QSETH Strikes Again: Finer Quantum Lower Bounds for Lattice Problem, Strong Simulation, Hitting Set Problem, and More
Abstract
Despite the wide range of problems for which quantum computers offer a computational advantage over their classical counterparts, there are also many problems for which the best known quantum algorithm provides a speedup that is only quadratic, or even subquadratic. Such a situation could also be desirable if we don’t want quantum computers to solve certain problems fast - say problems relevant to post-quantum cryptography. When searching for algorithms and when analyzing the security of cryptographic schemes, we would like to have evidence that these problems are difficult to solve on quantum computers; but how do we assess the exact complexity of these problems?
For most problems, there are no known ways to directly prove time lower bounds, however it can still be possible to relate the hardness of disparate problems to show conditional lower bounds. This approach has been popular in the classical community, and is being actively developed for the quantum case [1, 15, 14, 7].
In this paper, by the use of the QSETH framework [15] we are able to understand the quantum complexity of a few natural variants of CNFSAT, such as parity-CNFSAT or counting-CNFSAT, and also are able to comment on the non-trivial complexity of approximate versions of counting-CNFSAT. Without considering such variants, the best quantum lower bounds will always be quadratically lower than the equivalent classical bounds, because of Grover’s algorithm; however, we are able to show that quantum algorithms will likely not attain even a quadratic speedup for many problems. These results have implications for the complexity of (variations of) lattice problems, the strong simulation and hitting set problems, and more. In the process, we explore the QSETH framework in greater detail and present a useful guide on how to effectively use the QSETH framework.
Keywords and phrases:
Quantum conditional lower bounds, Fine-grained complexity, Lattice problems, Quantum strong simulation, Hitting set problem, QSETHCategory:
APPROXFunding:
Yanlin Chen: Most of this work was completed while the author was at Centrum Wiskunde & Informatica (QuSoft).Copyright and License:
2012 ACM Subject Classification:
Theory of computation Quantum computation theoryEditors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
A popular classical hardness conjecture known as the Strong Exponential Time-Hypothesis (SETH) says that determining whether an input CNF formula is satisfiable or not cannot be done in time for any constant [27, 28]. Several fine-grained lower bounds based on SETH have been shown since then; see [36, 37] for a summary of many such results. Some of the SETH-hard problems are building blocks for fine-grained cryptography [8, 30]. Besides finding a satisfying assignment, natural variants of the CNFSAT problem include computing the count or the parity of the count of satisfying assignments to a CNF formula – SETH and SETH conjecture complexity of these problems, respectively. These conjectures are weaker (i.e., more believable) than SETH, and can still be used to show fine-grained hardness of various problems [20].
When considering quantum computation, the SETH conjecture is no longer true, as using Grover’s algorithm for unstructured search [24] one can solve the CNFSAT problem in time. Aaronson, Chia, Lin, Wang, and Zhang assume this Grover-like quadratic speedup is nearly optimal for CNFSAT and (independent of [15]) initiate the study of quantum fine-grained complexity [1]. However, conjectures such as SETH or SETH are likely to still hold in the quantum setting because a Grover-like quantum speedup is not witnessed when the task is to compute the total number of satisfying assignments or the parity of this number. This situation can in some cases be exploited to give better quantum lower bounds than one would get from the conjectured quantum lower bound for the vanilla CNFSAT problem. This makes it at least as relevant (if not more) to study variants of CNFSAT and their implications in the quantum setting, as has been done classically. In fact, motivated by this exact observation, Buhrman, Patro, and Speelman [15] introduced a framework of Quantum Strong Exponential-Time Hypotheses (QSETH) as quantum analogues to SETH, with a striking feature that allows one to “technically” unify conjectures such as quantum analogues of SETH, SETH, maj-SETH, etc. under one umbrella conjecture.
The QSETH framework
In their framework, Buhrman et al. consider the problem in which one is given a formula or a circuit representation of a Boolean function and is asked whether a property where on the truth table111Truth table of a formula on variables, denoted by , is a bit string derived in the following way ; the symbol denotes concatenation. of this formula evaluates to . They conjectured that when the circuit representation is obfuscated enough then for most properties P (that are compression-oblivious properties as we will see in Definition 1), the time taken to compute on the truth table of -sized circuits is lower bounded by , i.e. the -bounded error quantum query complexity of , on all bit strings of length .
It is not hard to see that such a conjecture cannot be true for all properties. In principle, one can construct properties for which the above statement would not hold. For instance, consider a property P that is trivial on truth tables of small formulas (i.e., size) but complicated on formulas of longer length. These kinds of properties are likely to have very high quantum query complexity, but in reality, it will be trivial to compute such a of P on formulas of size. In order to prevent such scenarios the authors in [15] introduce the notion of compression-oblivious properties which they believe encompasses most of the naturally occurring properties. See Sections 2.2 and 2.3 of [15] for a detailed discussion on this topic and also see [18] for some new observations about the notion of compression-oblivious properties. To give a bit of intuition, first consider the set of truth tables corresponding to the set of size formulas on variables and consider the set of all the bit strings. Compression-oblivious properties are those properties for which one cannot save in computational time to compute them on a string from the former set in comparison to computing the same property on strings from the latter set. More formally,222The definition of compression-oblivious properties as stated in this paper is a more formal version of its original definition in [15]. Also, see [18] for a discussion on this topic.
Definition 1 (- and -Compression-Oblivious Properties [15, 18]).
Let . We say a property P is -compression-oblivious333We say a language iff there exists a family of Boolean circuits corresponding to such that , has depth at most and circuit size ., denoted by , if for every constant , for every quantum algorithm that computes P in the black-box setting, and a set of “hard languages”, such that circuit families corresponding to , circuit families corresponding to , , uses at least quantum time on at least one of the inputs in .
In particular, we say a property P is -compression-oblivious (denoted by ) if such that .
With that, we can conjecture the following using the QSETH framework by [15].
Conjecture 2 (-QSETH, consequences of [15]).
Let P be an -compression-oblivious property. The -QSETH conjecture states that , such that for every constant , for every quantum algorithm that computes P in the white-box setting, , a set , circuit families corresponding to , circuit families corresponding to , , the algorithm uses at least quantum time on at least one of the inputs in .
Informally, the notion of -compression-obliviousness captures properties whose query complexity is a lower bound for the time complexity to compute the property even for truth tables of small CNF/DNF formulas. And, the -QSETH conjecture states that having access to this succinct representation of the truth table, i.e., the description of the formula itself, must not help towards improving the computation time in computing these properties. The terms black-box and white-box setting are used to highlight this difference - in the former setting (i.e., the black-box setting as stated in Definition 1) even though the input is a CNF/DNF formula, the algorithm is only allowed to evaluate the formula on required inputs and has no access to the description of the inputted CNF/DNF formula, and, in the latter setting (i.e., the white-box setting as stated in ˜2) the algorithm is allowed to use the description as well.
In comparison to the original QSETH paper (by Buhrman et al. [15]) where the framework was introduced and applied to a more complex class of formulas,444The authors in [15] extensively used QSETH framework for branching programs or equivalently NC circuits to show non-trivial lower bounds for edit distance and longest common subsequence problems. this paper instead serves as a guide to using QSETH for the lowest level of formulas, i.e., poly-sized CNF and DNF formulas, in a more elaborate fashion.
| Problem | Variants | Quantum lower bound | Reference | ||
|
Vanilla | Corollary 6 | |||
| Parity | Corollary 14 | ||||
| Majority | Corollary 16 | ||||
| Strict Majority | Corollary 16 | ||||
| Count | Theorem 13 | ||||
| Corollary 15 | |||||
| -Additive error | Theorem 21 | ||||
| -Multiplicative factor | Corollary 26 | ||||
|
Vanilla | Section 5, [1] | |||
| Parity | Corollary 28 | ||||
| Count | Corollary 28 | ||||
| Corollary 28 | |||||
| -Multiplicative factor | Corollary 29 |
| Problem | Variants | Quantum lower bound | Reference | ||
|
Exact (with bits precision) | [17, Theorem 4.2] | |||
| Exact (with bits precision) | [17, Corollary 4.3] | ||||
| -Additive error | [17, Corollary 4.5] | ||||
| -Multiplicative factor | [17, Theorem 4.7] | ||||
|
[17, Section 5] | ||||
|
Vanilla | [17, Corollary 5.6] | |||
| -Multiplicative factor | [17, Corollary 5.7] | ||||
| -count | [17, Corollary 5.6] | ||||
|
Vanilla | [1, 15] | |||
| Parity | [17, Corollary 6.8] | ||||
| Count | [17, Corollary 6.8] | ||||
| -Multiplicative factor | [17, Corollary 6.8] | ||||
|
Vanilla | [17, Corollary 6.4] | |||
| Parity | [17, Corollary 6.4] | ||||
| Count | [17, Corollary 6.4] | ||||
| -Multiplicative factor | [17, Corollary 6.4] | ||||
|
[17, Corollary 6.11] |
Summary and technical overview
In this paper, we use the QSETH framework (or precisely, -QSETH) to “generate” natural variations of QSETH such as QSETH, QSETH, maj-QSETH, etc., which could (arguably) already be acceptable standalone conjectures in the quantum setting, and study some of their interesting implications. Additionally, we also use the QSETH framework to prove quantum lower bounds for approximately counting the number of satisfying assignments to CNF formulas, a problem whose complexity has been of interest in the classical setting [22]; we study its quantum implications. See Section 3 for details. Proof of this result follows from a more detailed exploration of the QSETH framework than what was required in the original paper. Thus, as another contribution of this paper, we present a useful guide on how to effectively use the QSETH framework. Here we carefully summarize our contributions and technical overview below:
-
We zoom into Buhrman et al.’s QSETH framework at the lowest-level formula class, i.e., the class of polynomial-size CNFs and DNFs, and use it to study the quantum complexity of variations of CNFSAT problems. The QSETH framework is quite general which also makes it not entirely trivial to use it thus, we present a useful guide on how to effectively use the -QSETH conjecture, for e.g., what lemmas need to be proved and what assumptions are needed to be made in order to understand the quantum complexity of CNFSAT and its variants; see Figure 1.
-
We can categorise the several variants of CNFSAT in two ways. First classification can be done by the width of the CNF formulas, i.e., -CNFs versus CNFs of unbounded clause length. Second classification is made with the choice of the property of the truth table one desires to compute. See the summary of complexity all CNFSAT variants and their respective quantum time lower bounds in Table 1 and see below for the overview of the techniques used.
-
–
To prove the quantum time lower bounds for the property variants of CNFSAT problem we invoke -QSETH (˜2). But, -QSETH conjectures the hardness of properties on a set of CNF and DNF formulas. For properties like count, parity, majority, etc., it easily follows from De Morgan’s laws that these properties are equally hard on both CNF and DNF formulas. However, such arguments no longer hold when the properties are approximate variants of count for which we give nontrivial proofs; see Sections 3.1.2 and 3.1.3.
-
–
Additionally, we also use -QSETH to understand quantum complexity of -SAT and its property variants. Firstly we study the classical reduction from CNFSAT to -SAT given by [16] and observe that the quantum lower bound for k-SAT, for , follows from the quantum lower bound of CNFSAT. Moreover, we make an important observation that this reduction by [16] is count-preserving and can be used to conclude lower bounds for other counting variants of -SAT. See Table 1.
-
–
-
Having (somewhat) understood the complexities of these variants of CNFSAT, we then prove conditional quantum time lower bounds for lattice problem, strong simulation, orthogonal vectors, set cover, hitting set, and their respective variants; see Table 2.
-
–
The quantum time lower bound we present for (for ) follows from a reduction from -SAT to by [11, 2] and from the hardness result of -SAT we present. Though such a result would also trivially follow by using Aaronson et al.’s version of QSETH, we stress that our hardness result of -SAT is based on basic-QSETH which is a more believable conjecture.555If basic-QSETH from Buhrman et al.’s framework is false then Aaronson et al.’s QSETH is also false, but the implication in the other direction is not obvious.
-
–
Additionally, we also discuss the quantum complexity of the lattice counting problem (for non-even norm). We present a reduction, using a similar idea of [11], from -SAT to the lattice counting problem and we show a time quantum lower bound for the latter when . As mentioned earlier, we get a time quantum lower bound for -SAT, when , using -QSETH.
-
–
As another application to the bounds we get from the property variants of CNFSAT we look at the strong simulation problem. It was already established by [19, 35] that strong simulation of quantum circuit is a #P-hard problem but in this work we give exact lower bounds for the same. Additionally, using the lower bounds of approximate counts of CNFSAT we are able to shed light on how hard it is to quantumly solve the strong simulation problem with additive and multiplicative error approximation.
-
–
Last but not least, we are also able to use the lower bounds for the property variants of CNFSAT to give interesting lower bounds for orthogonal vectors, hitting set problem and their respective variants. See Section 6 for more details.
Our motivation to study the worst-case complexities of counting versions of these problems stems from the fact that worst-case complexity of counting versions of problems have been used in past to understand average-case complexity of other related problems. And, computational problems that have high average-case complexities usually find their place in cryptographic primitives. For example, Goldreich and Rothblum in [23] present a worst-case to average-case reduction for counting -cliques in graph and use the average-case hardness result towards constructing an interactive proof system. Another such example is that of the OV problem - Ball et al. in [9] use the worst-case hardness of the counting variant of OV to first prove average-case hardness of evaluating low-degree polynomials which they use towards a Proofs of Work (PoW) protocol. Furthermore, Buhrman et al. in [15] observed that this PoW protocol in combination with QSETH ensures that the quantum provers also require the same time as the classical provers.666Note that counting the number of OV pairs on average has a fast algorithm [21] so a worst-case to average-case reduction for counting OV is not possible under standard fine-grained complexity assumptions.
-
–
Related work
Our paper is a follow-up work to the original QSETH paper by [15]; also the list of problems for which we show lower bounds does not overlap with the problems studied in [15]. A basic version of QSETH was also introduced by Aaronson et al. [1] where they primarily used it to study the quantum complexity of closest pair and bichromatic pair problems; they also discuss the complexity of the (vanilla version of) orthogonal vector problem. Prior to this work, a quantum hitting-set conjecture was proposed and its implications were discussed in Schoneveld’s bachelor thesis [33], but their definition of hitting set is different from ours. In our work, we observe that the parsimonious reduction from CNFSAT to hitting set given by [20] is easily quantizable, using which we get a QSETH-based lower bound. Recently, Huang et al. [26] showed a significant barrier to establishing fine-grained quantum reductions from -SAT to lattice problems in the Euclidean norm. In contrast, our work focuses on lattice problems in the norm, where is not an even integer.
2 Preliminaries
2.1 Quantum query complexity of Boolean properties
We start with defining Boolean properties, and then we will define the bounded-error quantum complexity of computing those properties.
Definition 3 (Property).
A Boolean property (or just property) is a sequence where each is a set of Boolean functions defined on variables.
The (bounded-error) quantum query complexity is defined only in a non-uniform setting, therefore, it is defined for for every instead of directly defining for P. A quantum query algorithm for , on an input begins in a fixed initial state , applies a sequence of unitaries , and performs a measurement whose outcome is denoted by . Here, the initial state and the unitaries are independent of the input . The unitary represents the “query” operation, and maps to for all . We say that is a -bounded-error algorithm computing if for all in the domain of , the success probability of outputting is at least . Let cost denote the number of queries makes to throughout the algorithm. The -bounded-error quantum query complexity of , denoted by , is defined as .
2.2 CNFSAT and -SAT
A Boolean formula over variables is in CNF form if it is an AND of OR’s of variables or their negations. More generally, a CNF formula has the form
where is either or . The terms are called literals of the formula and the disjunctions are called its clauses. A -CNF is a CNF formula in which all clauses contain at most literals (or the clause width is at most ). Note that when , then clauses must contain duplicate or trivial literals (for example, and ), therefore we can assume without loss of generality that is at most . A DNF is defined in the exact same way as CNF, except that it is an OR of AND’s of variables or their negations, that is, a DNF formula has the form . We also define computational problems -SAT and CNFSAT.
Definition 4 (CNFSAT).
Given as input a CNF formula defined on variables, the goal is to determine if such that .
Definition 5 (-SAT).
Given as input a -CNF formula defined on variables, the goal is to determine if such that .
3 Lower bounds for variants of CNFSAT using AC-QSETH
We will now define several variants of CNFSAT problem and using -QSETH understand the quantum complexities of all of them. The consequences of these hardness results, some of which follow immediately and the rest with some work, will be discussed in Sections 4, 5, and 6. We begin with some common variants of CNFSAT problem (such as -SAT) which are also very well studied classically [20]; we do this in Section 3.1.1. And, proceed with some less popular variants (Sections 3.1.2, 3.1.3, and 3.2) but with interesting consequences (presented in Sections 4, 5, and 6).
3.1 Quantum complexity of CNFSAT and other related problems
We first restate the quantum hardness of CNFSAT before delving into showing hardness results for its other variants. Interestingly, for the property , where for we define if and whenever , we can explicitly prove that [15, 18]. Also, note that computing OR on truth tables of DNF formulas of length can be computed in time. Hence, using -QSETH we can recover the following Basic-QSETH conjecture.
Corollary 6 (Basic-QSETH [15]).
For each constant , there exists such that there is no bounded-error quantum algorithm that solves CNFSAT (even restricted to formulas with clauses) in time, unless -QSETH (˜2) is false.
Note that Aaronson et al. [1] directly conjecture the above statement, while in our case the above conjecture is implied by -QSETH (˜2), and we will show how -QSETH can imply other conjectured time lower bound for variants of CNFSAT problems in this subsection.
3.1.1 Quantum complexity of #CNFSAT, CNFSAT, CNFSAT and maj-CNFSAT
To give conditional quantum lower bounds for variants of CNFSAT, we should understand their corresponding quantum query lower bound (on the -bit truth table). Here we introduce the properties that correspond to those popular variants of CNFSAT (which will be defined later.)
Definition 7.
Let denote the Hamming weight of -bit binary string . We here list some properties defined on binary strings.
-
1.
count: Let be the non-Boolean function defined by
-
2.
parity: Let be the Boolean function defined by
-
3.
: Let be an integer and let be the non-Boolean function defined by .
-
4.
majority: Let be the Boolean function defined by
And, there is also the following function almost similar to majority.
-
5.
st-majority: Let be the Boolean function with
Here, we define variants of CNFSAT corresponding to the above-mentioned properties.
Definition 8 (variants of CNFSAT).
Let denote the Hamming weight of the truth table of . The following lists five variants of CNFSAT:
-
1.
#CNFSAT: Given a CNF formula on input variables, output .
-
2.
CNFSAT: Given a CNF formula on input variables, output .
-
3.
CNFSAT: Given a CNF formula on input variables and an integer , output .
-
4.
maj-CNFSAT: Given a CNF formula on input variables, output if (else output ).
-
5.
st-maj-CNFSAT: Given a CNF formula on input variables, output if (else output ).
Now again, we use the quantum query lower bound for P whenever we want to discuss the time complexity of P-CNFSAT as in the QSETH framework by [15]. Therefore, immediately after the definitions for variants of CNFSAT (with respect to property P), we will introduce the corresponding bounded-error quantum query lower bound for computing P, and then conjecture the time lower bound for P-CNFSAT (P variant CNFSAT) using this query lower bound. After that, we can use lower bounds for those variants of CNFSAT to understand the quantum complexity of (variants of) -SAT. We include the quantum query lower bounds for those properties for completeness.
Lemma 9 ([10]).
The bounded-error quantum query complexity for count, parity, majority and st-majority on inputs of -bit Boolean strings is .
Proof.
[10] showed that the bounded-error quantum query complexity of a (total) Boolean function , denoted by is lower bounded by of the degree of a minimum-degree polynomial that approximates on all , i.e., ; let us denote this approximate degree by . Another important result by Paturi [32] showed that if is a non-constant, symmetric777A symmetric Boolean function implies for all whenever . and total Boolean function on then where and for .
Using the above two results we can show the following:
-
1.
for odd and whenever is even. Hence .888One can actually immediately give by an elementary degree lower bound without using Paturi’s result.
-
2.
Similar to the above item for odd and otherwise. Hence, and .
-
3.
Any of the above three properties can be computed from count. Hence, .
Lemma 10.
Let be an integer and be the function defined by . Then .
Proof.
Let be a decision version of the defined for all as
| (1) |
When the function is non-constant and symmetric then one can use Paturi’s theorem to characterize the approximate degree of that function [32]. It is easy to see that is a non-constant symmetric function. Combining both these results we get that .
We now compute the value of . For any symmetric Boolean function the quantity is defined as such that and for with . It is easy to see that only for with Hamming weight where is an integer and elsewhere. Let be the integer such that then the minimizing is either or . This implies that , which in turn implies that . Therefore, .
As one can compute using an algorithm that computes , we therefore have .
As we don’t yet know how to prove compression-obliviousness of properties with high query complexities (Theorem 9 in [15]) we instead conjecture that count, parity, majority and st-majority are compression oblivious for poly-sized CNF and DNF formulas. We think it is reasonable to make this conjecture since it will falsify certain commonly-used cryptography assumptions if those properties are not compression oblivious. See [18] for a discussion on this topic.
Conjecture 11.
Corollary 12.
Let denote the class of sized CNF and DNF formulas on input variables. If any one item of Conjecture 11 is true then the property is in .
We can now invoke -QSETH (as mentioned in ˜2) to prove the quantum hardness for #CNFSAT, CNFSAT, maj-CNFSAT and st-maj-CNFSAT.
Theorem 13 (#QSETH).
For each constant , there exists such that there is no bounded-error quantum algorithm that solves #CNFSAT (even restricted to formulas with clauses) in time, unless -QSETH (˜2) is false or (i.e., each item of Conjecture 11 is false).
Proof.
By way of contradiction, let us assume that there exists a bounded-error quantum algorithm that solves #CNFSAT on variables (and on clauses with some ) in time for some . Then given a circuit we do one of the following:
-
if is a poly-sized CNF formula then we use the algorithm to compute the number of satisfying assignments to in time. Or,
-
if is a poly-sized DNF formula then we first construct the negation of , let us denote by , in time; using De Morgan’s law we can see that the resulting formula will be a CNF formula. Using we can now compute the number of satisfying assignments to in time. The number of satisfying assignments to would be then .
The existence of an algorithm such as would imply that -QSETH is false. Hence, proved.
Using similar arguments as in the proof of Theorem 13 we can conclude the following statements.
Corollary 14 (QSETH).
For each constant , there exists such that there is no bounded-error quantum algorithm that solves CNFSAT (even restricted to formulas with clauses) in time, unless -QSETH (˜2) is false or (i.e., Item 1 of Conjecture 11 is false).
Corollary 15 (QSETH).
Let be an integer. For each constant , there exists such that there is no bounded-error quantum algorithm that solves CNFSAT (even restricted to formulas with clauses) in time, unless -QSETH (˜2) is false or (i.e., Item 2 of Conjecture 11 is false).
Corollary 16 (Majority-QSETH).
For each constant , there exists such that there is no bounded-error quantum algorithm that solves
-
1.
maj-CNFSAT (even restricted to formulas with clauses) in time, unless -QSETH is false or (i.e., Item 3 of Conjecture 11 is false);
-
2.
st-maj-CNFSAT (even restricted to formulas with clauses) in time, unless -QSETH is false or (i.e., Item 4 of Conjecture 11 is false).
Akmal and Williams showed that one can actually compute the Majority on the truth table of -CNF formulas for constant in polynomial time, while computing the strict-Majority on the truth table of such formulas is NP-hard [6]. Therefore, here we define both majority and strict-majority and their variants of CNFSAT problems for clarity (and state the hardness of both problems in one conjecture). Note that for CNFSAT, each clause is allowed to contain literals (which means is no longer a constant), and in this case, it is not clear if one can solve maj-CNFSAT in polynomial time or not. Therefore, none of -QSETH, Items 3 and 4 of Conjecture 11 is immediately false yet. (See also the discussion at the bottom of page 5 in the arXiv version of [6] for reductions between maj-CNFSAT and st-maj-CNFSAT.)
3.1.2 Quantum complexity of -add-#CNFSAT
Instead of the exact number of satisfying assignments to a formula, one might be interested in an additive-error approximation. Towards that, we define the problem -add-#CNFSAT as follows.
Definition 17 (-add-#CNFSAT).
Given a CNF formula on variables. The goal of the problem is to output an integer such that where .
This problem (Definition 17) can be viewed as computing the following property on the truth table of the given formula.
Definition 18 ().
Given a Boolean string , asks to output an integer such that where .
Note that is a relation instead of a function now because its value is not necessarily uniquely defined. The bounded-error quantum query complexity for computing was studied in [31]. They showed the following result.
Theorem 19 (Theorem 1.11 in [31]).
Let . Every bounded-error quantum algorithm that computes uses quantum queries on inputs with ones.
For values of we are unable to prove the compression-obliviousness of this property. Hence, we make the following conjecture.
Conjecture 20.
.
One can now establish the time lower bound for computing the on -sized CNF and DNF formulas. However, this doesn’t automatically imply the same lower bound for the case when there are only CNF formulas to consider. Fortunately, is defined in such a way that computing this property is equally hard for both CNF and DNF formulas. More precisely, the following statement holds.
Theorem 21 (-add-#QSETH).
Let . For each constant , there exists such that there is no bounded-error quantum algorithm that solves -add-#CNFSAT (even restricted to formulas with clauses) in time where is the number of satisfying assignments, unless -QSETH (˜2) is false or (i.e., Conjecture 20 is false).
Proof.
By way of contradiction let’s assume that there is an algorithm such that given a CNF formula it can compute the on its truth table in time for some constant .
Then, given a sized DNF formula on variables, let us denote that by , we can run Algorithm on and use its output which is a additive error approximation of the number of satisfying assignments to to compute a additive error approximation of the number of satisfying assignments to .
Let us denote the number of satisfying assignments of by and the output of Algorithm by . This means we have . We claim that will be a additive error approximation of , which is the number of satisfying assignments of ; .
Therefore, a time algorithm for computing on truth table of CNF formulas also implies a time algorithm for computing on truth table of DNF formulas; this violates the combination of -QSETH and Conjecture 20. Hence, proved.
3.1.3 Quantum complexity of -#CNFSAT and other related problems
One other approximation of the count of satisfying assignments is the multiplicative-factor approximation, defined as follows.
Definition 22 (-#CNFSAT).
Let . The -#CNFSAT problem is defined as follows. Given a CNF formula formula on Boolean variables, The goal of the problem is to output an integer such that . 999The same results hold if the approximation is defined with the equalities, i.e., . An additional observation under this changed definition of -#CNFSAT is as follows. Given a CNF formula as input, the algorithm for -#CNFSAT outputs only when there is no satisfying assignment to that formula. Hence, one can decide satisfiability of a given CNF formula using the algorithm for -#CNFSAT. Therefore, the same lower bound holds for this changed definition of -#CNFSAT.
The expression can be categorized into the following two cases.
-
Case 1 is when : in this regime, the algorithm solving -#CNFSAT is expected to return the value , which is the exact count of the number of solutions to the CNFSAT problem. From Theorem 13 we postulate that for each constant , there is no time algorithm that can compute the exact number of solutions to input CNF formula; this is a tight lower bound.
-
Case 2 is when : in this regime, the algorithm solving -#CNFSAT is expected to return a value which is a -approximate relative count of the number of solutions to the CNFSAT problem.
In order to understand the hardness of -#CNFSAT in the second case, we will first try to understand how hard it is to compute the following property. Let with be a partial function defined as follows
Nayak and Wu in [31] analyzed the approximate degree of . By using the polynomial method [10] again we have a lower bound on the quantum query complexity of as mentioned in the following statement.
Lemma 23 ([31, Corollary 1.2]).
Let be such that , where , and
Let and be such that is maximized. Then every bounded-error quantum algorithm that computes uses queries.
Using -QSETH we will now show that for a choice of computing on truth tables of CNF formulas of size requires time where and that maximises . The only caveat (as also witnessed several times earlier) is that we cannot prove the compression obliviousness of hence we state and use the following conjecture.
Conjecture 24.
For any pair of integers satisfying that , .101010Note that, there are some values of for which will be provably compression oblivious, for e.g., and would capture the OR property which is compression oblivious; see Section 3.1.
And we can show the following.
Lemma 25.
Let be such that . If both -QSETH(˜2) and Conjecture 24 hold, then at least one of the following is true:
-
For each constant , there exists such that there is no bounded-error quantum algorithm that computes on the truth table of CNF formulas defined on variables in time (even restricted to formulas with clauses);
-
For each constant , there exists such that there is no bounded-error quantum algorithm that computes on the truth table of CNF formulas defined on variables in time (even restricted to formulas with clauses);
here and such that is maximized. In particular, when , the above immediately implies the following:
-
For each constant , there exists such that there is no bounded-error quantum algorithm that computes on the truth table of CNF formulas defined on variables in time (even restricted to formulas with clauses).
Proof.
Let be an integer that we will fix later and let be defined as follows
It is not hard to see is the same as function . Fortunately, both the functions and have the same value of and where . Therefore the bounded error quantum query complexity of is where and such that is maximised; same as the bounded error quantum query complexity of as mentioned in Lemma 23.
Moreover, as is the same function it is therefore clear from Conjecture 24 that which means there is no bounded error quantum algorithm that can compute or on truth tables of size CNF or DNF formulas defined on input variables in time for any constant unless -QSETH is false. We will now show that conditional on -QSETH this result holds even when we restrict ourselves to only sized CNF formulas.
Having introduced we will now prove Lemma 25 using the following propositions.
-
Proposition A There is no bounded error quantum algorithm that can compute on truth table of CNF formulas defined on variables in time for any .
-
Proposition B There is no bounded error quantum algorithm that can compute on truth table of DNF formulas defined on variables in time for any .
-
Proposition C There is no bounded error quantum algorithm that can compute on truth table of CNF formulas defined on variables in time for any .
-
Proposition D There is no bounded error quantum algorithm that can compute on truth table of DNF formulas defined on variables in time for any .
Conditional on Conjecture 24 and -QSETH the following statements hold.
-
Claim 1 At least one of the propositions A or B is true.
-
Claim 2 At least one of the propositions C or D is true.
-
Claim 3 At least one of the propositions A or C is true; by way of contradiction let us assume that both propositions A and C are false, this means there exist algorithms that for an and compute and on the truth table of size CNF formulas defined on input variables in time and in time, respectively. Moreover, if propositions A and C are false then from Claims 1 and 2 we can deduce that both B and D must be true which means there is no quantum algorithm that can compute or on the truth table of size DNF formulas on input variables in time for any . However, given a DNF formula as an input to compute on its truth table one can instead compute on the negation of , let us denote by , using algorithm on in time which is a contradiction. This means at least one of the two propositions A or C must be true which is exactly the statement of Lemma 25.
Inspired by the arguments used in the proof of Theorem 1.13 in [31], we will now show that Lemma 25 implies the following result. Our result holds for ; this range of suffices for our reductions presented in the later sections.
Corollary 26 (-#QSETH).
Let . For each constant , there exists such that there is no bounded-error quantum algorithm that solves -#CNFSAT (even restricted to formulas with clauses) in time
-
1.
if , where is the number of satisfying assignments;
-
2.
otherwise,
unless -QSETH(˜2) is false or , (i.e., Conjecture 24 is false).
We show the first part of Corollary 26 in the following way and use the result from Theorem 13 for the second part. Given a value of we will fix values of and such that we are able to compute on the truth table of an input CNF formulas on variables using the algorithm that solves -#CNFSAT. Hence, we can show a lower bound on -#CNFSAT using the lower bound result from Lemma 25.
Proof.
Let . Let and ; here is a value that we will fix later but in any case, we have . With that, we are ensured that . We also make sure to choose values in such a way that . Clearly, and . Therefore by invoking the result from Lemma 25 we can say that for these values of there is no bounded-error quantum algorithm that can solve on the truth table of CNF formulas in time, for each ; let us denote this claim by (*).
Let be an algorithm that computes -#CNFSAT, i.e., Algorithm returns a value such that . Given and , there are values of such that we will be able to distinguish whether the number of satisfying assignments to a formula is or using Algorithm . As in our setup, we want such that ; it is then necessary that ; let us denote this as Condition 1.
Now we set the values of and . Given a value of , we set and . This implies , , and . Therefore we obtain .111111To view the calculations in a less cumbersome way one can use the fact that asymptotically , and . We know from claim (*) that every quantum algorithm that (for these values of ) computes on CNF formulas requires time for each , where . Moreover, is . Therefore, we can see that .
It is also easy to see that if were to be expressed as (i.e. denote to be ), then for that value of we have , which satisfies Condition 1. Hence here we can use Algorithm to distinguish whether the number of satisfying assignments to a formula is or . Hence given a CNF formula as input, we will be able to use Algorithm to distinguish whether the number of satisfying assignments is or . Let . If for some constant , can solve -#CNFSAT on an input CNF formula that has number of satisfying assignments in time, then we are essentially computing in time, which is a contradiction to claim (*). Hence the first part of the statement of Corollary 26 proved.
Proof of the second part of this theorem follows from Theorem 13 as the regime translates to exactly counting the number of satisfying assignments.
3.2 Quantum complexity of k-SAT and other related problems
In the previous subsection, we discussed the quantum complexity of variants of CNFSAT problems. However, it is not clear how to immediately derive a similar quantum complexity result for variants of -SAT problems with constant by using the quantum (conditional) hardness results for variants of CNFSAT problems. Of course we could make a further conjecture about variants of -SAT problems like we did in the previous subsection, but it would introduce too many conjectures. Moreover, some variants of -SAT (for constant ) are even shown to be solvable in polynomial time [6].
To give the (quantum) complexity of some optimization problems (for example, lattice problems [11]), on the other hand, we might want to have some (quantum) conditional lower bounds for (variants of) -SAT problems with not too large . This is because we might make calls to a solver of those problems to solve -SAT. This is undesirable for giving the (quantum) complexity of those optimization problems when approaches , while it is tolerable for a relatively small (like ). Hence in this subsection, we would like to say something interesting about quantum hardness for #-SAT and -SAT when , only using the hardness assumptions on counting-CNFSAT (that is, #QSETH). Here, variants of -SAT are defined exactly the same way as Definition 8, Definition 17, and Definition 22, except that the input is now a -CNF formula.
We use the classical algorithm by Schuler [34].121212This algorithm can also be used to solve CNFSAT on variables, clauses in expected time. This algorithm can be viewed as a Turing reduction from SAT with bounded clause density to SAT with bounded clause width, which was analyzed in [16]. The time complexity of this algorithm is upper bounded by , where is number of clauses.
Algorithm 1 takes as input a CNF formula of width greater than , and then outputs a list of -CNF formulas where the solutions of the input formula is the union of the solutions of the output formulas, i.e., , where denotes the set of satisfying assignments to a formula . In fact, it is not hard to see that the count of the number of satisfying assignments also is preserved, i.e., .
Lemma 27 (Implicit from Section 3.2 in [16]).
Algorithm 1 takes as input a CNF formula on input variables, with clauses, that is of width strictly greater than and outputs a number of -CNF formulas each defined on at most input variables and at most clauses such that .
In the full version of this paper [17] we present the proof for completeness. Using Lemma 27 and Lemma 5 in [16] we will now show the hardness of -SAT and its counting variants when without introducing new conjectures.
Corollary 28.
For each constant , there exists a constant such that there is no bounded-error quantum algorithm that solves
-
1.
-SAT in time unless Basic-QSETH (see Corollary 6) is false;
-
2.
-SAT in time unless #QSETH (see Theorem 13) is false;
-
3.
-SAT in time unless QSETH (see Corollary 14) is false;
-
4.
-SAT in time unless QSETH (see Corollary 15) is false.
Proof.
We first prove the first item. Suppose that for each constant , there is an algorithm that solves #-SAT in for some constant . Let for the rest of the proof. Consider the algorithm (Algorithm 1) with input CNF formula . Let be some path of length in the tree of recursive calls to ReduceWidth. Let be the output formula of width at most at the leaf of . Let be the number of left, right branches respectively on path . Every left branch in the path reduces the width of exactly 1 clause to , therefore . On the other hand, with additional time, every right branch of path reduces the number of variables by , therefore . As a result, the number of paths in tree with right branches is at most and each outputs a formula with variables.
Using the same arguments as in [16, Lemma 5], one can see that together with the subroutine can be used to solve #CNFSAT (ignoring factors) in time at most
where the last equality holds because we can assume that without loss of generality (by appending dummy clauses). Therefore, for each , there exist a constant for and such that if , then . As a result, a -time algorithm for #-SAT implies a -time algorithm for #CNFSAT (restricted to formulas with ), which would refute #-QSETH (Theorem 13). This proves the first item of the corollary. The same arguments hold for k-SAT, k-SAT, and k-SAT as well.
Note that, we cannot extend the same arguments for the majority or st-majority or additive-error approximation of count because those properties are not count-preserving. However, these arguments do extend to the multiplicative-factor approximation of the count.
Corollary 29.
Let . For each constant , there exists constant such that, there is no bounded-error quantum algorithm that solves -#-SAT in time
-
1.
, where is the number of satisfying assignments;
-
2.
otherwise,
unless -#QSETH (see Corollary 26, implied by Lemma 25) is false.
4 Quantum strong simulation of quantum circuits
Combining results from [25] with our results from Section 3 we are able to comment on the exact complexity of the strong simulation problem which is defined as follows.131313Note that this is different from the weak simulation problem; a weak simulation samples from probability distribution .
Definition 30 (The strong simulation problem).
Let . Given a quantum circuit on qubits and , the goal of strong simulation with -bit precision is to output the value of up to -bit precision. That is, output .141414Though in some papers the strong simulation problem requires that we output instead of , we use this definition because it is more comparable to the definition of the weak simulation problem. Also, the lower bound we present holds for both of these definitions.
For a quantum circuit , computing exactly, to a precision of bits, is #P-hard [19, 35]. This means even a quantum computer will likely require exponential time to strongly simulate another quantum circuit. In the full version of this paper [17], we prove a more precise quantum time bound for strongly simulating quantum circuits, both exactly and approximately; in the approximate case, we present complexity results for both multiplicative factor and additive error approximation. Our results extend the results by [25] in two directions: firstly, we give explicit (conditional) bounds proving that it is hard to strongly simulate quantum circuits using quantum computers as well. Secondly, we also address the open question posed by [25] on the (conditional) hardness of strong simulation up to accuracy , however, our results are based on a hardness assumption different from SETH or Basic QSETH.
Our results are based on two main components. Firstly, on the observation that the reduction from CNFSAT to the strong simulation problem given (in Theorem 3) by [25] encodes the count of the number of satisfying assignments; this fact allows us to use the same reduction to reduce other variants of CNFSAT, such as #CNFSAT or CNFSAT, to the strong simulation problem, moreover, the same reduction also allows us to reduce -#CNFSAT and -add-#CNFSAT to analogous variants of the strong simulation problem, respectively. As the second main component, we use the quantum hardness of these variants of CNFSAT problem discussed in Section 3.
In the full version of this paper on arXiv, we first state the result of the exact quantum time complexity of the strong simulation problem and then use that result to later show how hard it is for a quantum computer to strongly simulate a quantum circuit with an additive error or a multiplicative factor approximation as stated in Table 2 - see [17] for details.
5 Quantum lower bound for lattice counting and q-count problems
In the full version of this paper on arXiv, we connect -SAT to variants of lattice problems and then use the QSETH lower bound we have in Section 3.2 to give quantum fine-grained complexity for those lattice problems.
Fine-grained complexity of lattice problems is quite widely studied in the classical case [11, 2, 3, 5, 12, 13]. Lots of variants of lattice problems have been considered before, and the most well-studied one is the closest vector problem (with respect to norm).
CVPp is known to have a SETH lower bound for any [11, 2], and for even , there seems a barrier for showing a fine-grained reduction from -SAT to CVP [4]. Kannan gave a -time algorithm for solving CVPp for arbitrary [29], while the best-known algorithm for solving CVPp with noneven is still for some constant . To get a conditional quantum lower bound for CVPp for noneven , given there is already a classical reduction from -SAT to CVPp using time (for noneven ) [11, 2], either one can directly use the QSETH framework by Aaronson et al. [1] to get a lower bound, or we can use Corollary 28 to get the same lower bound in our QSETH framework.151515Basic QSETH assumption is weaker than the QSETH assumption in Aaronson et al [1], so our lower bound under basic QSETH assumption (2 and 6) will also imply a lower bound under their quantum SETH framework.
A natural question is invoked here: Can we have a quantum SETH lower bound for any (variants of) lattice problems? The answer is yes by using the framework and the problems introduced in Section 3.2 and by considering the counting variant of lattice problems stated in Table 2. In the full version, we begin by introducing the (approximate) lattice counting problem and some other related problems - see [17] for all the relevant details.
6 Hardness of Counting/Parity of OV, Hitting Set, and Set-Cover
In the full version of this paper on arXiv we discuss the consequences of Corollary 26 and Corollary 28 for some well-motivated optimization problems: Orthogonal Vectors, Hitting Set and Set Cover as stated in Table 2 – see [17] for details.
7 Discussion and open questions
We believe that this paper opens up the possibility of concluding quantum time lower bounds for many other problems, both for other variants of CNFSAT and also for problems that are not immediately related to CNFSAT. While this is a natural broad future direction to explore, we also mention the following few directions for future work which are more contextual to this paper.
-
One of the motivations to use -QSETH in this paper is so that we can “tie” certain conjectures, that would have otherwise been standalone conjectures, to one main conjecture. But in the process, we conjecture compression obliviousness of several properties. It would be nice if we could also have an “umbrella” conjecture that allows one to establish compression obliviousness of several properties. For e.g., it would be nice if we could show that compression obliviousness of a natural property like count or parity implies compression obliviousness of say .
-
It will be interesting to see if one can use the QSETH framework (or the -QSETH conjecture) to give a single exponential lower bound for #CVP in Euclidean norm.
-
Using Boolean function Fourier analysis, we were able to show that the existence of (quantum-secure) PRFs imply that majority and parity are compression oblivious, whenever the input is given by a formula or circuit. This proof technique could plausibly be extended to larger sets of functions that have a similar structure, e.g., a natural candidate would be to show an equivalent statement for symmetric functions with non-negligible mass on high-degree Fourier coefficients.
Additionally, extending this result to majority / parity for -QSETH, i.e. CNF or DNF input, would be another step towards grounding the (necessary) assumption that such properties are compression oblivious.
References
- [1] Scott Aaronson, Nai-Hui Chia, Han-Hsuan Lin, Chunhao Wang, and Ruizhe Zhang. On the quantum complexity of closest pair and related problems. In Proceedings of the 35th Computational Complexity Conference, CCC ’20, Dagstuhl, DEU, 2020. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2020.16.
- [2] Divesh Aggarwal, Huck Bennett, Alexander Golovnev, and Noah Stephens-Davidowitz. Fine-grained hardness of CVP(P) - everything that we can prove (and nothing else). In SODA, pages 1816–1835. SIAM, 2021. doi:10.1137/1.9781611976465.109.
- [3] Divesh Aggarwal and Eldon Chung. A note on the concrete hardness of the shortest independent vector in lattices. Inf. Process. Lett., 167:106065, 2021. doi:10.1016/j.ipl.2020.106065.
- [4] Divesh Aggarwal and Rajendra Kumar. Why we couldn’t prove SETH hardness of the closest vector problem for even norms, and of the subset sum problem! CoRR, abs/2211.04385, 2022. doi:10.48550/arXiv.2211.04385.
- [5] Divesh Aggarwal and Noah Stephens-Davidowitz. (gap/s)eth hardness of SVP. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC, pages 228–238. ACM, 2018. doi:10.1145/3188745.3188840.
- [6] Shyan Akmal and R. Ryan Williams. MAJORITY-3SAT (and related problems) in polynomial time. CoRR, abs/2107.02748, 2021. arXiv:2107.02748.
- [7] Andris Ambainis, Harry Buhrman, Koen Leijnse, Subhasree Patro, and Florian Speelman. Matching triangles and triangle collection: Hardness based on a weak quantum conjecture, 2022. doi:10.48550/arXiv.2207.11068.
- [8] Marshall Ball, Alon Rosen, Manuel Sabin, and Prashant Nalini Vasudevan. Average-case fine-grained hardness. In STOC, pages 483–496. ACM, 2017. doi:10.1145/3055399.3055466.
- [9] Marshall Ball, Alon Rosen, Manuel Sabin, and Prashant Nalini Vasudevan. Proofs of work from worst-case assumptions. In Hovav Shacham and Alexandra Boldyreva, editors, Advances in Cryptology – CRYPTO 2018, pages 789–819, Cham, 2018. Springer International Publishing. doi:10.1007/978-3-319-96884-1_26.
- [10] Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. Quantum lower bounds by polynomials. J. ACM, 48(4):778–797, 2001. doi:10.1145/502090.502097.
- [11] Huck Bennett, Alexander Golovnev, and Noah Stephens-Davidowitz. On the quantitative hardness of CVP. In 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 13–24. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.11.
- [12] Huck Bennett and Chris Peikert. Hardness of bounded distance decoding on lattices in norms. In 35th Computational Complexity Conference, CCC, volume 169 of LIPIcs, pages 36:1–36:21. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPIcs.CCC.2020.36.
- [13] Huck Bennett, Chris Peikert, and Yi Tang. Improved hardness of BDD and SVP under gap-(s)eth. In 13th Innovations in Theoretical Computer Science Conference, ITCS, volume 215 of LIPIcs, pages 19:1–19:12. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPIcs.ITCS.2022.19.
- [14] Harry Buhrman, Bruno Loff, Subhasree Patro, and Florian Speelman. Limits of quantum speed-ups for computational geometry and other problems: Fine-grained complexity via quantum walks. In Mark Braverman, editor, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022, January 31 - February 3, 2022, Berkeley, CA, USA, volume 215 of LIPIcs, pages 31:1–31:12. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ITCS.2022.31.
- [15] Harry Buhrman, Subhasree Patro, and Florian Speelman. A Framework of Quantum Strong Exponential-Time Hypotheses. In Markus Bläser and Benjamin Monmege, editors, 38th International Symposium on Theoretical Aspects of Computer Science (STACS 2021), volume 187 of Leibniz International Proceedings in Informatics (LIPIcs), pages 19:1–19:19, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.STACS.2021.19.
- [16] C. Calabro, R. Impagliazzo, and R. Paturi. A duality between clause width and clause density for sat. In 21st Annual IEEE Conference on Computational Complexity (CCC’06), pages 7 pp.–260, 2006. doi:10.1109/CCC.2006.6.
- [17] Yanlin Chen, Yilei Chen, Rajendra Kumar, Subhasree Patro, and Florian Speelman. QSETH strikes again: Finer quantum lower bounds for lattice problem, strong simulation, hitting set problem, and more. arXiv:2309.16431, 2023. doi:10.48550/arXiv.2309.16431.
- [18] Yanlin Chen, Yilei Chen, Rajendra Kumar, Subhasree Patro, and Florian Speelman. Fine-grained complexity via quantum natural proofs. arXiv:2504.10363, 2025. doi:10.48550/arXiv.2504.10363.
- [19] Jordan S. Cotler, Hsin-Yuan Huang, and Jarrod R. McClean. Revisiting dequantization and quantum advantage in learning tasks. ArXiv, abs/2112.00811, 2021. arXiv:2112.00811.
- [20] Marek Cygan, Holger Dell, Daniel Lokshtanov, Dániel Marx, Jesper Nederlof, Yoshio Okamoto, Ramamohan Paturi, Saket Saurabh, and Magnus Wahlström. On problems as hard as cnf-sat. ACM Transactions on Algorithms (TALG), 12(3):1–24, 2016. doi:10.1145/2925416.
- [21] Mina Dalirrooyfard, Andrea Lincoln, and Virginia Vassilevska Williams. New techniques for proving fine-grained average-case hardness. In 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS, pages 774–785, 2020. doi:10.1109/FOCS46700.2020.00077.
- [22] Holger Dell and John Lapinskas. Fine-grained reductions from approximate counting to decision. ACM Trans. Comput. Theory, 13(2):8:1–8:24, 2021. doi:10.1145/3442352.
- [23] Oded Goldreich and Guy N. Rothblum. Counting t-cliques: Worst-case to average-case reductions and direct interactive proof systems. In Mikkel Thorup, editor, 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pages 77–88. IEEE Computer Society, 2018. doi:10.1109/FOCS.2018.00017.
- [24] Lov K Grover. A fast quantum mechanical algorithm for database search. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pages 212–219, 1996. doi:10.1145/237814.237866.
- [25] Cupjin Huang, Michael Newman, and Mario Szegedy. Explicit lower bounds on strong quantum simulation. IEEE Transactions on Information Theory, 66(9):5585–5600, 2020. doi:10.1109/TIT.2020.3004427.
- [26] Jeremy Ahrens Huang, Young Kun Ko, and Chunhao Wang. On the (classical and quantum) fine-grained complexity of log-approximate cvp and max-cut. arXiv preprint arXiv:2411.04124, 2024. doi:10.48550/arXiv.2411.04124.
- [27] Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-sat. Journal of Computer and System Sciences, 62(2):367–375, 2001. doi:10.1006/jcss.2000.1727.
- [28] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? Journal of Computer and System Sciences, 63(4):512–530, 2001. doi:10.1006/jcss.2001.1774.
- [29] Ravi Kannan. Improved algorithms for integer programming and related lattice problems. In David S. Johnson, Ronald Fagin, Michael L. Fredman, David Harel, Richard M. Karp, Nancy A. Lynch, Christos H. Papadimitriou, Ronald L. Rivest, Walter L. Ruzzo, and Joel I. Seiferas, editors, Proceedings of the 15th Annual ACM Symposium on Theory of Computing, pages 193–206, 1983. doi:10.1145/800061.808749.
- [30] Rio LaVigne, Andrea Lincoln, and Virginia Vassilevska Williams. Public-key cryptography in the fine-grained setting. In CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, pages 605–635. Springer, 2019. doi:10.1007/978-3-030-26954-8_20.
- [31] Ashwin Nayak and Felix Wu. The quantum query complexity of approximating the median and related statistics. In Jeffrey Scott Vitter, Lawrence L. Larmore, and Frank Thomson Leighton, editors, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, USA, pages 384–393. ACM, 1999. doi:10.1145/301250.301349.
- [32] Ramamohan Paturi. On the degree of polynomials that approximate symmetric boolean functions (preliminary version). In Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, STOC ’92, pages 468–474, New York, NY, USA, 1992. Association for Computing Machinery. doi:10.1145/129712.129758.
- [33] Daan Schoneveld. Quantum fine-grained complexity: Hitting-set and related problems. Bachelors thesis, Universiteit van Amsterdam, 2022.
- [34] Rainer Schuler. An algorithm for the satisfiability problem of formulas in conjunctive normal form. J. Algorithms, 54(1):40–44, January 2005. doi:10.1016/j.jalgor.2004.04.012.
- [35] Maarten Van Den Nes. Classical simulation of quantum computation, the gottesman-knill theorem, and slightly beyond. Quantum Info. Comput., 10(3):258–271, March 2010. doi:10.26421/QIC10.3-4-6.
- [36] Virginia Vassilevska Williams. Hardness of easy problems: Basing hardness on popular conjectures such as the strong exponential time hypothesis (invited talk). In 10th International Symposium on Parameterized and Exact Computation (IPEC 2015). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2015. doi:10.4230/LIPIcs.IPEC.2015.17.
- [37] Virginia Vassilevska Williams. On some fine-grained questions in algorithms and complexity. In Proceedings of the international congress of mathematicians: Rio de janeiro 2018, pages 3447–3487. World Scientific, 2018.