Abstract 1 Introduction 2 Preliminaries 3 Lower bounds for variants of CNFSAT using AC𝟐𝟎-QSETH 4 Quantum strong simulation of quantum circuits 5 Quantum lower bound for lattice counting and q-count problems 6 Hardness of Counting/Parity of OV, Hitting Set, and Set-Cover 7 Discussion and open questions References

QSETH Strikes Again: Finer Quantum Lower Bounds for Lattice Problem, Strong Simulation, Hitting Set Problem, and More

Yanlin Chen University of Maryland (QuICS), College Park, MD, USA Yilei Chen Tsinghua University, Beijing, China Rajendra Kumar Indian Institute of Technology Delhi, New Delhi, India Subhasree Patro Eindhoven University of Technology, The Netherlands Florian Speelman University of Amsterdam and QuSoft, The Netherlands
Abstract

Despite the wide range of problems for which quantum computers offer a computational advantage over their classical counterparts, there are also many problems for which the best known quantum algorithm provides a speedup that is only quadratic, or even subquadratic. Such a situation could also be desirable if we don’t want quantum computers to solve certain problems fast - say problems relevant to post-quantum cryptography. When searching for algorithms and when analyzing the security of cryptographic schemes, we would like to have evidence that these problems are difficult to solve on quantum computers; but how do we assess the exact complexity of these problems?

For most problems, there are no known ways to directly prove time lower bounds, however it can still be possible to relate the hardness of disparate problems to show conditional lower bounds. This approach has been popular in the classical community, and is being actively developed for the quantum case [1, 15, 14, 7].

In this paper, by the use of the QSETH framework [15] we are able to understand the quantum complexity of a few natural variants of CNFSAT, such as parity-CNFSAT or counting-CNFSAT, and also are able to comment on the non-trivial complexity of approximate versions of counting-CNFSAT. Without considering such variants, the best quantum lower bounds will always be quadratically lower than the equivalent classical bounds, because of Grover’s algorithm; however, we are able to show that quantum algorithms will likely not attain even a quadratic speedup for many problems. These results have implications for the complexity of (variations of) lattice problems, the strong simulation and hitting set problems, and more. In the process, we explore the QSETH framework in greater detail and present a useful guide on how to effectively use the QSETH framework.

Keywords and phrases:
Quantum conditional lower bounds, Fine-grained complexity, Lattice problems, Quantum strong simulation, Hitting set problem, QSETH
Category:
APPROX
Funding:
Yanlin Chen: Most of this work was completed while the author was at Centrum Wiskunde & Informatica (QuSoft).
Yilei Chen: Supported by Tsinghua University startup funding, and Shanghai Qi Zhi Institute Innovation Program SQZ202405.
Rajendra Kumar: Supported by the Chandrukha New Faculty Fellowship from IIT Delhi and the Prime Minister Early Career Research Grant from the Anusandhan National Research Foundation (ANRF).
Florian Speelman: Supported by the Dutch Ministry of Economic Affairs and Climate Policy (EZK), as part of the Quantum Delta NL program, and the project Divide and Quantum “D&Q” NWA.1389.20.241 of the program “NWA-ORC”, which is partly funded by the Dutch Research Council (NWO).
Copyright and License:
[Uncaptioned image] © Yanlin Chen, Yilei Chen, Rajendra Kumar, Subhasree Patro, and Florian Speelman; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Quantum computation theory
Related Version:
Full Version: https://arxiv.org/abs/2309.16431 [17]
Editors:
Alina Ene and Eshan Chattopadhyay

1 Introduction

A popular classical hardness conjecture known as the Strong Exponential Time-Hypothesis (SETH) says that determining whether an input CNF formula is satisfiable or not cannot be done in 𝒪(2n(1δ)) time for any constant δ>0 [27, 28]. Several fine-grained lower bounds based on SETH have been shown since then; see [36, 37] for a summary of many such results. Some of the SETH-hard problems are building blocks for fine-grained cryptography [8, 30]. Besides finding a satisfying assignment, natural variants of the CNFSAT problem include computing the count or the parity of the count of satisfying assignments to a CNF formula – #SETH and SETH conjecture complexity of these problems, respectively. These conjectures are weaker (i.e., more believable) than SETH, and can still be used to show fine-grained hardness of various problems [20].

When considering quantum computation, the SETH conjecture is no longer true, as using Grover’s algorithm for unstructured search [24] one can solve the CNFSAT problem in 2n2poly(n) time. Aaronson, Chia, Lin, Wang, and Zhang assume this Grover-like quadratic speedup is nearly optimal for CNFSAT and (independent of [15]) initiate the study of quantum fine-grained complexity [1]. However, conjectures such as #SETH or SETH are likely to still hold in the quantum setting because a Grover-like quantum speedup is not witnessed when the task is to compute the total number of satisfying assignments or the parity of this number. This situation can in some cases be exploited to give better quantum lower bounds than one would get from the conjectured quantum lower bound for the vanilla CNFSAT problem. This makes it at least as relevant (if not more) to study variants of CNFSAT and their implications in the quantum setting, as has been done classically. In fact, motivated by this exact observation, Buhrman, Patro, and Speelman [15] introduced a framework of Quantum Strong Exponential-Time Hypotheses (QSETH) as quantum analogues to SETH, with a striking feature that allows one to “technically” unify conjectures such as quantum analogues of SETH, #SETH, maj-SETH, etc. under one umbrella conjecture.

The QSETH framework

In their framework, Buhrman et al. consider the problem in which one is given a formula or a circuit representation of a Boolean function f:{0,1}n{0,1} and is asked whether a property P:=(Pn)n where Pn:𝒟{0,1}2n{0,1} on the truth table111Truth table of a formula ϕ on n variables, denoted by tt(ϕ), is a 2n bit string derived in the following way tt(ϕ)=a{0,1}nϕ(a); the symbol denotes concatenation. of this formula evaluates to 1. They conjectured that when the circuit representation is obfuscated enough then for most properties P (that are compression-oblivious properties as we will see in Definition 1), the time taken to compute Pn on the truth table of poly(n)-sized circuits is lower bounded by 𝖰(Pn), i.e. the 1/3-bounded error quantum query complexity of Pn, on all bit strings of length 2n.

It is not hard to see that such a conjecture cannot be true for all properties. In principle, one can construct properties for which the above statement would not hold. For instance, consider a property P that is trivial on truth tables of small formulas (i.e., poly(n) size) but complicated on formulas of longer length. These kinds of properties are likely to have very high quantum query complexity, but in reality, it will be trivial to compute such a Pn of P on formulas of poly(n) size. In order to prevent such scenarios the authors in [15] introduce the notion of compression-oblivious properties which they believe encompasses most of the naturally occurring properties. See Sections 2.2 and 2.3 of [15] for a detailed discussion on this topic and also see [18] for some new observations about the notion of compression-oblivious properties. To give a bit of intuition, first consider the set of truth tables corresponding to the set of poly(n) size formulas on n variables and consider the set of all the 2n bit strings. Compression-oblivious properties are those properties for which one cannot save in computational time to compute them on a string from the former set in comparison to computing the same property on strings from the latter set. More formally,222The definition of compression-oblivious properties as stated in this paper is a more formal version of its original definition in [15]. Also, see [18] for a discussion on this topic.

Definition 1 (𝖠𝖢2,p0- and 𝖠𝖢20-Compression-Oblivious Properties [15, 18]).

Let p. We say a property P is 𝖠𝖢2,p0-compression-oblivious333We say a language L𝖠𝖢2,p0 iff there exists a family of Boolean circuits {Cn}n corresponding to L such that n, Cn has depth at most 2 and circuit size |Cn|np., denoted by P𝒞𝒪(𝖠𝖢2,p0), if for every constant δ>0, for every quantum algorithm 𝒜 that computes P in the black-box setting, n,nn and a set L={L1,L2,}𝖠𝖢2,p0 of “hard languages”, such that circuit families {Cn′′1}n′′ corresponding to L1, circuit families {Cn′′2}n′′ corresponding to L2, , 𝒜 uses at least 𝖰(Pn)1δ quantum time on at least one of the inputs in {Cni}i[|L|].

In particular, we say a property P is 𝖠𝖢20-compression-oblivious (denoted by P𝒞𝒪(𝖠𝖢20)) if p such that P𝒞𝒪(𝖠𝖢2,p0).

With that, we can conjecture the following using the QSETH framework by [15].

Conjecture 2 (AC20-QSETH, consequences of [15]).

Let P be an 𝖠𝖢20-compression-oblivious property. The 𝖠𝖢20-QSETH conjecture states that p, such that for every constant δ>0, for every quantum algorithm 𝒜 that computes P in the white-box setting, n,nn, a set L={L1,L2,}𝖠𝖢2,p0, circuit families {Cn′′1}n′′ corresponding to L1, circuit families {Cn′′2}n′′ corresponding to L2, , the algorithm 𝒜 uses at least 𝖰(Pn)1δ quantum time on at least one of the inputs in {Cni}i[|L|].

Informally, the notion of 𝖠𝖢20-compression-obliviousness captures properties whose query complexity is a lower bound for the time complexity to compute the property even for truth tables of small CNF/DNF formulas. And, the 𝖠𝖢20-QSETH conjecture states that having access to this succinct representation of the truth table, i.e., the description of the formula itself, must not help towards improving the computation time in computing these properties. The terms black-box and white-box setting are used to highlight this difference - in the former setting (i.e., the black-box setting as stated in Definition 1) even though the input is a CNF/DNF formula, the algorithm is only allowed to evaluate the formula on required inputs and has no access to the description of the inputted CNF/DNF formula, and, in the latter setting (i.e., the white-box setting as stated in ˜2) the algorithm is allowed to use the description as well.

In comparison to the original QSETH paper (by Buhrman et al. [15]) where the framework was introduced and applied to a more complex class of formulas,444The authors in [15] extensively used QSETH framework for branching programs or equivalently NC circuits to show non-trivial lower bounds for edit distance and longest common subsequence problems. this paper instead serves as a guide to using QSETH for the lowest level of formulas, i.e., poly-sized CNF and DNF formulas, in a more elaborate fashion.

Table 1: Overview of conditional lower bounds for variants of CNFSAT and k-SAT. The variable h^ in the above table is an arbitrary natural number satisfying γh^1. Our results hold for the multiplicative factor γ[12n,0.4999) and the additive error Δ[1,2n).
Problem Variants Quantum lower bound Reference
CNFSAT
Vanilla 2n2o(n) Corollary 6
Parity 2no(n) Corollary 14
Majority 2no(n) Corollary 16
Strict Majority 2no(n) Corollary 16
Count 2no(n) Theorem 13
Countq 2no(n) Corollary 15
Δ-Additive error (2nΔ+h^(2nh^)Δ)1o(1) Theorem 21
γ-Multiplicative factor (1γ2nh^h^)1o(1) Corollary 26
k-SAT
k=Θ(log(n))
Vanilla 2n2o(n) Section 5, [1]
Parity 2no(n) Corollary 28
Count 2no(n) Corollary 28
Countq 2no(n) Corollary 28
γ-Multiplicative factor (1γ2nh^h^)1o(1) Corollary 29
Table 2: Overview of lower bounds based on AC20-QSETH - all the relevant details such as the definitions, reductions, etc., can be found in the full version of this paper [17]. The variable h^ in the above table is an arbitrary natural number satisfying γh^1. Our results hold for the multiplicative factor γ[12n,0.4999) and the additive error Δ[12n,1).
Problem Variants Quantum lower bound Reference
Strong Simulation
Exact (with n bits precision) 2no(n) [17, Theorem 4.2]
Exact (with 2 bits precision) 2no(n) [17, Corollary 4.3]
Δ-Additive error (1Δ+h^(2nh^)2nΔ)1o(1) [17, Corollary 4.5]
γ-Multiplicative factor (1γ2nh^h^)1o(1) [17, Theorem 4.7]
CVPp for p2
2n2o(n) [17, Section 5]
Lattice Counting
(for non-even norm)
Vanilla 2no(n) [17, Corollary 5.6]
γ-Multiplicative factor (1γ2nh^h^)1o(1) [17, Corollary 5.7]
q-count 2no(n) [17, Corollary 5.6]
Orthogonal Vectors
Vanilla n1o(1) [1, 15]
Parity n2o(1) [17, Corollary 6.8]
Count n2o(1) [17, Corollary 6.8]
γ-Multiplicative factor (1γn2h^h^)1o(1) [17, Corollary 6.8]
Hitting Set
Vanilla 2n2o(n) [17, Corollary 6.4]
Parity 2no(n) [17, Corollary 6.4]
Count 2no(n) [17, Corollary 6.4]
γ-Multiplicative factor (1γ2nh^h^)1o(1) [17, Corollary 6.4]
Set Cover
2no(n) [17, Corollary 6.11]
Summary and technical overview

In this paper, we use the QSETH framework (or precisely, AC20-QSETH) to “generate” natural variations of QSETH such as QSETH, #QSETH, maj-QSETH, etc., which could (arguably) already be acceptable standalone conjectures in the quantum setting, and study some of their interesting implications. Additionally, we also use the QSETH framework to prove quantum lower bounds for approximately counting the number of satisfying assignments to CNF formulas, a problem whose complexity has been of interest in the classical setting [22]; we study its quantum implications. See Section 3 for details. Proof of this result follows from a more detailed exploration of the QSETH framework than what was required in the original paper. Thus, as another contribution of this paper, we present a useful guide on how to effectively use the QSETH framework. Here we carefully summarize our contributions and technical overview below:

  • We zoom into Buhrman et al.’s QSETH framework at the lowest-level formula class, i.e., the class of polynomial-size CNFs and DNFs, and use it to study the quantum complexity of variations of CNFSAT problems. The QSETH framework is quite general which also makes it not entirely trivial to use it thus, we present a useful guide on how to effectively use the AC20-QSETH conjecture, for e.g., what lemmas need to be proved and what assumptions are needed to be made in order to understand the quantum complexity of CNFSAT and its variants; see Figure 1.

  • We can categorise the several variants of CNFSAT in two ways. First classification can be done by the width of the CNF formulas, i.e., k-CNFs versus CNFs of unbounded clause length. Second classification is made with the choice of the property of the truth table one desires to compute. See the summary of complexity all CNFSAT variants and their respective quantum time lower bounds in Table 1 and see below for the overview of the techniques used.

    • To prove the quantum time lower bounds for the property variants of CNFSAT problem we invoke AC20-QSETH (˜2). But, AC20-QSETH conjectures the hardness of properties on a set of CNF and DNF formulas. For properties like count, parity, majority, etc., it easily follows from De Morgan’s laws that these properties are equally hard on both CNF and DNF formulas. However, such arguments no longer hold when the properties are approximate variants of count for which we give nontrivial proofs; see Sections 3.1.2 and 3.1.3.

    • Additionally, we also use AC20-QSETH to understand quantum complexity of k-SAT and its property variants. Firstly we study the classical reduction from CNFSAT to k-SAT given by [16] and observe that the 2n2 quantum lower bound for k-SAT, for k=Θ(logn), follows from the quantum lower bound of CNFSAT. Moreover, we make an important observation that this reduction by [16] is count-preserving and can be used to conclude lower bounds for other counting variants of k-SAT. See Table 1.

  • Having (somewhat) understood the complexities of these variants of CNFSAT, we then prove conditional quantum time lower bounds for lattice problem, strong simulation, orthogonal vectors, set cover, hitting set, and their respective variants; see Table 2.

    • The quantum 2n2 time lower bound we present for CVPp (for p2) follows from a reduction from k-SAT to CVPp by [11, 2] and from the hardness result of k-SAT we present. Though such a result would also trivially follow by using Aaronson et al.’s version of QSETH, we stress that our hardness result of k-SAT is based on basic-QSETH which is a more believable conjecture.555If basic-QSETH from Buhrman et al.’s framework is false then Aaronson et al.’s QSETH is also false, but the implication in the other direction is not obvious.

    • Additionally, we also discuss the quantum complexity of the lattice counting problem (for non-even norm). We present a reduction, using a similar idea of [11], from #k-SAT to the lattice counting problem and we show a 2n time quantum lower bound for the latter when k=Θ(logn). As mentioned earlier, we get a 2n time quantum lower bound for #k-SAT, when k=Θ(logn), using AC20-QSETH.

    • As another application to the bounds we get from the property variants of CNFSAT we look at the strong simulation problem. It was already established by [19, 35] that strong simulation of quantum circuit is a #P-hard problem but in this work we give exact lower bounds for the same. Additionally, using the lower bounds of approximate counts of CNFSAT we are able to shed light on how hard it is to quantumly solve the strong simulation problem with additive and multiplicative error approximation.

    • Last but not least, we are also able to use the lower bounds for the property variants of CNFSAT to give interesting lower bounds for orthogonal vectors, hitting set problem and their respective variants. See Section 6 for more details.

    Our motivation to study the worst-case complexities of counting versions of these problems stems from the fact that worst-case complexity of counting versions of problems have been used in past to understand average-case complexity of other related problems. And, computational problems that have high average-case complexities usually find their place in cryptographic primitives. For example, Goldreich and Rothblum in [23] present a worst-case to average-case reduction for counting t-cliques in graph and use the average-case hardness result towards constructing an interactive proof system. Another such example is that of the OV problem - Ball et al. in [9] use the worst-case hardness of the counting variant of OV to first prove average-case hardness of evaluating low-degree polynomials which they use towards a Proofs of Work (PoW) protocol. Furthermore, Buhrman et al. in [15] observed that this PoW protocol in combination with QSETH ensures that the quantum provers also require the same time as the classical provers.666Note that counting the number of OV pairs on average has a fast algorithm [21] so a worst-case to average-case reduction for counting OV is not possible under standard fine-grained complexity assumptions.

Related work

Our paper is a follow-up work to the original QSETH paper by [15]; also the list of problems for which we show lower bounds does not overlap with the problems studied in [15]. A basic version of QSETH was also introduced by Aaronson et al. [1] where they primarily used it to study the quantum complexity of closest pair and bichromatic pair problems; they also discuss the complexity of the (vanilla version of) orthogonal vector problem. Prior to this work, a quantum hitting-set conjecture was proposed and its implications were discussed in Schoneveld’s bachelor thesis [33], but their definition of hitting set is different from ours. In our work, we observe that the parsimonious reduction from CNFSAT to hitting set given by [20] is easily quantizable, using which we get a QSETH-based lower bound. Recently, Huang et al. [26] showed a significant barrier to establishing fine-grained quantum reductions from k-SAT to lattice problems in the Euclidean norm. In contrast, our work focuses on lattice problems in the p norm, where p is not an even integer.

Figure 1: Step-by-step guide on how to use the QSETH framework in a plug-and-play manner to show hardness results for P-CNFSAT. Here P can be any (partial or total) Boolean property of truth tables.

2 Preliminaries

2.1 Quantum query complexity of Boolean properties

We start with defining Boolean properties, and then we will define the bounded-error quantum complexity of computing those properties.

Definition 3 (Property).

A Boolean property (or just property) is a sequence P:=(Pn)n where each Pn is a set of Boolean functions defined on 2n variables.

The (bounded-error) quantum query complexity is defined only in a non-uniform setting, therefore, it is defined for Pn for every n instead of directly defining for P. A quantum query algorithm 𝒜 for Pn:{0,1}2n{0,1}, on an input x{0,1}2n begins in a fixed initial state |ψ0, applies a sequence of unitaries U0,Ox,U1,Ox,,UT, and performs a measurement whose outcome is denoted by z. Here, the initial state |ψ0 and the unitaries U0,U1,,UT are independent of the input x. The unitary Ox represents the “query” operation, and maps |i|b to |i|b+xi mod 2 for all i[2n]1. We say that 𝒜 is a 1/3-bounded-error algorithm computing Pn if for all x in the domain of Pn, the success probability of outputting z=Pn(x) is at least 2/3. Let cost(𝒜) denote the number of queries 𝒜 makes to Ox throughout the algorithm. The 1/3-bounded-error quantum query complexity of Pn, denoted by 𝖰(Pn), is defined as 𝖰(Pn)=min{cost(𝒜):𝒜 computes Pn with error probability 1/3}.

2.2 CNFSAT and 𝒌-SAT

A Boolean formula over variables x1,,xn is in CNF form if it is an AND of OR’s of variables or their negations. More generally, a CNF formula has the form

i(jvij)

where vij is either xk or ¬xk. The terms vij are called literals of the formula and the disjunctions jvij are called its clauses. A k-CNF is a CNF formula in which all clauses contain at most k literals (or the clause width is at most k). Note that when k>n, then clauses must contain duplicate or trivial literals (for example, xk¬xk and xkxk), therefore we can assume without loss of generality that k is at most n. A DNF is defined in the exact same way as CNF, except that it is an OR of AND’s of variables or their negations, that is, a DNF formula has the form i(jvij). We also define computational problems k-SAT and CNFSAT.

Definition 4 (CNFSAT).

Given as input a CNF formula ϕ defined on n variables, the goal is to determine if x{0,1}n such that ϕ(x)=1.

Definition 5 (k-SAT).

Given as input a k-CNF formula ϕ defined on n variables, the goal is to determine if x{0,1}n such that ϕ(x)=1.

3 Lower bounds for variants of CNFSAT using AC𝟐𝟎-QSETH

We will now define several variants of CNFSAT problem and using AC20-QSETH understand the quantum complexities of all of them. The consequences of these hardness results, some of which follow immediately and the rest with some work, will be discussed in Sections 4, 5, and 6. We begin with some common variants of CNFSAT problem (such as k-SAT) which are also very well studied classically [20]; we do this in Section 3.1.1. And, proceed with some less popular variants (Sections 3.1.2, 3.1.3, and 3.2) but with interesting consequences (presented in Sections 4, 5, and 6).

3.1 Quantum complexity of CNFSAT and other related problems

We first restate the quantum hardness of CNFSAT before delving into showing hardness results for its other variants. Interestingly, for the property OR:{0,1}2n{0,1}, where for x{0,1}2n we define OR(x)=1 if |x|1 and OR(x)=0 whenever |x|=0, we can explicitly prove that OR𝒞𝒪(𝖠𝖢20) [15, 18]. Also, note that computing OR on truth tables of DNF formulas of poly(n) length can be computed in poly(n) time. Hence, using AC20-QSETH we can recover the following Basic-QSETH conjecture.

Corollary 6 (Basic-QSETH [15]).

For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that solves CNFSAT (even restricted to formulas with mcn2 clauses) in 𝒪(2n(1δ)2) time, unless AC20-QSETH (˜2) is false.

Note that Aaronson et al. [1] directly conjecture the above statement, while in our case the above conjecture is implied by AC20-QSETH (˜2), and we will show how AC20-QSETH can imply other conjectured time lower bound for variants of CNFSAT problems in this subsection.

3.1.1 Quantum complexity of #CNFSAT, CNFSAT, #𝒒CNFSAT and maj-CNFSAT

To give conditional quantum lower bounds for variants of CNFSAT, we should understand their corresponding quantum query lower bound (on the 2n-bit truth table). Here we introduce the properties that correspond to those popular variants of CNFSAT (which will be defined later.)

Definition 7.

Let |x|=|{i:xi=1}| denote the Hamming weight of N-bit binary string x. We here list some properties defined on binary strings.

  1. 1.

    count: Let count:{0,1}N[N]{0} be the non-Boolean function defined by count(x)=|x|.

  2. 2.

    parity: Let parity:{0,1}N{0,1} be the Boolean function defined by parity(x)=|x|mod2.

  3. 3.

    countq: Let q be an integer and let countq:{0,1}N[q]1 be the non-Boolean function defined by countq(x)=|x|modq.

  4. 4.

    majority: Let majority:{0,1}N{0,1} be the Boolean function defined by

    majority(x)={1 if |x|N2,0otherwise.

    And, there is also the following function almost similar to majority.

  5. 5.

    st-majority: Let st-majority:{0,1}N{0,1} be the Boolean function with

    st-majority(x)={1 if |x|>N2,0otherwise.

Here, we define variants of CNFSAT corresponding to the above-mentioned properties.

Definition 8 (variants of CNFSAT).

Let |ϕ|={y{0,1}n:ϕ(y)=1} denote the Hamming weight of the truth table of ϕ. The following lists five variants of CNFSAT:

  1. 1.

    #CNFSAT: Given a CNF formula ϕ on n input variables, output |ϕ|.

  2. 2.

    CNFSAT: Given a CNF formula ϕ on n input variables, output |ϕ|mod2.

  3. 3.

    #qCNFSAT: Given a CNF formula ϕ on n input variables and an integer q[2n]{1}, output |ϕ|modq.

  4. 4.

    maj-CNFSAT: Given a CNF formula ϕ on n input variables, output 1 if |ϕ|2n/2 (else output 0).

  5. 5.

    st-maj-CNFSAT: Given a CNF formula ϕ on n input variables, output 1 if |ϕ|>2n/2 (else output 0).

Now again, we use the quantum query lower bound for P whenever we want to discuss the time complexity of P-CNFSAT as in the QSETH framework by [15]. Therefore, immediately after the definitions for variants of CNFSAT (with respect to property P), we will introduce the corresponding bounded-error quantum query lower bound for computing P, and then conjecture the time lower bound for P-CNFSAT (P variant CNFSAT) using this query lower bound. After that, we can use lower bounds for those variants of CNFSAT to understand the quantum complexity of (variants of) k-SAT. We include the quantum query lower bounds for those properties for completeness.

Lemma 9 ([10]).

The bounded-error quantum query complexity for count, parity, majority and st-majority on inputs of N-bit Boolean strings is Ω(N).

Proof.

[10] showed that the bounded-error quantum query complexity of a (total) Boolean function f:{0,1}N{0,1}, denoted by 𝖰(f) is lower bounded by 1/2 of the degree of a minimum-degree polynomial p that approximates f on all X{0,1}N, i.e., |p(X)f(X)|1/3; let us denote this approximate degree by deg~(f). Another important result by Paturi [32] showed that if f is a non-constant, symmetric777A symmetric Boolean function f:{0,1}N{0,1} implies f(X)=f(Y) for all X,Y whenever |X|=|Y|. and total Boolean function on {0,1}N then deg~(f)=Θ(N(NΓ(f))) where Γ(f)=min{|2kN+1|:fkfk+1 and 0kN1} and fk=f(X) for |X|=k.

Using the above two results we can show the following:

  1. 1.

    Γ(parity)=0 for odd N and Γ(parity)=1 whenever N is even. Hence 𝖰(parity)=Ω(N).888One can actually immediately give 𝖰(parity)N/2 by an elementary degree lower bound without using Paturi’s result.

  2. 2.

    Similar to the above item Γ(majority)=Γ(st-majority)=0 for odd N and Γ(majority)=Γ(st-majority)=1 otherwise. Hence, 𝖰(majority)=Ω(N) and 𝖰(st-majority)=Ω(N).

  3. 3.

    Any of the above three properties can be computed from count. Hence, 𝖰(count)=Ω(N).

Lemma 10.

Let q[3,N2] be an integer and countq:{0,1}N[q]1 be the function defined by countq(x)=count(x)modq. Then 𝖰(countq)=Ω(N(N2q+1)).

Proof.

Let dec-countq be a decision version of the countq defined for all x{0,1}N as

dec-countq(x)={1, if countq(x)=q1,0, otherwise. (1)

When the function is non-constant and symmetric then one can use Paturi’s theorem to characterize the approximate degree of that function [32]. It is easy to see that dec-countq is a non-constant symmetric function. Combining both these results we get that 𝖰(dec-countq)=Ω(N(NΓ(dec-countq))).

We now compute the value of Γ(dec-countq). For any symmetric Boolean function f:{0,1}N{0,1} the quantity Γ(f) is defined as Γ(f)=mink{|2kN+1|} such that fkfk+1 and fk=f(x) for |x|=k with 1kN1. It is easy to see that dec-countq(x)=1 only for x with Hamming weight |x|=rq1 where r is an integer and dec-countq(x)=0 elsewhere. Let r be the integer such that rq1N2(r+1)q1 then the k minimizing Γ(dec-countq) is either rq1 or (r+1)q1. This implies that Γ(dec-countq)2q1, which in turn implies that NΓ(dec-countq)N2q+1. Therefore, 𝖰(dec-countq)=Ω(N(N2q+1)).

As one can compute dec-countq using an algorithm that computes countq, we therefore have 𝖰(countq)=Ω(N(N2q+1)).

As we don’t yet know how to prove compression-obliviousness of properties with high query complexities (Theorem 9 in [15]) we instead conjecture that count, parity, majority and st-majority are compression oblivious for poly-sized CNF and DNF formulas. We think it is reasonable to make this conjecture since it will falsify certain commonly-used cryptography assumptions if those properties are not compression oblivious. See [18] for a discussion on this topic.

Conjecture 11.

The following properties

  1. 1.

    parity:{0,1}2n{0,1},

  2. 2.

    countq:{0,1}2n[q1]{0} where 2<q2n1,

  3. 3.

    majority:{0,1}2n{0,1}, and

  4. 4.

    st-majority:{0,1}2n{0,1}

stated in Definition 7 are in 𝒞𝒪(AC20).

Corollary 12.

Let AC20 denote the class of poly(n) sized CNF and DNF formulas on n input variables. If any one item of Conjecture 11 is true then the property count:{0,1}2n[2n]{0} is in 𝒞𝒪(AC20).

We can now invoke AC20-QSETH (as mentioned in ˜2) to prove the quantum hardness for #CNFSAT, CNFSAT, maj-CNFSAT and st-maj-CNFSAT.

Theorem 13 (#QSETH).

For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that solves #CNFSAT (even restricted to formulas with mcn2 clauses) in 𝒪(2n(1δ)) time, unless AC20-QSETH (˜2) is false or count𝒞𝒪(AC20) (i.e., each item of Conjecture 11 is false).

Proof.

By way of contradiction, let us assume that there exists a bounded-error quantum algorithm 𝒜 that solves #CNFSAT on n variables (and on m clauses with some mcn2) in 𝒪(2n(1δ)) time for some δ>0. Then given a circuit CAC20 we do one of the following:

  • if C is a poly-sized CNF formula then we use the algorithm 𝒜 to compute the number of satisfying assignments to C in 𝒪(2n(1δ)) time. Or,

  • if C is a poly-sized DNF formula then we first construct the negation of C, let us denote by ¬C, in poly(n) time; using De Morgan’s law we can see that the resulting formula ¬C will be a poly(n) CNF formula. Using 𝒜 we can now compute the number of satisfying assignments t to ¬C in 𝒪(2n(1δ)) time. The number of satisfying assignments to C would be then 2nt.

The existence of an algorithm such as 𝒜 would imply that AC20-QSETH is false. Hence, proved.

Using similar arguments as in the proof of Theorem 13 we can conclude the following statements.

Corollary 14 (QSETH).

For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that solves CNFSAT (even restricted to formulas with mcn2 clauses) in 𝒪(2n(1δ)) time, unless AC20-QSETH (˜2) is false or parity𝒞𝒪(AC20) (i.e., Item 1 of Conjecture 11 is false).

Corollary 15 (#qQSETH).

Let q[3,N2] be an integer. For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that solves #qCNFSAT (even restricted to formulas with mcn2 clauses) in 𝒪(2n(1δ)) time, unless AC20-QSETH (˜2) is false or countq𝒞𝒪(AC20) (i.e., Item 2 of Conjecture 11 is false).

Corollary 16 (Majority-QSETH).

For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that solves

  1. 1.

    maj-CNFSAT (even restricted to formulas with mcn2 clauses) in 𝒪(2n(1δ)) time, unless AC20-QSETH is false or majority𝒞𝒪(AC20) (i.e., Item 3 of Conjecture 11 is false);

  2. 2.

    st-maj-CNFSAT (even restricted to formulas with mcn2 clauses) in 𝒪(2n(1δ)) time, unless AC20-QSETH is false or st-majority𝒞𝒪(AC20) (i.e., Item 4 of Conjecture 11 is false).

Akmal and Williams showed that one can actually compute the Majority on the truth table of k-CNF formulas for constant k in polynomial time, while computing the strict-Majority on the truth table of such formulas is NP-hard [6]. Therefore, here we define both majority and strict-majority and their variants of CNFSAT problems for clarity (and state the hardness of both problems in one conjecture). Note that for CNFSAT, each clause is allowed to contain n literals (which means k is no longer a constant), and in this case, it is not clear if one can solve maj-CNFSAT in polynomial time or not. Therefore, none of AC20-QSETH, Items 3 and 4 of Conjecture 11 is immediately false yet. (See also the discussion at the bottom of page 5 in the arXiv version of [6] for reductions between maj-CNFSAT and st-maj-CNFSAT.)

3.1.2 Quantum complexity of 𝚫-add-#CNFSAT

Instead of the exact number of satisfying assignments to a formula, one might be interested in an additive-error approximation. Towards that, we define the problem Δ-add-#CNFSAT as follows.

Definition 17 (Δ-add-#CNFSAT).

Given a CNF formula ϕ on n variables. The goal of the problem is to output an integer d such that |d|ϕ||<Δ where Δ[1,2n].

This problem (Definition 17) can be viewed as computing the following property on the truth table of the given formula.

Definition 18 (Δ-add-count).

Given a Boolean string x{0,1}N, Δ-add-count asks to output an integer w such that |w|x||<Δ where Δ[1,N).

Note that Δ-add-count is a relation instead of a function now because its value is not necessarily uniquely defined. The bounded-error quantum query complexity for computing Δ-add-count was studied in [31]. They showed the following result.

Theorem 19 (Theorem 1.11 in [31]).

Let Δ[1,N). Every bounded-error quantum algorithm that computes Δ-add-count uses Ω(NΔ+t(Nt)Δ) quantum queries on inputs with t ones.

For values of Δ=o(t) we are unable to prove the compression-obliviousness of this property. Hence, we make the following conjecture.

Conjecture 20.

Δ-add-count𝒞𝒪(AC20).

One can now establish the time lower bound for computing the Δ-add-count on poly(n)-sized CNF and DNF formulas. However, this doesn’t automatically imply the same lower bound for the case when there are only CNF formulas to consider. Fortunately, Δ-add-count is defined in such a way that computing this property is equally hard for both CNF and DNF formulas. More precisely, the following statement holds.

Theorem 21 (Δ-add-#QSETH).

Let Δ[1,2n). For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that solves Δ-add-#CNFSAT (even restricted to formulas with mcn2 clauses) in 𝒪((NΔ+h^(Nh^)Δ)1δ) time where h^ is the number of satisfying assignments, unless AC20-QSETH (˜2) is false or Δ-add-count𝒞𝒪(AC20) (i.e., Conjecture 20 is false).

Proof.

By way of contradiction let’s assume that there is an algorithm 𝒜 such that given a CNF formula it can compute the Δ-add-count on its truth table in 𝒪((NΔ+t(Nt)Δ)1β) time for some constant β>0.

Then, given a poly(n) sized DNF formula on n variables, let us denote that by ϕ, we can run Algorithm 𝒜 on ¬ϕ and use its output which is a Δ additive error approximation of the number of satisfying assignments to ¬ϕ to compute a Δ additive error approximation of the number of satisfying assignments to ϕ.

Let us denote the number of satisfying assignments of ¬ϕ by d and the output of Algorithm 𝒜 by d. This means we have |dd|<Δ. We claim that 2nd will be a Δ additive error approximation of 2nd, which is the number of satisfying assignments of ϕ; |(2nd)(2nd)|=|dd|<Δ.

Therefore, a 𝒪((NΔ+t(Nt)Δ)1β) time algorithm for computing Δ-add-count on truth table of CNF formulas also implies a 𝒪((NΔ+t(Nt)Δ)1β) time algorithm for computing Δ-add-count on truth table of DNF formulas; this violates the combination of AC20-QSETH and Conjecture 20. Hence, proved.

3.1.3 Quantum complexity of 𝜸-#CNFSAT and other related problems

One other approximation of the count of satisfying assignments is the multiplicative-factor approximation, defined as follows.

Definition 22 (γ-#CNFSAT).

Let γ(0,1). The γ-#CNFSAT problem is defined as follows. Given a CNF formula formula ϕ on n Boolean variables, The goal of the problem is to output an integer d such that (1γ)|ϕ|<d<(1+γ)|ϕ|. 999The same results hold if the approximation is defined with the equalities, i.e., (1γ)|ϕ|d(1+γ)|ϕ|. An additional observation under this changed definition of γ-#CNFSAT is as follows. Given a CNF formula as input, the algorithm for γ-#CNFSAT outputs 0 only when there is no satisfying assignment to that formula. Hence, one can decide satisfiability of a given CNF formula using the algorithm for γ-#CNFSAT. Therefore, the same lower bound holds for this changed definition of γ-#CNFSAT.

The expression (1γ)|ϕ|<d<(1+γ)|ϕ| can be categorized into the following two cases.

  • Case 1 is when γ|ϕ|1: in this regime, the algorithm solving γ-#CNFSAT is expected to return the value |ϕ|, which is the exact count of the number of solutions to the CNFSAT problem. From Theorem 13 we postulate that for each constant δ>0, there is no 𝒪(2n(1δ)) time algorithm that can compute the exact number of solutions to input CNF formula; this is a tight lower bound.

  • Case 2 is when γ|ϕ|>1: in this regime, the algorithm solving γ-#CNFSAT is expected to return a value d which is a γ-approximate relative count of the number of solutions to the CNFSAT problem.

In order to understand the hardness of γ-#CNFSAT in the second case, we will first try to understand how hard it is to compute the following property. Let f,:𝒟{0,1} with 𝒟{0,1}N be a partial function defined as follows

f,(x)={1, if |x|=,0, if |x|=.

Nayak and Wu in [31] analyzed the approximate degree of f,. By using the polynomial method [10] again we have a lower bound on the quantum query complexity of f, as mentioned in the following statement.

Lemma 23 ([31, Corollary 1.2]).

Let , be such that , f,:𝒟{0,1} where 𝒟{0,1}N, and

f,(x)={1, if |x|=,0, if |x|=.

Let Δ=|| and p{,} be such that |N2p| is maximized. Then every bounded-error quantum algorithm that computes f, uses Ω(NΔ+p(Np)Δ) queries.

Using AC20-QSETH we will now show that for a choice of , computing f, on truth tables of CNF formulas of poly(n) size requires Ω(2nΔ+p(2np)Δ) time where Δ=|| and p{,} that maximises |2n1p|. The only caveat (as also witnessed several times earlier) is that we cannot prove the compression obliviousness of f, hence we state and use the following conjecture.

Conjecture 24.

For any pair of integers ,[2n]{0} satisfying that , f,𝒞𝒪(AC20).101010Note that, there are some values of , for which f, will be provably compression oblivious, for e.g., =1 and =0 would capture the OR property which is compression oblivious; see Section 3.1.

And we can show the following.

Lemma 25.

Let ,[2n]{0} be such that . If both AC20-QSETH(˜2) and Conjecture 24 hold, then at least one of the following is true:

  • For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that computes f, on the truth table of CNF formulas defined on n variables in 𝒪((2nΔ+p(2np)Δ)1δ) time (even restricted to formulas with mcn2 clauses);

  • For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that computes fN,N on the truth table of CNF formulas defined on n variables in 𝒪((2nΔ+p(2np)Δ)1δ) time (even restricted to formulas with mcn2 clauses);

here Δ=|| and p{,} such that |2n1p| is maximized. In particular, when +=2n, the above immediately implies the following:

  • For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that computes f, on the truth table of CNF formulas defined on n variables in 𝒪((2nΔ+Δ)1δ) time (even restricted to formulas with mcn2 clauses).

Proof.

Let N be an integer that we will fix later and let f,:{0,1}N{0,1} be defined as follows

f,={1, if |x|=N,0, if |x|=N.

It is not hard to see f, is the same as function fN,N. Fortunately, both the functions fN,N and f, have the same value of Δ and h where h=p(Np). Therefore the bounded error quantum query complexity of f, is Ω(NΔ+p(Np)Δ) where Δ=|| and p{,} such that |N2p| is maximised; same as the bounded error quantum query complexity of f, as mentioned in Lemma 23.

Moreover, as f, is the same function fN,N it is therefore clear from Conjecture 24 that f,𝒞𝒪(AC20) which means there is no bounded error quantum algorithm that can compute f, or f, on truth tables of poly(n) size CNF or DNF formulas defined on n input variables in 𝒪((2nΔ+p(2np)Δ)1δ) time for any constant δ>0 unless AC20-QSETH is false. We will now show that conditional on AC20-QSETH this result holds even when we restrict ourselves to only poly(n) sized CNF formulas.

Having introduced f, we will now prove Lemma 25 using the following propositions.

  • Proposition A There is no bounded error quantum algorithm that can compute f, on truth table of CNF formulas defined on n variables in 𝒪((2nΔ+p(2np)Δ)1δ) time for any δ>0.

  • Proposition B There is no bounded error quantum algorithm that can compute f, on truth table of DNF formulas defined on n variables in 𝒪((2nΔ+p(2np)Δ)1δ) time for any δ>0.

  • Proposition C There is no bounded error quantum algorithm that can compute f, on truth table of CNF formulas defined on n variables in 𝒪((2nΔ+p(2np)Δ)1δ) time for any δ>0.

  • Proposition D There is no bounded error quantum algorithm that can compute f, on truth table of DNF formulas defined on n variables in 𝒪((2nΔ+p(2np)Δ)1δ) time for any δ>0.

Conditional on Conjecture 24 and AC20-QSETH the following statements hold.

  • Claim 1 At least one of the propositions A or B is true.

  • Claim 2 At least one of the propositions C or D is true.

  • Claim 3 At least one of the propositions A or C is true; by way of contradiction let us assume that both propositions A and C are false, this means there exist algorithms 𝒜,𝒜 that for an δ>0 and δ>0 compute f, and f, on the truth table of poly(n) size CNF formulas defined on n input variables in 𝒪((2nΔ+p(2np)Δ)1δ) time and in 𝒪((2nΔ+p(2np)Δ)1δ) time, respectively. Moreover, if propositions A and C are false then from Claims 1 and 2 we can deduce that both B and D must be true which means there is no quantum algorithm that can compute f, or f, on the truth table of poly(n) size DNF formulas on n input variables in 𝒪((2nΔ+p(2np)Δ)1δ) time for any δ>0. However, given a DNF formula ϕ as an input to compute f, on its truth table one can instead compute f, on the negation of ϕ, let us denote by ¬ϕ, using algorithm 𝒜 on ¬ϕ in 𝒪((2nΔ+p(2np)Δ)1δ) time which is a contradiction. This means at least one of the two propositions A or C must be true which is exactly the statement of Lemma 25.

Inspired by the arguments used in the proof of Theorem 1.13 in [31], we will now show that Lemma 25 implies the following result. Our result holds for γ[12n,0.4999); this range of γ suffices for our reductions presented in the later sections.

Corollary 26 (γ-#QSETH).

Let γ[12n,0.4999). For each constant δ>0, there exists c>0 such that there is no bounded-error quantum algorithm that solves γ-#CNFSAT (even restricted to formulas with mcn2 clauses) in time

  1. 1.

    𝒪((1γ2nh^h^)1δ) if γh^>1, where h^ is the number of satisfying assignments;

  2. 2.

    𝒪(2n(1δ)) otherwise,

unless AC20-QSETH(˜2) is false or , f,𝒞𝒪(AC20) (i.e., Conjecture 24 is false).

We show the first part of Corollary 26 in the following way and use the result from Theorem 13 for the second part. Given a value of γ[12n,0.4999) we will fix values of [2n]{0} and [2n]{0} such that we are able to compute f, on the truth table of an input CNF formulas on n variables using the algorithm that solves γ-#CNFSAT. Hence, we can show a lower bound on γ-#CNFSAT using the lower bound result from Lemma 25.

Proof.

Let N=2n. Let =N2+γt=N2+γt and =N2γt=N2γt; here t[N] is a value that we will fix later but in any case, we have 1γt<N2. With that, we are ensured that γ>12. We also make sure to choose values , in such a way that γ=Ω(1). Clearly, +=N and Δ=||=2γt. Therefore by invoking the result from Lemma 25 we can say that for these values of , there is no bounded-error quantum algorithm that can solve f, on the truth table of CNF formulas in 𝒪((Nγt+(N)γt)1δ) time, for each δ>0; let us denote this claim by (*).

Let 𝒜 be an algorithm that computes γ-#CNFSAT, i.e., Algorithm 𝒜 returns a value h such that (1γ)h^<h<(1+γ)h^. Given =N2+γt and =N2γt, there are values of t[N] such that we will be able to distinguish whether the number of satisfying assignments to a formula is or using Algorithm 𝒜. As > in our setup, we want t such that (1+γ)<(1γ); it is then necessary that γN<2γt; let us denote this as Condition 1.

Now we set the values of and . Given a value of γ[1N,12), we set =N2(1γ) and =N. This implies N2(1γ)<N2(1γ)+1, N(12γ)2(1γ)1<N(12γ)2(1γ), and γN(1γ)||<γN(1γ)+2. Therefore we obtain 2γ2γ||<2γ+2.111111To view the calculations in a less cumbersome way one can use the fact that asymptotically =N2(1γ), =N(12γ)2(1γ) and ||=γN(1γ)=2γ. We know from claim (*) that every quantum algorithm that (for these values of ,) computes f, on CNF formulas requires Ω(L1δ) time for each δ>0, where L=1γN+1=Ω(1γN). Moreover, is (1)(12γ)1<(12γ). Therefore, we can see that L=Ω(1γN)=Ω(12γγN)=Ω(1γN).

It is also easy to see that if =N2(1γ) were to be expressed as N2+γt (i.e. denote to be N2+γt), then for that value of t we have γt=N2(1γ)N2Nγ2(1γ)>Nγ2, which satisfies Condition 1. Hence here we can use Algorithm 𝒜 to distinguish whether the number of satisfying assignments to a formula is or . Hence given a CNF formula as input, we will be able to use Algorithm 𝒜 to distinguish whether the number of satisfying assignments is or . Let T=1γN+1γN=𝒪(1γN). If for some constant δ>0, 𝒜 can solve γ-#CNFSAT on an input CNF formula that has h^ number of satisfying assignments in 𝒪((1γNh^h^)1δ) time, then we are essentially computing f, in 𝒪(T1δ) time, which is a contradiction to claim (*). Hence the first part of the statement of Corollary 26 proved.

Proof of the second part of this theorem follows from Theorem 13 as the regime γh^1 translates to exactly counting the number of satisfying assignments.

3.2 Quantum complexity of #k-SAT and other related problems

In the previous subsection, we discussed the quantum complexity of variants of CNFSAT problems. However, it is not clear how to immediately derive a similar quantum complexity result for variants of k-SAT problems with constant k by using the quantum (conditional) hardness results for variants of CNFSAT problems. Of course we could make a further conjecture about variants of k-SAT problems like we did in the previous subsection, but it would introduce too many conjectures. Moreover, some variants of k-SAT (for constant k) are even shown to be solvable in polynomial time [6].

To give the (quantum) complexity of some optimization problems (for example, lattice problems [11]), on the other hand, we might want to have some (quantum) conditional lower bounds for (variants of) k-SAT problems with not too large k. This is because we might make 2kpoly(n) calls to a solver of those problems to solve k-SAT. This is undesirable for giving the (quantum) complexity of those optimization problems when k approaches n, while it is tolerable for a relatively small k (like k=polylogn). Hence in this subsection, we would like to say something interesting about quantum hardness for #k-SAT and k-SAT when k=Θ(logn), only using the hardness assumptions on counting-CNFSAT (that is, #QSETH). Here, variants of k-SAT are defined exactly the same way as Definition 8, Definition 17, and Definition 22, except that the input is now a k-CNF formula.

We use the classical algorithm by Schuler [34].121212This algorithm can also be used to solve CNFSAT on n variables, m clauses in 𝒪(poly(n)2n(11/(1+logm))) expected time. This algorithm can be viewed as a Turing reduction from SAT with bounded clause density to SAT with bounded clause width, which was analyzed in [16]. The time complexity of this algorithm is upper bounded by (m+n/kn/k)poly(m,n), where m is number of clauses.

Algorithm 1 ReduceWidthk(ψ).

Algorithm 1 takes as input a CNF formula of width greater than k, and then outputs a list of k-CNF formulas ψi where the solutions of the input formula is the union of the solutions of the output formulas, i.e., sol(ψ)=isol(ψi), where sol(ϕ) denotes the set of satisfying assignments to a formula ϕ. In fact, it is not hard to see that the count of the number of satisfying assignments also is preserved, i.e., |sol(ψ)|=i|sol(ψi)|.

Lemma 27 (Implicit from Section 3.2 in [16]).

Algorithm 1 takes as input a CNF formula ψ on n input variables, with m clauses, that is of width strictly greater than k and outputs a number of k-CNF formulas ψi each defined on at most n input variables and at most m clauses such that |sol(ψ)|=i|sol(ψi)|.

In the full version of this paper [17] we present the proof for completeness. Using Lemma 27 and Lemma 5 in [16] we will now show the hardness of k-SAT and its counting variants when k=Θ(logn) without introducing new conjectures.

Corollary 28.

For each constant δ>0, there exists a constant c such that there is no bounded-error quantum algorithm that solves

  1. 1.

    clogn-SAT in 𝒪(2(1δ)n/2) time unless Basic-QSETH (see Corollary 6) is false;

  2. 2.

    #clogn-SAT in 𝒪(2(1δ)n) time unless #QSETH (see Theorem 13) is false;

  3. 3.

    clogn-SAT in 𝒪(2(1δ)n) time unless QSETH (see Corollary 14) is false;

  4. 4.

    qclogn-SAT in 𝒪(2(1δ)n) time unless #qQSETH (see Corollary 15) is false.

Proof.

We first prove the first item. Suppose that for each constant c, there is an algorithm 𝒜 that solves #clogn-SAT in 2ns for some constant s:=1δ<1. Let k=clogn for the rest of the proof. Consider the ReduceWidthk algorithm (Algorithm 1) with input CNF formula ψ. Let p be some path of length t in the tree T of recursive calls to ReduceWidth(ψ)k. Let ψp be the output formula of width at most k at the leaf of p. Let l,r be the number of left, right branches respectively on path p. Every left branch in the path reduces the width of exactly 1 clause to k, therefore lm. On the other hand, with additional poly(n,m) time, every right branch of path p reduces the number of variables by k, therefore rn/k. As a result, the number of paths in tree T with r right branches is at most (m+rr) and each outputs a formula with nrk variables.

Using the same arguments as in [16, Lemma 5], one can see that 𝒜 together with the ReduceWidthk subroutine can be used to solve #CNFSAT (ignoring poly(n) factors) in time at most

r=0n/k(m+rr)2s(nrk)+(m+n/kn/k)poly(m,n)
r=0n/k(m+nkr)2s(nrk)
= 2snr=0n/k(m+nkr)12srk
2sn(1+12sk)m+nk
2sne12sk(m+nk)since (1+x)ex
2sn+4m2sk,

where the last equality holds because we can assume that mnk without loss of generality (by appending dummy clauses). Therefore, for each c, there exist a constant c for k=clogn and δ such that if mcn2, then s+4mn2sk<1δ. As a result, a 2ns-time algorithm for #clogn-SAT implies a 2n(1δ)-time algorithm for #CNFSAT (restricted to formulas with mcn2), which would refute #-QSETH (Theorem 13). This proves the first item of the corollary. The same arguments hold for k-SAT, k-SAT, and qk-SAT as well.

Note that, we cannot extend the same arguments for the majority or st-majority or additive-error approximation of count because those properties are not count-preserving. However, these arguments do extend to the multiplicative-factor approximation of the count.

Corollary 29.

Let γ[12n,0.4999). For each constant δ>0, there exists constant c such that, there is no bounded-error quantum algorithm that solves γ-#clogn-SAT in time

  1. 1.

    𝒪((1γ2nh^h^)1δ) if γh^>1, where h^ is the number of satisfying assignments;

  2. 2.

    𝒪(2n(1δ)) otherwise,

unless γ-#QSETH (see Corollary 26, implied by Lemma 25) is false.

4 Quantum strong simulation of quantum circuits

Combining results from [25] with our results from Section 3 we are able to comment on the exact complexity of the strong simulation problem which is defined as follows.131313Note that this is different from the weak simulation problem; a weak simulation samples from probability distribution p(x):=|0n|C|x|2.

Definition 30 (The strong simulation problem).

Let p. Given a quantum circuit C on n qubits and x{0,1}n, the goal of strong simulation with p-bit precision is to output the value of |x|C|0n|:=0.C1C2 up to p-bit precision. That is, output C0.C1Cp1.141414Though in some papers the strong simulation problem requires that we output x|C|0n instead of |x|C|0n|, we use this definition because it is more comparable to the definition of the weak simulation problem. Also, the lower bound we present holds for both of these definitions.

For a quantum circuit C, computing |x|C|0n| exactly, to a precision of n bits, is #P-hard [19, 35]. This means even a quantum computer will likely require exponential time to strongly simulate another quantum circuit. In the full version of this paper [17], we prove a more precise quantum time bound for strongly simulating quantum circuits, both exactly and approximately; in the approximate case, we present complexity results for both multiplicative factor and additive error approximation. Our results extend the results by [25] in two directions: firstly, we give explicit (conditional) bounds proving that it is hard to strongly simulate quantum circuits using quantum computers as well. Secondly, we also address the open question posed by [25] on the (conditional) hardness of strong simulation up to accuracy O(2n/2), however, our results are based on a hardness assumption different from SETH or Basic QSETH.

Our results are based on two main components. Firstly, on the observation that the reduction from CNFSAT to the strong simulation problem given (in Theorem 3) by [25] encodes the count of the number of satisfying assignments; this fact allows us to use the same reduction to reduce other variants of CNFSAT, such as #CNFSAT or CNFSAT, to the strong simulation problem, moreover, the same reduction also allows us to reduce γ-#CNFSAT and Δ-add-#CNFSAT to analogous variants of the strong simulation problem, respectively. As the second main component, we use the quantum hardness of these variants of CNFSAT problem discussed in Section 3.

In the full version of this paper on arXiv, we first state the result of the exact quantum time complexity of the strong simulation problem and then use that result to later show how hard it is for a quantum computer to strongly simulate a quantum circuit with an additive error or a multiplicative factor approximation as stated in Table 2 - see [17] for details.

5 Quantum lower bound for lattice counting and q-count problems

In the full version of this paper on arXiv, we connect k-SAT to variants of lattice problems and then use the QSETH lower bound we have in Section 3.2 to give quantum fine-grained complexity for those lattice problems.

Fine-grained complexity of lattice problems is quite widely studied in the classical case [11, 2, 3, 5, 12, 13]. Lots of variants of lattice problems have been considered before, and the most well-studied one is the closest vector problem (with respect to p norm).

CVPp is known to have a 2n SETH lower bound for any p2 [11, 2], and for even p, there seems a barrier for showing a fine-grained reduction from k-SAT to CVP [4]. Kannan gave a n𝒪(n)-time algorithm for solving CVPp for arbitrary p1 [29], while the best-known algorithm for solving CVPp with noneven p is still ncn for some constant c. To get a conditional quantum lower bound for CVPp for noneven p, given there is already a classical reduction from k-SAT to CVPp using 2kpoly(n) time (for noneven p) [11, 2], either one can directly use the QSETH framework by Aaronson et al. [1] to get a 2(0.5ε)n lower bound, or we can use Corollary 28 to get the same lower bound in our QSETH framework.151515Basic QSETH assumption is weaker than the QSETH assumption in Aaronson et al [1], so our lower bound under basic QSETH assumption (2 and 6) will also imply a lower bound under their quantum SETH framework.

A natural question is invoked here: Can we have a 2(0.5+ε)n quantum SETH lower bound for any (variants of) lattice problems? The answer is yes by using the framework and the problems introduced in Section 3.2 and by considering the counting variant of lattice problems stated in Table 2. In the full version, we begin by introducing the (approximate) lattice counting problem and some other related problems - see [17] for all the relevant details.

6 Hardness of Counting/Parity of OV, Hitting Set, and Set-Cover

In the full version of this paper on arXiv we discuss the consequences of Corollary 26 and Corollary 28 for some well-motivated optimization problems: Orthogonal Vectors, Hitting Set and Set Cover as stated in Table 2 – see [17] for details.

7 Discussion and open questions

We believe that this paper opens up the possibility of concluding quantum time lower bounds for many other problems, both for other variants of CNFSAT and also for problems that are not immediately related to CNFSAT. While this is a natural broad future direction to explore, we also mention the following few directions for future work which are more contextual to this paper.

  • One of the motivations to use AC20-QSETH in this paper is so that we can “tie” certain conjectures, that would have otherwise been standalone conjectures, to one main conjecture. But in the process, we conjecture compression obliviousness of several properties. It would be nice if we could also have an “umbrella” conjecture that allows one to establish compression obliviousness of several properties. For e.g., it would be nice if we could show that compression obliviousness of a natural property like count or parity implies compression obliviousness of say Δ-add-count.

  • It will be interesting to see if one can use the QSETH framework (or the AC20-QSETH conjecture) to give a single exponential lower bound for #CVP in Euclidean norm.

  • Using Boolean function Fourier analysis, we were able to show that the existence of (quantum-secure) PRFs imply that majority and parity are compression oblivious, whenever the input is given by a formula or circuit. This proof technique could plausibly be extended to larger sets of functions that have a similar structure, e.g., a natural candidate would be to show an equivalent statement for symmetric functions with non-negligible mass on high-degree Fourier coefficients.

    Additionally, extending this result to majority / parity for AC20-QSETH, i.e. CNF or DNF input, would be another step towards grounding the (necessary) assumption that such properties are compression oblivious.

References

  • [1] Scott Aaronson, Nai-Hui Chia, Han-Hsuan Lin, Chunhao Wang, and Ruizhe Zhang. On the quantum complexity of closest pair and related problems. In Proceedings of the 35th Computational Complexity Conference, CCC ’20, Dagstuhl, DEU, 2020. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2020.16.
  • [2] Divesh Aggarwal, Huck Bennett, Alexander Golovnev, and Noah Stephens-Davidowitz. Fine-grained hardness of CVP(P) - everything that we can prove (and nothing else). In SODA, pages 1816–1835. SIAM, 2021. doi:10.1137/1.9781611976465.109.
  • [3] Divesh Aggarwal and Eldon Chung. A note on the concrete hardness of the shortest independent vector in lattices. Inf. Process. Lett., 167:106065, 2021. doi:10.1016/j.ipl.2020.106065.
  • [4] Divesh Aggarwal and Rajendra Kumar. Why we couldn’t prove SETH hardness of the closest vector problem for even norms, and of the subset sum problem! CoRR, abs/2211.04385, 2022. doi:10.48550/arXiv.2211.04385.
  • [5] Divesh Aggarwal and Noah Stephens-Davidowitz. (gap/s)eth hardness of SVP. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC, pages 228–238. ACM, 2018. doi:10.1145/3188745.3188840.
  • [6] Shyan Akmal and R. Ryan Williams. MAJORITY-3SAT (and related problems) in polynomial time. CoRR, abs/2107.02748, 2021. arXiv:2107.02748.
  • [7] Andris Ambainis, Harry Buhrman, Koen Leijnse, Subhasree Patro, and Florian Speelman. Matching triangles and triangle collection: Hardness based on a weak quantum conjecture, 2022. doi:10.48550/arXiv.2207.11068.
  • [8] Marshall Ball, Alon Rosen, Manuel Sabin, and Prashant Nalini Vasudevan. Average-case fine-grained hardness. In STOC, pages 483–496. ACM, 2017. doi:10.1145/3055399.3055466.
  • [9] Marshall Ball, Alon Rosen, Manuel Sabin, and Prashant Nalini Vasudevan. Proofs of work from worst-case assumptions. In Hovav Shacham and Alexandra Boldyreva, editors, Advances in Cryptology – CRYPTO 2018, pages 789–819, Cham, 2018. Springer International Publishing. doi:10.1007/978-3-319-96884-1_26.
  • [10] Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. Quantum lower bounds by polynomials. J. ACM, 48(4):778–797, 2001. doi:10.1145/502090.502097.
  • [11] Huck Bennett, Alexander Golovnev, and Noah Stephens-Davidowitz. On the quantitative hardness of CVP. In 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 13–24. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.11.
  • [12] Huck Bennett and Chris Peikert. Hardness of bounded distance decoding on lattices in 𝓁p norms. In 35th Computational Complexity Conference, CCC, volume 169 of LIPIcs, pages 36:1–36:21. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPIcs.CCC.2020.36.
  • [13] Huck Bennett, Chris Peikert, and Yi Tang. Improved hardness of BDD and SVP under gap-(s)eth. In 13th Innovations in Theoretical Computer Science Conference, ITCS, volume 215 of LIPIcs, pages 19:1–19:12. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPIcs.ITCS.2022.19.
  • [14] Harry Buhrman, Bruno Loff, Subhasree Patro, and Florian Speelman. Limits of quantum speed-ups for computational geometry and other problems: Fine-grained complexity via quantum walks. In Mark Braverman, editor, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022, January 31 - February 3, 2022, Berkeley, CA, USA, volume 215 of LIPIcs, pages 31:1–31:12. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ITCS.2022.31.
  • [15] Harry Buhrman, Subhasree Patro, and Florian Speelman. A Framework of Quantum Strong Exponential-Time Hypotheses. In Markus Bläser and Benjamin Monmege, editors, 38th International Symposium on Theoretical Aspects of Computer Science (STACS 2021), volume 187 of Leibniz International Proceedings in Informatics (LIPIcs), pages 19:1–19:19, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.STACS.2021.19.
  • [16] C. Calabro, R. Impagliazzo, and R. Paturi. A duality between clause width and clause density for sat. In 21st Annual IEEE Conference on Computational Complexity (CCC’06), pages 7 pp.–260, 2006. doi:10.1109/CCC.2006.6.
  • [17] Yanlin Chen, Yilei Chen, Rajendra Kumar, Subhasree Patro, and Florian Speelman. QSETH strikes again: Finer quantum lower bounds for lattice problem, strong simulation, hitting set problem, and more. arXiv:2309.16431, 2023. doi:10.48550/arXiv.2309.16431.
  • [18] Yanlin Chen, Yilei Chen, Rajendra Kumar, Subhasree Patro, and Florian Speelman. Fine-grained complexity via quantum natural proofs. arXiv:2504.10363, 2025. doi:10.48550/arXiv.2504.10363.
  • [19] Jordan S. Cotler, Hsin-Yuan Huang, and Jarrod R. McClean. Revisiting dequantization and quantum advantage in learning tasks. ArXiv, abs/2112.00811, 2021. arXiv:2112.00811.
  • [20] Marek Cygan, Holger Dell, Daniel Lokshtanov, Dániel Marx, Jesper Nederlof, Yoshio Okamoto, Ramamohan Paturi, Saket Saurabh, and Magnus Wahlström. On problems as hard as cnf-sat. ACM Transactions on Algorithms (TALG), 12(3):1–24, 2016. doi:10.1145/2925416.
  • [21] Mina Dalirrooyfard, Andrea Lincoln, and Virginia Vassilevska Williams. New techniques for proving fine-grained average-case hardness. In 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS, pages 774–785, 2020. doi:10.1109/FOCS46700.2020.00077.
  • [22] Holger Dell and John Lapinskas. Fine-grained reductions from approximate counting to decision. ACM Trans. Comput. Theory, 13(2):8:1–8:24, 2021. doi:10.1145/3442352.
  • [23] Oded Goldreich and Guy N. Rothblum. Counting t-cliques: Worst-case to average-case reductions and direct interactive proof systems. In Mikkel Thorup, editor, 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pages 77–88. IEEE Computer Society, 2018. doi:10.1109/FOCS.2018.00017.
  • [24] Lov K Grover. A fast quantum mechanical algorithm for database search. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pages 212–219, 1996. doi:10.1145/237814.237866.
  • [25] Cupjin Huang, Michael Newman, and Mario Szegedy. Explicit lower bounds on strong quantum simulation. IEEE Transactions on Information Theory, 66(9):5585–5600, 2020. doi:10.1109/TIT.2020.3004427.
  • [26] Jeremy Ahrens Huang, Young Kun Ko, and Chunhao Wang. On the (classical and quantum) fine-grained complexity of log-approximate cvp and max-cut. arXiv preprint arXiv:2411.04124, 2024. doi:10.48550/arXiv.2411.04124.
  • [27] Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-sat. Journal of Computer and System Sciences, 62(2):367–375, 2001. doi:10.1006/jcss.2000.1727.
  • [28] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? Journal of Computer and System Sciences, 63(4):512–530, 2001. doi:10.1006/jcss.2001.1774.
  • [29] Ravi Kannan. Improved algorithms for integer programming and related lattice problems. In David S. Johnson, Ronald Fagin, Michael L. Fredman, David Harel, Richard M. Karp, Nancy A. Lynch, Christos H. Papadimitriou, Ronald L. Rivest, Walter L. Ruzzo, and Joel I. Seiferas, editors, Proceedings of the 15th Annual ACM Symposium on Theory of Computing, pages 193–206, 1983. doi:10.1145/800061.808749.
  • [30] Rio LaVigne, Andrea Lincoln, and Virginia Vassilevska Williams. Public-key cryptography in the fine-grained setting. In CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, pages 605–635. Springer, 2019. doi:10.1007/978-3-030-26954-8_20.
  • [31] Ashwin Nayak and Felix Wu. The quantum query complexity of approximating the median and related statistics. In Jeffrey Scott Vitter, Lawrence L. Larmore, and Frank Thomson Leighton, editors, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, USA, pages 384–393. ACM, 1999. doi:10.1145/301250.301349.
  • [32] Ramamohan Paturi. On the degree of polynomials that approximate symmetric boolean functions (preliminary version). In Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, STOC ’92, pages 468–474, New York, NY, USA, 1992. Association for Computing Machinery. doi:10.1145/129712.129758.
  • [33] Daan Schoneveld. Quantum fine-grained complexity: Hitting-set and related problems. Bachelors thesis, Universiteit van Amsterdam, 2022.
  • [34] Rainer Schuler. An algorithm for the satisfiability problem of formulas in conjunctive normal form. J. Algorithms, 54(1):40–44, January 2005. doi:10.1016/j.jalgor.2004.04.012.
  • [35] Maarten Van Den Nes. Classical simulation of quantum computation, the gottesman-knill theorem, and slightly beyond. Quantum Info. Comput., 10(3):258–271, March 2010. doi:10.26421/QIC10.3-4-6.
  • [36] Virginia Vassilevska Williams. Hardness of easy problems: Basing hardness on popular conjectures such as the strong exponential time hypothesis (invited talk). In 10th International Symposium on Parameterized and Exact Computation (IPEC 2015). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2015. doi:10.4230/LIPIcs.IPEC.2015.17.
  • [37] Virginia Vassilevska Williams. On some fine-grained questions in algorithms and complexity. In Proceedings of the international congress of mathematicians: Rio de janeiro 2018, pages 3447–3487. World Scientific, 2018.