Quantum algorithms for N-1 security in power grids
Authors:
Niels M. P. Neumann,
Stan van der Linde,
Willem de Kok,
Koen Leijnse,
Juan Boschero,
Esteban Aguilera,
Peter Elias-van den Berg,
Vincent Koppen,
Nikki Jaspers,
Jelte Zwetsloot
Abstract:
In recent years, the supply and demand of electricity has significantly increased. As a result, the interconnecting grid infrastructure has required (and will continue to require) further expansion, while allowing for rapid resolution of unforeseen failures. Energy grid operators strive for networks that satisfy different levels of security requirements. In the case of N-1 security for medium volt…
▽ More
In recent years, the supply and demand of electricity has significantly increased. As a result, the interconnecting grid infrastructure has required (and will continue to require) further expansion, while allowing for rapid resolution of unforeseen failures. Energy grid operators strive for networks that satisfy different levels of security requirements. In the case of N-1 security for medium voltage networks, the goal is to ensure the continued provision of electricity in the event of a single-link failure. However, the process of determining if networks are N-1 secure is known to scale polynomially in the network size. This poses restrictions if we increase our demand of the network. In that case, more computationally hard cases will occur in practice and the computation time also increases significantly. In this work, we explore the potential of quantum computers to provide a more scalable solution. In particular, we consider gate-based quantum computing, quantum annealing, and photonic quantum computing.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
Matching Triangles and Triangle Collection: Hardness based on a Weak Quantum Conjecture
Authors:
Andris Ambainis,
Harry Buhrman,
Koen Leijnse,
Subhasree Patro,
Florian Speelman
Abstract:
Classically, for many computational problems one can conclude time lower bounds conditioned on the hardness of one or more of key problems: k-SAT, 3SUM and APSP. More recently, similar results have been derived in the quantum setting conditioned on the hardness of k-SAT and 3SUM. This is done using fine-grained reductions, where the approach is to (1) select a key problem $X$ that, for some functi…
▽ More
Classically, for many computational problems one can conclude time lower bounds conditioned on the hardness of one or more of key problems: k-SAT, 3SUM and APSP. More recently, similar results have been derived in the quantum setting conditioned on the hardness of k-SAT and 3SUM. This is done using fine-grained reductions, where the approach is to (1) select a key problem $X$ that, for some function $T$, is conjectured to not be solvable by any $O(T(n)^{1-ε})$ time algorithm for any constant $ε> 0$ (in a fixed model of computation), and (2) reduce $X$ in a fine-grained way to these computational problems, thus giving (mostly) tight conditional time lower bounds for them.
Interestingly, for Delta-Matching Triangles and Triangle Collection, classical hardness results have been derived conditioned on hardness of all three mentioned key problems. More precisely, it is proven that an $n^{3-ε}$ time classical algorithm for either of these two graph problems would imply faster classical algorithms for k-SAT, 3SUM and APSP, which makes Delta-Matching Triangles and Triangle Collection worthwhile to study.
In this paper, we show that an $n^{1.5-ε}$ time quantum algorithm for either of these two graph problems would imply faster quantum algorithms for k-SAT, 3SUM, and APSP. We first formulate a quantum hardness conjecture for APSP and then present quantum reductions from k-SAT, 3SUM, and APSP to Delta-Matching Triangles and Triangle Collection. Additionally, based on the quantum APSP conjecture, we are also able to prove quantum lower bounds for a matrix problem and many graph problems. The matching upper bounds follow trivially for most of them, except for Delta-Matching Triangles and Triangle Collection for which we present quantum algorithms that require careful use of data structures and Ambainis' variable time search.
△ Less
Submitted 22 July, 2022;
originally announced July 2022.