1,653 research outputs found
Quantum-over-classical Advantage in Solving Multiplayer Games
We study the applicability of quantum algorithms in computational game theory
and generalize some results related to Subtraction games, which are sometimes
referred to as one-heap Nim games.
In quantum game theory, a subset of Subtraction games became the first
explicitly defined class of zero-sum combinatorial games with provable
separation between quantum and classical complexity of solving them. For a
narrower subset of Subtraction games, an exact quantum sublinear algorithm is
known that surpasses all deterministic algorithms for finding solutions with
probability .
Typically, both Nim and Subtraction games are defined for only two players.
We extend some known results to games for three or more players, while
maintaining the same classical and quantum complexities:
and respectively
Classical and Quantum Algorithms for Constructing Text from Dictionary Problem
We study algorithms for solving the problem of constructing a text (long
string) from a dictionary (sequence of small strings). The problem has an
application in bioinformatics and has a connection with the Sequence assembly
method for reconstructing a long DNA sequence from small fragments. The problem
is constructing a string of length from strings with
possible intersections. We provide a classical algorithm with running time
where is the sum of lengths
of . We provide a quantum algorithm with running time . Additionally, we show that the lower bound for the
classical algorithm is . Thus, our classical algorithm is optimal
up to a log factor, and our quantum algorithm shows speed-up comparing to any
classical algorithm in a case of non-constant length of strings in the
dictionary
Quantum Attacks on Mersenne Number Cryptosystems
Mersenne number based cryptography was introduced by Aggarwal et al. as a potential post-
quantum cryptosystem in 2017. Shortly after the publication Beunardeau et al. propose a lattice based attack significantly reducing the security margins. During the NIST post-quantum project Aggarwal et al. and Szepieniec introduced a new form of Mersenne number based cryptosystems which remain secure in the presence of the lattice reduction attack. The cryptoschemes make use of error correcting codes and have a low but non-zero probability of failure during the decoding phase. In the event of a decoding failure information about the secret key may be leaked and may allow for new attacks.
In the first part of this work, we analyze the Mersenne number cryptosystem and NIST submission Ramstake and identify approaches to exploit the information leaked by decoding failures. We describe different attacks on a weakened variant of Ramstake. Furthermore we pair the decoding failures with a timing attack on the code from the submission package. Both our attacks significantly reduce the security margins compared to the best known generic attack. However, our results on the weakened variant do not seem to carry over to the unweakened cryptosystem. It remains an open question whether the information flow from decoding failures can be exploited to break Ramstake.
In the second part of this work we analyze the Groverization of the lattice reduction attack by Beunardeau et al.. The incorporation of classical search problem into a quantum framework promises a quadratic speedup potentially reducing the security margin by half. We give an explicit description of the quantum circuits resulting from the translation of the classical attack. This description contains, to the best of our knowledge, the first in depth description and analysis of a quantum variant of the LLL algorithm. We show that the Groverized attack requires a large (but polynomial) overhead of quantum memory
Quantum singular value transformation and beyond: exponential improvements for quantum matrix arithmetics
Quantum computing is powerful because unitary operators describing the
time-evolution of a quantum system have exponential size in terms of the number
of qubits present in the system. We develop a new "Singular value
transformation" algorithm capable of harnessing this exponential advantage,
that can apply polynomial transformations to the singular values of a block of
a unitary, generalizing the optimal Hamiltonian simulation results of Low and
Chuang. The proposed quantum circuits have a very simple structure, often give
rise to optimal algorithms and have appealing constant factors, while usually
only use a constant number of ancilla qubits. We show that singular value
transformation leads to novel algorithms. We give an efficient solution to a
certain "non-commutative" measurement problem and propose a new method for
singular value estimation. We also show how to exponentially improve the
complexity of implementing fractional queries to unitaries with a gapped
spectrum. Finally, as a quantum machine learning application we show how to
efficiently implement principal component regression. "Singular value
transformation" is conceptually simple and efficient, and leads to a unified
framework of quantum algorithms incorporating a variety of quantum speed-ups.
We illustrate this by showing how it generalizes a number of prominent quantum
algorithms, including: optimal Hamiltonian simulation, implementing the
Moore-Penrose pseudoinverse with exponential precision, fixed-point amplitude
amplification, robust oblivious amplitude amplification, fast QMA
amplification, fast quantum OR lemma, certain quantum walk results and several
quantum machine learning algorithms. In order to exploit the strengths of the
presented method it is useful to know its limitations too, therefore we also
prove a lower bound on the efficiency of singular value transformation, which
often gives optimal bounds.Comment: 67 pages, 1 figur
- …