Skip to main content

Showing 1–50 of 77 results for author: Mosca, M

.
  1. arXiv:2510.11526  [pdf, ps, other

    quant-ph

    Buildings for Synthesis with Clifford+R

    Authors: Mark Deaconu, Nihar Gargava, Amolak Ratan Kalra, Michele Mosca, Jon Yard

    Abstract: We study the problem of exact synthesis for the Clifford+R gate set and give the explicit structure of the underlying Bruhat-Tits building for this group. In this process, we also give an alternative proof of the arithmetic nature of the Clifford+R gate set.

    Submitted 13 October, 2025; originally announced October 2025.

    Comments: 26 pages, 5 figures

  2. arXiv:2508.14670  [pdf, other

    cs.LO quant-ph

    A Complete and Natural Rule Set for Multi-Qutrit Clifford Circuits

    Authors: Sarah Meng Li, Michele Mosca, Neil J. Ross, John van de Wetering, Yuming Zhao

    Abstract: We present a complete set of rewrite rules for n-qutrit Clifford circuits where n is any non-negative integer. This is the first completeness result for any fragment of quantum circuits in odd prime dimensions. We first generalize Selinger's normal form for n-qubit Clifford circuits to the qutrit setting. Then, we present a rewrite system by which any Clifford circuit can be reduced to this normal… ▽ More

    Submitted 20 August, 2025; originally announced August 2025.

    Comments: In Proceedings QPL 2025, arXiv:2508.13619

    Journal ref: EPTCS 426, 2025, pp. 23-78

  3. arXiv:2407.00357  [pdf, other

    quant-ph

    qLUE: A Quantum Clustering Algorithm for Multi- Dimensional Datasets

    Authors: Dhruv Gopalakrishnan, Luca Dellantonio, Antonio Di Pilato, Wahid Redjeb, Felice Pantaleo, Michele Mosca

    Abstract: Clustering algorithms are at the basis of several technological applications, and are fueling the development of rapidly evolving fields such as machine learning. In the recent past, however, it has become apparent that they face challenges stemming from datasets that span more spatial dimensions. In fact, the best-performing clustering algorithms scale linearly in the number of points, but quadra… ▽ More

    Submitted 7 July, 2024; v1 submitted 29 June, 2024; originally announced July 2024.

  4. arXiv:2405.19891  [pdf, other

    quant-ph cs.IT

    Improving the Fidelity of CNOT Circuits on NISQ Hardware

    Authors: Dohun Kim, Minyoung Kim, Sarah Meng Li, Michele Mosca

    Abstract: We introduce an improved CNOT synthesis algorithm that considers nearest-neighbour interactions and CNOT gate error rates in noisy intermediate-scale quantum (NISQ) hardware. Compared to IBM's Qiskit compiler, it improves the fidelity of a synthesized CNOT circuit by about 2 times on average (up to 9 times). It lowers the synthesized CNOT count by a factor of 13 on average (up to a factor of 162).… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 67 pages, 33 figures, and 9 tables

  5. arXiv:2403.08526  [pdf

    quant-ph

    Field demonstration of a fully managed, L1 encrypted 3-node network with hybrid relayed-QKD and centralized symmetric classical key management

    Authors: N. Makris, A. Papageorgopoulos, K. Tsimvrakidis, P. Konteli, Y. Gautier, M. Terenziani, E. Daudin, D. Ntoulias, T. Fragkioudakis, I. Meletios, M. Mosca, D. Hobbs, T. Rosati, I. Papastamatiou, O. Prnjat, K. Koumantaros, D. Mitropoulos, Jean-Robert Morax, Bruno Huttner, O. K. Christodoulopoulos, G. T. Kanellos, D. Syvridis

    Abstract: We successfully demonstrated a fully-managed, field-deployed, three-node QKD ring network with L1-OTNsec encryption, that employs a hybrid scheme of QKD and classical yet quantum-safe centrally-generated symmetric keys to support point-to-point and relay consumers.

    Submitted 13 March, 2024; originally announced March 2024.

  6. arXiv:2401.16317  [pdf, other

    quant-ph physics.soc-ph

    Assessing the Benefits and Risks of Quantum Computers

    Authors: Travis L. Scholten, Carl J. Williams, Dustin Moody, Michele Mosca, William Hurley, William J. Zeng, Matthias Troyer, Jay M. Gambetta

    Abstract: Quantum computing is an emerging technology with potentially far-reaching implications for national prosperity and security. Understanding the timeframes over which economic benefits and national security risks may manifest themselves is vital for ensuring the prudent development of this technology. To inform security experts and policy decision makers on this matter, we review what is currently k… ▽ More

    Submitted 13 February, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: Relative to v1: fix typos throughout, correct and update Table III, add 8 references

  7. Synthesis and Arithmetic of Single Qutrit Circuits

    Authors: Amolak Ratan Kalra, Michele Mosca, Dinesh Valluri

    Abstract: In this paper we study single qutrit circuits consisting of words over the Clifford$+D$ cyclotomic gate set, where $D=\text{diag}(\pmξ^{a},\pmξ^{b},\pmξ^{c})$, $ξ$ is a primitive $9$-th root of unity and $a,b,c$ are integers. We characterize classes of qutrit unit vectors $z$ with entries in $\mathbb{Z}[ξ, \frac{1}χ]$ based on the possibility of reducing their smallest denominator exponent (sde) w… ▽ More

    Submitted 18 February, 2025; v1 submitted 14 November, 2023; originally announced November 2023.

    Comments: 19 pages, 1 figure, typos corrected, Accepted in Quantum

    Journal ref: Quantum 9, 1647 (2025)

  8. arXiv:2311.04379  [pdf, other

    quant-ph

    A square-root speedup for finding the smallest eigenvalue

    Authors: Alex Kerzner, Vlad Gheorghiu, Michele Mosca, Thomas Guilbaud, Federico Carminati, Fabio Fracas, Luca Dellantonio

    Abstract: We describe a quantum algorithm for finding the smallest eigenvalue of a Hermitian matrix. This algorithm combines Quantum Phase Estimation and Quantum Amplitude Estimation to achieve a quadratic speedup with respect to the best classical algorithm in terms of matrix dimensionality, i.e., $\widetilde{\mathcal{O}}(\sqrt{N}/ε)$ black-box queries to an oracle encoding the matrix, where $N$ is the mat… ▽ More

    Submitted 15 November, 2023; v1 submitted 7 November, 2023; originally announced November 2023.

    Comments: 17 pages, 6 figures, all comments are welcome, additional references added

  9. arXiv:2307.02437  [pdf, other

    quant-ph cs.IT

    Graphical CSS Code Transformation Using ZX Calculus

    Authors: Jiaxin Huang, Sarah Meng Li, Lia Yeh, Aleks Kissinger, Michele Mosca, Michael Vasmer

    Abstract: In this work, we present a generic approach to transform CSS codes by building upon their equivalence to phase-free ZX diagrams. Using the ZX calculus, we demonstrate diagrammatic transformations between encoding maps associated with different codes. As a motivating example, we give explicit transformations between the Steane code and the quantum Reed-Muller code, since by switching between these… ▽ More

    Submitted 1 September, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: In Proceedings QPL 2023, arXiv:2308.15489

    Journal ref: EPTCS 384, 2023, pp. 1-19

  10. T-count and T-depth of any multi-qubit unitary

    Authors: Vlad Gheorghiu, Michele Mosca, Priyanka Mukhopadhyay

    Abstract: While implementing a quantum algorithm it is crucial to reduce the quantum resources, in order to obtain the desired computational advantage. For most fault-tolerant quantum error-correcting codes the cost of implementing the non-Clifford gate is the highest among all the gates in a universal fault-tolerant gate set. In this paper we design provable algorithm to determine T-count of any $n$-qubit… ▽ More

    Submitted 9 February, 2023; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in Nature Partner Journal Quantum Information. Not structured according to the journal policies. Compared to v3 : A note about implementation of 2-qubit QFT in Table 3

  11. arXiv:2108.07233  [pdf, other

    cond-mat.mtrl-sci cs.CE cs.LG

    Fast predictions of lattice energies by continuous isometry invariants of crystal structures

    Authors: Jakob Ropers, Marco M Mosca, Olga Anosova, Vitaliy Kurlin, Andrew I Cooper

    Abstract: Crystal Structure Prediction (CSP) aims to discover solid crystalline materials by optimizing periodic arrangements of atoms, ions or molecules. CSP takes weeks of supercomputer time because of slow energy minimizations for millions of simulated crystals. The lattice energy is a key physical property, which determines thermodynamic stability of a crystal but has no simple analytic expression. Past… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

    Comments: To appear in the proceedings of DACOMSIN (Data and Computation for Materials Science and Innovation) 2021, https://en.misis.ru/university/colleges/sound/thermochemistry/dacomsin/

  12. A (quasi-)polynomial time heuristic algorithm for synthesizing T-depth optimal circuits

    Authors: Vlad Gheorghiu, Michele Mosca, Priyanka Mukhopadhyay

    Abstract: We investigate the problem of synthesizing T-depth optimal quantum circuits over the Clifford+T gate set. First we construct a special subset of T-depth 1 unitaries, such that it is possible to express the T-depth-optimal decomposition of any unitary as product of unitaries from this subset and a Clifford (up to global phase). The cardinality of this subset is at most $n\cdot 2^{5.6n}$. We use nes… ▽ More

    Submitted 13 September, 2022; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: Published in Nature Partner Journal Quantum Information. Compared to v4: Minor changes. Not the exact journal version

  13. Reducing the CNOT count for Clifford+T circuits on NISQ architectures

    Authors: Vlad Gheorghiu, Jiaxin Huang, Sarah Meng Li, Michele Mosca, Priyanka Mukhopadhyay

    Abstract: While mapping a quantum circuit to the physical layer one has to consider the numerous constraints imposed by the underlying hardware architecture. Connectivity of the physical qubits is one such constraint that restricts two-qubit operations, such as CNOT, to "connected" qubits. SWAP gates can be used to place the logical qubits on admissible physical qubits, but they entail a significant increas… ▽ More

    Submitted 10 October, 2022; v1 submitted 24 November, 2020; originally announced November 2020.

    Comments: Accepted in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD). This is an extended version with more illustrations. Comparison with Qiskit and TKET added

  14. arXiv:2010.06571  [pdf, other

    cs.CR

    PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks

    Authors: Amelia Holcomb, Geovandro C. C. F. Pereira, Bhargav Das, Michele Mosca

    Abstract: Hyperledger Fabric is a prominent and flexible solution for building permissioned distributed ledger platforms. Access control and identity management relies on a Membership Service Provider (MSP) whose cryptographic interface only handles standard PKI methods for authentication: RSA and ECDSA classical signatures. Also, MSP-issued credentials may use only one signature scheme, tying the credentia… ▽ More

    Submitted 23 December, 2020; v1 submitted 13 October, 2020; originally announced October 2020.

  15. arXiv:2009.02488  [pdf, other

    cond-mat.mtrl-sci

    The asymptotic behaviour and a near linear time algorithm for isometry invariants of periodic sets

    Authors: Daniel Widdowson, Marco Mosca, Angeles Pulido, Vitaliy Kurlin, Andrew I Cooper

    Abstract: The fundamental model of a periodic structure is a periodic point set up to rigid motion or isometry. Our recent paper in SoCG 2021 defined isometry invariants (density functions), which are complete in general position and continuous under perturbations. This work introduces much faster isometry invariants (average minimum distances), which are also continuous and distinguish some sets that have… ▽ More

    Submitted 11 May, 2021; v1 submitted 5 September, 2020; originally announced September 2020.

    Comments: The main paper and appendices A,B are written for mathematicians and computer scientists, while appendices C,D focus on applications to crystals

    MSC Class: 51-08 (Primary) 51K05 14L24; 74E15 (Secondary) ACM Class: G.0; J.2; I.3.5

  16. A polynomial time and space heuristic algorithm for T-count

    Authors: Michele Mosca, Priyanka Mukhopadhyay

    Abstract: This work focuses on reducing the physical cost of implementing quantum algorithms when using the state-of-the-art fault-tolerant quantum error correcting codes, in particular, those for which implementing the T gate consumes vastly more resources than the other gates in the gate set. More specifically, we consider the group of unitaries that can be exactly implemented by a quantum circuit consist… ▽ More

    Submitted 6 October, 2021; v1 submitted 22 June, 2020; originally announced June 2020.

    Comments: Accepted in Quantum Science and Technology journal (not the exact journal version)

    Journal ref: Quantum Science and Technology 7(1), 2021

  17. arXiv:2002.11165  [pdf, other

    cs.CG physics.comp-ph

    Voronoi-based similarity distances between arbitrary crystal lattices

    Authors: Marco Michele Mosca, Vitaliy Kurlin

    Abstract: This paper develops a new continuous approach to a similarity between periodic lattices of ideal crystals. Quantifying a similarity between crystal structures is needed to substantially speed up the Crystal Structure Prediction, because the prediction of many target properties of crystal structures is computationally slow and is essentially repeated for many nearly identical simulated structures.… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: Paper accepted in Crystal Research and Technology Journal

  18. arXiv:1910.09592  [pdf, other

    cs.CR quant-ph

    On speeding up factoring with quantum SAT solvers

    Authors: Michele Mosca, João Marcos Vensi Basso, Sebastian R. Verschoor

    Abstract: There have been several efforts to apply quantum SAT solving methods to factor large integers. While these methods may provide insight into quantum SAT solving, to date they have not led to a convincing path to integer factorization that is competitive with the best known classical method, the Number Field Sieve. Many of the techniques tried involved directly encoding multiplication to SAT or an e… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

  19. arXiv:1907.07859  [pdf, other

    quant-ph math.CO

    Pauli Partitioning with Respect to Gate Sets

    Authors: Andrew Jena, Scott Genin, Michele Mosca

    Abstract: Measuring the expectation value of Pauli operators on prepared quantum states is a fundamental task in a multitude of quantum algorithms. Simultaneously measuring sets of operators allows for fewer measurements and an overall speedup of the measurement process. We investigate the task of partitioning a random subset of Pauli operators into simultaneously-measurable parts. Using heuristics from col… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

    Comments: 7 pages, 2 figures

  20. Quantum circuit optimizations for NISQ architectures

    Authors: Beatrice Nash, Vlad Gheorghiu, Michele Mosca

    Abstract: Currently available quantum computing hardware platforms have limited 2-qubit connectivity among their addressable qubits. In order to run a generic quantum algorithm on such a platform, one has to transform the initial logical quantum circuit describing the algorithm into an equivalent one that obeys the connectivity restrictions. In this work we construct a circuit synthesis scheme that takes… ▽ More

    Submitted 24 April, 2020; v1 submitted 3 April, 2019; originally announced April 2019.

    Comments: Replaced by the published version

    Journal ref: Quantum Science and Technology 5, 025010 (2020)

  21. Novel Technique for Robust Optimal Algorithmic Cooling

    Authors: Sadegh Raeisi, Mária Kieferová, Michele Mosca

    Abstract: Heat-bath algorithmic cooling (HBAC) provides algorithmic ways to improve the purity of quantum states. These techniques are complex iterative processes that change from each iteration to the next and this poses a significant challenge to implementing these algorithms. Here, we introduce a new technique that on a fundamental level, shows that it is possible to do algorithmic cooling and even reach… ▽ More

    Submitted 9 June, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: 5 pages, 3 figures + SM (5 pages, 2 figures)

    Journal ref: Phys. Rev. Lett. 122, 220501 (2019)

  22. arXiv:1902.02332  [pdf, other

    quant-ph

    Benchmarking the quantum cryptanalysis of symmetric, public-key and hash-based cryptographic schemes

    Authors: Vlad Gheorghiu, Michele Mosca

    Abstract: Quantum algorithms can break factoring and discrete logarithm based cryptography and weaken symmetric cryptography and hash functions. In order to estimate the real-world impact of these attacks, apart from tracking the development of fault-tolerant quantum computers it is important to have an estimate of the resources needed to implement these quantum attacks. For attacking symmetric cryptograp… ▽ More

    Submitted 7 February, 2019; v1 submitted 6 February, 2019; originally announced February 2019.

    Comments: 19 pages, 66 figures, 3 tables, all comments are welcome

  23. arXiv:1902.01448  [pdf, other

    cs.CR quant-ph

    Factoring semi-primes with (quantum) SAT-solvers

    Authors: Michele Mosca, Sebastian R. Verschoor

    Abstract: The assumed computationally difficulty of factoring large integers forms the basis of security for RSA public-key cryptography, which specifically relies on products of two large primes or semi-primes. The best-known factoring algorithms for classical computers run in sub-exponential time. Since integer factorization is in NP, one can reduce this problem to any NP-hard problem, such as Boolean Sat… ▽ More

    Submitted 22 October, 2019; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: Update: typos, included reference to abs/1910.09592

  24. Fault tolerant resource estimation of quantum random-access memories

    Authors: Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca

    Abstract: Quantum random-access look-up of a string of classical bits is a necessary ingredient in several important quantum algorithms. In some cases, the cost of such quantum random-access memory (qRAM) is the limiting factor in the implementation of the algorithm. In this paper we study the cost of fault-tolerantly implementing a qRAM. We construct and analyze generic families of circuits that function a… ▽ More

    Submitted 22 January, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: 14 pages, 14 figures. Code repository available in references. To appear in IEEE Transactions on Quantum Engineering

  25. arXiv:1712.02617  [pdf, other

    cs.CR cs.NI quant-ph

    The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)

    Authors: Piotr K. Tysowski, Xinhua Ling, Norbert Lütkenhaus, Michele Mosca

    Abstract: Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an ent… ▽ More

    Submitted 7 December, 2017; originally announced December 2017.

  26. On the CNOT-complexity of CNOT-PHASE circuits

    Authors: Matthew Amy, Parsiad Azimzadeh, Michele Mosca

    Abstract: We study the problem of CNOT-optimal quantum circuit synthesis over gate sets consisting of CNOT and Z-basis rotations of arbitrary angles. We show that the circuit-polynomial correspondence relates such circuits to Fourier expansions of pseudo-Boolean functions, and that for certain classes of functions this expansion uniquely determines the minimum CNOT cost of an implementation. As a corollary… ▽ More

    Submitted 13 August, 2018; v1 submitted 5 December, 2017; originally announced December 2017.

    Comments: 21 pages, 5 figures, 1 table. Version 2 formally verifies the correctness of the benchmark optimizations, 4 out of 39 are left unverified due to size, Quantum Science and Technology, 2018

    Journal ref: Quantum Science and Technology 4(1), 2018

  27. arXiv:1706.03419  [pdf, other

    quant-ph cs.ET

    Improved reversible and quantum circuits for Karatsuba-based integer multiplication

    Authors: Alex Parent, Martin Roetteler, Michele Mosca

    Abstract: Integer arithmetic is the underpinning of many quantum algorithms, with applications ranging from Shor's algorithm over HHL for matrix inversion to Hamiltonian simulation algorithms. A basic objective is to keep the required resources to implement arithmetic as low as possible. This applies in particular to the number of qubits required in the implementation as for the foreseeable future this numb… ▽ More

    Submitted 11 June, 2017; originally announced June 2017.

    Comments: 16 pages, 11 figures; to appear in Proceedings of the 12th Conference on Theory of Quantum Computation, Communication and Cryptography (TQC 2017)

  28. Parallelizing quantum circuit synthesis

    Authors: Olivia Di Matteo, Michele Mosca

    Abstract: Quantum circuit synthesis is the process in which an arbitrary unitary operation is decomposed into a sequence of gates from a universal set, typically one which a quantum computer can implement both efficiently and fault-tolerantly. As physical implementations of quantum computers improve, the need is growing for tools which can effectively synthesize components of the circuits and algorithms the… ▽ More

    Submitted 14 October, 2016; v1 submitted 23 June, 2016; originally announced June 2016.

    Comments: 16 pages, 9 figures

    Journal ref: Quantum Science and Technology, Vol 1 (1) 2016

  29. arXiv:1603.09383  [pdf, ps, other

    quant-ph

    Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3

    Authors: Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John Schanck

    Abstract: We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is run on a surface code based fault-tolerant quantum computer. Our estimates rely on a time-area metric that costs the number of logical qubits times the depth of the circuit in units of surface code cy… ▽ More

    Submitted 30 November, 2016; v1 submitted 30 March, 2016; originally announced March 2016.

    Comments: Same as the published version to appear in the Selected Areas of Cryptography (SAC) 2016. Comments are welcome!

  30. T-count optimization and Reed-Muller codes

    Authors: Matthew Amy, Michele Mosca

    Abstract: In this paper, we study the close relationship between Reed-Muller codes and single-qubit phase gates from the perspective of $T$-count optimization. We prove that minimizing the number of $T$ gates in an $n$-qubit quantum circuit over CNOT and $T$, together with the Clifford group powers of $T$, corresponds to finding a minimum distance decoding of a length $2^n-1$ binary vector in the order… ▽ More

    Submitted 13 August, 2018; v1 submitted 27 January, 2016; originally announced January 2016.

    Comments: 19 pages. Version 2 gives a substantially different presentation of the results, as well as a generalization to rotation angles of any finite order

  31. On the robustness of bucket brigade quantum RAM

    Authors: Srinivasan Arunachalam, Vlad Gheorghiu, Tomas Jochym-O'Connor, Michele Mosca, Priyaa Varshinee Srinivasan

    Abstract: We study the robustness of the bucket brigade quantum random access memory model introduced by Giovannetti, Lloyd, and Maccone [Phys. Rev. Lett. 100, 160501 (2008)]. Due to a result of Regev and Schiff [ICALP '08 pp. 773], we show that for a class of error models the error rate per gate in the bucket brigade quantum memory has to be of order $o(2^{-n/2})$ (where $N=2^n$ is the size of the memory)… ▽ More

    Submitted 10 December, 2015; v1 submitted 11 February, 2015; originally announced February 2015.

    Comments: Replaced with the published version. 13 pages, 9 figures

    Journal ref: New Journal of Physics, Vol. 17, No. 12, Pp. 123010 (2015)

  32. The Asymptotic Cooling of Heat-Bath Algorithmic Cooling

    Authors: Sadegh Raeisi, Michele Mosca

    Abstract: The purity of quantum states is a key requirement for many quantum applications. Improving the purity is limited by fundamental laws of thermodynamics. Here we are probing the fundamental limits for a natural approach to this problem, namely heat-bath algorithmic cooling(HBAC). The existence of the cooling limit for HBAC techniques was proved by Schulman et al. in, the limit however remained unkno… ▽ More

    Submitted 2 December, 2014; v1 submitted 11 July, 2014; originally announced July 2014.

    Comments: 11 pages, 4 figures, In the new version we clarified the main proofs and moved parts to the main body of the paper. Elaborated on implications for more general initial states. Additional references added. Minor corrections and changes

    Journal ref: Phys. Rev. Lett. 114, 100404 (2015)

  33. arXiv:1308.4134  [pdf, other

    quant-ph

    An algorithm for the T-count

    Authors: David Gosset, Vadym Kliuchnikov, Michele Mosca, Vincent Russo

    Abstract: We consider quantum circuits composed of Clifford and T gates. In this context the T gate has a special status since it confers universal computation when added to the (classically simulable) Clifford gates. However it can be very expensive to implement fault-tolerantly. We therefore view this gate as a resource which should be used only when necessary. Given an n-qubit unitary U we are interested… ▽ More

    Submitted 19 August, 2013; originally announced August 2013.

  34. Polynomial-time T-depth Optimization of Clifford+T circuits via Matroid Partitioning

    Authors: Matthew Amy, Dmitri Maslov, Michele Mosca

    Abstract: Most work in quantum circuit optimization has been performed in isolation from the results of quantum fault-tolerance. Here we present a polynomial-time algorithm for optimizing quantum circuits that takes the actual implementation of fault-tolerant logical gates into consideration. Our algorithm re-synthesizes quantum circuits composed of Clifford group and T gates, the latter being typically the… ▽ More

    Submitted 13 December, 2013; v1 submitted 8 March, 2013; originally announced March 2013.

    Comments: Version 2 contains substantial improvements and extensions to the previous version. We describe a new, more robust algorithm and achieve significantly improved experimental results

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33(10): 1476-1489, 2014

  35. Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search

    Authors: Thijs Laarhoven, Michele Mosca, Joop van de Pol

    Abstract: By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehlé, we obtain improved asymptotic quantum results for solving the shortest vector problem. With quantum computers we can provably find a shortest vector in time $2^{1.799n + o(n)}$, improving upon the classical time complexity of… ▽ More

    Submitted 25 January, 2013; originally announced January 2013.

    Comments: 19 pages

    Journal ref: 5th International Workshop on Post-Quantum Cryptography (PQCrypto), pp. 83-101, 2013

  36. Practical approximation of single-qubit unitaries by single-qubit quantum Clifford and T circuits

    Authors: Vadym Kliuchnikov, Dmitri Maslov, Michele Mosca

    Abstract: We present an algorithm, along with its implementation that finds T-optimal approximations of single-qubit Z-rotations using quantum circuits consisting of Clifford and T gates. Our algorithm is capable of handling errors in approximation down to size $10^{-15}$, resulting in optimal single-qubit circuit designs required for implementation of scalable quantum algorithms. Our implementation along w… ▽ More

    Submitted 13 March, 2014; v1 submitted 31 December, 2012; originally announced December 2012.

    Comments: 11 pages, 9 figures

    Journal ref: IEEE Transactions on Computers, vol.65, no. 1, pp. 161-172, Jan. 2016

  37. Asymptotically optimal approximation of single qubit unitaries by Clifford and T circuits using a constant number of ancillary qubits

    Authors: Vadym Kliuchnikov, Dmitri Maslov, Michele Mosca

    Abstract: We present an algorithm for building a circuit that approximates single qubit unitaries with precision ε using O(log(1/ε)) Clifford and T gates and employing up to two ancillary qubits. The algorithm for computing our approximating circuit requires an average of O(log^2(1/ε)log log(1/ε)) operations. We prove that the number of gates in our circuit saturates the lower bound on the number of gates r… ▽ More

    Submitted 6 December, 2012; v1 submitted 4 December, 2012; originally announced December 2012.

    Journal ref: Phys. Rev. Lett. 110, 190502 (2013)

  38. arXiv:1206.6150  [pdf, ps, other

    quant-ph

    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

    Authors: Michele Mosca, Douglas Stebila, Berkant Ustaoglu

    Abstract: Key establishment is a crucial primitive for building secure channels: in a multi-party setting, it allows two parties using only public authenticated communication to establish a secret session key which can be used to encrypt messages. But if the session key is compromised, the confidentiality of encrypted messages is typically compromised as well. Without quantum mechanics, key establishment ca… ▽ More

    Submitted 26 June, 2012; originally announced June 2012.

    Comments: 17 pages

    MSC Class: 81P94; 94A60 ACM Class: E.3

  39. arXiv:1206.5236  [pdf, other

    quant-ph cs.ET

    Fast and efficient exact synthesis of single qubit unitaries generated by Clifford and T gates

    Authors: Vadym Kliuchnikov, Dmitri Maslov, Michele Mosca

    Abstract: In this paper, we show the equivalence of the set of unitaries computable by the circuits over the Clifford and T library and the set of unitaries over the ring $\mathbb{Z}[\frac{1}{\sqrt{2}},i]$, in the single-qubit case. We report an efficient synthesis algorithm, with an exact optimality guarantee on the number of Hadamard and T gates used. We conjecture that the equivalence of the sets of unit… ▽ More

    Submitted 27 February, 2013; v1 submitted 22 June, 2012; originally announced June 2012.

    Comments: 23 pages, 3 figures, added the proof of T-optimality of the circuits synthesized by Algorithm 1

    Journal ref: Quantum Information and Computation, Vol. 13, No. 7,8 pp. 607-630 (2013)

  40. A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits

    Authors: Matthew Amy, Dmitri Maslov, Michele Mosca, Martin Roetteler

    Abstract: We present an algorithm for computing depth-optimal decompositions of logical operations, leveraging a meet-in-the-middle technique to provide a significant speed-up over simple brute force algorithms. As an illustration of our method we implemented this algorithm and found factorizations of the commonly used quantum logical operations into elementary gates in the Clifford+T set. In particular, we… ▽ More

    Submitted 25 January, 2013; v1 submitted 4 June, 2012; originally announced June 2012.

    Comments: 23 pages, 15 figures, 1 table; To appear in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 32(6): 818-830, 2013

  41. arXiv:1109.3235  [pdf, ps, other

    quant-ph

    A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys

    Authors: Lawrence M. Ioannou, Michele Mosca

    Abstract: We give new arguments in support of \emph{signed quantum key establishment}, where quantum cryptography is used in a public-key infrastructure that provides the required authentication. We also analyze more thoroughly than previous works the benefits that quantum key establishment protocols have over certain classical protocols, motivated in part by the various objections to quantum key establishm… ▽ More

    Submitted 14 September, 2011; originally announced September 2011.

    Comments: To appear in Proceedings of the Fourth International Conference on Post-Quantum Cryptography (PQCrypto 2011)

    Journal ref: in Proceedings of the Fourth International Conference on Post-Quantum Cryptography (PQCrypto 2011), Lecture Notes in Computer Science, Vol. 7071, pp. 255-274, Springer, 2011

  42. arXiv:1108.2887  [pdf, ps, other

    quant-ph

    Unconditionally-secure and reusable public-key authentication

    Authors: Lawrence M. Ioannou, Michele Mosca

    Abstract: We present a quantum-public-key identification protocol and show that it is secure against a computationally-unbounded adversary. This demonstrates for the first time that unconditionally-secure and reusable public-key authentication is possible in principle with (pure-state) public keys.

    Submitted 14 August, 2011; originally announced August 2011.

    Comments: to appear in Proceedings of the 6th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2011)

  43. Generalized self-testing and the security of the 6-state protocol

    Authors: Matthew McKague, Michele Mosca

    Abstract: Self-tested quantum information processing provides a means for doing useful information processing with untrusted quantum apparatus. Previous work was limited to performing computations and protocols in real Hilbert spaces, which is not a serious obstacle if one is only interested in final measurement statistics being correct (for example, getting the correct factors of a large number after runni… ▽ More

    Submitted 1 June, 2010; originally announced June 2010.

    Comments: To appear in proceedings of TQC 2010

  44. arXiv:1001.0767  [pdf, other

    quant-ph

    Algorithms for Quantum Computers

    Authors: Jamie Smith, Michele Mosca

    Abstract: This paper surveys the field of quantum computer algorithms. It gives a taste of both the breadth and the depth of the known algorithms for quantum computers, focusing on some of the more recent results. It begins with a brief review of quantum Fourier transform based algorithms, followed by quantum searching and some of its early generalizations. It continues with a more in-depth description of… ▽ More

    Submitted 7 January, 2010; v1 submitted 5 January, 2010; originally announced January 2010.

    Comments: 48 pages. Part of the "Handbook of Natural Computing," upcoming from Springer Verlag. Corrected and updated author details and acknowledgments

  45. arXiv:0911.1295  [pdf, ps, other

    quant-ph

    Quantum Coins

    Authors: Michele Mosca, Douglas Stebila

    Abstract: One of the earliest cryptographic applications of quantum information was to create quantum digital cash that could not be counterfeited. In this paper, we describe a new type of quantum money: quantum coins, where all coins of the same denomination are represented by identical quantum states. We state desirable security properties such as anonymity and unforgeability and propose two candidate q… ▽ More

    Submitted 6 November, 2009; originally announced November 2009.

    Comments: 12 pages, 4 figures

    Journal ref: Error-Correcting Codes, Finite Geometries and Cryptography. Contemporary Mathematics, volume 523, pages 35-47. American Mathematical Society, 2010

  46. arXiv:0905.3413  [pdf, ps, other

    quant-ph cond-mat.other

    Interacting boson problems are QMA-hard

    Authors: Tzu-Chieh Wei, Michele Mosca, Ashwin Nayak

    Abstract: Computing the ground-state energy of interacting electron (fermion) problems has recently been shown to be hard for QMA, a quantum analogue of the complexity class NP. Fermionic problems are usually hard, a phenomenon widely attributed to the so-called sign problem occurring in Quantum Monte Carlo simulations. The corresponding bosonic problems are, according to conventional wisdom, tractable. H… ▽ More

    Submitted 20 May, 2009; originally announced May 2009.

    Comments: 4 pages, comments welcome

    Journal ref: Phys. Rev. Lett. 104, 040501 (2010)

  47. arXiv:0903.5156  [pdf, ps, other

    quant-ph

    Public-key cryptography based on bounded quantum reference frames

    Authors: Lawrence M. Ioannou, Michele Mosca

    Abstract: We demonstrate that the framework of bounded quantum reference frames has application to building quantum-public-key cryptographic protocols and proving their security. Thus, the framework we introduce can be seen as a public-key analogue of the framework of Bartlett et al. (Phys. Rev. A 70, 032307), where a private shared reference frame is shown to have cryptographic application. The protocol we… ▽ More

    Submitted 14 August, 2011; v1 submitted 30 March, 2009; originally announced March 2009.

    Comments: v3: added proof that individual attacks on protocol rounds are sufficient; to appear in Theoretical Computer Science (special issue on QKD)

  48. The Case for Quantum Key Distribution

    Authors: Douglas Stebila, Michele Mosca, Norbert Lütkenhaus

    Abstract: Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of e… ▽ More

    Submitted 2 December, 2009; v1 submitted 17 February, 2009; originally announced February 2009.

    Comments: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009 Workshop on Quantum and Classical Information Security; version 2 minor content revisions

    Journal ref: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, volume 36, page 283--296. Springer, 2010.

  49. Efficient discrete-time simulations of continuous-time quantum query algorithms

    Authors: R. Cleve, D. Gottesman, M. Mosca, R. D. Somma, D. L. Yonge-Mallo

    Abstract: The continuous-time query model is a variant of the discrete query model in which queries can be interleaved with known operations (called "driving operations") continuously in time. Interesting algorithms have been discovered in this model, such as an algorithm for evaluating nand trees more efficiently than any classical algorithm. Subsequent work has shown that there also exists an efficient… ▽ More

    Submitted 26 November, 2008; originally announced November 2008.

    Comments: 12 pages, 6 figs

    Journal ref: Proc. 41st Ann. Symp. on Theory of Computing, 409-416 (2009)

  50. Approximating Fractional Time Quantum Evolution

    Authors: L. Sheridan, D. Maslov, M. Mosca

    Abstract: An algorithm is presented for approximating arbitrary powers of a black box unitary operation, $\mathcal{U}^t$, where $t$ is a real number, and $\mathcal{U}$ is a black box implementing an unknown unitary. The complexity of this algorithm is calculated in terms of the number of calls to the black box, the errors in the approximation, and a certain `gap' parameter. For general $\mathcal{U}$ and l… ▽ More

    Submitted 23 April, 2009; v1 submitted 21 October, 2008; originally announced October 2008.

    Comments: 13 pages, 2 figures

    Journal ref: J. Phys. A: Math. Theor. 42 (2009) 185302