pith. machine review for the scientific record. sign in

arxiv: 2510.07622 · v2 · submitted 2025-10-08 · 🪐 quant-ph · cs.CC· cs.DS

Recognition: unknown

Conjugate queries can help

Ewin Tang , John Wright , Mark Zhandry

Authors on Pith no claims yet
classification 🪐 quant-ph cs.CCcs.DS
keywords queriesquantumalgorithmsstateconjugatedaggerdemonstrateforward
0
0 comments X
read the original abstract

We give a natural problem over input quantum oracles $U$ which cannot be solved with exponentially many black-box queries to $U$ and $U^\dagger$, but which can be solved with constant many queries to $U$ and $U^*$, or $U$ and $U^{\mathrm{T}}$. We also demonstrate a quantum commitment scheme that is secure against adversaries that query only $U$ and $U^\dagger$, but is insecure if the adversary can query $U^*$. These results show that conjugate and transpose queries do give more power to quantum algorithms, lending credence to the idea put forth by Zhandry that cryptographic primitives should prove security against these forms of queries. Our key lemma is that any circuit using $q$ forward and inverse queries to a state preparation unitary for a state $\sigma$ can be simulated to $\varepsilon$ error with $n = \mathcal{O}(q^2/\varepsilon)$ copies of $\sigma$. Consequently, for decision tasks, algorithms using (forward and inverse) state preparation queries only ever perform quadratically better than sample access. We also identify a motif, which we call the "acorn trick", where generically strengthening a quantum resource can be possible if the output is allowed to be random, bypassing no-go theorems for deterministic algorithms. We demonstrate this idea for several settings, including controlization and purification.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 6 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Strict Hierarchy for Quantum Channel Certification to Unitary

    quant-ph 2026-04 unverdicted novelty 8.0

    Optimal algorithms achieve query complexities Θ(d/ε²) for incoherent access, Θ(d/ε) for coherent access, and Θ(√d/ε) for source-code access in quantum channel certification to unitary, exactly matching prior lower bounds.

  2. Quantum Multi-Level Estimation of Functionals of Discrete Distributions

    quant-ph 2026-05 unverdicted novelty 7.0

    A quantum multi-level framework achieves near-optimal query complexity for q-Tsallis entropy estimation for q>1 and a speedup for q<1 over classical methods.

  3. Quantum channel tomography: optimal bounds and a Heisenberg-to-classical phase transition

    quant-ph 2026-04 unverdicted novelty 7.0

    Quantum channel tomography query complexity transitions from Heisenberg scaling Θ(r d1 d2 / ε) at dilation rate τ=1 to classical scaling Θ(r d1 d2 / ε²) for τ ≥ 1+Ω(1).

  4. Probabilistic and approximate universal quantum purification machines

    quant-ph 2026-04 unverdicted novelty 7.0

    A machine that purifies two quantum inputs of different rank with positive probability cannot be a linear positive map, ruling out universal probabilistic purification from finite copies; approximate strategies exhibi...

  5. Quantum metrology of mixed states via purification

    quant-ph 2026-05 unverdicted novelty 6.0

    New purification-based reformulations of QCRB and HCRB connect mixed-state metrology bounds to those of purified states, enabling asymptotic attainment of HCRB or 2×QCRB via random channels and individual measurements.

  6. Advances in quantum learning theory with bosonic systems

    quant-ph 2026-05 unverdicted novelty 2.0

    A concise review of sample complexities and methods for tomography and learning in continuous-variable quantum systems, with emphasis on Gaussian versus non-Gaussian states.