In short

The Hidden Subgroup Problem (HSP) is the single framework that generates almost every exponential quantum speedup you will ever meet. Fix a group G. Somebody hides a subgroup H \le G. They hand you a function f : G \to X with the promise that f(g) = f(h) if and only if g^{-1}h \in H — so f is constant on each coset of H and distinct across different cosets. Your job: find H (a set of generators is enough). When G is abelian\mathbb{Z}_2 (Deutsch), \mathbb{Z}_2^n (Bernstein-Vazirani, Simon), \mathbb{Z} (Shor's order-finding), \mathbb{Z}_p^* (discrete log) — HSP has a polynomial-time quantum algorithm built from the quantum Fourier transform. When G is non-abelian — the symmetric group S_n (graph isomorphism), the dihedral group (lattice cryptography) — it is mostly still open, three decades in. HSP is the map: once you see a problem as an HSP instance over an abelian group, a quantum algorithm is waiting for you.

You have already met three quantum algorithms built around oracle access to a mystery function: Deutsch decides "constant vs balanced" in one query, Bernstein-Vazirani extracts a hidden bit string s from a linear function in one query, and Simon's finds a hidden XOR-period s in polynomially many queries. Soon you will meet Shor's algorithm, which finds the period of modular exponentiation and so breaks RSA. Those are four different algorithms for four different problems — but they feel oddly related, and not just because they all start "prepare a superposition, query the oracle, do a Fourier-like transform, measure."

They are related. Each one is a special case of a single problem. That problem is the Hidden Subgroup Problem, and once you see the algorithms as instances of it, you stop learning them one at a time. You specialise the general template to each group G, and the algorithm falls out.

HSP is not a minor bit of theoretical tidying. It is the reason Peter Shor could write down his factoring algorithm within a year of Simon's period-finding result: Simon had solved the HSP instance for \mathbb{Z}_2^n, and Shor saw that factoring reduced to the HSP instance for \mathbb{Z} — with essentially the same circuit shape, just a different Fourier transform at the end. HSP is the map of where exponential quantum speedups live, what territory has been explored, and what territory — most of it non-abelian — is still uncharted three decades after the original results.

The setup — groups, subgroups, cosets, and a promise

Before stating HSP cleanly, pin down the four objects it refers to.

A group G is a set with a binary operation (written multiplicatively or additively depending on convention), an identity element, and inverses for every element, such that the operation is associative. You have seen several:

The first five are abelian (the operation commutes: g \cdot h = h \cdot g). The last two are non-abelian. This distinction will matter enormously.

A subgroup H \le G is a subset of G that is closed under the group operation and inverses — a group in its own right, sitting inside G. For \mathbb{Z}_2^n, any XOR-closed subset is a subgroup (for instance \{0, s\} for a fixed string s is a two-element subgroup, provided s \ne 0). For \mathbb{Z}, every subgroup is of the form r\mathbb{Z} = \{0, \pm r, \pm 2r, \ldots\} for some non-negative integer r. Subgroups are specified either by listing their elements (for small groups) or by giving a set of generators whose products give every element of the subgroup.

A coset of H in G is a set of the form gH = \{gh : h \in H\} for a specific g \in G. Cosets partition G into equal-sized blocks. Two elements g, g' are in the same coset if and only if g^{-1}g' \in H (in additive notation, g' - g \in H). The subgroup H itself is one coset (the one containing the identity); all other cosets are disjoint translates.

Why cosets matter here: the HSP promise says f takes the same value on every element of a single coset and different values on different cosets. So f is constant on each "layer" and the layers are labelled by the distinct values of f. If you could only learn which-coset-a-random-g-is-in, you could read off H by comparing elements — but reading that off classically requires finding collisions among f-values, which is the expensive part.

The promise. Fix a group G. A function f: G \to X (where X is some "label set" — could be \{0,1\}^n, or the integers, or anything) hides the subgroup H if:

f(g) = f(h) \iff g^{-1}h \in H.

In additive notation (which you will use for \mathbb{Z}_2^n and \mathbb{Z}): f(g) = f(h) \iff g - h \in H, i.e. g and h are in the same coset of H.

Cosets partition a group into f-constant blocksA grid of eight group elements partitioned into four coset blocks of two elements each. Each block is labelled with a distinct value of f — a, b, c, d. The subgroup H contains the identity and one other element; the three other cosets are translates.G — eight elements partitioned into four cosets of H = {e, s}H (coset of e)esf = acoset g₁Hg₁g₁·sf = bcoset g₂Hg₂g₂·sf = ccoset g₃Hg₃g₃·sf = df is constant within each block and distinct across blocks
The hidden-subgroup promise, drawn. The group $G$ breaks into cosets of $H$. The function $f$ takes one value on each coset and different values on different cosets. Your job is to recover $H$ — equivalently, the shape of the partition — from oracle access to $f$.

The problem. You are given oracle access to f. Find H — say, by returning a set of generators — using as few oracle queries as possible. The running time should be polynomial in \log |G| where possible.

That is HSP. The drama is all in the choice of G.

The four instances you already know

Before the general algorithm, see how four familiar algorithms fit this template.

Deutsch — G = \mathbb{Z}_2

The function is f: \{0, 1\} \to \{0, 1\}. The hidden subgroup is either:

Finding H is literally the Deutsch problem: distinguish constant from balanced. One quantum query does it.

Bernstein-Vazirani — G = \mathbb{Z}_2^n, hiding a hyperplane

The function is f(x) = s \cdot x \pmod 2 for a hidden n-bit string s. Here f is constant on the hyperplane H = \{x : s \cdot x = 0\} (a subgroup of \mathbb{Z}_2^n of size 2^{n-1}) and takes the opposite value on the other coset. So the hidden subgroup is \{x : s \cdot x = 0\} and BV's algorithm recovers s — equivalently, a generator of H^\perp, the "orthogonal complement" of H.

Simon — G = \mathbb{Z}_2^n, hiding a period

The function f: \mathbb{Z}_2^n \to X satisfies f(x) = f(y) \iff x \oplus y \in \{0, s\}. The hidden subgroup is H = \{0, s\}, a size-2 subgroup of \mathbb{Z}_2^n. Simon's algorithm finds s in O(n) quantum queries, while classical needs \Omega(2^{n/2}). The template is exactly HSP over \mathbb{Z}_2^n — Simon's algorithm is what the general abelian HSP algorithm looks like when you write it out for the group \mathbb{Z}_2^n.

Shor's order-finding — G = \mathbb{Z}, hiding a period

Fix a positive integer N and an element a with \gcd(a, N) = 1. Define f: \mathbb{Z} \to \mathbb{Z}_N by f(k) = a^k \bmod N. This function has a period r — the order of a modulo N — such that f(k) = f(\ell) \iff k \equiv \ell \pmod r, i.e. k - \ell \in r\mathbb{Z}. So the hidden subgroup is H = r\mathbb{Z}, and finding r is exactly HSP over \mathbb{Z}.

Finding the order r lets you factor N with high probability (via a classical reduction going back to the 1970s). So factoring ≡ HSP over \mathbb{Z}. Shor's algorithm uses a quantum Fourier transform over \mathbb{Z}_Q (for Q \approx N^2) to implement the general HSP algorithm specialised to this instance.

Example 1: Simon's algorithm as HSP over $\mathbb{Z}_2^n$

Take n = 3 and s = 101. Simon's promise says there is a function f: \mathbb{Z}_2^3 \to X with f(x) = f(y) \iff x \oplus y \in \{000, 101\}. List the eight inputs and group them into cosets of H = \{000, 101\}.

Step 1. Compute the cosets. Each coset has two elements, with the second obtained by XORing the first with s = 101.

coset representative the two elements f-value (some label)
000 \{000, 101\} a
001 \{001, 100\} b
010 \{010, 111\} c
011 \{011, 110\} d

Why four cosets of size two: |\mathbb{Z}_2^3| = 8 and |H| = 2, so there are 8 / 2 = 4 cosets, each containing two elements. The coset representatives are any four strings, one from each pair. An easy choice: pick the strings whose first bit is 0 (which gives 000, 001, 010, 011), since XORing with s = 101 flips the first bit to 1.

Step 2. Verify the HSP condition. Take x = 010 and y = 111. Then x \oplus y = 101 \in H, so the promise says f(010) = f(111) = c. ✓ Take x = 010 and y = 011. Then x \oplus y = 001 \notin H, so f(010) \ne f(011) — indeed c \ne d. ✓

Step 3. Fit to the HSP template. The group is G = \mathbb{Z}_2^3 (additive, abelian). The hidden subgroup is H = \{000, 101\}. The function f is constant on each coset and distinct across different cosets — matching the HSP promise exactly. Simon's algorithm recovers H by returning a generator of H, which is the single element s = 101.

Result. Simon's algorithm is precisely HSP for G = \mathbb{Z}_2^n and |H| = 2. The algorithm's procedure — Hadamard, oracle query, measure the target, Hadamard again, measure — is the general abelian HSP algorithm specialised to \mathbb{Z}_2^n, where the quantum Fourier transform over \mathbb{Z}_2^n coincides with the n-fold Hadamard H^{\otimes n}.

Simon's algorithm as HSP over Z₂³Four coset boxes showing the partition of eight 3-bit strings into four two-element cosets under XOR with s = 101. Each coset labelled with an abstract f-value a, b, c, d.Z₂³ partitioned into 4 cosets of H = {000, 101}H000101f = a001 + H001100f = b010 + H010111f = c011 + H011110f = df is constant within each box and distinct across boxes — the HSP promise
Simon's algorithm in the HSP frame: four cosets of $H = \{000, 101\}$, one distinct $f$-value per coset. Finding $H$ means finding the single generator $s = 101$.

Example 2: Shor's order-finding as HSP over $\mathbb{Z}$

Take N = 15 and a = 7. The order-finding problem asks: what is the smallest r > 0 with 7^r \equiv 1 \pmod{15}? This is HSP for the group G = \mathbb{Z} with a hidden subgroup of the form H = r\mathbb{Z}.

Step 1. Define the function. Let f: \mathbb{Z} \to \mathbb{Z}_{15} by f(k) = 7^k \bmod 15. Compute the first few values:

k 7^k \bmod 15
0 1
1 7
2 4
3 13
4 1
5 7
6 4
7 13

Step 2. Spot the period. Values repeat with period r = 4. So f(k) = f(\ell) whenever k - \ell is a multiple of 4. In group terms, k - \ell \in 4\mathbb{Z}.

Step 3. Identify the hidden subgroup. H = 4\mathbb{Z} = \{\ldots, -8, -4, 0, 4, 8, \ldots\} is a subgroup of \mathbb{Z}. The cosets are \{0, 4, 8, \ldots\}, \{1, 5, 9, \ldots\}, \{2, 6, 10, \ldots\}, \{3, 7, 11, \ldots\} — four cosets, one for each residue class mod 4. The function f takes the values 1, 7, 4, 13 on these four cosets respectively: constant within each, distinct across.

Step 4. Recover r from H. A generator of H = 4\mathbb{Z} is 4 (or -4). So the order is r = 4.

Step 5. Factor N = 15. Since r = 4 is even, compute \gcd(7^{r/2} - 1, 15) = \gcd(48, 15) = 3 and \gcd(7^{r/2} + 1, 15) = \gcd(50, 15) = 5. You have factored 15 = 3 \times 5.

Result. The N = 15, a = 7 factoring problem is exactly HSP for G = \mathbb{Z}, H = 4\mathbb{Z}. Shor's algorithm applies the quantum Fourier transform over \mathbb{Z}_Q (for a chosen Q \gg N) to recover r with high probability, then classical post-processing extracts the factor — order-finding is the quantum core, factoring is the classical shell.

Shor's order-finding as HSP over ZA number line with integers 0 through 11 shown, grouped into four cosets of 4Z. Each coset is one residue class mod 4, and each carries a distinct f-value 1, 7, 4, 13.7^k mod 15 — period r = 4 ⇒ H = 4Z0141811757972464313713red dots = coset of 0 (multiples of 4); f repeats every 4 stepsH = 4Z; recovering a generator of H gives r = 4
Order-finding as HSP over $\mathbb{Z}$. The hidden subgroup is $H = r\mathbb{Z}$; red dots mark the coset of $0$, where $f$ returns to its value at $0$. Quantum Fourier sampling over a large $\mathbb{Z}_Q$ recovers $r$ in polynomial time.

One more abelian instance worth naming: the discrete-logarithm problem, central to public-key cryptography (Diffie-Hellman, ECC), is HSP for the group G = \mathbb{Z}_{p-1} \times \mathbb{Z}_{p-1}. Shor's algorithm handles this too. Taking Diffie-Hellman and ECC off the table alongside RSA is why "post-quantum cryptography" is a policy topic at the Government of India's National Quantum Mission.

The general abelian HSP algorithm

Every abelian HSP instance is solved by the same quantum algorithm — the specialisation just changes which Fourier transform you use at the end.

The recipe, in five steps.

  1. Prepare a uniform superposition over G in a "coset register":
\frac{1}{\sqrt{|G|}} \sum_{g \in G} |g\rangle \otimes |0\rangle.
  1. Query the oracle U_f|g\rangle|y\rangle = |g\rangle|y \oplus f(g)\rangle to load f into the second register:
\frac{1}{\sqrt{|G|}} \sum_{g \in G} |g\rangle |f(g)\rangle.
  1. Measure the second register. It collapses to some specific value f(g_0). Because f is constant on cosets and distinct across cosets, the first register collapses onto the unique coset g_0 H:
\frac{1}{\sqrt{|H|}} \sum_{h \in H} |g_0 h\rangle.
  1. Apply the quantum Fourier transform over G to the first register. For the abelian group G, the QFT takes a uniform superposition over a coset of H to a uniform superposition over the character subgroup H^\perp — the characters of G that are trivial on H.

  2. Measure the first register. You get a random element of H^\perp. Repeat the whole procedure O(\log |G|) times, collect the samples, and solve a linear-algebra problem over the appropriate ring to determine H.

Generic abelian HSP circuitA quantum circuit with two register wires. The top register carries ket g over G; the bottom carries ket 0. First, a QFT box is applied to the top wire to create a uniform superposition over G. Then a U_f box is applied to both wires. Then the bottom wire is measured. Then another QFT box is applied to the top wire. Then the top wire is measured.|0⟩_G|0⟩QFT_GU_fmeasure f(g)QFT_Gsample from H^⊥uniform over Goracle queryFourier transform
The general abelian HSP algorithm. QFT over $G$ prepares a uniform superposition; $U_f$ loads $f$; measuring the target collapses the input register to a random coset of $H$; a second QFT over $G$ produces a sample from the character subgroup $H^\perp$; $O(\log |G|)$ samples determine $H$.

Why the QFT does the work: characters of an abelian group G are the group homomorphisms \chi: G \to \mathbb{C}^\times landing in the unit circle. The QFT over G is exactly the change of basis from "group elements" to "characters." For a coset g_0 H, the characters that vanish on H survive the Fourier transform; the others cancel by interference. This is the same constructive/destructive-interference pattern you saw in Deutsch-Jozsa, generalised to an arbitrary abelian group.

The five instances you met above are this algorithm with different choices of G:

The Hadamard-oracle-Hadamard structure you have been seeing since Deutsch is the \mathbb{Z}_2^n specialisation of this single algorithm. That is not a coincidence — it is the whole point of introducing HSP.

The running time. For every abelian G, the algorithm uses O(\log |G|) oracle queries and O(\text{poly}(\log |G|)) gates (assuming the QFT over G can be implemented efficiently — which it can for every group you meet in cryptographic practice). So every abelian HSP instance has a quantum polynomial-time algorithm. Abelian HSP is solved.

The non-abelian cliff

Move one step outside the abelian world and the whole framework trips.

Non-abelian groups have a richer representation theory — their characters are no longer complex numbers but matrices. The "Fourier transform" over a non-abelian group still exists (it is the standard object in non-abelian harmonic analysis), but decoding a coset state by measuring after the Fourier transform no longer yields a clean linear system for H. What you learn from one Fourier-sampled measurement over a non-abelian group is, in general, not enough to reconstruct the hidden subgroup even after many samples.

Three specific non-abelian HSP cases drive the field.

Graph isomorphism — HSP over the symmetric group S_n. Two graphs on n vertices are isomorphic if one can be permuted into the other. Define f: S_n \to X so that f(\pi) records the graph obtained by applying \pi to a fixed labelling, with some canonical tag to identify "the same graph under different permutations." Then f hides the automorphism group of the combined graph, and HSP-solving would immediately solve graph isomorphism. Graph isomorphism is in complexity class P for restricted graph classes, in quasipolynomial time classically (Babai 2015), and not known to be in classical P in general. A quantum polynomial-time algorithm for HSP over S_n would imply a quantum polynomial-time algorithm for graph isomorphism — a major open problem.

Dihedral HSP — HSP over D_N. The dihedral group of order 2N has a "hidden shift" structure that equivalent formulations connect to shortest-vector problems in lattices — the computational problem underpinning lattice-based cryptography (learning-with-errors, Ring-LWE, and most post-quantum schemes). An efficient quantum algorithm for dihedral HSP would break lattice-based cryptography. Kuperberg's algorithm (2003) solves dihedral HSP in 2^{O(\sqrt{\log N})} time — subexponential, but nowhere near polynomial, so lattice crypto remains quantum-safe by current best knowledge.

General non-abelian HSP. For an arbitrary finite group, no general efficient quantum algorithm is known. The standard approach — coset state + Fourier sampling — fails to extract enough information per sample. The best general result is that polynomially many coset samples are information-theoretically sufficient to determine H (Ettinger, Høyer, Knill 1999), but no efficient decoding algorithm is known. This gap — information sufficient, algorithm unknown — is one of the central open problems in quantum algorithms.

The HSP instance mapA horizontal arrangement of six HSP instances, left to right: Deutsch on Z2, BV on Z2 to the n, Simon on Z2 to the n, Shor's order-finding on Z, discrete log on Zp star, graph isomorphism on S_n, dihedral on D_N. The first five are marked solved in quantum polytime; GI is marked open; dihedral is marked subexponential.The HSP instance mapabelianDeutschZ₂BVZ₂ⁿabelianSimonZ₂ⁿShorZabeliandiscrete logZₚ*quantum poly ✓non-abeliandihedralDₙsub-exp (Kuperberg)non-abeliangraph isoSₙopensolved: QFT + O(log |G|) samplesopen or subexponentialthe abelian–non-abelian cliff is the main unsolved frontier in quantum algorithms
The HSP map. Abelian instances — Deutsch, BV, Simon, Shor, discrete log — are all solved in quantum polynomial time by the QFT-based algorithm. The dihedral case sits at subexponential time via Kuperberg's algorithm; general graph isomorphism is open. This is the terrain of known exponential quantum speedups.

Common confusions

Going deeper

You have the framework and the abelian algorithm. The rest of this section goes into the formal machinery — the role of characters and Fourier transforms, the dihedral-HSP-to-lattice connection that makes lattice-based post-quantum cryptography plausible, the symmetric-group case that would solve graph isomorphism, Kuperberg's subexponential algorithm, and the "hidden shift" sibling problem that sits beside HSP in the same taxonomy. If you are aiming for research in quantum algorithms or post-quantum cryptography, this is the map of where to look next.

The QFT-based algorithm, formally

For an abelian group G, a character is a group homomorphism \chi : G \to \mathbb{C}^\times whose image lies on the unit circle. The set of all characters of G forms a group \hat{G} — the dual group — and for abelian G there is a natural isomorphism \hat{G} \cong G. Characters are the "frequencies" of G.

The quantum Fourier transform over G acts as

\text{QFT}_G |g\rangle = \frac{1}{\sqrt{|G|}} \sum_{\chi \in \hat{G}} \chi(g) |\chi\rangle.

For G = \mathbb{Z}_N, characters are \chi_k(j) = e^{2\pi i jk / N} — the standard DFT. For G = \mathbb{Z}_2^n, characters are \chi_s(x) = (-1)^{s \cdot x} — the Hadamard transform.

Given a coset state \frac{1}{\sqrt{|H|}} \sum_{h \in H} |g_0 h\rangle, apply \text{QFT}_G:

\text{QFT}_G \frac{1}{\sqrt{|H|}} \sum_{h \in H} |g_0 h\rangle = \frac{1}{\sqrt{|H|}\sqrt{|G|}} \sum_{h \in H, \chi} \chi(g_0 h) |\chi\rangle = \frac{1}{\sqrt{|H|}\sqrt{|G|}} \sum_{\chi} \chi(g_0) \left[\sum_{h \in H} \chi(h)\right] |\chi\rangle.

The inner sum \sum_h \chi(h) is |H| if \chi is trivial on H (i.e., \chi \in H^\perp) and 0 otherwise. So the QFT outputs a uniform superposition over H^\perp, scaled by a global phase \chi(g_0) per term. Measurement yields a uniformly random element of H^\perp. Since H^\perp \cong G/H and H is recovered as the annihilator of H^\perp, O(\log |G|) samples suffice to determine H via linear algebra.

Dihedral HSP and lattice cryptography

The dihedral group D_N consists of 2N elements: N rotations and N reflections. Its subgroup structure is rich, but the hardest HSP case turns out to be when H is generated by a single reflection. Fourier sampling over D_N produces a state whose measurement reveals a "hidden shift" s \in \mathbb{Z}_N encoded in the phases of a two-qubit system. Extracting s from this state is equivalent to the unique shortest vector problem (uSVP) in a two-dimensional lattice — and uSVP in higher dimensions underpins lattice-based cryptography.

The best algorithm is Kuperberg's sieve (2003), running in 2^{O(\sqrt{\log N})} time and space. This is subexponential in \log N (so better than classical 2^{O(\sqrt{N})}), but nowhere near polynomial, meaning the lattice-based post-quantum schemes currently being standardised by NIST (like Kyber and Dilithium) remain safe under current best knowledge. If someone finds a polynomial-time quantum algorithm for dihedral HSP, most post-quantum cryptography breaks. This is why dihedral HSP is not a theoretical curiosity — it is the single-biggest known threat to the "post-quantum" security landscape.

Graph isomorphism as HSP over S_n

Given two graphs G_1, G_2 on n vertices, form the disjoint-union graph G_1 \sqcup G_2 on 2n vertices. Define f : S_{2n} \to \{\text{graphs}\} by f(\pi) = \pi(G_1 \sqcup G_2), the graph obtained by permuting vertices. The stabiliser of f — the set of permutations that map G_1 \sqcup G_2 to itself — is the automorphism group of G_1 \sqcup G_2. A non-trivial automorphism that swaps G_1 and G_2 exists if and only if the two graphs are isomorphic.

So graph isomorphism reduces to finding the automorphism group of G_1 \sqcup G_2 — which is the HSP for G = S_{2n}. The group S_{2n} is the most notoriously-structured non-abelian group for HSP. Even determining whether a specific ansatz approach will work is open; three decades in, and graph isomorphism is still not known to be in quantum polynomial time.

Kuperberg's subexponential algorithm — the sketch

Kuperberg's idea: instead of trying to extract s from one Fourier sample, generate many coset states, pair them up, and combine them via a sieve to create states with progressively clearer phase information. Each combine step doubles the accuracy but halves the number of states; with 2^{O(\sqrt{\log N})} starting states, you end up with one state clear enough to read s off directly. The algorithm is a rare example of a quantum speedup not built on Fourier sampling alone — it uses classical post-processing structure that has no analogue in abelian HSP.

The hidden shift problem — HSP's sibling

Closely related to HSP is the hidden shift problem: given two functions f_0, f_1 : G \to X with the promise that f_1(g) = f_0(gs) for some fixed s, find s. For abelian G, hidden shift reduces to HSP over G \times \mathbb{Z}_2 (with an extra register indicating which function you queried), so the abelian solutions transfer. For non-abelian G, hidden shift can be strictly harder than HSP — different algorithmic techniques apply. Hidden shift over \mathbb{Z}_N is equivalent to dihedral HSP, so the two problems are the same.

The broader speedup taxonomy

HSP is the home of almost every exponential oracle quantum speedup you will meet. The other main family — quadratic speedups — comes from Grover's algorithm and its generalisations, which are not HSP instances and have a different geometric picture (amplitude amplification). There are a handful of known quantum speedups that do not fit either framework (Child's quantum walk on graphs, the glued-trees problem, Jordan's quantum gradient algorithm), but the vast majority of exponential separations are HSP-flavoured.

Indian context — IIT, TIFR, and post-quantum cryptography

Theoretical computer science groups at TIFR Mumbai, IIT Bombay, IIT Delhi, IIT Madras, and IISc Bangalore have worked on quantum algorithms, HSP variants, and lattice problems. Ashwin Nayak (IIT alumnus), Rahul Jain (NUS, Indian-trained), and others have contributed to oracle lower bounds and the formal structure underlying quantum separations. The connection between dihedral HSP and lattice cryptography is particularly relevant for India: because Aadhaar, UPI, and most government digital infrastructure rely on RSA/ECC, the migration to post-quantum cryptographic standards is a policy priority under the National Quantum Mission. The schemes India is likely to adopt (Kyber, Dilithium) depend on the continued intractability of lattice problems — which depends on the continued intractability of dihedral HSP. The frontier of HSP research is not just theoretical elegance; it is security assumptions that will underpin the signatures on a billion Indian bank transactions in the coming decade.

Where this leads next

References

  1. Wikipedia, Hidden subgroup problem — standard encyclopaedic summary with the abelian algorithm and instance list.
  2. Richard Jozsa, Quantum factoring, discrete logarithms, and the hidden subgroup problem (2001) — influential survey placing Shor's and Simon's in the HSP framework. arXiv:quant-ph/0012084.
  3. John Preskill, Lecture Notes on Quantum Computation, Ch. 6 — theory.caltech.edu/~preskill/ph229.
  4. Alexei Kitaev, Quantum measurements and the Abelian stabilizer problem (1995) — the abelian HSP result in its original form. arXiv:quant-ph/9511026.
  5. Andrew Childs and Wim van Dam, Quantum algorithms for algebraic problems (2010) — broad survey of HSP and related problems. arXiv:0812.0380.
  6. Oded Regev, Quantum computation and lattice problems (2002) — the dihedral-HSP-to-lattice connection. arXiv:cs/0304005.