815 research outputs found
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
An efficient quantum modular exponentiation method is indispensible for
Shor's factoring algorithm. But we find that all descriptions presented by
Shor, Nielsen and Chuang, Markov and Saeedi, et al., are flawed. We also remark
that some experimental demonstrations of Shor's algorithm are misleading,
because they violate the necessary condition that the selected number ,
where is the number of qubits used in the first register, must satisfy , where is the large number to be factored.Comment: 12 pages,5 figures. The original version has 6 pages. It did not
point out the reason that some researchers took for granted that quantum
modlar exponentiation is in polynomial time. In the new version, we indicate
the reason and analyze some experimental demonstrations of Shor's algorithm.
Besides, the author Zhenfu Cao is added to the version for his contribution.
arXiv admin note: text overlap with arXiv:1409.735
Efficient networks for quantum factoring
We consider how to optimize memory use and computation time in operating a quantum computer. In particular, we estimate the number of memory quantum bits (qubits) and the number of operations required to perform factorization, using the algorithm suggested by Shor [in Proceedings of the 35th Annual Symposium on Foundations of Computer Science, edited by S. Goldwasser (IEEE Computer Society, Los Alamitos, CA, 1994), p. 124]. A K-bit number can be factored in time of order K3 using a machine capable of storing 5K+1 qubits. Evaluation of the modular exponential function (the bottleneck of Shor’s algorithm) could be achieved with about 72K3 elementary quantum gates; implementation using a linear ion trap would require about 396K3 laser pulses. A proof-of-principle demonstration of quantum factoring (factorization of 15) could be performed with only 6 trapped ions and 38 laser pulses. Though the ion trap may never be a useful computer, it will be a powerful device for exploring experimentally the properties of entangled quantum states
Factoring in a Dissipative Quantum Computer
We describe an array of quantum gates implementing Shor's algorithm for prime
factorization in a quantum computer. The array includes a circuit for modular
exponentiation with several subcomponents (such as controlled multipliers,
adders, etc) which are described in terms of elementary Toffoli gates. We
present a simple analysis of the impact of losses and decoherence on the
performance of this quantum factoring circuit. For that purpose, we simulate a
quantum computer which is running the program to factor N = 15 while
interacting with a dissipative environment. As a consequence of this
interaction randomly selected qubits may spontaneously decay. Using the results
of our numerical simulations we analyze the efficiency of some simple error
correction techniques.Comment: plain tex, 18 pages, 8 postscript figure
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Data privacy is crucial when dealing with biometric data. Accounting for the
latest European data privacy regulation and payment service directive,
biometric template protection is essential for any commercial application.
Ensuring unlinkability across biometric service operators, irreversibility of
leaked encrypted templates, and renewability of e.g., voice models following
the i-vector paradigm, biometric voice-based systems are prepared for the
latest EU data privacy legislation. Employing Paillier cryptosystems, Euclidean
and cosine comparators are known to ensure data privacy demands, without loss
of discrimination nor calibration performance. Bridging gaps from template
protection to speaker recognition, two architectures are proposed for the
two-covariance comparator, serving as a generative model in this study. The
first architecture preserves privacy of biometric data capture subjects. In the
second architecture, model parameters of the comparator are encrypted as well,
such that biometric service providers can supply the same comparison modules
employing different key pairs to multiple biometric service operators. An
experimental proof-of-concept and complexity analysis is carried out on the
data from the 2013-2014 NIST i-vector machine learning challenge
- …