Next Article in Journal
LSTM-Based Music Generation Technologies
Previous Article in Journal
Deploying a Mental Health Chatbot in Higher Education: The Development and Evaluation of Luna, an AI-Based Mental Health Support System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Classification Outside the Promised Class

by
Theodore Andronikos
1,*,†,
Constantinos Bitsakos
2,†,
Konstantinos Nikas
2,†,
Georgios I. Goumas
2,† and
Nectarios Koziris
2,†
1
Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece
2
Computing Systems Laboratory, National Technical University of Athens, 15772 Zografou, Greece
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Computers 2025, 14(6), 228; https://doi.org/10.3390/computers14060228
Submission received: 24 April 2025 / Revised: 1 June 2025 / Accepted: 5 June 2025 / Published: 10 June 2025

Abstract

This paper studies the important problem of quantum classification of Boolean functions from an entirely novel perspective. Typically, quantum classification algorithms allow us to classify functions with a probability of 1.0 , if we are promised that they meet specific unique properties. The primary objective of this study is to explore whether it is feasible to obtain any insights when the input function deviates from the promised class. For concreteness, we use a recently introduced quantum algorithm that is designed to classify a large class of imbalanced Boolean functions with probability 1.0 using just a single oracular query. First, we establish a completely new concept characterizing “nearness” between Boolean functions. Utilizing this concept, we show that, as long as the unknown function is close enough to the promised class, it is still possible to obtain useful information about its behavioral pattern from the classification algorithm. In this regard, the current study is among the first to provide evidence that shows how useful it is to apply quantum classification algorithms to functions outside the promised class in order to get a glimpse of important information.

1. Introduction

In the rapidly evolving field of quantum computing, as of now, no quantum computer possess the capability to fundamentally disrupt the computational landscape. However, the remarkable progress witnessed in recent years suggests that such a transformative shift may be imminent. Over the past few months, leading organizations and research teams have achieved groundbreaking milestones, significantly advancing the development of quantum technologies and their potential applications. Building on the success of the 127-qubit Eagle processor [1] and the 433-qubit Osprey processor [2], IBM has made significant strides with the introduction of the 1121-qubit Condor processor [3], and the cutting-edge R2 Heron, recognized as IBM’s most powerful quantum processor to date [4]. These advancements enhance the computational capacity that is required for complex quantum algorithms, including those used in function classification. Google has recently demonstrated the superior performance of quantum computers over the most advanced classical supercomputers, as documented in [5,6]. These breakthroughs underscore the potential of quantum systems to tackle computationally intensive tasks, such as the classification of Boolean and generalized functions, with unprecedented efficiency. Microsoft has unveiled the revolutionary Majorana 1 quantum chip, a significant development poised to redefine quantum computing capabilities [7,8,9]. This innovation promises to enhance the scalability of quantum systems, supporting demanding applications in cryptography and quantum classification. In the realm of quantum annealing, D-Wave has achieved a notable success by using a quantum processor to solve a scientifically significant problem faster than classical computers, as reported in [10,11]. This milestone highlights the potential of quantum annealers to address optimization problems, which can also be useful for classification tasks. At the same time, other research teams have reported significant breakthroughs. Although this report is far from exhaustive, we believe that some of the most significant recent advancements are as follows. The state-of-the-art Zuchongzhi 3.0 quantum processor, featuring 105 qubits, represents a significant technological step in quantum hardware development [12,13]. This processor enhances the computational power available for quantum algorithms, including those leveraging algorithms for function analysis. Beyond individual processors, recent advancements include novel design concepts [14,15] and innovative hardware solutions [16,17]. A particularly noteworthy development is the demonstration of distributed quantum computing, where researchers successfully connected two separate quantum processors via a photonic network interface, creating a unified, fully integrated quantum computer [18,19]. This breakthrough in distributed quantum computing opens new possibilities for scalable quantum systems, which could significantly enhance the implementation of quantum classification algorithms.
This research introduces a novel and innovative perspective on the quantum classification of Boolean functions, redefining the approach to this significant challenge within the realm of quantum computing. Our study focuses on the capabilities of quantum classification algorithms, which can achieve a classification probability of 1.0 for functions that adhere to specific, well-defined characteristics—referred to as the “promised class”. However, the central objective of this work is to investigate the extent to which meaningful insights can be derived when the input function deviates from this promised class, presenting a scenario where classification becomes inherently more complex. To make these technical concepts more accessible and engaging, we present our quantum classification algorithm in the form of a game featuring the well-known characters Alice and Bob. By leveraging the entertaining and intuitive nature of games, we aim to facilitate a clearer understanding of the underlying quantum principles for a broader audience. Since the seminal works of Meyer [20] and Eisert et al. [21], quantum games have gained significant traction in the research community, largely due to the demonstrated superiority of quantum strategies over their classical counterparts in various scenarios. A prime example is the quantum version of the Prisoners’ Dilemma [21], which serves as a compelling case study and has inspired the development of numerous abstract quantum games, as explored in the recent literature [22]. Beyond their entertainment value, quantum games have proven to be powerful tools for addressing serious computational challenges, including the design of cryptographic protocols, as evidenced by foundational work in quantum cryptography [23] and recent advancements [24]. Furthermore, the principles of quantum games have been extended to transform classical systems into quantum frameworks, including applications in political and social systems, highlighting their versatility and potential impact across diverse domains.

1.1. Related Work

The field of quantum classification has seen remarkable progress since the introduction of the seminal Deutsch–Jozsa algorithm [25], which laid the foundation for leveraging quantum advantages in function classification. This pioneering work has inspired a series of sophisticated contributions that have expanded the scope and capabilities of quantum classification algorithms. For instance, Cleve et al. [26] explored a multidimensional generalization of the Deutsch–Jozsa problem, which was further refined by Chi et al. [27] through an in-depth analysis of evenly distributed and balanced Boolean functions. Subsequent advancements by Holmes et al. [28] adapted the Deutsch–Jozsa algorithm to classify balanced functions within finite Abelian subgroups, broadening its applicability. Another notable generalization was proposed by Ballhysa et al. [29], while Qiu et al. [30] extended the Deutsch–Jozsa framework and introduced an optimized algorithm for enhanced performance. More recently, Ossorio-Castillo et al. [31] presented an innovative generalization of the Deutsch–Jozsa algorithm, pushing the boundaries of quantum classification. Practical applications of this algorithm have also been explored in works such as [32,33], demonstrating its versatility in real-world scenarios. Furthermore, significant efforts toward developing distributed versions of the Deutsch–Jozsa algorithm have been documented in [34,35], highlighting the potential for scalable quantum classification systems. In a related vein, Nagata et al. [36] extended Deutsch’s original algorithm to binary Boolean functions, enriching the theoretical framework for quantum classification. The broader literature on Quantum Learning and Quantum Machine Learning has also contributed significantly to this domain, with key studies such as [37,38,39,40,41,42] focusing on oracular algorithms for computing and classifying Boolean functions. These works predominantly emphasize the distinction between constant and balanced functions, where a balanced function is defined as one whose domain elements yielding output 0 are equal in number to those yielding output 1. In contrast, a recent study by Andronikos et al. [43] shifts the focus to imbalanced Boolean functions, introducing the novel BFPQC (Boolean Function Pattern Quantum Classifier) algorithm, which is designed to classify a diverse class of imbalanced functions exhibiting specific behavioral patterns, leveraging pattern-based hierarchies.
Quantum classification algorithms are typically guaranteed to succeed only when the input function satisfies certain well-defined properties, forming what is commonly referred to as a “promise problem”. In essence, if the input function belongs to a rigorously specified category—such as the promised class defined by the pattern bases in the BFPQC framework—the algorithm will produce accurate results. However, if the input function deviates from these properties, the algorithm’s performance is not guaranteed, most often leading to erroneous outcomes. The literature consistently emphasizes this limitation, with authors meticulously outlining the precise conditions under which their algorithms are applicable [25,26,30]. To the best of our knowledge, the vast majority of prior work has not systematically investigated the behavior of quantum classification algorithms when the input function lies outside the promised class, leaving a critical gap in understanding their robustness and applicability.
Contribution. Quantum classification algorithms represent a promising approach to categorizing functions that adhere to specific structural properties, achieving a perfect classification probability of 1.0 when these conditions are met, a concept widely recognized in the literature as a “promise problem”. The “promised class” encapsulates the rigorously defined set of functions that satisfy these properties, ensuring the algorithm’s optimal and reliable performance. In this study, we establish a precise and formal definition of the promised class in Definition 13. To eliminate any potential ambiguity, we emphasize that the algorithm’s effectiveness is contingent upon the input function belonging to this promised class; when the function deviates from this class, the algorithm is not expected to yield accurate results, as the absence of the required properties undermines its reliability. From an implementation standpoint, these algorithms leverage a quantum oracle that efficiently evaluates the input function, a pivotal component that harnesses the quantum advantage in classification tasks.
The primary objective of this research is to address a significant gap in the literature by investigating whether meaningful insights can be extracted when the input function lies outside the promised class, a challenging scenario that tests the robustness of quantum classification algorithms. To ensure a rigorous and productive investigation, we adopt a well-defined framework based on specific assumptions. Our analysis centers on the BFPQC algorithm, introduced in [43], which is designed to classify all Boolean functions within the promised class with optimal accuracy and a probability of 1.0 using a single oracular query. In this work, we extend our exploration to examine the behavior of the BFPQC algorithm when applied to functions that, while not members of the promised class, are sufficiently close to its elements, as formalized in Definition 19. This represents a noteworthy advancement, as, to the best of our knowledge, this study is the first to provide rigorous evidence that quantum classification algorithms can yield valuable insights into the structure and behavioral patterns of functions outside the promised class, offering a novel perspective on their classification and potential applications.
A key innovation of this work is the introduction of a novel concept of “nearness” between Boolean functions, which quantifies proximity to the promised class through a carefully defined distance metric. By applying this concept, we demonstrate that the BFPQC algorithm can extract significant information about the behavioral patterns of functions that are close to the promised class, thereby expanding the algorithm’s utility beyond its original scope. Within our framework, the notion of left and right cluster proximity serves as a robust criterion for assessing nearness, providing a structured and mathematically rigorous approach to evaluate how closely an unknown function aligns with the promised class. This concept of “nearness” is not only a novel contribution to the literature but also appears to offer distinct advantages over alternative distance metrics. For example, the Hamming distance, which counts the number of inputs where two functions differ, is a straightforward and intuitive metric but is limited in the quantum context due to the projective nature of quantum states, which prioritizes phase and amplitude differences over simple value discrepancies. Our analysis strongly suggests that imposing a distance-based constraint is critical for any quantum classification algorithm to yield useful insights when dealing with functions outside the promised class.

1.2. Organization

This article is structured in the following way. Section 1 introduces the topic and includes references to relevant literature. Section 2 offers a brief overview of key concepts, which serves as a basis for grasping the technical details. Section 3 and Section 4 rigorously define the promised class itself, and what we perceive as Boolean functions being outside the promised class, but still close enough to it. Section 5 provides an in-depth analysis of the information that Alice can infer about the behavioral pattern of the unknown function. Finally, the paper wraps up with a summary and a discussion of the algorithm’s nuances in Section 6.

2. Background Concepts

To begin, we will establish the notation and terminology that will be utilized throughout this article.
  • B is the binary set { 0 , 1 } .
  • b = b n 1 b 0 is a sequence of n bits that makes up a bit vector b of length n. zero and one are two special bit vectors, represented by 0 and 1 , respectively, where all the bits are zero and one: 0 = 0 0 and 1 = 1 1 .
  • For clarity, we write b in boldface when referring to a bit vector b B n . For convenience, b is frequently viewed as the binary representation of the integer b.
  • It is also useful to think of each bit vector b B n as the binary correspondence to one of the 2 n basis kets that constitute the computational basis of the 2 n -dimensional Hilbert space.
Definition 1 (Boolean Functions).
A Boolean function f is a function from B n to B , n 1 .
Example 1 (Boolean Functions).
We give now two examples of Boolean functions. The binary Boolean function f and the ternary Boolean function g are defined as shown below:
f ( x 1 , x 0 ) : = x 1 x 0 g ( x 2 , x 1 , x 0 ) : = x 2 x 1 x 0 .
The above functions assume the values listed in Table 1.
In this work, when studying a system consisting of n qubits, we shall often refer to following signature state | φ
| φ = 2 n 2 x B n | x ,
as the perfect superposition state. This state is of particular importance because it is the starting point of most quantum algorithms. In modern quantum computers it is easily prepared by acting with the n-fold Hadamard transform on the initial state | 0 n . Two other important states are the | + and | states, which are defined as
| + = H | 0 = | 0 + | 1 2
| = H | 1 = | 0 | 1 2
Example 2 (Perfect Superposition State).
Let | φ 2 and | φ 3 stand for the perfect superposition state corresponding to two quantum registers, one with 2 and one with 3 qubits, respectively. In such a scenario, the general formula (1) becomes
| φ 2 = 1 2 | 00 + | 01 + | 10 + | 11 , and | φ 3 = 1 2 2 | 000 + | 001 + | 010 + | 011 + | 100 + | 101 + | 110 + | 111 .
Oracles represent a fundamental concept in quantum computing, serving as components in numerous quantum algorithms. An oracle functions as a black box that encapsulates a particular function or information within a quantum circuit, enabling quantum algorithms to address problems more effectively than classical algorithms in specific scenarios. It facilitates the evaluation of the function or the verification of a condition without disclosing the internal mechanisms of the function. In the realm of quantum algorithms, oracles are frequently employed to identify solutions to a problem or to convey insights regarding a function’s behavior. For the purposes of this discussion, the following definition is adequate.
Definition 2 (Oracle & Unitary Transform).
An oracle is a black box implementing a Boolean function f. The idea here is that, being a black box function, we know nothing about its inner working; just that it works correctly. Thus, it can be used for the construction of a unitary transform U f that captures the behavior of f. Henceforth, we shall assume that the corresponding unitary transform U f implements the standard schema
U f : | y | x | y f ( x ) | x .
This particular oracle is occasionally designated as a Deutsch–Jozsa oracle. It is pertinent to mention that there exist other types of oracles, such as the Grover oracle, primarily employed to identify solutions to a problem. The present study assumes that every oracle and unitary transform adheres to Equation (4) and is utilized to infer a function based on its behavior. The primary measure of complexity in oracular algorithms is the query complexity, defined as the number of queries directed towards the oracle by the algorithm. To obtain any useful information from the schema (4), we set | y equal to | , in which case (4) takes the following familiar form:
U f : | | x ( 1 ) f ( x ) | | x .
Figure 1 and Figure 2 give a visual outline of the unitary transforms U f that implement schemata (4) and (5), respectively.
Throughout this work, the following conventions are consistently applied to all quantum circuits, including those shown in Figure 1 and Figure 2.
  • The arrangement of the qubits follows the Qiskit convention [44], specifically the little-endian qubit indexing convention, which positions the least significant qubit at the top of the diagram and the most significant qubit at the bottom.
  • I R is the quantum input register that contains a specific number of qubits.
  • O R is the single-qubit output register that is initialized to an arbitrary state | y in Figure 1 and to state | in Figure 2.
  • U f is the unitary transform. Its precise mathematical expression depends on f and is hidden. However, it is assumed that it satisfies relation (4) in Figure 1 and relation (5) in Figure 2.
Example 3 (Oracle in Deutsch’s Algorithm).
Perhaps the earliest quantum algorithm, Deutsch’s algorithm, provides a simple but instructive example of a quantum oracle. This algorithm is mainly a proof of concept, in that it solves a specific problem faster than any classical algorithm. Given a Boolean function f : B B , which is either constant (same output for both inputs) or balanced (different outputs for each input), the algorithm determines whether f is constant or balanced using only one query to the function, compared to two queries required classically. The quantum circuit in Figure 3 visualizes the implementation of Deutsch’s algorithm and employs the following notation.
  • I R is the quantum input register that contains one qubits and starts its operation at state | 0 .
  • O R is the single-qubit output register initialized to state | 1 .
  • H is the Hadamard transform.
  • U f is the unitary transform corresponding to the oracle for the unknown function f. The latter is promised to be constant or balanced.
Referring to Figure 3 and recalling that the ordering the qubits adheres to the Qiskit [44] convention, we may express the initial state | ψ 0 as shown below
| ψ 0 = | 1 | 0 .
Applying Hadamard gates to all qubits leads to the next state | ψ 1 , which, by taking into account (2) and (3), can be written as
| ψ 1 = H | 1 H | 0 = | 0 | 1 2 | 0 + | 1 2 = 1 2 | | 0 + | 1 .
The oracle’s action according to the schema (5), evolves the state to | ψ 2
| ψ 2 = 1 2 | x B ( 1 ) f ( x ) | x .
The power of the quantum oracle stems from its ability to encode both output values of the Boolean function f into the relative phase x B ( 1 ) f ( x ) of state | ψ 2 . In the literature, this is referred to as the phase kickback phenomenon. Phase kickback is a fundamental trait of many quantum algorithms because an operation on the ancilla qubit induces a phase shift on the control qubit. To successfully employ this technique, it is necessary for the ancilla qubit to be in state | 0 | 1 2 = H | 1 = | (recall Equation (3)). Using phase kickback is crucial because the oracle instead of writing the values f ( x ) explicitly to a qubit, encodes them as the relative phase ( 1 ) f ( x ) . The typical method to produce | is to initialize the ancilla qubit to state | 1 and, subsequently, apply the Hadamard transform H, as depicted in the quantum circuit of Figure 3. Modern-day quantum computers allow for the immediate initialization of qubits to states other than | 0 and | 1 , such as | . In all of the quantum circuits shown in the rest of this paper, we directly initialize the output register O R to | .
Subsequently, by applying the Hadamard gate to the quantum input register I R , we drive the system into the | ψ 3 described below
| ψ 3 = 1 2 | y B x B ( 1 ) f ( x ) y x | y .
It is easy to see that the amplitude of the state | 0 is given by the following formula
1 2 x B ( 1 ) f ( x ) ,
which enables us to distinguish between the following two cases.
(D1)
If f is constant, then (7) reduces to ± 1.0 .
(D2)
If f is balanced, then (7) reduces to 0.0 .
Thus, if we measure | 0 , then f is constant, otherwise f is balanced. An important observation is that the quantum oracle demonstrates parallelism by evaluating f on both inputs simultaneously, and interference by amplifying desired outcomes.
We point out that the term “promise” is frequently used in the literature to describe a specific property of the Boolean function f. This means that we are assured, or if you would prefer we are certain with probability 1.0 , that f satisfies the property in question. One well-known example of this is the Deutsch–Jozsa algorithm, which promises that f is either balanced or constant.
Extending the operation of addition modulo 2 to bit vectors is a natural and fruitful generalization.
Definition 3 (Bitwise Addition Modulo 2).
Given two bit vectors x , y B n , with x = x n 1 x 0 and y = y n 1 y 0 , we define their bitwise sum modulo 2, denoted by x y , as
x y ( x n 1 y n 1 ) ( x 0 y 0 ) .
Following the standard approach, we use the same symbol ⊕ to denote the operation of addition modulo 2 two between bits, and the bitwise sum modulo 2 between two bit vectors because the context always makes clear the intended operation.

3. The Promised Class

Typically, by employing a quantum classification algorithm, we are able to classify with probability 1.0 functions that satisfy certain special properties. Most often in the literature, one encounters some phrase that states that we have been given the promise that the classifiable functions fulfill these special properties, hence the “promise” problem. In this work, we refer to the “promised” class to encompass all these functions that satisfy these properties. In our investigation, the promised class is rigorously defined in Definition 13. To dispel any possible ambiguity, we clarify that the classification algorithm is not expected to work correctly, or to be more accurate, is improbable to give the right answer, whenever the input function fails outside the promised class. Implementation-wise, these quantum algorithms make use of an oracle that stealthily implements the input function. The main premise of this work is to investigate if it is possible to gain any information when the input function falls outside the promised class, as rigorously defined in Definition 13. To bear any useful result, such an undertaking must be concrete. Therefore, we shall work under the following hypotheses.
(H1)
We study the behavior of the quantum classification algorithm BFPQC, introduced in [43]. The acronym stands for Boolean Function Pattern Quantum Classifier.
(H2)
BFPQC is designed to classify all Boolean functions belonging to the promised class with probability 1.0 using just a single oracular query.
(H3)
In this paper, we study functions that, despite being outside the promised class, are still quite “close” to its elements, in the sense we shall make precise in Definition 19.
Under the above hypotheses, the question we shall answer here is: can we obtain any useful information? And, if so, under what circumstances?
As previously mentioned, we conceptualize this method as the advancement of a game played between our talented stars, Alice and Bob. This game is called the Classification Game and is governed by the following rules.
(G1)
Bob is free to choose any Boolean function, belonging either to the promised class or to a class near to the promised class as ordained by Definition 19. Bob must announce to Alice the class to which the unknown function belongs.
(G2)
Bob wins the game if Alice fails to identify the chosen function if it belongs to the promised class, or if Alice fails to obtain any useful information if it is outside the promised class. Otherwise, Alice is the winner.
(G3)
In terms of implementing the game as a quantum circuit, Bob chooses the hidden oracle, while Alice furnishes the classifier, and is allowed to make a single query to the oracle.
Definition 4 (Pattern Bit Vectors).
Let f be a Boolean function from B n to B , n 1 . We abstract the operation of f into a unique bit vector that we call pattern bit vector. The technicalities are given below.
  • The pattern bit vector p f = p 2 n 1 p 1 p 0 corresponding to f is the element of B 2 n with the property that p i = f ( i ) , where i is the binary bit vector representing integer i, 0 i 2 n 1 . The pattern bit vector p f codifies the binary values of f ( i ) as i ranges over B n .
    Computers 14 00228 i003
  • The negation of the pattern bit vector p f = p 2 n 1 p 1 p 0 , denoted by p f ¯ , is the pattern bit vector p 2 n 1 ¯ p 1 ¯ p 0 ¯ , which encodes the function f ¯ .
Example 4 (Pattern Bit Vectors).
In the previous Example 1, we defined the Boolean functions f and g, whose values are contained in Table 1. The pattern bit vectors and their negations corresponding to the functions f and g are listed below:
p f = 1000 p f ¯ = 0111 p g = 11111110 p g ¯ = 00000001 .
Definition 5 (Functions from Patterns Bit Vectors).
Conversely, to any bit vector p = p 2 n 1 p 1 p 0 of length 2 n , we associate the Boolean function f p with the property that f ( i ) = p i , where i is the binary bit vector representing integer i, 0 i 2 n 1 .
In the rest of this paper, to avoid excessive notation, when we want to refer to an arbitrary pattern bit vector without emphasizing the corresponding function f, we shall simply write p instead of p f .
Example 5 (Functions from Patterns Bit Vectors).
Let us consider the pattern bit vectors p = 1000 and q = 0110 and let f and g be the Boolean functions that correspond to these bit vectors. The behavior of these functions, i.e., their values as their inputs range over B 2 , is given in Table 2.
The closed form of functions f and g is described below:
f ( x 1 , x 0 ) : = x 1 x 0 g ( x 1 , x 0 ) : = ( ¬ x 1 x 0 ) ( x 1 ¬ x 0 ) .
Definition 6 (Pattern Kets).
To each pattern bit vector p = p 2 n 1 p 1 p 0 , we associate the 2 n -dimensional pattern ket   | a p , with coefficients a i , 0 i 2 n 1 , given by the next formula.
a i = 2 n 2 if p i = 0 , 2 n 2 if p i = 1 .
The visual interpretation of Definition 6 is presented in Figure 4.
The intuition behind the above Definition 6 is quite straightforward. If O f is an oracle realizing the Boolean function f, then, by recalling (1), we surmise that | a p results from the action of O f onto the perfect superposition state | φ . For future reference, we make a rigorous note of this fact in the following relation:
O f | | φ = | | a p .
Example 6 (Pattern Kets).
Recalling the pattern bit vectors p f = 1000 and p g = 11111110 computed in the previous Example 4, and applying Definition 6, we see that the pattern kets | a p f and | a p g are:
| a p f = 1 2 | 00 + 1 2 | 01 + 1 2 | 10 1 2 | 11 = 1 2 | 00 + | 01 + | 10 | 11 | a p g = 1 2 2 | 000 1 2 2 | 001 1 2 2 | 010 1 2 2 | 011 1 2 2 | 100 1 2 2 | 101 1 2 2 | 110 1 2 2 | 111 = 1 2 2 | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111 .
If O f and O g are oracles for f and g, respectively, their action on the perfect superposition states | φ 2 and | φ 3 , as described in Example 2, will produce the pattern kets | a p f and | a p g shown above.
The previous Definitions 4 and 6 clearly illustrate a one-to-one relationship between Boolean functions and pattern bit vectors and between pattern bit vectors and pattern kets. One should consider a Boolean function, its corresponding pattern bit vector, and the corresponding pattern ket as different facets of the same entity. Consequently, understanding the behavior of a Boolean function allows for the creation of its pattern bit vector, or its pattern ket, while any one of the pattern bit vectors or the pattern kets holds all the essential information required to recreate the Boolean function. The next Figure 5 is meant to convey this strong correlation among these three entities.
Definition 7 (Pattern Bit Vectors Product).
Let p = p 2 n 1 p 1 p 0 and q be two pattern bit vectors of length 2 n and 2 m , respectively, where, in general, n m . We define their product, denoted by p q , as
p q = s 2 n 1 s 1 s 0 , where s i = q if p i = 0 q ¯ if p i = 1 , 0 i 2 n 1 .
Example 7 (Pattern Bit Vectors Product).
We explain the product operation between two pattern bit vectors begin by giving two detailed examples: 01 1100 and 0101 0001 .
01 1100 = 11000011 0101 0001 = 0001111000011110
To explain all the details, we show the step-by-step product construction process in Table 3 and Table 4.
Definition 8 (Orthogonal Pattern Bit Vectors).
Given two pattern bit vectors p and q of length 2 n , we say that p and q are orthogonal if p q contains 2 n 1 0s and 2 n 1 1s.
Definition 9 (Pattern Basis).
A pattern basis of rank n, n 1 , is a list of 2 n pairwise orthogonal pattern bit vectors ( p 0 , p 1 , , p 2 n 1 ) , each of length 2 n .
Example 8 (Pattern Bases).
Consider the following two lists I 2 and B 2 of pattern vectors:
I 2 : = ( p 0 = 0001 , p 1 = 0010 , p 2 = 0100 , p 3 = 1000 ) , and B 2 : = ( e 0 = 0000 , e 1 = 0101 , e 2 = 0011 , e 3 = 0110 ) .
Every p i has length 2 2 = 4 and is orthogonal to every other p j , i j , and, similarly, every e i has length 2 2 = 4 and is orthogonal to every other e j , i j . Furthermore, both lists I 2 and B 2 consist of 2 2 = 4 pattern bit. Hence, according to Definition 9, I 2 and B 2 are two different pattern bases of rank 2.
Definition 10 (Pattern Bases Product).
Let P n = ( p 0 , p 1 , , p 2 n 1 ) and P m = ( q 0 , q 1 , …, q 2 m 1 ) be two pattern bases of rank n and m, respectively, where, in general, n m . Their product P n P m is defined as
P n P m : = ( p 0 q 0 , p 0 q 1 , p 0 q 2 m 1 , p 1 q 0 , p 1 q 1 , p 1 q 2 m 1 , , p 2 n 1 q 0 , p 2 n 1 q 1 , p 2 n 1 q 2 m 1 ) ,
comprising a list of 2 n + m pattern bit vectors, each of length 2 n + m .
We employ the same symbol ⊙ to denote the product operation between two pattern bit vectors, and the product operation between two pattern bases because the context always makes clear the intended operation.
Example 9 (Pattern Bases Product).
In this example, we construct the product between two pattern bases. We focus on the pattern basis I 2 , which is the set consisting of the following four pairwise orthogonal pattern vectors:
I 2 : = ( p 0 , p 1 , p 2 , p 3 ) , where p 0 = 0001 , p 1 = 0010 , p 2 = 0100 , p 3 = 1000 .
The intuition behind our choice of the pattern basis I 2 is that these pattern vectors correspond to imbalanced binary Boolean functions and can be used to generate a sequence of classes of imbalanced Boolean functions. We compute the product of I 2 with itself
I 4 : = I 2 I 2 .
To show how Definition 10 works, we list the elements of I 4 in Table 5, indicating their derivation from I 2 .
In view of the previous example, it becomes clear that we can define a sequence of classes of imbalanced Boolean functions. To do so, we start from the pattern basis I 2 , already encountered in Example 12, that consists of the following four pairwise orthogonal pattern bit vectors:
I 2 ( p 0 , p 1 , p 2 , p 3 ) , where p 0 = 0001 , p 1 = 0010 , p 2 = 0100 , p 3 = 1000 .
Definition 11 (A Sequence of Imbalanced Pattern Bases).
We recursively define a sequence ( I 2 n ) n 1 , of pattern bases exhibiting imbalance.
(I0)
If n = 1 , the corresponding pattern basis is I 2 , as defined by (13).
(I1)
Given the pattern basis I 2 n of rank 2 n , we define the pattern basis I 2 ( n + 1 ) of rank 2 ( n + 1 ) as follows:
I 2 ( n + 1 ) : = I 2 I 2 n .
(I2)
This sequence of pattern bases I 2 , I 4 , …, I 2 n , …, is denoted by I .
As we have pointed out, the sequence I of pattern bases induces a corresponding sequence of classes of Boolean functions. This concept is formalized by Definition 12.
Definition 12 (Functions from Imbalanced Bases).
Let I 2 n = ( p 0 , p 1 , , p 2 2 n 1 ) be a pattern basis of rank 2 n . To I 2 n we associate the class F 2 n = ( f 0 , f 1 , , f 2 2 n 1 ) of Boolean functions from B 2 n to B such that p i is the pattern bit vector corresponding to f i , 0 i 2 2 n 1 . This sequence of classes of Boolean functions F 2 , F 4 , …, F 2 n , …, is denoted by F .
Definition 13 (The Promised Class).
The promised class is the collection of Boolean functions belonging to the F sequence.
In a symmetrical manner, the sequence I of pattern bases induces a corresponding sequence of unitary pattern classifiers. This concept is formalized by Definitions 14 and 15.
Definition 14 (Unitary Pattern Classifiers).
Let P n = ( p 0 , p 1 , , p 2 n 1 ) be a pattern basis of rank n, n 1 . To P n corresponds the unitary pattern classifier C P n , defined as follows:
0 t h 1 s t ( 2 n 1 ) t h C P n = [ | a p 0 | a p 1 | a p 2 n 1 ] , n 1 .
Definition 14 concerns the most general case, where the starting point of the construction is an arbitrary pattern basis. The following Definition 15 is tailored to the special case of imbalanced pattern bases.
Definition 15
(Unitary Pattern Classifiers for Imbalanced Functions). We recursively define a sequence of unitary pattern classifiers corresponding to the sequence I of imbalanced pattern bases as follows.
(CI0)
For n = 1 , the unitary pattern classifier corresponding to I 2 is denoted by C I 2 , and, in accordance to Definition 14, is given by
0 t h 1 s t 2 n d 3 r d C I 2 = [ | a p 0 | a p 1 | a p 2 | a p 3 ] .
(CI1)
Given the unitary pattern classifier C I 2 n corresponding to the pattern basis I 2 n , we define C I 2 ( n + 1 ) , corresponding to I 2 ( n + 1 ) as
C I 2 ( n + 1 ) : = C I 2 C I 2 n = C I 2 ( n + 1 ) ( n 1 ) .
(CI2)
We use CI for the sequence of unitary pattern classifiers C I 2 , C I 4 , …, C I 2 n , … .
Example 10 (Unitary Pattern Classifiers).
We start by explicitly writing the 2 2 × 2 2 unitary classifier C I 2 that corresponds to the pattern basis I 2 . Its precise construction follows the guidelines outlined in Definitions 6 and 14. The end result is shown below:
C I 2 = [ 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 ] = 0 t h 1 s t 2 n d 3 r d [ | a p 0 | a p 1 | a p 2 | a p 3 ] .
Incidentally, we note that C I 2 can be easily constructed by modern quantum computers using ubiquitous standard gates such as the Hadamard, Z and controlled-Z gates:
C I 2 = ( H H ) C Z ( Z Z ) ( H H )
In the same way, we construct the matrix representation of the unitary classifier C I 4 , given below.
C I 4 = ( 17 ) C I 2 C I 2 = ( 18 ) [ 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 ] [ 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 ] = [ 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 1 4 ] .
The previous Definitions 11, 12, and 15 clearly illustrate a one-to-one correspondence among the elements of the pattern basis I 2 n , the functions of the function class F 2 n , and the column kets of the unitary pattern classifier C I 2 n since they all contain precisely the same information. This situation is captured by the following Figure 6.
The quantum algorithm BFPQC (Boolean Function Pattern Quantum Classifier), as introduced in [43], classifies imbalanced Boolean functions that belong to the promised class defined in Definition 13. The primary characteristic of these functions is that the proportion of elements in their domain assigned the value 0 is different from the proportion assigned the value 1. The BFPQC algorithm classifies these functions with a probability of 1.0 using a single oracular query. To achieve this, it employs the unitary classifiers C I 2 n , n 1 , as the main component in the construction of a family of quantum circuits QCPC2n, for the classification of the class of Boolean functions F 2 n . Suppose we intend to classify a Boolean function belonging to the F sequence, and, in particular, to the class F 2 n , for some specific n. This is easily achievable by the quantum circuit QCPC2n that utilizes as the primary component the unitary classifier C I 2 n . This quantum circuit is depicted in Figure 7. If the oracle encodes a function of F 2 n , the QCPC2n circuit will conclusively, i.e., with probability 1.0 , determine this function.
To enhance clarity, we explain the notation used in the above figure.
  • I R is the quantum input register that contains 2 n qubits and starts its operation at state | 0 .
  • O R is the single-qubit output register initialized to | .
  • H is the Hadamard transform.
  • U f is the unitary transform corresponding to the oracle for the unknown function h.
  • C I 2 is the fundamental building block of C I 2 n , as evidenced by Equation (17).
The situation is summarized in the following Theorem 1 proved in [43]. To enhance the readability of this article, we have relocated the proofs of all results in Appendix A.
Theorem 1
(Classification in the Promised Class). Let f i , 0 i 2 2 n 1 , be a Boolean function contained in the class F 2 n = ( f 0 , f 1 , , f 2 2 n 1 ) . Upon measuring the quantum circuit QCPC2n containing the oracle for f i and the unitary classifier C I 2 n , we obtain | i , where i is the binary representation of the index i, and | i is one of the basis kets of the computational basis.
Example 11 (Classifying functions in the Promised Class).
Suppose that, in the Classification Game between Bob and Alice, Bob chooses a Boolean function from F 4 , which belongs to the promised class of functions. Say that Bob chooses f 3 , the behavior of which is encoded by the pattern vector r 3 = 1000 1000 1000 0111 , listed in Example 12. Alice makes her move by employing the classifier C I 4 = C I 2 2 . In this case, the concrete implementation in Qiskit [44] of the classification algorithm takes the form shown in Figure 8, where Bob uses the oracle for the function f 3 and Alice the classifier C I 4 .
After the action of the classifier, the state of the system is just | 0011 . Therefore, measuring the quantum circuit depicted in Figure 8 will output the bit vector 0011 with probability 1 (as corroborated by the measurements contained in Figure 9), which is the binary representation of the index of f 3 . Alice surely wins the game, as anticipated.
This article aims to explore the information that can be derived from the BFPQC algorithm when the input is a function that, while not part of the promised class, remains relatively close, in a way to be rigorously defined in Definition 19. When the oracle realizes a function outside F 2 n , the final measurement will not reveal the function. However, as we shall demonstrate, it is possible to obtain some useful information when the input function is sufficiently close to the class F 2 n , in the sense of Definition 19.

4. Outside the Promised Class

For our investigation regarding the behavior of functions outside the promised class, we shall consider functions that are a mixture of balanced and imbalanced Boolean functions. We begin by first defining the sequence of balanced pattern bases, as outlined in the next Definition 16. To avoid any confusion, we clarify that only the first pattern bit vector in every basis represents the constant function; all the remaining pattern bit vectors encode balanced functions.
Definition 16 (A Sequence of Balanced Pattern Bases).
We recursively define a sequence ( B 2 m ) m 1 , of pattern bases demonstrating balanced behavior.
(B0)
If m = 1 , the corresponding pattern basis is B 2 , as defined below
B 2 : = ( e 0 , e 1 , e 2 , e 3 ) , where e 0 = 0000 , e 1 = 0101 , e 2 = 0011 , e 3 = 0110 .
(B1)
Given the pattern basis B 2 m of rank 2 m , we define the pattern basis B 2 ( m + 1 ) of rank 2 ( m + 1 ) as follows:
B 2 ( m + 1 ) : = B 2 B 2 m .
(B2)
This sequence of pattern bases B 2 , B 4 , …, B 2 m , …, is denoted by B .
Example 12 (Pattern Bases Product).
In this example, we construct the pattern basis B 4 . Starting from the initial pattern basis B 2 , as defined by Equation (21), we construct the product of B 2 with itself
B 4 : = B 2 B 2 .
Using Definition 10, we compute the elements of B 4 in Table 6, indicating their derivation from B 2 .
As we have pointed out before, only the first pattern bit vector in B 4 represents the constant function, and all the remaining pattern bit vectors encode balanced functions.
Definition 17 (Functions from Balanced Bases).
Let B 2 m = ( e 0 , e 1 , , e 2 2 m 1 ) be a balanced pattern basis of rank 2 m . To B 2 m we associate the class G 2 m = ( g 0 , g 1 , , g 2 2 m 1 ) of Boolean functions from B 2 m to B such that e i is the pattern bit vector corresponding to g i , 0 i 2 2 m 1 . This sequence of classes of Boolean functions G 2 , G 4 , …, G 2 m , …, is denoted by G .
It is clear that the pattern bit vectors in B 2 correspond to binary functions outside F 2 . These particular pattern bit vectors are inspired from the 2-fold Hadamard transform H 2 .
Example 13 (Inability to classify functions outside the Promised Class).
Although the BFPQC can conclusively classify all the functions that lie within the promised class F , it fails, as expected, to classify functions outside the promised class. It is straightforward to see that given any e i B 2 , 0 i 3 , the corresponding function cannot be classified by BFPQC. The explanation for this behavior is the following. The pattern kets corresponding to the bit vectors of B 2 are
| a e 0 = 1 2 | 00 + 1 2 | 01 + 1 2 | 10 + 1 2 | 11 | a e 1 = 1 2 | 00 1 2 | 01 + 1 2 | 10 1 2 | 11 | a e 2 = 1 2 | 00 + 1 2 | 01 1 2 | 10 1 2 | 11 | a e 3 = 1 2 | 00 1 2 | 01 1 2 | 10 + 1 2 | 11 ,
which are precisely the columns of H 2 . Accordingly, the action of the C I 2 classifier on any of them will result in one of the following states
C I 2 | a e 0 = 1 2 | 00 + 1 2 | 01 + 1 2 | 10 + 1 2 | 11 C I 2 | a e 1 = 1 2 | 00 + 1 2 | 01 1 2 | 10 + 1 2 | 11 C I 2 | a e 2 = 1 2 | 00 1 2 | 01 + 1 2 | 10 + 1 2 | 11 C I 2 | a e 3 = 1 2 | 00 + 1 2 | 01 + 1 2 | 10 1 2 | 11 ,
which, upon measurement, will collapse of any of the four basis states with equal probability 1 4 .
This line of reasoning leads to Theorem 2, which is proved in Appendix A.
Theorem 2.
Let g i , 0 i 2 2 m 1 , be a Boolean function contained in the class G 2 n = ( g 0 , g 1 , , g 2 2 m 1 ) . The state of the input register I R in the quantum circuit QCPC2m that contains the oracle for g i and the unitary classifier C I 2 m , before measurement is
2 m z B 2 m ( 1 ) z · i | z .
Upon measurement of the input register I R , we may obtain any of the 2 2 m basis kets of the computational basis with equal probability 2 2 m , rendering classification probabilistically impossible.
Definition 18
(Extended Product). Let f : B n B and g : B m B be two Boolean functions. We construct their extended product, denoted by h = f g , as the Boolean function h : B n + m B defined as follows:
h ( j + i 2 n ) = g ( j ) if f ( i ) = 0 g ( j ) ¯ if f ( i ) = 1 , 0 i 2 n 1 , 0 j 2 m 1 .
Example 14 (Extended Product Example).
This example explains how the extended product between Boolean functions works. Consider two functions from the class F 2 , say f 0 and f 3 , corresponding to pattern bit vectors p 0 and p 3 from (12).
f 0 ( x 1 , x 0 ) : = ¬ x 1 ¬ x 0 f 3 ( x 1 , x 0 ) : = x 1 x 0
The detailed construction of their extended product function f 0 f 3 is contained in Table 7. The pattern bit vectors and the pattern kets of f 0 , f 3 and f 0 f 3 are shown in Table 8. The resulting function belongs to the class F 4 , and the corresponding pattern bit vector is listed in Table 5, as r 3 .
As we have previously explained, our aim is to study what information can be obtained by the BFPQC algorithm if the input function is outside the promised class, but, at the same time “close” to some function of the F sequence. The next Definition 19 formalizes this concept of nearness.
Definition 19 (Left & Right Clusters).
Let F 2 n and G 2 m , n , m 1 , be two classes of functions in the F and G sequences, respectively. We define the following two concepts.
  • The left cluster of F 2 n by G 2 m , denoted by G 2 m F 2 n , is the class of Boolean functions of the form g f , where f F 2 n and g G 2 m . We refer to the function g f as being in the left cluster of f.
  • The right cluster of F 2 n by G 2 m , denoted by F 2 n G 2 m , is the class of Boolean functions of the form f g , where f F 2 n and g G 2 m . In this case, we say that the function f g is in the right cluster of f.
Henceforth, we shall consider any function in F 2 n as being close to every function in the left or right cluster of F 2 n by G 2 m .
Example 15 (Functions in the Left and Right Cluster).
Suppose that we are given a function belonging to the F sequence, say f 3 , that corresponds to the pattern bit vector p 3 = 1000 . Let us also consider a function from the G sequence, say g 3 , corresponding to the pattern bit vector q = 0110 . The truth values of f 3 and g 3 are listed in Table 2 of Example 5. Using f 3 and g 3 , we may construct the new functions g 3 f 3 and f 3 g 3 that belong to the left and right cluster of f 3 , respectively. The detailed construction of g 3 f 3 and f 3 g 3 , according to Definition 18, produces the truth values contained in Table 9.
From Table 9, we immediately surmise that r = 1000011101111000 and s = 1001011001100110 are the pattern bit vectors of the Boolean functions g 3 f 3 and f 3 g 3 , respectively.
From now on, we assume that the oracle in Figure 7 realizes a function h that is either in the left, or right cluster of F 2 n . It is convenient to distinguish the following two cases, depending on whether the function h belongs to the left or right cluster of F 2 n .
  • Suppose that h = g j f i , where g j G 2 m and f i F 2 n with corresponding indices i and j, respectively. The appropriate circuit in this scenario is depicted in Figure 10. In this case,
    | a p h = | a p g j | a p f i .
    In view of Theorems 1 and 2, we arrive at the following relation
    C I 2 ( n + m ) | a p h = C I 2 m | a p g j C I 2 n | a p f i = 2 m z B 2 m ( 1 ) z · i | z | i .
    This is the state of the input register I R of the system prior to the final measurement. Hence, upon measurement, the final outcome in the input register I R will be x i , that is the 2 m most significant qubits will contain a random basis ket from B 2 m , and the 2 n least significant qubits will contain i , which correctly identifies the f i function belonging to F 2 n .
  • Suppose that h = f i g j , where f i F 2 n and g j G 2 m with corresponding indices i and j, respectively. This situation is visualized in Figure 11. Resorting to the same reasoning as in the previous case, we see that
    | a p h = | a p f i | a p g j .
    Invoking Theorems 1 and 2, we derive the following relation
    C I 2 ( n + m ) | a p h = C I 2 n | a p f i C I 2 m | a p g j = | i 2 m z B 2 m ( 1 ) z · i | z .
    Therefore, upon measurement, the input register I R will contain i x . Now the 2 n most significant qubits will contain i , correctly identifying the f i function belonging to F 2 n , and the 2 m least significant qubits will contain a random basis ket from B 2 m .
Figure 10. This figure shows the operation of the BFPQC circuit for the function g j f i .
Figure 10. This figure shows the operation of the BFPQC circuit for the function g j f i .
Computers 14 00228 g010
Figure 11. The above figure depicts the operation of the BFPQC circuit for the function f i g j .
Figure 11. The above figure depicts the operation of the BFPQC circuit for the function f i g j .
Computers 14 00228 g011
Example 16 (Functions Outside the Promised Class).
In this example we consider two possible rounds of the Classification Game played by Alice and Bob.
Computers 14 00228 i001Let us suppose that in the first round, Bob chooses a function from the left cluster G 2 F 2 , say g 3 f 3 . Function g 3 is from the class G 2 and corresponds to the pattern bit vector e 3 from (21), while f 3 is from F 2 corresponding to the pattern bit vector p 3 from (13). According to the rules of the Classification Game, as explained in Section 3, Bob announces to Alice the underlying class G 2 F 2 that he has chosen. We note that this is the only information known to Alice. Subsequently, Bob constructs the oracle for the secret function g 3 f 3 . In this scenario, Alice must use the unitary pattern classifier C I 4 = C I 2 C I 2 from Definition 15. For this particular instance, the circuit, with the exception of the oracle furnished by Bob, takes the concrete implementation visualized in Figure 8. By applying (26) we see that the state of the input register I R prior to the final measurement is
1 2 z B 2 ( 1 ) z · 11 | z | 11 .
Figure 12 shows the state of the input register I R prior to measurement. Upon measurement, the input register I R will be x 11 , for some random x B 2 . Practically, this means that, while the 2 most significant qubits will contain a random basis ket from B 2 , the 2 least significant qubits will contain 11. This will conclusively reveal that the second operand in the unknown extended product is the f 3 function. Therefore, Alice will win the first round.
Computers 14 00228 i002For the second round, Bob now picks a function from the right cluster F 2 G 2 , specifically the function f 3 g 3 . Functions f 3 and g 3 , with pattern bit vectors p 3 from (13) and e 3 from (21), belong to the classes F 2 and G 2 , respectively. As ordained by the rules of the Classification Game, given in Section 3, Bob informs Alice that he has picked a function from the right cluster F 2 G 2 . Subsequently, Bob constructs the oracle for the unknown function f 3 g 3 . Alice, knowing only that the unknown function belongs to the right cluster F 2 G 2 , employs the unitary pattern classifier C I 4 = C I 2 C I 2 from Definition 15. For this round, the quantum circuit, with the exception of the oracle furnished by Bob, resembles the implementation depicted in Figure 8. By applying (28), Alice concludes that the state of the input register I R prior to the final measurement is
| 11 1 2 z B 2 ( 1 ) z · 11 | z .
Figure 13 shows the state of the input register I R prior to measurement. Upon measurement, the input register I R will be 11 x , for some random x B 2 . Hence, the 2 most significant qubits will contain 11, while the 2 least significant qubits will contain a random basis ket from B 2 . Thus, Alice will correctly identify the first operand of the of the extended product f 3 g 3 as being f 3 , and win the second round too.

5. What Did Alice Learn?

In this Section we take a closer look at the precise amount of information that Alice can surmise from the Classification Game depending on whether Bob picks a function h from the left cluster G 2 m F 2 n or from the right cluster F 2 n G 2 m . To clearly understand the details, it will be expedient to focus on the corresponding pattern bit vectors. So, let us write down the three pattern bit vectors p f i , p g j , and p h in their expanded form
p f i = a 2 2 n 1 a 1 a 0 p g j = b 2 2 m 1 b 1 b 0 p h = c 2 2 ( n + m ) 1 c 1 c 0 .
Although the amount of information is the same in both cases, there are some important subtle differences. For this reason we distinguish between the following two cases. First, we examine the case where h = g j f i . Then, we know that
Computers 14 00228 i004
where
a 2 2 n 1 r a 1 r a 0 r = a 2 2 n 1 a 1 a 0 if b r = 0 a 2 2 n 1 a 1 a 0 ¯ if b r = 1 , 0 r 2 2 m 1 .
In view of the above analysis, we may summarize the following facts.
(KL1)
Alice knows that the pattern bit vector of the h function, which encodes its behavior, consists of 2 2 m blocks, each of length 2 2 n . Alice knows f i and, therefore, knows that every block is either equal to p f i or its negation.
(KL2)
The modulo 2 sum of any two distinct bits 0 k < l 2 2 n 1 of the same block is equal to the modulo 2 sum of the corresponding bits in every other block:
Computers 14 00228 i005
(KL3)
It is worth noting that knowledge of a single additional bit in any block automatically reveals to Alice the entire block.
(KL4)
However, this information is not enough to allow Alice to reconstruct p h .
Now, we examine the case where h = f i g j . This implies
Computers 14 00228 i006
where
b 2 2 m 1 r b 1 r b 0 r = b 2 2 m 1 b 1 b 0 if a r = 0 b 2 2 m 1 b 1 b 0 ¯ if a r = 1 , 0 r 2 2 n 1 .
In view of the above analysis, we may summarize the following facts.
(KR1)
Alice knows that the pattern bit vector of the h function, which encodes its behavior, consists of 2 2 n blocks, each of length 2 2 m . Now, the fact that Alice knows f i implies that Alice knows with certainty which block is equal to p g j and which block is equal to its negation.
(KR2)
For any position k, 0 k 2 2 m 1 , Alice knows in which blocks the bit in the same position k has the same value and in which blocks has the opposite value.
(KR3)
In this case, knowledge of a single additional bit in any block automatically reveals the corresponding bit in all other blocks.
(KR4)
This information is again not enough to allow Alice to reconstruct p h .
Example 17 (Alice’s conclusions).
Let us continue Example 16, in which, during the first round of the Classification Game, Bob has chosen the function g 3 f 3 . The truth values of this function are shown in Table 9, and its pattern bit vector is repeated below for convenience:
Computers 14 00228 i007
After the final measurement, Alice knows that the right operand of the unknown extended product g j f i is, in fact, f 3 , with corresponding pattern bit vector p 3 = 1000 . Thus, Alice can deduce that the pattern bit vector consists of four blocks, and that each block is either Computers 14 00228 i008 or Computers 14 00228 i009. She only requires a single additional bit in any block to know the entire block. Furthermore, Alice concludes that the modulo 2 sum of any two distinct bits 0 k < l 3 of the same block is equal to the modulo 2 sum of the corresponding bits in every other block, e.g., the least two significant bits in every block sum up to 0.
In the second round of the Classification Game, Bob picked the function f 3 g 3 . The truth values of this function are shown in Table 9. The corresponding pattern bit vector is given below:
Computers 14 00228 i010
This time, after the final measurement, Alice knows that the left operand of the unknown extended product f i g j is, in fact, f 3 , with pattern bit vector p 3 = 1000 . Alice concludes that the pattern bit vector of the unknown extended product consists of the following four blocks: p g j ¯ p g j p g j p g j , where p g j is the pattern bit vector of the function g j , which is unknown to Alice. She may further deduce for every bit in which blocks the bit in the same position has the same value and in which blocks has the opposite value. For instance, the least significant bits of blocks 0 , 1 , and 2 are equal and opposite to the least significant bit of block 3. In this case, if Alice finds any additional bit in any of the four blocks, she will know the corresponding bit in all other blocks.

6. Discussion and Conclusions

6.1. Synopsis

Advanced research on the classification of Boolean functions that satisfy specific properties, i.e., belong to a particular class, is abundant in the literature. Yet, to the best of our knowledge, no prior studies have examined what information might be revealed when the input Boolean function does not fall into this category. This paper offers a fresh research perspective that demonstrates that significant knowledge can still be obtained under appropriate circumstances.
In this paper, we studied what information may be gained when a specific classification algorithm is applied to functions that do not belong to the promised class, but are still relatively close to its elements. For this purpose, we have introduced a novel concept that defines “nearness” between Boolean functions. We illustrate this concept by showing that, as long as the input function is close enough to the promised class, the classification algorithm can still yield insightful information about its behavioral pattern. To the best of our knowledge, this study is the first to demonstrate the benefits of using quantum classification algorithms to look at functions that are not part of the promised class in order to get a glimpse of important data.
In concluding this subsection, we wish to highlight the inherent limitations of our quantum classification framework, particularly when dealing with functions outside the promised class, and to provide guidance for future research directions. When the unknown function lies outside the designated class, it becomes essential to introduce a well-defined notion of distance to quantify its proximity to the promised class, thereby enabling meaningful classification outcomes. To corroborate this, we have conducted extensive experimental simulations using randomly generated Boolean functions that fall outside the promised class. These experiments suggest that, in such random scenarios, the BFPQC algorithm struggles to extract useful information without additional constraints. Consequently, we advocate that for any quantum classification algorithm, including ours, to effectively handle functions outside the promised class, some form of proximity condition must be satisfied to ensure the function is sufficiently “close” to the class. In our framework, the concept of left and right cluster proximity serves as a suitable criterion for defining this nearness, providing a structured approach to assess how closely an unknown function aligns with the promised class. However, other alternative distance metrics could also be considered, each with its own merits and challenges. For instance, the Hamming distance, which measures the number of inputs where two functions differ, represents a straightforward and viable option, though its effectiveness may be limited in the quantum setting due to the projective nature of quantum states, which emphasizes phase and amplitude relationships over simple value differences. Our analysis strongly suggests that imposing a distance-based constraint is critical for any quantum classification algorithm to yield useful insights when dealing with functions outside the promised class.
Synopsis
When the unknown input function h belongs to the left or right cluster of a function f within the promised class, meaning that h can written either as gf, or fg, where g, and, thus, h is outside the promised class, the classification algorithm BFPQC can conclusively unveil f with a single query. This furnishes important information about the behavioral pattern of h, albeit not the complete information.

6.2. Additional Possibilities

In our view, one of the most critical and intellectually stimulating directions for advancing the concept of classification—both within and beyond the promised class—lies in generalizing these methodologies to functions defined from Z n Z n , where Z n = { 0 , 1 , , n 1 } , n > 2 . This research direction offers substantial promise, particularly due to the natural compatibility of the Quantum Fourier Transform (QFT) with this task, as it provides a powerful tool for analyzing functions in the Fourier domain. Nevertheless, the transition to this broader domain introduces significant technical challenges that warrant careful consideration. These challenges include the effective generalization of quantum oracles to handle modular arithmetic over Z n , the efficient implementation of the QFT for larger state spaces, and the adaptation of the classification framework to accommodate the increased complexity of both the domain and codomain. Regarding the selection of an appropriate distance metric for comparing such functions, several viable options exist, yet no single approach stands out as the definitively optimal. For example, while the Hamming distance can be straightforwardly extended to count the number of positions where two functions differ, the projective nature of quantum systems may limit its effectiveness in capturing the nuances of quantum states. Consequently, alternative metrics, such as the Fourier-based distance, which leverages the QFT to compare functions in the frequency domain, may offer a more suitable approach for quantum classification tasks.
This investigation, for concreteness, employs the Boolean Function Pattern Quantum Classifier (BFPQC) algorithm, designed to classify imbalanced Boolean functions within a well-defined hierarchy of function classes, denoted F 2 , F 4 , …, F 2 n , …. This hierarchy is derived from a corresponding sequence of imbalanced pattern bases, P 2 , P 4 , …, P 2 n , …, as rigorously established in Definition 5. Each pattern basis P 2 n serves as the structural foundation for constructing the function class F 2 n , enabling the BFPQC algorithm to systematically categorize Boolean functions based on their syntactical characteristics. Drawing on the principles outlined in [43], this framework allows for the development of tailored variants of the BFPQC algorithm, designed to classify diverse classes of Boolean functions by modifying the pattern bases or classification methodologies. For instance, the pattern basis B 2 { 00 , 01 } encapsulates Boolean functions that are either constant or perfectly balanced, providing a foundational example within the hierarchy. To extend this classification to other hierarchical levels, one can revise Definition 14 to redefine the classification process. A particularly effective approach involves defining a new hierarchy of unitary classifiers, as specified in Equation (37). This results in an alternative hierarchy of Boolean function classes, each incorporating both perfectly balanced and imbalanced functions, thereby expanding the algorithm’s applicability. These modifications not only enhance the versatility of the BFPQC algorithm but also pave the way for further exploration of Boolean function classification in computational and quantum domains, offering potential applications in areas such as quantum algorithm design and pattern recognition.
H Q 2 , H 2 Q 2 , .

6.3. Future Research

One research direction that we believe is worth pursuing in the near future is to investigate the viability of encoding strategies in some famous games, such as the Repeated Prisoners’ Dilemma, as Boolean functions. In the Repeated Prisoners’ Dilemma, each player chooses a strategy that dictates their action (Cooperate or Defect) in each round. For a finite number of rounds, strategies like “Tit-for-Tat”, “Grim Trigger”, or “Always Defect”, can be modeled as Boolean functions by associating C to 0 and D to 1, or vice versa. In the quantum setting, a strategy can be implemented as a secret oracle that computes the player’s action. Therefore, given two players with strategies f and g, we believe it will be interesting to examine whether their oracles can be queried to simulate the game’s progression, allowing the analysis of their interaction via the extended product f g . The classification of f g as the evaluation of payoffs could be viable because the joint actions ( f ( x ) , g ( x ) ) at each round determine the payoff matrix entries. Hopefully, by analyzing f g , one may compute expected payoffs over multiple rounds or characterize the strategy pair’s behavior by determining cooperative or defective tendencies.

Author Contributions

Conceptualization, T.A., C.B., and K.N.; methodology, T.A., G.I.G., and N.K.; validation, C.B., K.N. and G.G; formal analysis, T.A., G.I.G., and N.K; investigation, C.B and K.N.; writing original draft preparation, T.A., C.B., and G.I.G.; writing review and editing, T.A. and N.K.; visualization, C.B. and K.N.; supervision, T.A., G.I.G. and N.K.; project administration, T.A. and N.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proofs of the Main Results

This Appendix presents the formal proofs of the Propositions and Theorems contained in the previous sections.
Let w H ( x ) denote the Hamming weight, that is the number of 1s, of pattern bit vector x . The following Proposition recalls some well-known facts about Hamming weight and its proof is omitted.
Proposition A1 (Hamming Weight Facts).
Let x and y be two pattern bit vectors of equal length n. Then, the following relations hold:
w H ( x y ) = w H ( x ¯ y ¯ )
w H ( x y ¯ ) = w H ( x ¯ y )
w H ( x y ) + w H ( x y ¯ ) = n .
An immediate consequence of Proposition A1, is the following useful fact, which we record in the next Proposition.
Proposition A2 (Orthogonality Properties).
If p and q are two orthogonal pattern bit vectors of length 2 n , then p and q ¯ , p ¯ and q , and p ¯ and q ¯ are also pairwise orthogonal pattern bit vectors.
Proof of Proposition A2.
Invoking Definition 8 and relation (A1), we see that w H ( p q ) = w H ( p ¯ q ¯ ) = 2 n 1 . Moreover, by relation (A3), we know that w H ( p q ¯ ) = 2 n 1 , and, finally, by relation (A2), we also conclude that w H ( p ¯ q ) = 2 n 1 . □
The previous Proposition A2 allows us to prove two important properties of the pattern bit vector product operation.
Proposition A3 (Pattern Vectors Product Properties).
Let p and q be two orthogonal pattern bit vectors of length 2 n , and let x and y be two orthogonal pattern bit vectors of length 2 m . Then, the following hold.
1.
The pattern bit vectors p x and q x are orthogonal pattern bit vectors of length 2 n + m .
2.
The pattern bit vectors p x and p y are orthogonal pattern bit vectors of length 2 n + m .
Proof of Proposition A3.
1.
The orthogonality of p and q implies that their corresponding bits differ in precisely 2 n 1 position. These positions will lead to exactly 2 n 1 blocks containing pairs of x and x ¯ .
2.
The pattern bit vectors p x and p y consist of 2 n blocks that are pairwise orthogonal being pairs of either x and y , or x ¯ and y ¯ .
Proposition A4
(Pattern Basis Construction). Let P n and P m be two pattern bases of rank n and m (possibly n m ). Their product P n P m is a pattern basis of rank n + m .
Proof of Proposition A4.
The only nontrivial part is to show the orthogonality of the pattern bit vectors of P n P m . Given any p P n , then for all x P m , the products p x are pairwise orthogonal, according to Proposition A3. Symmetrically, given any x P m , then for all p P n , the products p x are pairwise orthogonal, again by Proposition A3. □
Proposition A5
(Orthogonal Pattern Kets). Let p and q be two orthogonal pattern bit vectors. Their corresponding pattern kets | a p and | a q are orthogonal:
a q | a p = 0 .
Proof of Proposition A5.
As outlined in Definition 6, the probability amplitudes of the kets have the same magnitude, allowing us to focus exclusively on the signs of the coefficients. The orthogonality between pattern vectors p and q indicates that their binary representations differ in precisely 2 n 1 out of the 2 n positions. This specific configuration leads to a balanced partitioning of the coefficient pairs: exactly 2 n 1 pairs share the same sign, while the other 2 n 1 pairs have opposite signs. As a result, when computing the inner product of the quantum states | a p and | a q , these opposing contributions cancel out, resulting in a zero inner product and thereby establishing their orthogonality. □
Taking into account the construction of the product operation between two pattern bit vectors, as prescribed in Definition 7, and in view of the definition of pattern kets, given in Definition 6, we derive the following correlation among their corresponding pattern kets, as stated in the next Proposition A6.
Proposition A6
(Pattern Kets Tensor Product). Let p , q , r be pattern bit vectors, and | a p , | a q , and | a r their corresponding pattern kets. Then, the following relation holds:
r = p q | a r = | a p | a q .
Proposition A7
(Pattern Classifiers Unitarity). If C P n is the pattern classifier corresponding to the pattern basis P n , then C P n is a unitary matrix.
Proof of Proposition A7.
As stipulated by Definition 14, the columns of the classification matrix C P n are formed by the pattern kets corresponding to the pattern bit vectors of the pattern basis P n . According to Definition 6, each of these pattern kets is unitary, ensuring that they represent normalized quantum states suitable for quantum computation. To establish that C P n is a unitary matrix, it remains to demonstrate that its columns are pairwise orthogonal. This property follows directly from Proposition A5, which guarantees the pairwise orthogonality of the pattern bit vectors comprising P n . Consequently, the corresponding pattern kets, which form the columns of C P n , inherit this orthogonality, ensuring that C P n satisfies the requirements of a unitary operator. □
The next Theorem A1 was shown in [43], and so we omit its proof here.
Theorem A1 (Classification in the Promised Class).
Let f i , 0 i 2 2 n 1 , be a Boolean function contained in the class F 2 n = ( f 0 , f 1 , , f 2 2 n 1 ) . Upon measuring the quantum circuit QCPC2n containing the oracle for f i and the unitary classifier C I 2 n , we obtain | i , where i is the binary representation of the index i, and | i is one of the basis kets of the computational basis.
Theorem A2.
Let g i , 0 i 2 2 m 1 , be a Boolean function contained in the class G 2 m = ( g 0 , g 1 , , g 2 2 m 1 ) . The state of the input register I R in the quantum circuit QCPC2m that contains the oracle for g i and the unitary classifier C I 2 m , before measurement is
2 m z B 2 m ( 1 ) z · i | z .
Thus, upon measurement of the input register I R , we may obtain any of the 2 2 m basis kets of the computational basis with equal probability 2 2 m , rendering classification probabilistically impossible.
Proof of Theorem A2.
The G sequence of function classes is systematically established through Definitions 16 and 17, which collectively define these classes via an indirect recursive construction. Similarly, the sequence of unitary classifiers is recursively defined in Definition 15, providing a robust framework for the outcome of the action of the BFPQC algorithm upon these functions. These recursive definitions lay the foundation for an inductive proof of the classification outcome. To this end, we employ induction on the parameter m, which indexes the hierarchy of function classes and their corresponding classifiers:
  • Base Case ( m = 1 ): For m = 1 , the function class G 2 encompasses the functions g 0 , g 1 , g 2 , and g 3 , which were analyzed in Example 13. In that example, we demonstrated that the action of the unitary classifier C I 2 consistently transforms the initial state into the quantum state 2 1 z B 2 ( 1 ) z · i | z , where i represents in binary the index i (with 0 i 3 ) corresponding to each function in G 2 . This result establishes the correctness of (A6) for the base case.
  • Inductive Step: Assuming that Equation (A6) holds for an arbitrary m, we demonstrate its validity for m + 1 by leveraging the recursive construction of the unitary classifiers, as specified in Definition 15. This step is further supported by invoking Proposition A6, which ensures the consistency of the tensor product structure of the pattern kets across the hierarchy. The recursive nature of the classifiers and the orthogonality properties of the pattern kets guarantee that the classification process extends seamlessly to higher levels of the hierarchy.
Proposition A8
(Equivalence of Products). Let h be the extended product of f and g, let p h , p f and p g be their corresponding pattern bit vectors, and let | a p h , | a p f and | a p g be their corresponding pattern kets. Then, the following relations hold:
h = f g p h = p f p g | a p h = | a p f | a p g .
Proof of Proposition A8.
In view of Proposition A6, it suffices to prove that h = f g p h = p f p g , which is a direct consequence of the construction of the extended product, as specified by Definition 18. □

References

  1. Chow, J.; Dial, O.; Gambetta, J. IBM Quantum Breaks the 100-Qubit Processor Barrier. 2021. Available online: https://www.ibm.com/quantum/blog/127-qubit-quantum-processor-eagle/ (accessed on 7 January 2025).
  2. IBM. IBM Unveils 400 Qubit-Plus Quantum Processor. 2022. Available online: https://newsroom.ibm.com/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two/ (accessed on 7 January 2025).
  3. Gambetta, J. The Hardware and Software for the Era of Quantum Utility Is Here. 2023. Available online: https://www.ibm.com/quantum/blog/quantum-roadmap-2033/ (accessed on 7 January 2025).
  4. IBM. IBM Launches Its Most Advanced Quantum Computers, Fueling New Scientific Value and Progress towards Quantum Advantage. 2024. Available online: https://newsroom.ibm.com/2024-11-13-ibm-launches-its-most-advanced-quantum-computers,-fueling-new-scientific-value-and-progress-towards-quantum-advantage/ (accessed on 7 January 2025).
  5. Neven, H. Meet Willow, Our State-of-the-Art Quantum CHIP. 2024. Available online: https://blog.google/technology/research/google-willow-quantum-chip/ (accessed on 7 January 2025).
  6. Garisto, D. Google Uncovers How Quantum Computers Can Beat Today’s Best Supercomputers. 2024. Available online: https://www.nature.com/articles/d41586-024-03288-3/ (accessed on 7 January 2025).
  7. Aasen, D.; Aghaee, M.; Alam, Z.; Andrzejczuk, M.; Antipov, A.; Astafev, M.; Avilovas, L.; Barzegar, A.; Bauer, B.; Becker, J.; et al. Roadmap to fault tolerant quantum computation using topological qubit arrays. arXiv 2025, arXiv:2502.12252. [Google Scholar] [CrossRef]
  8. Aghaee, M.; Alcaraz Ramirez, A.; Alam, Z.; Ali, R.; Andrzejczuk, M.; Antipov, A.; Astafev, M.; Barzegar, A.; Bauer, B.; Becker, J.; et al. Interferometric single-shot parity measurement in InAs–Al hybrid devices. Nature 2025, 638, 651–655. [Google Scholar] [CrossRef]
  9. Microsoft. Microsoft’s Majorana 1 Chip Carves New Path for Quantum Computing. 2025. Available online: https://news.microsoft.com/source/features/innovation/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing/ (accessed on 21 February 2025).
  10. King, A.D.; Nocera, A.; Rams, M.M.; Dziarmaga, J.; Wiersema, R.; Bernoudy, W.; Raymond, J.; Kaushal, N.; Heinsdorf, N.; Harris, R.; et al. Beyond-classical computation in quantum simulation. Science 2025, 388, 199–204. [Google Scholar] [CrossRef]
  11. Davide, C. Fresh ‘Quantum Advantage’ Claim Made by Computing Firm D-Wave. 2025. Available online: https://www.nature.com/articles/d41586-025-00765-1/ (accessed on 17 March 2025).
  12. Gao, D.; Fan, D.; Zha, C.; Bei, J.; Cai, G.; Cai, J.; Cao, S.; Chen, F.; Chen, J.; Chen, K.; et al. Establishing a New Benchmark in Quantum Computational Advantage with 105-qubit Zuchongzhi 3.0 Processor. Phys. Rev. Lett. 2025, 134, 090601. [Google Scholar] [CrossRef]
  13. Sanders, B.C. Superconducting Quantum Computing Beyond 100 Qubits. 2025. Available online: https://physics.aps.org/articles/v18/45/ (accessed on 17 March 2025).
  14. Cacciapuoti, A.S.; Illiano, J.; Viscardi, M.; Caleffi, M. Multipartite Entanglement Distribution in the Quantum Internet: Knowing When to Stop! IEEE Trans. Netw. Serv. Manag. 2024, 21, 6041–6058. [Google Scholar] [CrossRef]
  15. Illiano, J.; Caleffi, M.; Viscardi, M.; Cacciapuoti, A.S. Quantum MAC: Genuine Entanglement Access Control via Many-Body Dicke States. IEEE Trans. Commun. 2024, 72, 2090–2105. [Google Scholar] [CrossRef]
  16. Photonic. Photonic Demonstrates Distributed Entanglement Between Modules, Marking Significant Milestone Toward Scalable Quantum Computing and Networking. 2024. Available online: https://photonic.com/news/photonic-demonstrates-distributed-entanglement-between-modules/ (accessed on 7 January 2025).
  17. Nu Quantum. Announcing the Qubit-Photon Interface (QPI): Towards Unlocking Modular and Scalable Distributed Quantum Computing. 2024. Available online: https://www.nu-quantum.com/news/qubit-photon-interface-qpi-towards-unlocking-modular-and-scalable-distributed-quantum-computing/ (accessed on 7 January 2025).
  18. Main, D.; Drmota, P.; Nadlinger, D.P.; Ainley, E.M.; Agrawal, A.; Nichol, B.C.; Srinivas, R.; Araneda, G.; Lucas, D.M. Distributed quantum computing across an optical network link. Nature 2025, 638, 383–388. [Google Scholar] [CrossRef]
  19. Oxford News. First Distributed Quantum Algorithm Brings Quantum Supercomputers Closer. 2025. Available online: https://www.ox.ac.uk/news/2025-02-06-first-distributed-quantum-algorithm-brings-quantum-supercomputers-closer/ (accessed on 7 February 2025).
  20. Meyer, D.A. Quantum strategies. Phys. Rev. Lett. 1999, 82, 1052. [Google Scholar] [CrossRef]
  21. Eisert, J.; Wilkens, M.; Lewenstein, M. Quantum games and quantum strategies. Phys. Rev. Lett. 1999, 83, 3077. [Google Scholar] [CrossRef]
  22. Koh, D.E.; Kumar, K.; Goh, S.T. Quantum Volunteer’s Dilemma. arXiv 2024, arXiv:2409.05708. [Google Scholar] [CrossRef]
  23. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 10–12 December 1984; pp. 175–179. [Google Scholar]
  24. Andronikos, T.; Sirokofskich, A. A Multiparty Quantum Private Equality Comparison Scheme Relying on |GHZ3〉 States. Future Internet 2024, 16, 309. [Google Scholar] [CrossRef]
  25. Deutsch, D.; Jozsa, R. Rapid solution of problems by quantum computation. Proc. R. Soc. Lond. Ser. A Math. Phys. Sci. 1992, 439, 553–558. [Google Scholar] [CrossRef]
  26. Cleve, R.; Ekert, A.; Macchiavello, C.; Mosca, M. Quantum algorithms revisited. Proc. R. Soc. Lond. Ser. A Math. Phys. Eng. Sci. 1998, 454, 339–354. [Google Scholar] [CrossRef]
  27. Chi, D.P.; Kim, J.; Lee, S. Initialization-free generalized Deutsch-Jozsa algorithm. J. Phys. A Math. Gen. 2001, 34, 5251. [Google Scholar] [CrossRef]
  28. Holmes, R.R.; Texier, F. A Generalization of the Deutsch-Jozsa Quantum Algorithm. Far East J. Math Sci. 2003, 9, 319–326. [Google Scholar]
  29. Ballhysa, E.; Say, A.C.C. Generating Equiprobable Superpositions of Arbitrary Sets for a New Generalization of the Deutsch-Jozsa Algorithm. In Computer and Information Sciences—ISCIS 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 966–975. [Google Scholar] [CrossRef]
  30. Qiu, D.; Zheng, S. Generalized Deutsch-Jozsa problem and the optimal quantum algorithm. Phys. Rev. A 2018, 97, 062331. [Google Scholar] [CrossRef]
  31. Ossorio-Castillo, J.; Pastor–Díaz, U.; Tornero, J. A generalisation of the Phase Kick-Back. Quantum Inf. Process. 2023, 22, 143. [Google Scholar] [CrossRef]
  32. Qiu, D.; Zheng, S. Revisiting Deutsch-Jozsa algorithm. Inf. Comput. 2020, 275, 104605. [Google Scholar] [CrossRef]
  33. Xie, Z.; Qiu, D.; Cai, G.; Gruska, J.; Mateus, P. Testing Boolean Functions Properties. Fundam. Informaticae 2021, 182, 321–344. [Google Scholar] [CrossRef]
  34. Tănăsescu, A.; Mina, M.Z.; Popescu, P.G. Non-local quantum functions and the distributed Deutsch-Jozsa algorithm. Phys. Lett. A 2019, 383, 2168–2171. [Google Scholar] [CrossRef]
  35. Li, H.; Qiu, D.; Luo, L. Distributed Generalized Deutsch-Jozsa Algorithm. In Computing and Combinatorics; Springer Nature Singapore: Singapore, 2025; pp. 214–225. [Google Scholar] [CrossRef]
  36. Nagata, K.; Nakamura, T. Generalization of Deutsch’s Algorithm. Int. J. Theor. Phys. 2020, 59, 2557–2561. [Google Scholar] [CrossRef]
  37. Bshouty, N.H.; Jackson, J.C. Learning DNF over the Uniform Distribution Using a Quantum Example Oracle. SIAM J. Comput. 1998, 28, 1136–1153. [Google Scholar] [CrossRef]
  38. Farhi, E.; Goldstone, J.; Gutmann, S.; Sipser, M. Bound on the number of functions that can be distinguished with k quantum queries. Phys. Rev. A 1999, 60, 4331–4333. [Google Scholar] [CrossRef]
  39. Servedio, R.A.; Gortler, S.J. Equivalences and Separations Between Quantum and Classical Learnability. SIAM J. Comput. 2004, 33, 1067–1092. [Google Scholar] [CrossRef]
  40. Hunziker, M.; Meyer, D.A.; Park, J.; Pommersheim, J.; Rothstein, M. The geometry of quantum learning. Quantum Inf. Process. 2009, 9, 321–341. [Google Scholar] [CrossRef]
  41. Yoo, S.; Bang, J.; Lee, C.; Lee, J. A quantum speedup in machine learning: Finding anN-bit Boolean function for a classification. New J. Phys. 2014, 16, 103014. [Google Scholar] [CrossRef]
  42. Cross, A.W.; Smith, G.; Smolin, J.A. Quantum learning robust against noise. Phys. Rev. A 2015, 92, 012327. [Google Scholar] [CrossRef]
  43. Andronikos, T.; Bitsakos, C.; Nikas, K.; Goumas, G.I.; Koziris, N. A Quantum Algorithm for the Classification of Patterns of Boolean Functions. Mathematics 2025, 13, 1750. [Google Scholar] [CrossRef]
  44. Qiskit. Qiskit Is the World’s Most Popular Software Stack for Quantum Computing. 2025. Available online: https://www.ibm.com/quantum/qiskit/ (accessed on 7 January 2025).
Figure 1. This figure shows the unitary transform U f , which is based on the oracle for the function f and implements the standard schema (4).
Figure 1. This figure shows the unitary transform U f , which is based on the oracle for the function f and implements the standard schema (4).
Computers 14 00228 g001
Figure 2. This figure shows the unitary transform U f , again based on the oracle for the function f, but now implementing the schema (5).
Figure 2. This figure shows the unitary transform U f , again based on the oracle for the function f, but now implementing the schema (5).
Computers 14 00228 g002
Figure 3. This figure depicts the quantum circuit for the implementation of Deutsch’s algorithm.
Figure 3. This figure depicts the quantum circuit for the implementation of Deutsch’s algorithm.
Computers 14 00228 g003
Figure 4. This figure visualizes the correlation among the bits of the pattern bit vector and the coefficients of the pattern ket.
Figure 4. This figure visualizes the correlation among the bits of the pattern bit vector and the coefficients of the pattern ket.
Computers 14 00228 g004
Figure 5. Boolean functions, pattern bit vectors and pattern kets are all equivalent.
Figure 5. Boolean functions, pattern bit vectors and pattern kets are all equivalent.
Computers 14 00228 g005
Figure 6. One-to-one correspondence among the elements of the pattern basis I 2 n , the functions of the function class F 2 n , and the columns of the pattern classifier C I 2 n ) .
Figure 6. One-to-one correspondence among the elements of the pattern basis I 2 n , the functions of the function class F 2 n , and the columns of the pattern classifier C I 2 n ) .
Computers 14 00228 g006
Figure 7. This figure depicts the quantum circuit that conclusively classifies all functions contained in F 2 n .
Figure 7. This figure depicts the quantum circuit that conclusively classifies all functions contained in F 2 n .
Computers 14 00228 g007
Figure 8. This figure shows the implementation of the BFPQC algorithm for the classification of the Boolean functions in F 4 , assuming Bob has chosen the oracle for the function f 3 and Alice has employed the classifier C I 4 .
Figure 8. This figure shows the implementation of the BFPQC algorithm for the classification of the Boolean functions in F 4 , assuming Bob has chosen the oracle for the function f 3 and Alice has employed the classifier C I 4 .
Computers 14 00228 g008
Figure 9. The measurement outcome of the quantum circuit of Figure 8.
Figure 9. The measurement outcome of the quantum circuit of Figure 8.
Computers 14 00228 g009
Figure 12. This figure depicts the state of the input register I R prior to measurement when the unknown function is g 3 f 3 .
Figure 12. This figure depicts the state of the input register I R prior to measurement when the unknown function is g 3 f 3 .
Computers 14 00228 g012
Figure 13. This figure depicts the state of the input register I R prior to measurement when the unknown function is f 3 g 3 .
Figure 13. This figure depicts the state of the input register I R prior to measurement when the unknown function is f 3 g 3 .
Computers 14 00228 g013
Table 1. The truth values of the Boolean functions f and g.
Table 1. The truth values of the Boolean functions f and g.
00011011000001010011100101110111
f0001g01111111
Table 2. The truth values of the Boolean functions f and g.
Table 2. The truth values of the Boolean functions f and g.
0001101100011011
f0001g0110
Table 3. The product 01 1100 .
Table 3. The product 01 1100 .
p = 0101
q = 110011000011
Product:11000011
Table 4. The product 0101 0001 .
Table 4. The product 0101 0001 .
p = 01010101
q = 00010001111000011110
Product:0001111000011110
Table 5. This table contains the pattern bit vectors of I 4 .
Table 5. This table contains the pattern bit vectors of I 4 .
I2 Pattern Bit Vectorspi ⊙ p0, 0 ≤ i ≤ 3pi ⊙ p1, 0 ≤ i ≤ 3pi ⊙ p2, 0 ≤ i ≤ 3pi ⊙ p3, 0 ≤ i ≤ 3
p0 = 0001r0: 0001000100011110r1: 0010001000101101r2: 0100010001001011r3: 1000100010000111
p1 = 0010r4: 0001000111100001r5: 0010001011010010r6: 0100010010110100r7: 1000100001111000
p2 = 0100r8: 0001111000010001r9: 0010110100100010r10: 0100101101000100r11: 1000011110001000
p3 = 1000r12: 1110000100010001r13: 1101001000100010r14: 1011010001000100r15: 0111100010001000
Table 6. This table contains the pattern bit vectors of B 4 .
Table 6. This table contains the pattern bit vectors of B 4 .
B2 Pattern Bit Vectorsei ⊙ e0, 0 ≤ i ≤ 3ei ⊙ e1, 0 ≤ i ≤ 3ei ⊙ e2, 0 ≤ i ≤ 3ei ⊙ e3, 0 ≤ i ≤ 3
e0 = 0000s0: 0000000000000000s1: 0101010101010101s2: 0011001100110011s3: 0110011001100110
e1 = 0110s4: 0000111100001111s5: 0101101001011010s6: 0011110000111100s7: 0110100101101001
e2 = 0011s8: 0000000011111111s9: 0101010110101010s10: 0011001111001100s11: 0110011010011001
e3 = 0110s12: 0000111111110000s13: 0101101010100101s14: 0011110011000011s15: 0110100110010110
Table 7. The truth table of the function f 0 f 3 .
Table 7. The truth table of the function f 0 f 3 .
if0 (x1, x0)jf3 (x1, x0) f 3 ( x 1 , x 0 ) ¯ kf (x3, x2, x1, x0)
0100101
0110111
0120121
0131030
1000140
1010150
1020160
1031071
2000180
2010190
20101100
20310111
30001120
30101130
30201140
30310151
Table 8. This table contains the pattern bit vectors and the pattern kets of f 0 , f 3 and f 0 f 3 .
Table 8. This table contains the pattern bit vectors and the pattern kets of f 0 , f 3 and f 0 f 3 .
FunctionPattern Bit VectorPattern Ket
f00001 1 2 | 00 + 1 2 | 01 + 1 2 | 10 + 1 2 | 11
f31000 1 2 | 00 + 1 2 | 01 + 1 2 | 10 1 2 | 11
f0f31000 1000 1000 0111 1 4 | 0000 1 4 | 0001 1 4 | 0010 + 1 4 | 0011
+ 1 4 | 0100 + 1 4 | 0101 + 1 4 | 0110 1 4 | 0111
+ 1 4 | 1000 + 1 4 | 1001 + 1 4 | 1010 1 4 | 1011
+ 1 4 | 1100 + 1 4 | 1101 + 1 4 | 1110 1 4 | 1111
Table 9. Truth values of the functions g 3 f 3 and f 3 g 3 .
Table 9. Truth values of the functions g 3 f 3 and f 3 g 3 .
0000000100100011010001010110011110001001101010111100110111101111
g3f30001111011100001
f3g30110011001101001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Andronikos, T.; Bitsakos, C.; Nikas, K.; Goumas, G.I.; Koziris, N. Quantum Classification Outside the Promised Class. Computers 2025, 14, 228. https://doi.org/10.3390/computers14060228

AMA Style

Andronikos T, Bitsakos C, Nikas K, Goumas GI, Koziris N. Quantum Classification Outside the Promised Class. Computers. 2025; 14(6):228. https://doi.org/10.3390/computers14060228

Chicago/Turabian Style

Andronikos, Theodore, Constantinos Bitsakos, Konstantinos Nikas, Georgios I. Goumas, and Nectarios Koziris. 2025. "Quantum Classification Outside the Promised Class" Computers 14, no. 6: 228. https://doi.org/10.3390/computers14060228

APA Style

Andronikos, T., Bitsakos, C., Nikas, K., Goumas, G. I., & Koziris, N. (2025). Quantum Classification Outside the Promised Class. Computers, 14(6), 228. https://doi.org/10.3390/computers14060228

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop