Workshop on Quantum Algorithms and Cryptography

December 14 – 15, 2025

Pre-conference workshop, FSTTCS 2025, BITS Goa

About the workshop

Quantum computing is an exciting computational resource whose capabilities are not yet fully understood. Shor's algorithm was a breakthrough result, providing a polynomial-time algorithm to the factoring problem using a quantum computer. Just a few years later, Grover showed how to perform searches in an unsorted database much faster than classical computers. Both of these algorithms are pioneering results that have gained significant attention from computer scientists. Over the last three decades, we have seen more exciting developments in these directions.

In this workshop, we will have talks on recent advancements in quantum algorithms and quantum cryptography. The target audience includes senior undergraduate and postgraduate students, as well as early-career researchers. We also plan to cover the basics of quantum computing in the first two sessions before moving on to advanced or recent topics.

Workshop venue is room DLT8

Speakers

Avantika Agarwal
University of Waterloo
Shashwat Agrawal
IIT Delhi
Shweta Agrawal
IIT Madras
Akshay Bansal
Virginia Tech
Krishnamoorthy Dinesh
IIT Palakkad
Venkata Koppula
IIT Delhi
Nikhil Mande
University of Liverpool
Sikhar Patranabis
IBM Research Bangalore
Jaikumar Radhakrishnan
ICTS Bengaluru
Nitin Saurabh
IIT Hyderabad
Dhinakaran Vinayagamurthy
IBM Research Bangalore

Participation & Registration

Register Here

Talk Details

Speaker Title and Abstract
Avantika Agarwal Oracle Separations in Quantum Complexity

Abstract: This talk will be split into two parts. First, we study classical oracle separations for the quantum-classical polynomial hierarchy, QCPH, which is the class of languages solvable by a constant number of alternating classical quantifiers followed by a quantum verifier. Our main result is that QCPH is infinite relative to a random oracle (previously, this was not even known relative to any oracle). We further prove that higher levels of PH are not contained in lower levels of QCPH relative to a random oracle; this is a strengthening of the somewhat recent result that PH is infinite relative to a random oracle (Rossman, Servedio, and Tan 2016). The oracle separation requires lower bounding a certain type of low-depth alternating circuit with some quantum gates. To establish this, we give a new switching lemma for quantum algorithms which may be of independent interest.

Second, we study oracle separations in the quantum oracle model. In recent years, the quantum oracle model has found a lot of use in showing oracle separations between complexity classes and cryptographic primitives. It is generally assumed that proof techniques that do not relativize with respect to quantum oracles will also not relativize with respect to classical oracles. We show that this is not the case: specifically, we show that there is a quantum oracle problem that is contained in the class QMA, but not in a class we call polyQCPH. The class polyQCPH is equal to PSPACE with respect to classical oracles, and it is a well-known result that QMA is contained in PSPACE (also with respect to classical oracles). We believe our findings show the need for some caution when using these non-standard oracle models, particularly when showing separations between quantum and classical resources.

This talk is based on joint works with Shalev Ben-David and Srijita Kundu.

Shashwat Agrawal Quantum Algorithms for Learning with Errors.

Abstract: The Learning with Errors (LWE) problem has served as a security foundation for numerous cryptographic primitives. Not only is it the most prominent hardness assumption for post-quantum cryptography, but its algebraic simplicity enables the design of primitives with advanced functionalities. Thus, it is crucial to analyse the quantum fine-grained hardness of this problem.

In this talk, our objective is to cover a few ideas in the quest for quantum algorithms for LWE. We will first look at the Dihedral Hidden Subgroup / Dihedral Coset problem (DCP), and Kuperberg’s sieving technique that gives a subexponential algorithm for this problem. We will then see Regev’s reduction from LWE to a faulty version of DCP. The faulty nature of this reduction hampers us from having a subexponential algorithm for LWE. Next, we will establish the equivalence of LWE to an extrapolated version of DCP (EDCP).

We will then examine recent ventures in defining quantum variants of LWE. Specifically, we will define S|LWE>, and then look at a subexponential time algorithm solving S|LWE> for certain amplitudes. However, we only manage to reduce an LWE instance to an S|LWE>-like instance where the phase of the amplitude is unknown. This again seems to pose a barrier against a subexponential algorithm for LWE.

Shweta Agrawal Post Quantum Cryptography: Foundations, Opportunities and Beyond
Akshay Bansal Semidefinite programming in two-party quantum cryptography

Abstract: In recent years, semidefinite programming has found numerous applications in computer science, ranging from approximation algorithms for Max-Cut and other graph partitioning problems to improved performance bounds for error-correcting codes.

In this talk, I will first introduce the formalism of linear and semidefinite programming and then discuss several cryptographic primitives—such as coin flipping, oblivious transfer, and bit commitment—that serve as building blocks or subroutines for many cryptographic protocols.

Subsequently, I will review known bounds on the information-theoretic (unconditional) security of these tasks in both classical and quantum settings, using analyses based on semidefinite programming. Finally, I will present a switching framework [Bansal and Sikora, 2025] that leverages stochastic semidefinite programming to construct secure protocols from insecure ones.

Krishnamoorthy Dinesh Introduction to Quantum Algorithms
Venkata Koppula Classical Verification of Quantum Computation
Nikhil Mande Quantum Search With Generalized Wildcards

Abstract: In the "search with wildcards'' problem [Ambainis, Montanaro, Quantum Inf.~Comput.'14], one's goal is to learn an unknown bit-string x in {-1,1}^n. An algorithm may, at unit cost, test equality of any subset of the hidden string with a string of its choice. Ambainis and Montanaro showed a quantum algorithm of cost O(sqrt{n} log n) and a near-matching lower bound of Omega(sqrt{n}). Belovs [Comput.~Comp.'15] subsequently showed a tight O(sqrt{n}) upper bound.

We consider a natural generalization of this problem, parametrized by a subset Q of 2^{[n]}, where an algorithm may test whether x_S = b for an arbitrary S in Q and b in {-1,1}^S of its choice, at unit cost. We show tight bounds for various choices of Q, such as sets of bounded size, contiguous blocks, prefixes, and only the full set. In particular, setting Q = 2^{[n]} recovers the tight bounds mentioned above.

All of these results are derived using a framework that we develop. We show, using the primal adversary bound, that the quantum query complexity of learning x is characterized, up to a constant factor, by a particular abstract analytic optimization program. Based on joint work with Arjan Cornelissen, Subhasree Patro, Nithish Raja, and Swagato Sanyal.

Sikhar Patranabis Isogenies for Dummies: Abstract Frameworks for Isogeny-based Post-Quantum Cryptography

Abstract: Isogenies have emerged as a viable alternative to lattice for post-quantum cryptography over the past 20 years. However, due to the uniquely complex underlying mathematical features and security/efficiency properties, the landscape of isogeny-based cryptography has remained somewhat limited and inaccessible to the wider cryptographic community. Additionally, building new cryptographic applications from isogenies has been a potentially tedious and time-consuming task.

In this talk, I will present overviews of two frameworks for isogeny-based cryptography, namely “cryptographic group actions” and “cryptographic forensic categories”. These frameworks enable viewing isogeny-based cryptography through the lens of abstract and easy-to-understand algebraic structures combined with simple cryptographic hardness assumptions. I will showcase some applications of these frameworks in: (i) enabling simplified expositions of well-known cryptographic constructions from isogenies (e.g., CSIDH-based public-key encryption and the SQIsign family of digital signatures), and (ii) realizing new (plausibly) post-quantum instances of advanced cryptographic primitives from isogenies. I will hope to demonstrate the simplicity and usability of these frameworks for isogeny non-experts. Along the way, I will also talk about some hard problems that form the basis of isogeny-based cryptography, and their classical/quantum hardness as of today.

No prior background in either cryptography or quantum computing will be necessary to follow the talk.

Jaikumar Radhakrishnan Mathematics for Quantum Computing
Nitin Saurabh Does Approximate Degree Compose?

Abstract: A polynomial p(x) is said to approximate a Boolean function f:{0,1}^n -> {0,1} if |f(x)-p(x)| <= 1/3 for all x \in {0,1}^n. The approximate degree of f, denoted adeg(f), is defined to be the minimal degree of an approximating polynomial for f. It was introduced roughly 30 years back in a seminal work of Nisan and Szegedy (Computational Complexity 1994). Since then it has become a powerful and versatile tool in theoretical computer science finding spectacular applications in circuit complexity, quantum query complexity, communication complexity, computational learning, and differential privacy, to name a few.

This talk will be about an important problem about approximate degree -- Does it compose? Formally, for any two Boolean functions f and g, the composed function f o g is defined as, f o g (x_1, ... , x_n) = f(g(x_1), ..., g(x_n)), where x_i \in {0,1}^m. In a beautiful and significant work, Sherstov (Theory of Computing 2013) showed that adeg(f o g) = O(adeg(f)adeg(g)). The approximate degree composition problem posits that this upper bound is tight. That is, adeg(f o g) = \Omega(adeg(f) adeg(g)) for all f and g.

I will survey the current state of progress, including its connections to quantum algorithms.

Dhinakaran Vinayagamurthy Qiskit deep dive: Algorithmic perspective.

Qiksit has been a popular software stack for quantum computing, with open surveys indicating 70% of quantum developers across the world using it for a few years now. In this talk, we will discuss the different layers of Qiskit, while exploring some of the key algorithms behind its functioning. We will start with the algorithms used in the core modules which perform efficient compilation of quantum programs. We will then move up the stack to cover a class of sampling-based algorithms that leverage hybrid quantum computing - classical supercomputing infrastructure and provide the state-of-the-art results for many applications of quantum computing. All these have accompanying open-source code in http://github.com/Qiskit to build on them for your research.

Schedule

Day 1, 14th Dec 2025

Time Speaker Title
9.00AM - 10.30AM Jaikumar Radhakrishnan Mathematics for Quantum Computing [Slides]
10.30AM - 11.00AM

Coffee Break

11.00AM - 12.30PM Krishnamoorthy Dinesh Introduction to Quantum Algorithms
12.30PM - 2.00PM

Lunch Break

2.00PM - 2.50PM Nitin Saurabh Does Approximate Degree Compose?
2.50PM - 3.40PM Avantika Agarwal Oracle Separations in Quantum Complexity
3.40PM - 4.10PM

Coffee Break

4.10PM - 5.00PM Akshay Bansal Semidefinite programming in two-party quantum cryptography [Slides]
5.00PM - 5.50PM Dhinakaran Vinayagamurthy Qiskit deep dive: Algorithmic perspective [Slides]

Day 2, 15th Dec 2025

Time Speaker Title
9.00AM - 10.30AM Shweta Agrawal Post Quantum Cryptography: Foundations, Opportunities and Beyond [Slides]
10.30AM - 11.00AM

Coffee Break

11.00AM - 12.30PM Venkata Koppula Classical Verification of Quantum Computation
12.30PM - 2.00PM

Lunch Break

2.00PM - 2.50PM Sikhar Patranabis Isogenies for Dummies: Abstract Frameworks for Isogeny-based Post-Quantum Cryptography
2.50PM - 3.40PM Shashwat Agrawal Quantum Algorithms for Learning with Errors [Slides]
3.40PM - 4.10PM

Coffee Break

4.10PM - 5.00PM Nikhil Mande Quantum Search With Generalized Wildcards

Organizers

Akshay Bansal
Virginia Tech
Rajendra Kumar
IIT Delhi
Rajat Mittal
IIT Kanpur