Bounded-Error Quantum Polynomial-Time
The class of decision problems solvable by a uniform family of polynomial-size quantum circuits with two-sided bounded error:
- If the answer is “yes,” the circuit accepts with probability at least 2/3.
- If the answer is “no,” the circuit accepts with probability at most 1/3.
BQP is the quantum analogue of BPP and is the standard model for efficient quantum computation.
See the complexity zoo entry here.
Notable problems
- Integer factorization and discrete logarithm are in via Shor’s algorithm — TODO citation (Shor 1994). This directly breaks RSA and elliptic-curve Diffie-Hellman.
- Unstructured search: Grover’s algorithm provides a quadratic quantum speedup for unstructured search — TODO citation (Grover 1996). This does not place unstructured search in itself, but implies that any problem with a classical exhaustive-search algorithm can be solved quantumly in queries.
Known relationships
- : classical probabilistic computation is a special case of quantum computation.
- : quantum computation can be simulated with unbounded-error classical randomness, and in polynomial space — TODO citation (Adleman, DeMarrais, Huang 1997).
- vs : the two classes are believed incomparable. Simon’s problem is in but not in relative to a random oracle; conversely, NP-complete problems are not believed to be in — TODO citation.
- PostBQP (Aaronson 2005 — TODO citation): augmented with postselection on measurement outcomes equals . This gives an elegant proof of .
Relevance to cryptography
BQP defines the power of a quantum adversary. All post-quantum cryptographic schemes — lattice-based, hash-based, code-based, isogeny-based — are designed to resist adversaries. Shor’s algorithm shows that the number-theoretic hardness assumptions underlying RSA, Diffie-Hellman, DSA, and ECDSA are all broken by machines.
Grover’s algorithm gives a generic quadratic speedup on unstructured search, implying that symmetric-key schemes and hash functions need security parameters roughly twice as large (e.g., AES-256 instead of AES-128) to maintain -bit post-quantum security.