
we make use of 3D geometry (Lemma 6) and the intermediate value theorem of continuous
function on closed intervals. We only show the proof for the case where αis fixed, since the
proof for βbeing fixed is almost the same, but we point out some differences in Section 4.5.
Remark: We call the procedure in Theorem 1and 2the fixed-axis-rotation (FXR) method,
because the exponentiation Fk
xr can be seen as rotating about a fixed axis for ktimes on the
Bloch sphere. The peculiar notation in the denominator of Eq. (4) only takes effect when λis
large, because when λis small, 4 arcsin(√λsin α
2) will always be in [0,π
2], and klower will be of
order O(1/√λ), maintaining the quadratic speedup. The same goes for Eq. (5).
1.3 Related work and paper structure
A special case of Theorem 1with α=πwas considered by Roy et al. in [6], where the
deterministic two-parameter (D2p) protocol was proposed. The D2p protocol obtains zero
failure rate by applying G(π, β1) and G(π, β2), alternatively, to the initial state |ψ0iuntil
k≥ dkopteoracle queries are made. When kis even, the last iteration is G(π, β2); when kis
odd, the last iteration is G(π, β1) and the equations which parameters (β1, β2) need to satisfy
are more complicated. Compared to the D2p protocol, our FXR method iterates Fxr as one
piece for ktimes, regardless of the parity of k, therefore only one system of equations needs to
be solved to obtain parameters (β1, β2). Moreover, they claimed that the equations can always
be solved when k>kopt and λ61/4, but lack rigorous proof.
The rest of this paper is organized as follows. We first give two applications of our results
in Section 2. The first uses Theorem 1and the other uses Theorem 2. In Section 3we describe
the intuition behind our FXR method, and derive the equations that parameters (k, β1, β2) or
(k, α1, α2) need to satisfy. In Section 4we prove the existence of solution (β1, β2) or (α1, α2) to
the corresponding equations whenever kis greater than klower. Conclusion and future work are
discussed in Section 5.
2 Applications
In this section, we present two applications of the search framework with adjustable parameters.
The first uses Theorem 1, and the second uses Theorem 2. It can be seen especially from the
second application that the search framework can be deployed in designing quantum exact
algorithms no longer restricted to Grover search problem, and the key step is to reduce the
problem under consideration to the problem of transforming initial state to target state in a
two-dimensional subspace with some obtained G(α, β). We believe that the two applications
shown below are only tip of the iceberg demonstrating the usefulness of the search framework,
and that more interesting ones will be found in the future.
2.1 Identifying secret string exactly with Hamming distance oracle
Hunziker and Meyer [7] considered the problem of identifying a secret string s∈[k]n, by
querying the Hamming distance oracle hs(x) = dist(x, s) mod r, where r= max{2,6−k},
and dist(x, s) is the generalized Hamming distance between the query string xand s, i.e., the
number of components at which they differ. When k∈ {2,3,4}, Algorithm B proposed in [7]
requires only one query to identify sexactly. However, the case of k > 4 is more complicated,
and we recall the main idea proposed in [7] for this case in the following, where the second step
has a flaw and can be amended by using Theorem 1.
(i) Algorithm C proposed in [7] can be viewed as nsynchronous Grover search on each
position of s. In the i-th position, a Grover search with O(√k) iterations is performed for
4