Posted

Ewin Tang, John Wright, Mark Zhandry (Oct 10 2025).
Abstract: We give a natural problem over input quantum oracles UU which cannot be solved with exponentially many black-box queries to UU and UU^\dagger, but which can be solved with constant many queries to UU and UU^*, or UU and UTU^{\mathrm{T}}. We also demonstrate a quantum commitment scheme that is secure against adversaries that query only UU and UU^\dagger, but is insecure if the adversary can query UU^*. These results show that conjugate and transpose queries do give more power to quantum algorithms, lending credence to the idea put forth by Zhandry that cryptographic primitives should prove security against these forms of queries. Our key lemma is that any circuit using qq forward and inverse queries to a state preparation unitary for a state σ\sigma can be simulated to ε\varepsilon error with n=O(q2/ε)n = \mathcal{O}(q^2/\varepsilon) copies of σ\sigma. Consequently, for decision tasks, algorithms using (forward and inverse) state preparation queries only ever perform quadratically better than sample access. These results follow from straightforward combinations of existing techniques; our contribution is to state their consequences in their strongest, most counter-intuitive form. In doing so, we identify a motif where generically strengthening a quantum resource can be possible if the output is allowed to be random, bypassing no-go theorems for deterministic algorithms. We call this the acorn trick.

Order by:

Want to join this discussion?

Join our community today and start discussing with our members by participating in exciting events, competitions, and challenges. Sign up now to engage with quantum experts!