12,885 research outputs found
Nondeterministic quantum communication complexity: the cyclic equality game and iterated matrix multiplication
We study nondeterministic multiparty quantum communication with a quantum
generalization of broadcasts. We show that, with number-in-hand classical
inputs, the communication complexity of a Boolean function in this
communication model equals the logarithm of the support rank of the
corresponding tensor, whereas the approximation complexity in this model equals
the logarithm of the border support rank. This characterisation allows us to
prove a log-rank conjecture posed by Villagra et al. for nondeterministic
multiparty quantum communication with message-passing.
The support rank characterization of the communication model connects quantum
communication complexity intimately to the theory of asymptotic entanglement
transformation and algebraic complexity theory. In this context, we introduce
the graphwise equality problem. For a cycle graph, the complexity of this
communication problem is closely related to the complexity of the computational
problem of multiplying matrices, or more precisely, it equals the logarithm of
the asymptotic support rank of the iterated matrix multiplication tensor. We
employ Strassen's laser method to show that asymptotically there exist
nontrivial protocols for every odd-player cyclic equality problem. We exhibit
an efficient protocol for the 5-player problem for small inputs, and we show
how Young flattenings yield nontrivial complexity lower bounds
Quantum Conference
A notion of quantum conference is introduced in analogy with the usual notion
of a conference that happens frequently in today's world. Quantum conference is
defined as a multiparty secure communication task that allows each party to
communicate their messages simultaneously to all other parties in a secure
manner using quantum resources. Two efficient and secure protocols for quantum
conference have been proposed. The security and efficiency of the proposed
protocols have been analyzed critically. It is shown that the proposed
protocols can be realized using a large number of entangled states and group of
operators. Further, it is shown that the proposed schemes can be easily reduced
to protocol for multiparty quantum key distribution and some earlier proposed
schemes of quantum conference, where the notion of quantum conference was
different.Comment: 12 pages, 1 figur
Continuous variable controlled quantum dialogue and secure multiparty quantum computation
A continuous variable controlled quantum dialogue scheme is proposed. The
scheme is further modified to obtain two other protocols of continuous variable
secure multiparty computation. The first one of these protocols provides a
solution of two party socialist millionaire problem, while the second protocol
provides a solution for a special type of multi-party socialist millionaire
problem which can be viewed as a protocol for multiparty quantum private
comparison. It is shown that the proposed scheme of continuous variable
controlled quantum dialogue can be performed using bipartite entanglement and
can be reduced to obtain several other two and three party cryptographic
schemes in the limiting cases. The security of the proposed scheme and its
advantage over corresponding discrete variable counterpart are also discussed.
Specifically, the ignorance of an eavesdropper in the proposed scheme is shown
to be very high compared with corresponding discrete variable scheme and thus
the present scheme is less prone to information leakage inherent with the
discrete variable quantum dialogue based schemes.It is further established that
the proposed scheme can be viewed as a continuous variable counterpart of
quantum cryptographic switch which allows a supervisor to control the
information transferred between the two legitimate parties to a continuously
varying degree.Comment: Quantum dialogue and its application in the continuous variable
scenario is studied in detai
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure
function evaluation (SFE) which enables two parties to jointly compute a
function without disclosing their private inputs. Chameleon combines the best
aspects of generic SFE protocols with the ones that are based upon additive
secret sharing. In particular, the framework performs linear operations in the
ring using additively secret shared values and nonlinear
operations using Yao's Garbled Circuits or the Goldreich-Micali-Wigderson
protocol. Chameleon departs from the common assumption of additive or linear
secret sharing models where three or more parties need to communicate in the
online phase: the framework allows two parties with private inputs to
communicate in the online phase under the assumption of a third node generating
correlated randomness in an offline phase. Almost all of the heavy
cryptographic operations are precomputed in an offline phase which
substantially reduces the communication overhead. Chameleon is both scalable
and significantly more efficient than the ABY framework (NDSS'15) it is based
on. Our framework supports signed fixed-point numbers. In particular,
Chameleon's vector dot product of signed fixed-point numbers improves the
efficiency of mining and classification of encrypted data for algorithms based
upon heavy matrix multiplications. Our evaluation of Chameleon on a 5 layer
convolutional deep neural network shows 133x and 4.2x faster executions than
Microsoft CryptoNets (ICML'16) and MiniONN (CCS'17), respectively
IMS signalling for multiparty services based on network level multicast
3rd EURO-NGI Conference on Next Generation Internet Networks. Norwegian University of Science and Technology, Trondheim, Norway, 21-23 may 2007.The standardization process of the UMTS technology has led to the development of the IP Multimedia Subsystem (IMS). IMS provides a framework that supports the negotiation of the next generation multimedia services with QoS requirements that are envisioned for 3G networks. But even though many of these services involve the participation of multiple users in a multiparty arrangement, the delivery technology at network level is still unicast based. This approach is not optimum, in terms of transmission efficiency. In this paper, a new approach is presented proposing to use a network level multicast delivery technology for the multiparty services that are signalled through IMS. The main advantages and drawbacks related with this new approach are analyzed in the article. Finally, as a starting point in the development of the presented solution, a new SIP signalling dialogue is proposed allowing the negotiation of a generic multiparty service, and supporting at the same time the configuration of the corresponding network level multicast delivery service with QoS requirements that will be used in the user plane.Publicad
- …