Skip to main content

Showing 1–9 of 9 results for author: Movassagh, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.18928  [pdf, other

    quant-ph cs.CR

    Quantum function secret sharing

    Authors: Alex B. Grilo, Ramis Movassagh

    Abstract: We propose a quantum function secret sharing scheme in which the communication is exclusively classical. In this primitive, a classical dealer distributes a secret quantum circuit $C$ by providing shares to $p$ quantum parties. The parties on an input state $|ψ\rangle$ and a projection $Π$, compute values $y_i$ that they then classically communicate back to the dealer, who can then compute… ▽ More

    Submitted 31 January, 2025; originally announced January 2025.

    Comments: 15 pages + references

  2. arXiv:2411.03305  [pdf, ps, other

    quant-ph cs.CR

    Quantum One-Time Protection of any Randomized Algorithm

    Authors: Sam Gunn, Ramis Movassagh

    Abstract: The meteoric rise in power and popularity of machine learning models dependent on valuable training data has reignited a basic tension between the power of running a program locally and the risk of exposing details of that program to the user. At the same time, fundamental properties of quantum states offer new solutions to data and program security that can require strikingly few quantum resource… ▽ More

    Submitted 30 December, 2024; v1 submitted 5 November, 2024; originally announced November 2024.

    Comments: Update: Resolved a bug where we used an insufficiently-strong definition of one-time authentication. See the remark on page 4

  3. arXiv:2401.06300  [pdf, other

    quant-ph cond-mat.dis-nn cs.AI cs.LG

    Advantage of Quantum Neural Networks as Quantum Information Decoders

    Authors: Weishun Zhong, Oles Shtanko, Ramis Movassagh

    Abstract: A promising strategy to protect quantum information from noise-induced errors is to encode it into the low-energy states of a topological quantum memory device. However, readout errors from such memory under realistic settings is less understood. We study the problem of decoding quantum information encoded in the groundspaces of topological stabilizer Hamiltonians in the presence of generic pertur… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 25 pages, 5 figures

  4. arXiv:2305.13362  [pdf, other

    quant-ph cs.LG

    On quantum backpropagation, information reuse, and cheating measurement collapse

    Authors: Amira Abbas, Robbie King, Hsin-Yuan Huang, William J. Huggins, Ramis Movassagh, Dar Gilboa, Jarrod R. McClean

    Abstract: The success of modern deep learning hinges on the ability to train neural networks at scale. Through clever reuse of intermediate information, backpropagation facilitates training through gradient computation at a total cost roughly proportional to running the function, rather than incurring an additional factor proportional to the number of parameters - which can now be in the trillions. Naively,… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 29 pages, 2 figures

    Journal ref: Advances in Neural Information Processing Systems 36 (2024)

  5. arXiv:2205.04535  [pdf, other

    math.PR cs.DM math.CO quant-ph

    Repeated Averages on Graphs

    Authors: Ramis Movassagh, Mario Szegedy, Guanyang Wang

    Abstract: Sourav Chatterjee, Persi Diaconis, Allan Sly and Lingfu Zhang, prompted by a question of Ramis Movassagh, renewed the study of a process proposed in the early 1980s by Jean Bourgain. A state vector $v \in \mathbb R^n$, labeled with the vertices of a connected graph, $G$, changes in discrete time steps following the simple rule that at each step a random edge $(i,j)$ is picked and $v_i$ and $v_j$ a… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

    Comments: 39 pages, 8 figures, comments are welcome!

  6. Quantum Merkle Trees

    Authors: Lijie Chen, Ramis Movassagh

    Abstract: Committing to information is a central task in cryptography, where a party (typically called a prover) stores a piece of information (e.g., a bit string) with the promise of not changing it. This information can be accessed by another party (typically called the verifier), who can later learn the information and verify that it was not meddled with. Merkle trees are a well-known construction for do… ▽ More

    Submitted 14 June, 2024; v1 submitted 28 December, 2021; originally announced December 2021.

    Journal ref: Quantum 8, 1380 (2024)

  7. Classical algorithms for quantum mean values

    Authors: Sergey Bravyi, David Gosset, Ramis Movassagh

    Abstract: We consider the task of estimating the expectation value of an $n$-qubit tensor product observable $O_1\otimes O_2\otimes \cdots \otimes O_n$ in the output state of a shallow quantum circuit. This task is a cornerstone of variational quantum algorithms for optimization, machine learning, and the simulation of quantum many-body systems. Here we study its computational complexity for constant-depth… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

    Journal ref: Nature Physics (2021)

  8. arXiv:1909.06210  [pdf, other

    quant-ph cond-mat.str-el cs.CC hep-th math-ph

    Quantum supremacy and random circuits

    Authors: Ramis Movassagh

    Abstract: As Moore's law reaches its limits, quantum computers are emerging with the promise of dramatically outperforming classical computers. We have witnessed the advent of quantum processors with over $50$ quantum bits (qubits), which are expected to be beyond the reach of classical simulation. Quantum supremacy is the event at which the old Extended Church-Turing Thesis is overturned: A quantum compute… ▽ More

    Submitted 9 November, 2020; v1 submitted 11 September, 2019; originally announced September 2019.

    Comments: 27 pages. 8 Figures Former title, "Cayley path and quantum computational supremacy: A proof of average-case $\#P-$hardness of Random Circuit Sampling with quantified robustness"

  9. arXiv:1808.02046  [pdf, other

    cs.SI cond-mat.dis-nn physics.soc-ph

    Directed Random Geometric Graphs

    Authors: Jesse Michel, Sushruth Reddy, Rikhav Shah, Sandeep Silwal, Ramis Movassagh

    Abstract: Many real-world networks are intrinsically directed. Such networks include activation of genes, hyperlinks on the internet, and the network of followers on Twitter among many others. The challenge, however, is to create a network model that has many of the properties of real-world networks such as powerlaw degree distributions and the small-world property. To meet these challenges, we introduce th… ▽ More

    Submitted 6 August, 2018; originally announced August 2018.

    Comments: 14+5 pages, 5 figures, 3 tables

    Journal ref: Journal of Complex Networks, Volume 7, Issue 5, October 2019, Pages 792-816,