3,871 research outputs found
Depth Reduction for Circuits with a Single Layer of Modular Counting Gates
We consider the class of constant depth AND/OR circuits augmented with
a layer of modular counting gates at the bottom layer, i.e circuits. We show that the following
holds for several types of gates : by adding a gate of type at
the output, it is possible to obtain an equivalent randomized depth 2
circuit of quasipolynomial size consisting of a gate of type at
the output and a layer of modular counting gates, i.e circuits. The types of gates we consider are modular
counting gates and threshold-style gates. For all of these, strong
lower bounds are known for (deterministic)
circuits
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute
discrete logarithms on elliptic curves over prime fields. The estimates are
derived from a simulation of a Toffoli gate network for controlled elliptic
curve point addition, implemented within the framework of the quantum computing
software tool suite LIQ. We determine circuit implementations for
reversible modular arithmetic, including modular addition, multiplication and
inversion, as well as reversible elliptic curve point addition. We conclude
that elliptic curve discrete logarithms on an elliptic curve defined over an
-bit prime field can be computed on a quantum computer with at most qubits using a quantum circuit of at most Toffoli gates. We are able to classically simulate the
Toffoli networks corresponding to the controlled elliptic curve point addition
as the core piece of Shor's algorithm for the NIST standard curves P-192,
P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to
recent resource estimates for Shor's factoring algorithm. The results also
support estimates given earlier by Proos and Zalka and indicate that, for
current parameters at comparable classical security levels, the number of
qubits required to tackle elliptic curves is less than for attacking RSA,
suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added.
ASIACRYPT 201
08381 Abstracts Collection -- Computational Complexity of Discrete Problems
From the 14th of September to the 19th of September, the Dagstuhl Seminar
08381 ``Computational Complexity of Discrete Problems\u27\u27 was held in Schloss Dagstuhl - Leibniz Center for Informatics.
During the seminar, several participants presented their current
research, and ongoing work as well as open problems were discussed.
Abstracts of the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this report. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
Simulating quantum computation by contracting tensor networks
The treewidth of a graph is a useful combinatorial measure of how close the
graph is to a tree. We prove that a quantum circuit with gates whose
underlying graph has treewidth can be simulated deterministically in
time, which, in particular, is polynomial in if
. Among many implications, we show efficient simulations for
log-depth circuits whose gates apply to nearby qubits only, a natural
constraint satisfied by most physical implementations. We also show that
one-way quantum computation of Raussendorf and Briegel (Physical Review
Letters, 86:5188--5191, 2001), a universal quantum computation scheme with
promising physical implementations, can be efficiently simulated by a
randomized algorithm if its quantum resource is derived from a small-treewidth
graph.Comment: 7 figure
Asymptotically Optimal Quantum Circuits for d-level Systems
As a qubit is a two-level quantum system whose state space is spanned by |0>,
|1>, so a qudit is a d-level quantum system whose state space is spanned by
|0>,...,|d-1>. Quantum computation has stimulated much recent interest in
algorithms factoring unitary evolutions of an n-qubit state space into
component two-particle unitary evolutions. In the absence of symmetry, Shende,
Markov and Bullock use Sard's theorem to prove that at least C 4^n two-qubit
unitary evolutions are required, while Vartiainen, Moettoenen, and Salomaa
(VMS) use the QR matrix factorization and Gray codes in an optimal order
construction involving two-particle evolutions. In this work, we note that
Sard's theorem demands C d^{2n} two-qudit unitary evolutions to construct a
generic (symmetry-less) n-qudit evolution. However, the VMS result applied to
virtual-qubits only recovers optimal order in the case that d is a power of
two. We further construct a QR decomposition for d-multi-level quantum logics,
proving a sharp asymptotic of Theta(d^{2n}) two-qudit gates and thus closing
the complexity question for all d-level systems (d finite.) Gray codes are not
required, and the optimal Theta(d^{2n}) asymptotic also applies to gate
libraries where two-qudit interactions are restricted by a choice of certain
architectures.Comment: 18 pages, 5 figures (very detailed.) MatLab files for factoring qudit
unitary into gates in MATLAB directory of source arxiv format. v2: minor
change
- …