727 research outputs found
Improved quantum circuits for elliptic curve discrete logarithms
We present improved quantum circuits for elliptic curve scalar
multiplication, the most costly component in Shor's algorithm to compute
discrete logarithms in elliptic curve groups. We optimize low-level components
such as reversible integer and modular arithmetic through windowing techniques
and more adaptive placement of uncomputing steps, and improve over previous
quantum circuits for modular inversion by reformulating the binary Euclidean
algorithm. Overall, we obtain an affine Weierstrass point addition circuit that
has lower depth and uses fewer gates than previous circuits. While previous
work mostly focuses on minimizing the total number of qubits, we present
various trade-offs between different cost metrics including the number of
qubits, circuit depth and -gate count. Finally, we provide a full
implementation of point addition in the Q# quantum programming language that
allows unit tests and automatic quantum resource estimation for all components.Comment: 22 pages, to appear in: Int'l Conf. on Post-Quantum Cryptography
(PQCrypto 2020
Reducing the Depth of Quantum FLT-Based Inversion Circuit
Works on quantum computing and cryptanalysis has increased significantly in
the past few years. Various constructions of quantum arithmetic circuits, as
one of the essential components in the field, has also been proposed. However,
there has only been a few studies on finite field inversion despite its
essential use in realizing quantum algorithms, such as in Shor's algorithm for
Elliptic Curve Discrete Logarith Problem (ECDLP). In this study, we propose to
reduce the depth of the existing quantum Fermat's Little Theorem (FLT)-based
inversion circuit for binary finite field. In particular, we propose follow a
complete waterfall approach to translate the Itoh-Tsujii's variant of FLT to
the corresponding quantum circuit and remove the inverse squaring operations
employed in the previous work by Banegas et al., lowering the number of CNOT
gates (CNOT count), which contributes to reduced overall depth and gate count.
Furthermore, compare the cost by firstly constructing our method and previous
work's in Qiskit quantum computer simulator and perform the resource analysis.
Our approach can serve as an alternative for a time-efficient implementation.Comment: version 0.
Revisiting Shor's quantum algorithm for computing general discrete logarithms
We heuristically demonstrate that Shor's algorithm for computing general
discrete logarithms, modified to allow the semi-classical Fourier transform to
be used with control qubit recycling, achieves a success probability of
approximately 60% to 82% in a single run. By slightly increasing the number of
group operations that are evaluated quantumly, and by performing a limited
search in the classical post-processing, we furthermore show how the algorithm
can be modified to achieve a success probability exceeding 99% in a single run.
We provide concrete heuristic estimates of the success probability of the
modified algorithm, as a function of the group order, the size of the search
space in the classical post-processing, and the additional number of group
operations evaluated quantumly. In analogy with our earlier works, we show how
the modified quantum algorithm may be simulated classically when the logarithm
and group order are both known. Furthermore, we show how slightly better
tradeoffs may be achieved, compared to our earlier works, if the group order is
known when computing the logarithm.Comment: The pre-print has been extended to show how slightly better tradeoffs
may be achieved, compared to our earlier works, if the group order is known.
A minor issue with an integration limit, that lead us to give a rough success
probability estimate of 60% to 70%, as opposed to 60% to 82%, has been
corrected. The heuristic and results reported in the original pre-print are
otherwise unaffecte
Quantum attacks on Bitcoin, and how to protect against them
The key cryptographic protocols used to secure the internet and financial
transactions of today are all susceptible to attack by the development of a
sufficiently large quantum computer. One particular area at risk are
cryptocurrencies, a market currently worth over 150 billion USD. We investigate
the risk of Bitcoin, and other cryptocurrencies, to attacks by quantum
computers. We find that the proof-of-work used by Bitcoin is relatively
resistant to substantial speedup by quantum computers in the next 10 years,
mainly because specialized ASIC miners are extremely fast compared to the
estimated clock speed of near-term quantum computers. On the other hand, the
elliptic curve signature scheme used by Bitcoin is much more at risk, and could
be completely broken by a quantum computer as early as 2027, by the most
optimistic estimates. We analyze an alternative proof-of-work called Momentum,
based on finding collisions in a hash function, that is even more resistant to
speedup by a quantum computer. We also review the available post-quantum
signature schemes to see which one would best meet the security and efficiency
requirements of blockchain applications.Comment: 21 pages, 6 figures. For a rough update on the progress of Quantum
devices and prognostications on time from now to break Digital signatures,
see https://www.quantumcryptopocalypse.com/quantum-moores-law
- …