24,996 research outputs found
Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search
By applying Grover's quantum search algorithm to the lattice algorithms of
Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and
Stehl\'{e}, we obtain improved asymptotic quantum results for solving the
shortest vector problem. With quantum computers we can provably find a shortest
vector in time , improving upon the classical time
complexity of of Pujol and Stehl\'{e} and the of Micciancio and Voulgaris, while heuristically we expect to find a
shortest vector in time , improving upon the classical time
complexity of of Wang et al. These quantum complexities
will be an important guide for the selection of parameters for post-quantum
cryptosystems based on the hardness of the shortest vector problem.Comment: 19 page
Quantum Annealing and Analog Quantum Computation
We review here the recent success in quantum annealing, i.e., optimization of
the cost or energy functions of complex systems utilizing quantum fluctuations.
The concept is introduced in successive steps through the studies of mapping of
such computationally hard problems to the classical spin glass problems. The
quantum spin glass problems arise with the introduction of quantum
fluctuations, and the annealing behavior of the systems as these fluctuations
are reduced slowly to zero. This provides a general framework for realizing
analog quantum computation.Comment: 22 pages, 7 figs (color online); new References Added. Reviews of
Modern Physics (in press
Quantum attacks on Bitcoin, and how to protect against them
The key cryptographic protocols used to secure the internet and financial
transactions of today are all susceptible to attack by the development of a
sufficiently large quantum computer. One particular area at risk are
cryptocurrencies, a market currently worth over 150 billion USD. We investigate
the risk of Bitcoin, and other cryptocurrencies, to attacks by quantum
computers. We find that the proof-of-work used by Bitcoin is relatively
resistant to substantial speedup by quantum computers in the next 10 years,
mainly because specialized ASIC miners are extremely fast compared to the
estimated clock speed of near-term quantum computers. On the other hand, the
elliptic curve signature scheme used by Bitcoin is much more at risk, and could
be completely broken by a quantum computer as early as 2027, by the most
optimistic estimates. We analyze an alternative proof-of-work called Momentum,
based on finding collisions in a hash function, that is even more resistant to
speedup by a quantum computer. We also review the available post-quantum
signature schemes to see which one would best meet the security and efficiency
requirements of blockchain applications.Comment: 21 pages, 6 figures. For a rough update on the progress of Quantum
devices and prognostications on time from now to break Digital signatures,
see https://www.quantumcryptopocalypse.com/quantum-moores-law
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory
The present survey reports on the state of the art of the different
cryptographic functionalities built upon the ring learning with errors problem
and its interplay with several classical problems in algebraic number theory.
The survey is based to a certain extent on an invited course given by the
author at the Basque Center for Applied Mathematics in September 2018.Comment: arXiv admin note: text overlap with arXiv:1508.01375 by other
authors/ comment of the author: quotation has been added to Theorem 5.
Spatial quantum search in a triangular network
The spatial search problem consists in minimizing the number of steps
required to find a given site in a network, under the restriction that only
oracle queries or translations to neighboring sites are allowed. We propose a
quantum algorithm for the spatial search problem on a triangular lattice with N
sites and torus-like boundary conditions. The proposed algortithm is a special
case of the general framework for abstract search proposed by Ambainis, Kempe
and Rivosh [AKR05] (AKR) and Tulsi [Tulsi08], applied to a triangular network.
The AKR-Tulsi formalism was employed to show that the time complexity of the
quantum search on the triangular lattice is O(sqrt(N logN)).Comment: 10 pages, 4 Postscript figures, uses sbc-template.sty, appeared in
Annals of WECIQ 2010, III Workshop of Quantum Computation and Quantum
Informatio
Genetic braid optimization: A heuristic approach to compute quasiparticle braids
In topologically-protected quantum computation, quantum gates can be carried
out by adiabatically braiding two-dimensional quasiparticles, reminiscent of
entangled world lines. Bonesteel et al. [Phys. Rev. Lett. 95, 140503 (2005)],
as well as Leijnse and Flensberg [Phys. Rev. B 86, 104511 (2012)] recently
provided schemes for computing quantum gates from quasiparticle braids.
Mathematically, the problem of executing a gate becomes that of finding a
product of the generators (matrices) in that set that approximates the gate
best, up to an error. To date, efficient methods to compute these gates only
strive to optimize for accuracy. We explore the possibility of using a generic
approach applicable to a variety of braiding problems based on evolutionary
(genetic) algorithms. The method efficiently finds optimal braids while
allowing the user to optimize for the relative utilities of accuracy and/or
length. Furthermore, when optimizing for error only, the method can quickly
produce efficient braids.Comment: 6 pages 4 figure
- …