Skip to main content
Proceedings. Mathematical, Physical, and Engineering Sciences logoLink to Proceedings. Mathematical, Physical, and Engineering Sciences
. 2018 Jan 17;474(2209):20170480. doi: 10.1098/rspa.2017.0480

Quantum algorithm for multivariate polynomial interpolation

Jianxin Chen 3, Andrew M Childs 1,2,3, Shih-Han Hung 1,3,
PMCID: PMC5806014  PMID: 29434504

Abstract

How many quantum queries are required to determine the coefficients of a degree-d polynomial in n variables? We present and analyse quantum algorithms for this multivariate polynomial interpolation problem over the fields Fq, R and C. We show that kC and 2kC queries suffice to achieve probability 1 for C and R, respectively, where kC=(1/(n+1))(n+dd) except for d=2 and four other special cases. For Fq, we show that ⌈(d/(n+d))(n+d d) ⌉ queries suffice to achieve probability approaching 1 for large field order q. The classical query complexity of this problem is (n+d d) , so our result provides a speed-up by a factor of n+1, (n+1)/2 and (n+d)/d for C, R and Fq, respectively. Thus, we find a much larger gap between classical and quantum algorithms than the univariate case, where the speedup is by a factor of 2. For the case of Fq, we conjecture that 2kC queries also suffice to achieve probability approaching 1 for large field order q, although we leave this as an open problem.

Keywords: quantum algorithms, query complexity, polynomial interpolation

1. Introduction

Let f(x1,,xn)K[x1,,xn] be a polynomial of degree d. Suppose d is known and we are given a black box that computes f on any desired input. The polynomial interpolation problem is to determine all the coefficients of the polynomial by querying the black box.

Classically, a multivariate polynomial can be interpolated by constructing a system of linear equations. Invertibility of the Vandermonde matrix implies that (n+dd) queries are necessary and sufficient to determine all the coefficients. (Note that one must choose the input values carefully to construct a full-rank Vandermonde matrix for n>1 [1].)

Recent work has established tight bounds on the quantum query complexity of interpolating univariate polynomials over a finite field Fq. In particular, Childs et al. [2] developed an optimal quantum algorithm that makes (d+1)/2 queries to succeed with bounded error and one more query to achieve success probability 1−O(1/q). They also showed that the success probability of the algorithm is optimal among all algorithms making the same number of queries. Previous work [3,4] shows that no quantum algorithm can succeed with bounded error using fewer queries, so the optimal success probability exhibits a sharp transition as the number of queries is increased.

For multivariate polynomials, Childs et al. [2] conjectured that a straightforward analogue of the univariate algorithm solves the interpolation problem with probability 1−o(1) using (1/(n+1))(n+dd)+1 queries. However, while that conjecture is natural, the analysis of the algorithm appeared to require solving a difficult problem in algebraic geometry and was left open. (In addition, Montanaro considered the quantum query complexity of interpolating a multilinear polynomial [5], but this is quite different from the general multivariate case.)

To the best of our knowledge, all previous work on quantum algorithms for polynomial interpolation has focused on finite fields. Cryptographic applications of interpolation typically use finite fields, and the multivariate case could lead to new applications in that domain. However, polynomial interpolation over infinite fields is also a natural problem, especially considering the ubiquity of real- and complex-valued polynomials in numerical analysis.

In this paper, we propose an approach to the quantum query complexity of polynomial interpolation in the continuum limit. To obtain a well-defined initial state, the algorithm prepares a superposition over a bounded working region. The bounded region limits the precision that can be achieved due to the uncertainty principle, but the algorithm can be made arbitrarily precise by taking an arbitrarily large region. Using this strategy, we present a quantum algorithm for multivariate polynomial interpolation over the real and complex numbers. To simplify the analysis, we allow the algorithm to work with arbitrarily precise inputs and outputs over R or C; in practice, sufficiently fine discretization of the space could achieve similar performance. We also consider multivariate polynomial interpolation over finite fields, where our algorithm can be viewed as a generalization of the univariate polynomial interpolation algorithm proposed in [2].

To analyse the success probability of our approach, we relate it to the tensor rank problem. The rank of a given tensor, which is the smallest integer k such that the tensor can be decomposed as linear combination of k simple tensors (i.e. those that can be written as tensor products), was first introduced nearly a century ago. A half century later, with the advent of principal component analysis on multidimensional arrays, the study of tensor rank attracted further attention. However, it has recently been shown that most tensor problems, including tensor rank, are NP-hard [68], and restricting these problems to symmetric tensors does not seem to alleviate their NP-hardness [7,8]. More specifically, tensor rank is NP-hard over any field extension of Q and NP-complete over a finite field Fq.

Fortunately, analysing the success probability of multivariate polynomial interpolation does not require exactly computing the rank of a symmetric tensor. The number of queries needed to achieve success probability 1 can be translated to the smallest integer k such that almost every symmetric tensor can be decomposed as a linear combination of no more than k simple tensors. In turn, this quantity can be related to properties of certain secant varieties, which lets us take advantage of recent progress in algebraic geometry [9,10].

The success probability of our algorithm behaves differently as a function of the number of queries for the three fields we consider. Specifically, by introducing

kC(n,d):={n+1d=2,n2;1n+1(n+dd)+1(n,d)=(4,3),(2,4),(3,4),(4,4);1n+1(n+dd)otherwise, 1.1

we have the following upper bounds on the query complexity:

Theorem 1.1 —

For positive integers d and n, there exists a quantum algorithm for interpolating an n-variate polynomial of degree d over the field K using at most

  • (1) (d/(n+d))(n+dd) queries for K=Fq, succeeding with probability 1−O(1/q);

  • (2) 2kC queries for K=R, succeeding with probability 1;

  • (3) kC queries for K=C, succeeding with probability 1.

Note that these upper bounds can be improved using known results [2] for univariate polynomial interpolation (see the final remark in §3c(iii)).

2. Preliminaries and notations

(a). Notation and definitions

Let fK[x1,,xn] be a polynomial of degree at most d over the field K. We let xj:=i=1nxiji for jJ, where J:={jNn:j1++jnd} is the set of allowed exponents with size J:=(n+dd). Thus, xj is a monomial in x1,…,xn of degree j1+j2+⋯+jn. With this notation, we write f(x)=jJcjxj for some coefficients {cjK:jJ}.

Access to the function f is given by a black box that performs |x,y〉↦|x,y+f(x)〉 for all xKn and yK. We will compute the coefficients of f by performing phase queries, which are obtained by phase kickback over K, as detailed in §3a.

For k-dimensional vectors x,yKk, we consider the inner product :Kk×KkK defined by xy=i=1kx¯iyi, where x¯ is the complex conjugate of x (where we let x¯=x for xFq). We denote the indicator function for a set ARn by IA(z), which is 1 if zA and 0 if zA. We denote a ball of radius rR+ centred at 0 by B(r).

A lattice Λ is a discrete additive subgroup of Rn for positive integer n generated by e1,,enRn. For every element xΛ, we have x=i=1nγiei for some γiZ for i∈{1,…,n}. A fundamental domain T of Λ centred at zero is a subset of Rn such that T={i=1naiei:ai[12,12)}. The dual lattice of Λ, denoted by Λ~, is an additive subgroup of Rn generated by f1,,fnRn satisfying eifj=δij for i,j∈{1,…,n}.

The standard basis over the real numbers is the set {|x:xRn} for positive integer n. The amplitude of a state |ψ〉 in the standard basis is denoted by ψ(x) or 〈x|ψ〉. The standard basis vectors over real numbers are orthonormal in the sense of the Dirac delta function, i.e. 〈x′|x〉=δ(n)(xx′) for x,xRn.

(b). Algebraic geometry concepts

A subset V of Kn is an algebraic set if it is the set of common zeros of a finite collection of polynomials g1,g2,…,gr with giK[x1,x2,,xn] for 1≤ir.

A finite union of algebraic sets is an algebraic set, and an arbitrary intersection of algebraic sets is again an algebraic set. Thus by taking the open subsets to be the complements of algebraic sets, we can define a topology, called the Zariski topology, on Kn.

A non-empty subset V of a topological space X is called irreducible if it cannot be expressed as the union of two proper (Zariski) closed subsets. The empty set is not considered to be irreducible. An affine algebraic variety is an irreducible closed subset of some Kn.

We define projective n-space, denoted by Pn, to be the set of equivalence classes of (n+1)-tuples (a0,…,an) of complex numbers, not all zero, under the equivalence relation given by (a0,…,an)∼(λa0,…,λan) for all λK, λ≠0.

A notion of algebraic variety may also be introduced in projective spaces, giving the notion of a projective algebraic variety: a subset VPn is an algebraic set if it is the set of common zeros of a finite collection of homogeneous polynomials g1,g2,…,gr with giK[x0,x1,,xn] for 1≤ir. We call open subsets of irreducible projective varieties quasi-projective varieties.

For any integers n and d, we define the Veronese map of degree d as

Vd:[x0:x1::xn][x0d:x0d1x1::xnd], 2.1

where the notation with square brackets and colons denotes homogeneous coordinates and the expression in the output of V d ranges over all monomials of degree d in x0,x1,…,xn. The image of V d is an algebraic variety called a Veronese variety.

Finally, for an irreducible algebraic variety V , its kth secant variety σk(V) is the Zariski closure of the union of subspaces spanned by k distinct points chosen from V .

For more information about Veronese and secant varieties, refer to Example 2.4 and Example 11.30 in [11].

3. Quantum algorithm for polynomial interpolation

(a). The query model

Using the standard concept of phase kickback, we encode the results of queries in the phase by performing standard queries in the Fourier basis. We briefly explain these queries for the three types of fields we consider.

(i). Finite field Fq

The order of a finite field can always be written as a prime power q:=pr. Let e:FqC be the exponential function e(z):=ei2πTr(z)/p where the trace function Tr:FqFp is defined by Tr(z):=z+zp+zp2+⋯+zpr−1. The Fourier transform over Fq is a unitary transformation acting as |x(1/q)yFqe(xy)|y for all xFq. The k-dimensional quantum Fourier transform (QFT) is given by |x(1/qk/2)yFqke(xy)|y for any xFqk.

A phase query is simply the Fourier transform of a standard query. By performing an inverse QFT, a query, and then a QFT, we map |x,y〉↦e(yf(x))|x,y〉 for any x,yFq.

As in the univariate case, our algorithm is non-adaptive, making all queries in parallel for a carefully chosen superposition of inputs. With k parallel queries, we generate a phase i=1kyif(xi)=i=1kjJyixijcj for the input (x,y)Fqk×Fqk. For convenience, we define Z:Fqnk×FqkFqJ by Z(x,y)j=i=1kyixij for jJ, so that i=1kyif(xi)=Z(x,y)c.

(ii). Real numbers R

Let e:RC be the exponential function e(x):=ei2πx. For any function ψ whose Fourier transform exists, the QFT over R acts as

Rdxψ(x)|xRdyΨ(y)|y, 3.1

where Ψ(y)=Rdxe(xy)ψ(x). By Parseval’s theorem, the QFT is unitary.

As in the finite field case, we construct a phase query by making a standard query in the Fourier basis, giving

R2dxdyψ(x,y)|x,yR2dxdye(yf(x))ψ(x,y)|x,y. 3.2

An algorithm making k parallel queries generates a phase Z(x,y)⋅c, where we similarly define Z:Rnk×RkRJ by Z(x,y)j=i=1kyixij for jJ.

(iii). Complex numbers C

The complex numbers can be viewed as a field extension of the real numbers of degree 2, namely C=R[1]. For any positive integer n, let ϕn:CnR2n be an isomorphism ϕn(x):=(ℜ(x1),ℑ(x1),ℜ(x2),ℑ(x2),…,ℜ(xn),ℑ(xn)), which we also denote in boldface by x. A complex number xC can be stored in a quantum register as a tensor product of its real and imaginary parts, |x〉=|ℜ(x)〉|ℑ(x)〉.

A complex function ψ:CmCn can be seen as a function with 2m variables. Let ψ(x)=ψ~(x). By abuse of notation, we will neglect the tilde and write ψ(x)=ψ(x). Let e:CC be the exponential function e(x):=ei2πℜ(x). For any function ψ:CC whose Fourier transform exists, we define the transform

R2d2xψ(x)|xR2d2yΨ(y)|y, 3.3

where Ψ(y)=R2d2xe(y¯x)ψ(x). Note that in general Ψ(y) cannot be written in the form of Ψ(y) with a complex variable yC. To encode the output in the phase, the queries act as

R2d2xR2d2yψ(x,y)|x,yR2d2xR2d2yR2d2zψ(x,y)e(y¯z)|x,z 3.4
R2d2xR2d2yR2d2zψ(x,y)e(y¯z)|x,z+f(x) 3.5
R2d2xR2d2yR2d2zR2d2uψ(x,y)e(y¯z)e(u¯(z+f(x)))|x,u 3.6
R2d2xR2d2yψ(x,y)e(y¯f(x))|x,y, 3.7

where we use the identity R2d2ye(y(xx)¯)=δ(2)(xx) for x,xC.

An algorithm making k parallel queries generates a phase i=1ky¯if(xi)=i=1kjJy¯ixijcj. We define Z:Cnk×CkCJ satisfying Z(x,y)j=i=1kyix¯ij for jJ, so that i=1ky¯if(xi)=Z(x,y)c.

(b). The algorithm

Our algorithm follows the same idea as in [2]: we perform k phase queries in parallel for a carefully chosen superposition of inputs, such that the output states corresponding to distinct polynomials are as distinguishable as possible. For a k-query quantum algorithm, we consider the mapping Z:Knk×KkKJ defined in §3a for K=Fq, R and C. Childs et al. [2] gave an optimal algorithm for n=1 using a uniform superposition over a unique set of preimages of the range Rk:=Z(Knk,Kk) of Z, so we apply the same strategy here. For each zRk, we choose a unique (x,y)Knk×Kk such that Z(x,y)=z. Let Tk be some set of unique representatives, so that Z : TkRk is a bijection.

(i). K=Fq

The algorithm generates a uniform superposition over Tk, performs k phase queries, and computes Z in place, giving

1|Tk|(x,y)Tk|x,y1|Tk|(x,y)Tke(Z(x,y)c)|x,y1|Rk|zRke(zc)|z. 3.8

We then measure in the basis of Fourier states |c~:=(1/qJ)zFqJe(zc)|z. A simple calculation shows that the result of this measurement is the correct vector of coefficients with probability |Rk|/qJ.

(ii). K=R

We consider a bounded subset SRJ and a set Tk′ of unique preimages of each element in RkS such that Z(Tk′)=RkS and Z : Tk′→RkS is bijective. The algorithm on input |ψ〉 with support supp(ψ)⊆RkS gives

|ψ=RkSdJzψ(z)|zRkSdJzψ(z)|z|Z1(z) 3.9
RkSdJzψ(z)e(zc)|z|Z1(z) 3.10
RkSdJzψ(z)e(zc)|z=:|ψc. 3.11

The choice of S constrains the set of inputs that can be perfectly distinguished by this procedure, as captured by the following lemma.

Lemma 3.1 (Orthogonality) —

For positive integer n, let m(A):=Adnz be the measure of the set ARn. Let S be a bounded subset of Rn with non-zero measure. Let |c~=(1/m(S))Sdnze(cz)|z and let U be the maximal subset of Rn such that for any c,c′∈U with cc′,

c~|c~=1m(S)Sdnze((cc)z)=0. 3.12

Then there is a lattice Λ such that URn/Λ.

Proof. —

By definition, cc′ must be a zero of the Fourier transform F(IS) of the indicator function IS(z). We denote Λ:={c:F(IS)(c)=0}{0} and let c0U. Clearly Uc0+Λ as Λ contains all zeros. Since c+c0~|c~0=0 for all cΛ∖{0}, we have c0+ΛU and U=c0+Λ. If cΛ∖{0}, then c0+c~|c~0=c~0|c0c~=0 implies that −cΛ. If c,c′∈Λ∖{0}, then c+c0~|c+c0~=c+c+c0~|c~0=0 implies c+c′∈Λ∖{0}. Therefore, Λ is an additive subgroup of Rn.

Now we prove that Λ is a lattice. For ϵ>0, δB(ϵ), and cΛ,

|c+δ~|c~|2=|Sdnze(δz)|2|Sdnzcos(2πδz)|2>0, 3.13

if SB(r) for r<1/4ϵ. Thus, B(ϵ) contains exactly one element in Λ and hence Λ is discrete. ▪

Roughly speaking, lemma 3.1 is a consequence of the uncertainty principle: restricting the support to a finite window limits the precision with which we can determine the Fourier transform. In the proof, note that a larger window offers better resolution of the coefficients.

We have shown that the set Λ of perfectly distinguishable coefficients forms a lattice. We also require the set {|c~:cΛ} to be a complete basis. Since z|c~=(1/m(S))e(zc), completeness implies that |z〉 is of the form cΛe(zc)|c~ up to a normalization constant. More formally, we have the following lemma.

Lemma 3.2 (Completeness) —

For positive integer n, let m(A):=Adnz be the measure of the set ARn. Let Λ be a discrete additive subgroup of Rn. Let S be a bounded set with non-zero measure and |c~=(1/m(S))Sdnze(zc)|z. Then {|c~:cΛ} forms a complete basis over support S if and only if S is a fundamental domain of the dual lattice of Λ.

Proof. —

Let Λ~ be the dual lattice of Λ. We observe that (ignoring the normalization constant)

cΛe(zc)|c~=SdJzcΛe((zz)c)|z=SdJzz0Λ~δ(zzz0)|z 3.14
=z0Λ~IS(z+z0)|z+z0=|(z+Λ~)S. 3.15

In equation (3.14), cΛe(zc)=z0Λ~δ(zz0) up to a constant factor [12], Section 7.2. The set (z+Λ~)S cannot be empty, so a fundamental domain of Λ~ is a subset of S. For z,zRn, (z+Λ~)S|(z+Λ~)S=0 if zz+Λ~, which implies that S is a subset of a fundamental domain of Λ~. ▪

Lemma 3.2 further restricts the bounded set S has to be a fundamental region of Λ~. Without loss of generality, one may choose S to be a fundamental domain of a lattice centred at zero. In the last step, the algorithm applies the unitary operator

1m(S)cΛSdJze(zc)|cz|, 3.16

to the state |ψc〉 in equation (3.11). The algorithm outputs c′∈Λ with probability

1m(RkS)m(S)|RkSdJzψ(z)e(z(cc))|2m(RkS)m(S), 3.17

where the upper bound follows from the Cauchy–Schwarz inequality. The maximum is reached if ψ(z)=(1/m(RkS))IRkS(z) and c happens to be a lattice point. If cΛ, the algorithm returns the closest lattice point with high probability.

To achieve arbitrarily high precision, one may want to take SRJ. In this limit, the basis of coefficients is normalized to the Dirac delta function, i.e. c~|c=δ(J)(cc). In this case, ΛRJ and the unitary operator in equation (3.16) becomes the J-dimensional QFT over the real numbers. However, for the interpolation problem, the success probability m(RkS)/m(S) is not well defined in the limit SRJ since different shapes for S can give different probabilities. Thus, it is necessary to choose a bounded region, and we leave the optimal choice as an open question.

Though the size of the fundamental domain S affects the resolution of the coefficients, it does not affect the maximal success probability m(RkS)/m(S). This can be seen by scale invariance: for every zRk, there is a preimage (x,y) such that Z(x,y)=z. Then λzRk since Z(x,λy)=λz for any λR. In terms of the bijection ℓ: zλz for λR×, we have ℓ(Rk)=Rk and ℓ(RkS)=Rk∩ℓ(S). Then m(Rk∩ℓ(S))=m(ℓ(RkS))=λJm(RkS) and hence m(Rk∩ℓ(S))/m(ℓ(S))=m(RkS)/m(S). Thus, we can make the precision arbitrarily high by taking S arbitrarily large, and we call m(RkS)/m(S) the success probability of the algorithm.

(iii). K=C

We consider a bounded set SCJ and a set Tk′ of unique preimages of each element in RkS such that Z(Tk′)=Rk and Z : Tk′→RkS is bijective. The algorithm on input |ψ〉 with support supp(ψ)⊆RkS gives

|ψ=ϕ(RkS)d2Jzψ(z)|zϕ(RkS)d2Jzψ(z)|z|ϕ(Z1(z)) 3.18
ϕ(RkS)d2Jzψ(z)e(zc)|z|ϕ(Z1(z)) 3.19
ϕ(RkS)d2Jzψ(z)e(zc)|z=:|ψc. 3.20

By lemma 3.1 and 3.2, the set S must be a fundamental domain in CJ. Let {|c~:cΛ} be the measurement basis. In the last step of the algorithm, we apply the unitary operator

1m(S)cϕ(Λ)ϕ(S)d2Jze(zc)|cz|, 3.21

to the state |ψc〉 in equation (3.20). The algorithm outputs c′∈Λ with probability

1m(RkS)m(S)|ϕ(RkS)d2Jzψ(z)e(z(cc))|2. 3.22

Again, since |ψ〉 is normalized, equation (3.22) cannot be arbitrarily large. By the Cauchy–Schwarz inequality, equation (3.22) is upper bounded by m(RkS)/m(S); this maximal success probability is obtained if ψ(z)=(1/m(RkS))Iϕ(RkS)(z) and c happens to be a lattice point. If cΛ, the algorithm returns the closest lattice point with high probability.

By the same argument as in §3b(ii), we can show scale invariance holds for complex numbers: for ℓ: zλz where zCJ and λR×, m(RkS)/m(S)=m(Rk∩ℓ(S))/m(ℓ(S)). Thus, we can make the precision of the algorithm arbitrarily high by taking S arbitrarily large without affecting the maximal success probability.

(c). Performance

We have shown in §3b(i) that the optimal success probability is at most |Rk|/qJ for K=Fq. For real and complex numbers, we consider a bounded support S in which the algorithm is performed. The success probability of the algorithm with this choice is at most m(RkS)/m(S), as shown in equations (3.17) and (3.22). To establish the query complexity, first we show that if dimRk=J, the algorithm outputs the coefficients with bounded error.

Lemma 3.3 —

For positive integers n,k,d, let J:=(n+dd) and let m(A):=AdJz be the volume of ARJ. Let Z:Knk×Kk, Z(x,y)=i=1kyixij for an infinite field K. Let Rk=Z(Knk,Kk) be the range of Z. If dimRk=J, then m(RkS)/m(S)>0 if S is a fundamental domain centred at 0.

Proof. —

Rk is a constructible set for K=C and it is a semialgebraic set for K=R. By [9,10], Rk has non-empty interior if dim(Rk)=J for both cases.

S is a fundamental domain centred at 0 with finite measure, so we only need to prove that m(RkS) is of positive measure, or equivalently, that the interior of Rk and the interior of S have non-empty intersection.

If this is not the case, then any interior point of S cannot be in the interior of Rk. By scale invariance of Rk, any point in Kn except 0 cannot be in the interior of Rk, which contradicts the fact that Rk has non-empty interior given dim(Rk)=J. ▪

Lemma 3.3 shows that for infinite fields, although we perform the algorithm over a bounded support, the query complexity can be understood by considering the dimension of the entire set Rk. Moreover, by invoking recent work on typical ranks, we can establish the minimum number of queries to determine the coefficients almost surely.

Now let vd(x1,x2,…,xn) be the (n+d d) -dimensional vector that contains all monomials with variables x1,…,xn of degree no more than d as its entries. Let

Xn,d:={vd(x1,x2,,xn):x1,x2,,xnK}, 3.23

where K is a given ground field. For example, we have

X3,2={(x12,x22,x32,x1x2,x1x3,x2x3,x1,x2,x3,1)T:x1,x2,x3K}. 3.24

Our question is to determine the smallest number k such that a generic vector in K(n+dd) can be written as a linear combination of no more than k elements from Xn,d. More precisely, we have Rk={i=1kcivi:ciK,viXn,d}, and we ask what is the smallest number k such that Rk has full measure in K(n+dd).

Our approach requires basic knowledge of algebraic geometry—specifically, the concepts of Zariski topology, Veronese variety and secant variety. Formal definitions can be found in §2b. For the reader’s convenience, we also explain these concepts briefly when we first use them.

Now we make two simple observations.

  • (1) In general, vd(x1,x2,…,xn) can be treated as an (n+d d) -dimensional vector that contains all monomials with variables x1,…,xn,xn+1 of degree d as its entries, by simply taking the map (x1,x2,…,xn)↦(x1/xn+1,…,xn/xn+1) and multiplying by xn+1d. For example, applying this mapping to X3,2 gives
    X3,2={(x12,x22,x32,x1x2,x1x3,x2x3,x1x4,x2x4,x3x4,x42)T:x1,x2,x3,x4K}.
    The new set Xn,d′ is slightly bigger than Xn,d since it also contains those points corresponding to xn+1=0, but this will not affect our calculation since the difference is just a measure zero set in Xn,d′.
  • (2) The set Xn,d′ is the Veronese variety. One may also note that this set is isomorphic to ((x1,x2,…,xn+1)T)d in the symmetric subspace.

These observations imply that instead of studying Rk, we can study the new set

Rk={i=1kcivi:ciK,viXn,d}. 3.25

In general, we have a sequence of inclusions:

Xn,d=R1R2RkK(n+dd). 3.26

By taking the Zariski closure, we also have

X¯n,d=R¯1R¯2R¯kK(n+dd), 3.27

where R¯k is the kth secant variety of the Veronese variety Xn,d′.

Palatini showed the following [13,14]:

Lemma 3.4 —

If dimR¯k+1dimR¯k+1, then R¯k+1 is linear.

In particular, this shows that if dimR¯k=(n+dd), then R¯k=K(n+dd).

For an infinite field K, define kK to be the smallest integer such that m(RkKS)/m(S)=1. Thus, kK represents the minimal number of queries such that our algorithm succeeds with probability 1. For the finite field case K=Fq, we only require that m(RkFqS)/m(S) goes to 1 when q tends to infinity.

(i). K=C

A theorem due to Alexander & Hirschowitz [15] implies an upper bound on the query complexity of polynomial interpolation over C.

Theorem 3.5 (Alexander–Hirschowitz Theorem, [15]) —

The dimension of R¯k satisfies

dimR¯k={k(n+1)k(k1)2d=2,2kn;(n+dd)1(d,n,k)=(3,4,7),(4,2,5),(4,3,9),(4,4,14);min{k(n+1),(n+dd)}otherwise. 3.28

Thus, the minimum k to make R¯k=C(n+dd) is

kC(n,d):={n+1d=2,n2;1n+1(n+dd)+1(n,d)=(4,3),(2,4),(3,4),(4,4);1n+1(n+dd)otherwise. 3.29

By parameter counting, we see that Rk is of full measure in Rk′. It remains to show that Rk′ is of full measure in its Zariski closure R¯k:

Theorem 3.6 —

Rk′ is of full measure in R¯k.

Proof. —

Rk′ is just the image of the map (Q1,Q2,…,Qk)↦(Q1+Q2+⋯+Qk). By Exercise 3.19 in ch. II of [16], Rk′ is a constructible set, so it contains an open subset of each connected component of R¯k. Therefore, its complement is of measure 0. ▪

This immediately implies the following:

Corollary 3.7 —

Rk has measure 0 in C(n+dd) for k<kC(n,d) and measure 1 in C(n+dd) for kkC(n,d).

Thus, as the integer k increases, m(Rk′∩S)/m(S) suddenly jumps from 0 to 1 at the point kC(n,d), and so does m(RkS)/m(S). This implies part (3) of theorem 1.1.

(ii). K=R

Now consider the case K=R. For d=2, (n+1)-variate symmetric tensors are simply (n+1)×(n+1) symmetric matrices, so a random (n+1)-variate symmetric tensor will be of rank n+1 with probability 1. However, if the order of the symmetric tensors is larger than 2, the situation is much more complicated. For example, a random bivariate symmetric tensor of order 3 will be of two different ranks, 2 and 3, both with positive probabilities.

From the perspective of algebraic geometry, it still holds that R¯k=R(n+dd) for kkC(n,d) and for k<kC(n,d), R¯k is of measure zero in R(n+dd). It also holds that Rk is of full measure in Rk′. However, the claim that Rk′ has full measure in R¯k no longer holds over R. As we explained in the proof of theorem 3.6, Rk′ is the image of the map (Q1,Q2,…,Qk)↦(Q1+Q2+⋯+Qk). For an algebraically closed field K, it is known that the image of any map is always a constructible set in its Zariski closure. Thus, Rk′ is of full measure in R¯k. Over R, it is easy to verify that the image may not be of full measure in its Zariski closure (a simple counterexample is xx2). Consequently, over C, Rk′ has non-empty interior for a unique value of k, and this value of k is called the generic rank. Over R, Rk′ is just a semialgebraic set and it has non-empty interior for several values of k, which are called the typical ranks.

For the univariate case, we have the following theorem:

Theorem 3.8 ([17]; [18]) —

For n=1, all integers from kC=(d+1)/2 to kR=d are typical ranks.

For the multivariate case n≥2, it still holds that kC(n,d) defined in §3c(i) is the smallest typical rank [10]. According to Bernardi et al. [9], every rank between kC(n,d) and the top typical rank kR(n,d) is also typical. Thus, we only need to study the top typical rank kR(n,d). Unfortunately, the top typical rank in general is not known. In the literature, considerable effort has been devoted to understanding the maximum possible rank kmax(n,d), which, by definition, is also an upper bound for kR(n,d). In particular, we have kmax(n,2)n+1 for n≥2, kmax(2,4)11, kmax(3,4)19, kmax(4,4)29, kmax(4,3)15 and kmax(n,d)2(1/(n+1))(n+dd) otherwise [10].

The above result implies kR(n,d)kmax(n,d)2kC(n,d). We also mention a few other upper bounds on kmax(n,d). Trivially, we have kmax(n,d)(n+dd). In [19,20], this was improved to kmax(n,d)(n+dd)n. Later work showed that kmax(n,d)(n+d1n) [21]. Jelisiejew [22] then proved that kmax(n,d)(n+d1n)(n+d5n2), and Ballico & De Paris [23] then improved this to kmax(n,d)(n+d1n)(n+d5n2)(n+d6n2). For small cases, these bounds may be stronger than the bound kmax(n,d)2kC(n,d) mentioned above.

To summarize, we have the following, which implies part (2) of theorem 1.1:

Theorem 3.9 —

As the integer k increases from kC(n,d)1 to kR(n,d)2kC(n,d), m(Rk′∩S)/m(S) forms a strictly increasing sequence from 0 to 1, and so does m(Rk∩S)/m(S).

(iii). K=Fq

We link the finite field case with the complex case using the Lang–Weil theorem:

Theorem 3.10 (Lang–Weil Theorem, [24]) —

There exists a constant A(n,d,r) depending only on n,d,r such that for any variety VPn with dimension r and degree d, if we define V over a finite field Fq, the number of points in V must satisfy

|Nqr|(d1)(d2)qr1/2+A(n,d,r)qr1. 3.30

The Lang–Weil theorem shows that when q is large enough, the number of points in a variety over Fq is very close to qdimV. So it actually tells us that m(Rk′∩S)/m(S)=0 if k<kC(n,d). It remains unclear whether m(Rk′∩S)/m(S)>0 for k=kC(n,d). Once again, for the finite field case, when we talk about the measure, we always assume q is sufficiently large. As in the real field case, the main challenge now is to study the measure of Rk′ in R¯k.

For the upper bound, recall our notation that vd(x1,x2,…,xn) is the (n+d d) -dimensional vector that contains all monomials with degree no more than d as its entries.

Here we make a slight change to the definition in which we require all those xis in vd to be non-zero. We can similarly define Xn,d′′ and Rk′′. We prove the following:

Lemma 3.11 —

Let rn,d be the minimum number such that |Rrn,d′′|=q(n+dd)O(q(n+dd)−1). Then rn,drn−1,d+rn,d−1.

Proof. —

The proof is by induction on n+d.

For n+d=2, it is easy to verify r2,2=3≤r1,2+r2,1=2+1. Assume lemma 3.11 holds for n+dm−1 and consider the pair (n,d) with n+d=m. For the sake of readability, we first explain how the induction works for the specific example (n,d)=(3,2), and then generalize our idea to any (n,d).

The vector

v2(x1,x2,x3)=(x12,x22,x32,x1x2,x1x3,x2x3,x1,x2,x3,1)TX3,2 3.31

can be rearranged as (x3,x3x1,x3x2,x32,x12,x22,x1x2,x1,x2,1)T. The first four entries can be rewritten as x32(1/x3,x1/x3,x2/x3,1)T=x32v1(1/x3,x1/x3,x2/x3), and the last six entries form v2(x1,x2).

When (x1,x2,x3) ranges over all 3-tuples in Fq{0}, (1/x3,x1/x3,x2/x3) also ranges over all possible 3-tuples in Fq{0}. By assumption, if we take linear combinations of r3,1 vectors chosen from X3,2′′, the first four entries will range over no fewer than q(3+1 1)O(q(3+1 1)−1) different vectors in Fq(3+11).

For any such linear combination, we can add r2,2 extra vectors from X3,2 with the restriction that x3=0, which will guarantee these extra vectors do not affect the first four entries. By assumption, the last six entries will range over no fewer than q(2+2 2)O(q(2+2 2)−1) different vectors in Fq(2+22).

Thus, in total, we have (q(3+11)O(q(3+11)1))(q(2+22)O(q(2+22)1)) different vectors in Fq(3+22) if we take linear combinations of r3,1+r2,2 vectors from X3,2′′, which implies r3,2r3,1+r2,2.

For general (n,d), the analogous partition of vd(x1,x2,…,xn) is still valid. Those (n+d d) −(n−1+d d) =(n+d−1 d−1) entries involving xn will form xnd1vd1(1/xn,x1/xn,,xn1/xn) and the rest will form vd(x1,x2,…,xn−1). All arguments follow straightforwardly, so we have rn,drn−1,d+rn,d−1 for n+d=m and for any (n,d) by induction. ▪

Corollary 3.12 —

rn,d≤(n+d−1 d−1) .

Proof. —

We use induction on n+d. For n+d=2, it is easy to verify. If it is true for n+d=m, then for n+d=m+1, we have rn,drn−1,d+rn,d−1≤(n+d−2 d−1) +(n+d−2 d−2) = (n+d−1 d−1) . ▪

Rk′′ is obviously a subset of Rk′, so kFq(n,d)rn,d. By combining theorem 3.10 and corollary 3.12, we have the following, which implies part (1) of theorem 1.1:

Corollary 3.13 —

kC(n,d)kFq(n,d)rn,d(n+d1d1)=(d/(n+d))(n+dd).

Remark 3.14 —

By combining corollary 3.12 with the fact rn,2kC(n,2), we have rn,2=n+1.

Remark 3.15 —

It was previously known that rn,1=1 [25,26] and r1,d=⌈(d+1)/2⌉ [2]. We can further refine the upper bound using these boundary conditions:

rn,di=0d2(n2+ii)r1,di+(d+n3d1)i=0d2(n2+ii)di+32+(d+n3d1)=n+d+22(n+d3n1)n12(n+d2n)+(d+n3d1). 3.32

4. Optimality

In this section, we show that our algorithm is optimal for the case of finite fields. Specifically, we show that no k-query quantum algorithm can succeed with probability greater than |Rk|/qJ. This follows by essentially the same argument as in the univariate case [2].

First we show that the final state of a k-query algorithm is restricted to a subspace of dimension |Rk|. We prove the following:

Lemma 4.1 (cf. Lemma 3 of [2], arXiv version) —

Let J:=(n+dd), and let |ψc〉 be the state of any quantum algorithm after k queries, where the black box contains cFqJ. Then dimspan{|ψc:cFqJ}|Rk|.

Proof. —

Following the same technique as in the proof of Lemma 3 in [2], arXiv version, consider a general k-query quantum algorithm UkQcUk−1QcQcU1QcU0 acting on a state space of the form |x,y,w〉 for an arbitrary-sized workspace register |w〉. Here Qc: |x,y〉↦e(yf(x))|x,y〉 for xFqn,yFq is the phase query. Starting from the initial state |x0,y0,w0〉=|0,0,0〉, we can write the output state in the form

|ψc=zRke(zc)|ξz, 4.1

where with x=(x1,,xk)(Fqn)k, y=(y1,,yk)Fqk, w=(w1,…,wk+1) and I an appropriate index set,

|ξz=(x,y)Z1(z)xk+1Fqn,yk+1Fq,wIk+1(j=0kxj+1,yj+1,wj+1|Uj|xj,yj,wj)|xk+1,yk+1,wk+1. 4.2

Then dimspan{|ψc:cFqJ}dimspan{|ξz:zRk}|Rk|. ▪

We also use the following basic lemma about the distinguishability of a set of quantum states in a space of restricted dimension.

Lemma 4.2 (Lemma 2 of [2], arXiv version) —

Suppose we are given a state |ϕc〉 with cC chosen uniformly at random. Then the probability of correctly determining c with some orthogonal measurement is at most dimspan{ϕc:cC}/|C|.

Combining these lemmas, the success probability of multivariate interpolation under the uniform distribution over cFqJ (and hence also in the worst case) is at most |Rk|/qJ.

Unfortunately, it is unclear how to generalize this argument to the infinite-dimensional case, so we leave lower bounds on the query complexity of polynomial interpolation over R and C as a topic for future work.

5. Conclusion and open problems

In this paper, we studied the number of quantum queries required to determine the coefficients of a degree-d polynomial in n variables over a field K. We proposed a quantum algorithm that works for K=C, R or Fq, and we used it to give upper bounds on the quantum query complexity of multivariate polynomial interpolation in each case. Our results show a substantially larger gap between classical and quantum algorithms than the univariate case.

There are still several open questions that remain. Recall that kK represents the minimal number of queries required for our algorithm to succeed with probability 1 over the field K (or with probability approaching 1 for large q if K=Fq). First, for the finite field case K=Fq, can we bound kFq by CkC where C is a constant independent of the degree d? For the values of (n,d) for which explicit values of kC, kR and kFq are known, we always have kCkFqkR. For example, kC(1,d)=kFq(1,d)=(d+1)/2d=kR(1,d) and kC(n,2)=kFq(n,2)=kR(n,2)=n+1. Thus, it is plausible to conjecture that kFq(n,d)kR(n,d), which would imply kFq2kC.

Another question is whether we can always obtain positive success probability with only kC queries. We know that kC queries are sufficient to achieve positive success probability for K=C and R, but are they also sufficient for K=Fq? Indeed, if they are, then kFq2kC follows immediately. To see this, if there is a point p with rank greater than 2kC, then consider a line through p and a point q with rank kC. This line has no other points with rank at most kC, since otherwise p would be of rank no more than 2kC, a contradiction. Therefore, the measure of the set of points with rank kC must be less than a fraction 1/q of the whole space, which contradicts the assumption that kC queries suffice. Thus, there is no point with rank greater than 2kC—or in other words, if kC queries are sufficient to achieve positive success probability, then 2kC queries are sufficient to achieve success probability 1.

While we considered an algorithm with a bounded working region, it is unclear what is the highest success probability that can be achieved by a general k-query algorithm without this restriction (and in particular, whether fewer than kK queries could suffice to solve the problem with high probability). Indeed, even for the algorithm we proposed in §3b, it remains open to understand what choice of the region S leads to the highest success probability. As mentioned in §4, it would be useful to establish lower bounds on the query complexity of polynomial interpolation over infinite fields. Also, as stated in [2], for the univariate case over finite fields, the algorithm is time efficient since the function Z−1(z), i.e. finding a preimage of elements in the range of Z, is efficiently computable. However, for multivariate cases, it remains open whether there is an analogous efficiency analysis.

Finally, Zhandry has placed the quantum algorithm for polynomial interpolation in a broader framework that includes other problems such as polynomial evaluation and extrapolation [27]. It could be interesting to consider these problems for multivariate polynomials and/or over infinite fields.

Acknowledgements

We thank Charles Clark for encouraging us to consider quantum algorithms for polynomial interpolation over the real numbers. J.C. would also like to thank Jun Yu and Chi-Kwong Li for helpful comments in early discussions of the project.

Data accessibility

This work does not have any experimental data.

Authors' contributions

All authors contributed equally to the original ideas, analytical derivations and final writing of this manuscript, and gave final approval for publication.

Competing interests

We have no competing interests.

Funding

This work received support from the Canadian Institute for Advanced Research, the Department of Defense and the National Science Foundation (grant no. 1526380).

References

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

This work does not have any experimental data.


Articles from Proceedings. Mathematical, Physical, and Engineering Sciences are provided here courtesy of The Royal Society

RESOURCES