

The domain of (dCollisionN,Rk,γ)N is

D(dCollisionN,Rk,γ)N=HNNRDGapORRγTHRNk.

Moreover, restricted to the latter domain they are the same function:

(dCollisionN,Rk,γ)N=GapORRγTHRNk.

We are now ready to give the proof of Lemma 23.

Proof of Lemma 23.

By Proposition 24, instead of CollisionN,Nk,γ/c we can consider dCollisionN,Rk,γ (with the appropriate parameters) to show a lower bound. By Proposition 25, we can use Lemma 20 to relate the query complexity of dCollisionN,Rk,γ to the double-promise degree of GapORRγTHRNk with domain further restricted to HNNR.

4.3 Main lower bound

Let us fix f=(GapORRγTHRNk) with domain D=D(GapORRγTHRNk) (see Proposition 25). For technical reasons, in the rest of the section we fix k3 and N=20(2k)k/2R. (These parameters are used in the proof of Lemma 29, that omitted from this version of the paper.)

We first define a construction used in order to compose dual polynomials, which was introduced in earlier line of work [44, 33, 43].

Definition 26 (Dual block composition).

The dual block composition of two functions ϕ:{1,1}n and ψ:{1,1}m is a function ϕψ:{1,1}nm defined as

(ϕψ)(x)=2nϕ(sgn(ψ(x1)),,sgn(ψ(xn)))i[n]|ψ(xi)|

where x=(x1,,xn) and xi{1,1}m, for i[n].

This subsection is dedicated to the proof of the following lemma which, together with Lemma 23, implies Theorem 14. Observe that we have to zero out the support of the dual polynomial outside of HNNR, since our target domain is not D but DHNNR in Lemma 23.

Lemma 27.

Let N=20(2k)k/2R and 0<γ<1/4k1. Then there exists a function ζ:{1,1}NR such that

x{1,1}NRHNNR,ζ(x)=0; (7)
xHNNRDζ(x)f(x)xHNNRD|ζ(x)|>2/3; (8)
ζ1=1 and phd(ζ)Ω(N11/k/ln2N). (9)
Proof.

The construction of ζ starts by block composing (Definition 26) two dual polynomials ϕ,ψ, one for GapORRγ and one for THRNk. The dual polynomial ϕ for GapORRγ is given by Proposition 28. The dual polynomial ψ for THRNk is given by the first part of Lemma 29.

The block composition ϕψ is a good candidate for the dual polynomial of f. Indeed, Lemma 30 shows that it satisfies Equation 8, showing correlation at least 9/10>2/3. One could also check that it satisfies Equation 9. Nonetheless it does not satisfy Equation 7.

We can now use the second part of Lemma 29 to argue that there exists another dual polynomial ζ that satisfies Equation 7 and Equation 9. Moreover, this ζ is close to ϕψ so that it also satisfies Equation 8, with the weaker but sufficient correlation 9/102/9>2/3. This concludes the proof.

As we have seen, the previous proof relies on the following results. The first one is direct and we omit its proof.

Proposition 28.

Let ϕ:{1,1}R be such that ϕ(1R)=1/2, ϕ(1R)=1/2, and ϕ(z)=0 for all z{1,1}R{1R,1R}. Then ϕ1=1, phd(ϕ)1, and

x{1,1}Rϕ(x)OR(x)=1.

The second lemma is the rephrasing of several scattered results in [19] that we unify into one statement for more clarity. For the sake of completeness, we explain how to prove it in the full version of the paper [9].

Lemma 29.

Let N=20(2k)k/2R and ϕ:{1,1}R from Proposition 28. Then there exist ψ:{1,1}N and ζ:{1,1}NR such that

  1. 1.

    ψ1=1, phd(ψ)c1k1N11/k,

    xD+|ψ(x)|148N, and xD|ψ(x)|1224k,

    where D+={x{1,1}N:ψ(x)>0,THRNk(x)=1} and D={x{1,1}N:ψ(x)<0,THRNk(x)=1}.

  2. 2.

    ζ1=1, phd(ζ)=Ω(N11/k/ln2N), ζϕψ12/9, and ζ(x)=0 for all x{1,1}NRHNNR.

Finally we are ready to state the last missing statement, the proof of which is our main technical contribution to this part. The proof of [19, Lemma 6.9] does not apply directly to this problem: they use the fact that the dual polynomial ψ of their inner function (OR) has one sided error, which is not the case here.

As now we focus on the composed function f (and the dual composition ϕψ), the domain is not restricted to small Hamming weight inputs anymore. For space saving purposes, the proof can be found in the paper’s full version [9].

Lemma 30.

Let N=20(2k)k/2R and 0<γ<1/4k1. Functions ϕ from Proposition 28 and ψ from Lemma 29 satisfy

xD(ϕψ)(x)f(x)x{1,1}NRD|(ϕψ)(x)|9/10.

Finally, we can conclude the proof of Theorem 14.

Proof of Theorem 14.

By Lemma 27, there is a dual polynomial for GapORRγTHRNk of pure high degree Ω(N11/k/ln2N) that is only supported on HNNR. By Theorem 21 this means that the double-promise δ-approximate degree of GapORRγTHRNk with domain restricted to HNNR is Ω(N11/k/ln2N). Using Lemma 23 with c=20(2k)k/2, we obtain that the bounded-error quantum query complexity of CollisionN,Nk,γ is Ω(N11/k/ln2N) if γ=γ/c<1/(4k120(2k)k/2). This implies the same lower bound on testing k-collision-freeness with ε=γ as Collision is just a more restricted version of the same problem.

5 Testing 𝟑-colorability

In this section, we will prove that the problem of testing 3-colorability in bounded degree graphs remains maximally hard-to-test in the quantum setting. Our lower bound proof will roughly follow the same approach as that of [15], see [14, Section 5.6] also for a reference. Our result is stated below.

Theorem 31 (Restatement of Theorem 4).

Let G be an unknown undirected N-vertex graph with maximum degree d, and ε(0,1) be a parameter. Given quantum query access to G in the undirected bounded-degree graph model, in order to distinguish if G is 3-colorable, or if it is ε-far from being 3-colorable, Ω(N) quantum queries are necessary.

To prove the above theorem, we adapt the classical lower bound for testing 3-colorability. Let us start with the notion of k-wise independent string which will be used in the quantum lower bound proof.

Definition 32 (k-wise independent string).

A string s=(s1,,sN){0,1}N is said to be k-wise independent if for any set of k-indices i1,i2,ik, the probability of any particular assignment (bi1,bi2,,bik){0,1}k to the indices i1,i2,ik is equal to 1/2k.

As we discussed in the overview, to prove the lower bound of 3-colorability, the authors in [15] studied another problem called E(3,c)LIN-2, a problem related to deciding the satisfiability of a system of linear equations. Then the authors designed a reduction to 3-colorability from E(3,c)LIN-2, which finally proves the linear query complexity lower bound for testing 3-colorability. We will also follow a similar approach here. Let us first formally define the problem of E(3,c)LIN-2, where below 𝔽2 denotes the field with two elements.

Definition 33 (E(3,c)LIN-2).

Let be a system of linear equations with N variables from 𝔽2, where there are 3 variables in each equation, and each variable occurs in at most c equations. This system is represented as a matrix and we have query access to its entries. Given a parameter α(0,1), the goal is to distinguish if is satisfiable, or at least an α-fraction of the equations need to be modified to make satisfiable.

We will first prove the quantum lower bound for testing E(3,c)LIN-2. Our result is stated as follows.

Lemma 34.

For every α>0 there are constants c and δ>0 such that every algorithm that distinguishes satisfiable instances of E(3,c)LIN-2 with N variables from instances that are (1/2α)-far from satisfiable must have quantum query complexity at least δN/2.

In order to prove the above lemma, we will use the following observation from [8], which states that distinguishing between a uniformly random string and a -wise independent string, for an appropriate integer , is hard for quantum algorithms.

Proposition 35 (Fact 1 from [8]).

The output distribution of a quantum algorithm making q queries to a uniformly random string is identical to the same algorithm making q queries to a 2q-wise independent string.

Finally, we have the reduction that maps satisfying instances of testing E(3,c)LIN-2 to satisfying instances of testing 3-colorability and vice-versa.

Lemma 36 ([15, Section 4]).

There exists a reduction φ that maps instances of testing E(3,c)LIN-2 to instances of testing 3-colorability such that the following hold:

  1. 1.

    If an input x to E(3,c)LIN-2 is satisfiable, then φ(x) is a 3-colorable graph;

  2. 2.

    If an input x to E(3,c)LIN-2 is far from being satisfiable, then φ(x) is a graph that is far from being 3-colorable.

The proofs of Lemma 34 and of Theorem 31 are simple combinations of the classical results and of Proposition 35. For the sake of completeness, they are included in the full version of the paper [9].

Using various reductions following [45, 27], we obtain the following corollaries.

Corollary 37 (Hamiltonian Path/Cycle).

Given quantum query access to an unknown undirected (directed) d-bounded degree N-vertex graph G for some integer d, and a parameter ε(0,1), in order to distinguish if G has an undirected (directed) Hamiltonian path/cycle or ε-far from having an undirected (directed) Hamiltonian path/cycle, Ω(N) quantum queries are necessary.

Corollary 38 (Approximating Independent Set/Vertex Cover size).

Given query access to an unknown undirected d-bounded degree N-vertex graph G for some integer d, and a parameter ε(0,1), approximating the independent set size/vertex cover of G, Ω(N) quantum queries are necessary.

References

  • [1] Scott Aaronson. Quantum lower bound for the collision problem. In Proceedings of 34th Annual ACM Symposium on Theory of Computing (STOC), pages 635–642. Association for Computing Machinery, 2002. doi:10.1145/509907.509999.
  • [2] Scott Aaronson, Andris Ambainis, Janis Iraids, Martins Kokainis, and Juris Smotrovs. Polynomials, quantum query complexity, and Grothendieck’s inequality. In Proceedings of the 31st Conference on Computational Complexity (CCC), volume 50, pages 25:1–25:19. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016. doi:10.4230/LIPIcs.CCC.2016.25.
  • [3] Scott Aaronson and Yaoyun Shi. Quantum lower bounds for the collision and the element distinctness problems. Journal of the ACM, 51(4):595–605, 2004. doi:10.1145/1008731.1008735.
  • [4] A. Ambainis. Quantum search algorithms. SIGACT News, 35(2):22–35, 2004. doi:10.1145/992287.992296.
  • [5] Andris Ambainis. Polynomial degree and lower bounds in quantum complexity: Collision and element distinctness with small range. Theory of Computing, 1(3):37–46, 2005. doi:10.4086/toc.2005.v001a003.
  • [6] Andris Ambainis, Aleksandrs Belovs, Oded Regev, and Ronald de Wolf. Efficient quantum algorithms for (gapped) group testing and junta testing. In Proceedings of the 27th annual Symposium on Discrete Algorithms (SODA), pages 903–922, 2016. doi:10.1137/1.9781611974331.ch65.
  • [7] Andris Ambainis, Andrew M Childs, and Yi-Kai Liu. Quantum property testing for bounded-degree graphs. In Proceedings of the 14th International Workshop and 15th International Conference on Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques (APPROX-RANDOM), pages 365–376. Springer Berlin Heidelberg, 2011. doi:10.5555/2033252.2033285.
  • [8] Simon Apers and Ronald De Wolf. Quantum speedup for graph sparsification, cut approximation, and Laplacian solving. SIAM Journal on Computing, 51(6):1703–1742, 2022. doi:10.1137/21M1391018.
  • [9] Simon Apers, Frédéric Magniez, Sayantan Sen, and Dániel Szabó. Quantum property testing in sparse directed graphs. arXiv:2410.05001, 2024. doi:10.48550/arXiv.2410.05001.
  • [10] Simon Apers and Alain Sarlette. Quantum fast-forwarding: Markov chains and graph property testing. Quantum Information & Computation, 19(3–4):181–213, 2019. doi:10.5555/3370245.3370246.
  • [11] Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. Quantum lower bounds by polynomials. Journal of the ACM, 48(4):778–797, 2001. doi:10.1145/502090.502097.
  • [12] Shalev Ben-David, Andrew M Childs, András Gilyén, William Kretschmer, Supartha Podder, and Daochen Wang. Symmetries, graph properties, and quantum speedups. In 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 649–660. IEEE, 2020. doi:10.1109/FOCS46700.2020.00066.
  • [13] Michael A Bender and Dana Ron. Testing properties of directed graphs: acyclicity and connectivity. Random Structures & Algorithms, 20(2):184–205, 2002. doi:10.1002/rsa.10023.
  • [14] Arnab Bhattacharyya and Yuichi Yoshida. Property Testing - Problems and Techniques. Springer Singapore, 1 edition, 2022. doi:10.1007/978-981-16-8622-1.
  • [15] Andrej Bogdanov, Kenji Obata, and Luca Trevisan. A lower bound for testing 3-colorability in bounded-degree graphs. In 43rd Annual Symposium on Foundations of Computer Science (FOCS), pages 93–102. IEEE Computer Society, 2002. doi:10.1109/SFCS.2002.1181886.
  • [16] Michel Boyer, Gilles Brassard, Peter Høyer, and Alain Tapp. Tight Bounds on Quantum Searching, chapter 10, pages 187–199. John Wiley & Sons, Ltd, 1999. doi:10.1002/3527603093.ch10.
  • [17] Gilles Brassard, Peter Høyer, and Alain Tapp. Quantum cryptanalysis of hash and claw-free functions. In Proceedings of the 3rd Latin American Symposium on Theoretical Informatics (LATIN), pages 163–169. Springer Berlin Heidelberg, 1998. doi:10.1007/BFb0054319.
  • [18] Harry Buhrman, Lance Fortnow, Ilan Newman, and Hein Röhrig. Quantum property testing. SIAM Journal on Computing, 37(5):1387–1400, 2008. doi:10.1137/S0097539704442416.
  • [19] Mark Bun, Robin Kothari, and Justin Thaler. The polynomial method strikes back: Tight quantum query bounds via dual polynomials. Theory of Computing, 16(10):1–71, 2020. doi:10.4086/toc.2020.v016a010.
  • [20] Mark Bun and Justin Thaler. A nearly optimal lower bound on the approximate degree of AC0. SIAM Journal on Computing, 49(4):FOCS17–59–FOCS17–96, 2020. doi:10.1137/17M1161737.
  • [21] Hubie Chen and Yuichi Yoshida. Testability of homomorphism inadmissibility: Property testing meets database theory. In Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS), pages 365–382. Association for Computing Machinery, 2019. doi:10.1145/3294052.3319679.
  • [22] Artur Czumaj, Pan Peng, and Christian Sohler. Relating two property testing models for bounded degree directed graphs. In Proceedings of the 48th annual Symposium on Theory of Computing (STOC), pages 1033–1045. Association for Computing Machinery, 2016. doi:10.1145/2897518.2897575.
  • [23] Artur Czumaj and Christian Sohler. Sublinear-time algorithms. In Oded Goldreich, editor, Property Testing: Current Research and Surveys, pages 41–64. Springer Berlin Heidelberg, 2010. doi:10.1007/978-3-642-16367-8_5.
  • [24] Eldar Fischer. The art of uninformed decisions. Bulletin of the EATCS, 75:97, 2001.
  • [25] Sebastian Forster, Danupon Nanongkai, Liu Yang, Thatchaphol Saranurak, and Sorrachai Yingchareonthawornchai. Computing and testing small connectivity in near-linear time and queries via fast local cut algorithms. In Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 2046–2065. Society for Industrial and Applied Mathematics, 2020. doi:10.5555/3381089.3381215.
  • [26] Oded Goldreich. Introduction to Property Testing. Cambridge University Press, 2017. doi:10.1017/9781108135252.
  • [27] Oded Goldreich. On Testing Hamiltonicity in the Bounded Degree Graph Model, pages 282–292. Springer Nature Switzerland, 2025. doi:10.1007/978-3-031-88946-2_15.
  • [28] Oded Goldreich, Shari Goldwasser, and Dana Ron. Property testing and its connection to learning and approximation. Journal of the ACM, 45(4):653–750, 1998. doi:10.1145/285055.285060.
  • [29] Oded Goldreich and Dana Ron. Property testing in bounded degree graphs. Algorithmica, 32(2):302–343, 2002. doi:10.1007/s00453-001-0078-7.
  • [30] Lov K. Grover. A fast quantum mechanical algorithm for database search. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC), pages 212–219. Association for Computing Machinery, 1996. doi:10.1145/237814.237866.
  • [31] Aram W Harrow, Cedric Yen-Yu Lin, and Ashley Montanaro. Sequential measurements, disturbance and property testing. In Proceedings of the 28th Annual Symposium on Discrete Algorithms (SODA), pages 1598–1611. Society for Industrial and Applied Mathematics, 2017. doi:10.5555/3039686.3039791.
  • [32] Frank Hellweg and Christian Sohler. Property testing in sparse directed graphs: Strong connectivity and subgraph-freeness. In 20th Annual European Symposium on Algorithms (ESA), pages 599–610. Springer Berlin Heidelberg, 2012. doi:10.1007/978-3-642-33090-2_52.
  • [33] Troy Lee. A note on the sign degree of formulas. arXiv:0909.4607, 2009. doi:10.48550/arXiv.0909.4607.
  • [34] Qipeng Liu and Mark Zhandry. On finding quantum multi-collisions. In Advances in Cryptology (EUROCRYPT), pages 189–218. Springer International Publishing, 2019. doi:10.1007/978-3-030-17659-4_7.
  • [35] Nikhil S. Mande, Justin Thaler, and Shuchen Zhu. Improved approximate degree bounds for k-distinctness. In Proceedings of the 15th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC), volume 158, pages 2:1–2:22. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPIcs.TQC.2020.2.
  • [36] Ashley Montanaro and Ronald de Wolf. A Survey of Quantum Property Testing. Number 7 in Graduate Surveys. Theory of Computing Library, 2016. doi:10.4086/toc.gs.2016.007.
  • [37] Yaron Orenstein and Dana Ron. Testing Eulerianity and connectivity in directed sparse graphs. Theoretical Computer Science, 412(45):6390–6408, 2011. doi:10.1016/j.tcs.2011.06.038.
  • [38] Pan Peng and Yuyang Wang. An optimal separation between two property testing models for bounded degree directed graphs. In 50th International Colloquium on Automata, Languages, and Programming (ICALP), volume 261, pages 96:1–96:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPIcs.ICALP.2023.96.
  • [39] Sofya Raskhodnikova, Dana Ron, Amir Shpilka, and Adam Smith. Strong lower bounds for approximating distribution support size and the distinct elements problem. SIAM Journal on Computing, 39(3):813–842, 2009. doi:10.1137/070701649.
  • [40] Dana Ron. Algorithmic and analysis techniques in property testing. Foundations and Trends in Theoretical Computer Science, 5(2):73–205, 2010. doi:10.1561/0400000029.
  • [41] Ronitt Rubinfeld and Asaf Shapira. Sublinear time algorithms. SIAM Journal on Discrete Mathematics, 25(4):1562–1588, 2011. doi:10.1137/100791075.
  • [42] Alexander A. Sherstov. The pattern matrix method. SIAM Journal on Computing (SICOMP), 40(6):1969–2000, 2011. doi:10.1137/080733644.
  • [43] Alexander A. Sherstov. The intersection of two halfspaces has high threshold degree. SIAM Journal on Computing, 42(6):2329–2374, 2013. doi:10.1137/100785260.
  • [44] Yaoyun Shi and Yufan Zhu. Quantum communication complexity of block-composed functions. Quantum Information & Computation, 9(5):444–460, 2009. doi:10.5555/2011791.2011798.
  • [45] Yuichi Yoshida and Hiro Ito. Query-number preserving reductions and linear lower bounds for testing. IEICE transactions on Information and Systems, E93.D(2):233–240, 2010. doi:10.1587/transinf.E93.D.233.
  • [46] Yuichi Yoshida and Hiro Ito. Testing k-edge-connectivity of digraphs. Journal of Systems Science and Complexity, 23(1):91–101, 2010. doi:10.1007/s11424-010-9280-5.