-
A Quantum Algorithm for Assessing Node Importance in the st-Connectivity Attack
Authors:
Iain Burge,
Michel Barbeau,
Joaquin Garcia-Alfaro
Abstract:
Problems in distributed security often naturally map to graphs. The centrality of nodes assesses the importance of nodes in a graph. It is used in various applications. Cooperative game theory has been used to create nuanced and flexible notions of node centrality. However, the approach is often computationally complex to implement classically. This work describes a quantum approach to approximati…
▽ More
Problems in distributed security often naturally map to graphs. The centrality of nodes assesses the importance of nodes in a graph. It is used in various applications. Cooperative game theory has been used to create nuanced and flexible notions of node centrality. However, the approach is often computationally complex to implement classically. This work describes a quantum approach to approximating the importance of nodes that maintain a target connection. In addition, we detail a method for quickly identifying high-importance nodes. The approximation method relies on quantum subroutines for st-connectivity and approximating Shapley values. The search for important nodes relies on a quantum algorithm to find the maximum. We consider st-connectivity attack scenarios in which a malicious actor disrupts a subset of nodes to perturb the system functionality. Our methods identify the nodes that are most important in minimizing the impact of the attack. The node centrality metric identifies where more redundancy is required and can be used to enhance network resiliency. Finally, we explore the potential complexity benefits of our quantum approach in contrast to classical random sampling.
△ Less
Submitted 20 March, 2025; v1 submitted 1 February, 2025;
originally announced February 2025.
-
A Shapley Value Estimation Speedup for Efficient Explainable Quantum AI
Authors:
Iain Burge,
Michel Barbeau,
Joaquin Garcia-Alfaro
Abstract:
This work focuses on developing efficient post-hoc explanations for quantum AI algorithms. In classical contexts, the cooperative game theory concept of the Shapley value adapts naturally to post-hoc explanations, where it can be used to identify which factors are important in an AI's decision-making process. An interesting question is how to translate Shapley values to the quantum setting and whe…
▽ More
This work focuses on developing efficient post-hoc explanations for quantum AI algorithms. In classical contexts, the cooperative game theory concept of the Shapley value adapts naturally to post-hoc explanations, where it can be used to identify which factors are important in an AI's decision-making process. An interesting question is how to translate Shapley values to the quantum setting and whether quantum effects could be used to accelerate their calculation. We propose quantum algorithms that can extract Shapley values within some confidence interval. Our method is capable of quadratically outperforming classical Monte Carlo approaches to approximating Shapley values up to polylogarithmic factors in various circumstances. We demonstrate the validity of our approach empirically with specific voting games and provide rigorous proofs of performance for general cooperative games.
△ Less
Submitted 17 April, 2025; v1 submitted 19 December, 2024;
originally announced December 2024.
-
Quantum CORDIC -- Arcsin on a Budget
Authors:
Iain Burge,
Michel Barbeau,
Joaquin Garcia-Alfaro
Abstract:
This work introduces a quantum algorithm for computing the arcsine function to an arbitrary accuracy. We leverage a technique from embedded computing and field-programmable gate array (FPGA), called COordinate Rotation DIgital Computer (CORDIC). CORDIC is a family of iterative algorithms that, in a classical context, can approximate various trigonometric, hyperbolic, and elementary functions using…
▽ More
This work introduces a quantum algorithm for computing the arcsine function to an arbitrary accuracy. We leverage a technique from embedded computing and field-programmable gate array (FPGA), called COordinate Rotation DIgital Computer (CORDIC). CORDIC is a family of iterative algorithms that, in a classical context, can approximate various trigonometric, hyperbolic, and elementary functions using only bit shifts and additions. Adapting CORDIC to the quantum context is non-trivial, as the algorithm traditionally uses several non-reversible operations. We detail a method for CORDIC which avoids such non-reversible operations. We propose multiple approaches to calculate the arcsine function reversibly with CORDIC. For n bits of precision, our method has space complexity of order n qubits, a layer count in the order of n times log n, and a CNOT count in the order of n squared. This primitive function is a required step for the Harrow-Hassidim-Lloyd (HHL) algorithm, is necessary for quantum digital-to-analog conversion, can simplify a quantum speed-up for Monte-Carlo methods, and has direct applications in the quantum estimation of Shapley values.
△ Less
Submitted 2 November, 2024;
originally announced November 2024.
-
Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks
Authors:
Michel Barbeau,
Joaquin Garcia-Alfaro,
Evangelos Kranakis
Abstract:
Entanglement distribution is a core mechanism for the future quantum Internet. The quantum world is, however, a faulty environment. Hence, successful entanglement swapping is error-prone. The occurrence of quantum state errors can be mitigated using purification and error correction, which can be repeated in the former case and concatenated in the latter case. Repeated purification merges low-fide…
▽ More
Entanglement distribution is a core mechanism for the future quantum Internet. The quantum world is, however, a faulty environment. Hence, successful entanglement swapping is error-prone. The occurrence of quantum state errors can be mitigated using purification and error correction, which can be repeated in the former case and concatenated in the latter case. Repeated purification merges low-fidelity qubits into higher-quality ones, while concatenated error correction builds upon the redundancy of quantum information. In this article, we study in-depth and compare the two options: repeated purification and concatenated error correction. We consider using repeated purification and concatenated error correction to mitigate the presence of faults that occur during the establishment of Bell pairs between remote network nodes. We compare their performance versus the number of repetitions or concatenations, to reach a certain level of fidelity in quantum networks. We study their resource requirements, namely, their work memory complexity (e.g., number of stored qubits) and operational complexity (e.g., number of operations). Our analysis demonstrates that concatenated error correction, versus repeated purification, requires fewer iterations and has lower operational complexity than repeated purification to reach high fidelity at the expense of increased memory requirements.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Keyless Semi-Quantum Point-to-point Communication Protocol with Low Resource Requirements
Authors:
Haoye Lu,
Michel Barbeau,
Amiya Nayak
Abstract:
Full quantum capability devices can provide secure communications, but they are challenging to make portable given the current technology. Besides, classical portable devices are unable to construct communication channels resistant to quantum computers. Hence, communication security on portable devices cannot be guaranteed. Semi-Quantum Communication (SQC) attempts to break the quandary by lowerin…
▽ More
Full quantum capability devices can provide secure communications, but they are challenging to make portable given the current technology. Besides, classical portable devices are unable to construct communication channels resistant to quantum computers. Hence, communication security on portable devices cannot be guaranteed. Semi-Quantum Communication (SQC) attempts to break the quandary by lowering the receiver's required quantum capability so that secure communications can be implemented on a portable device. However, all SQC protocols have low qubit efficiency and complex hardware implementations. The protocols involving quantum entanglement require linear Entanglement Preservation Time (EPT) and linear quregister size. In this paper, we propose two new keyless SQC protocols that address the aforementioned weaknesses. They are named Economic Keyless Semi-Quantum Point-to-point Communication (EKSQPC) and Rate Estimation EKSQPC (REKSQPC). They achieve theoretically constant minimal EPT and quregister size, regardless of message length. We show that the new protocols, with low overhead, can detect Measure and Replay Attacks (MRAs). REKSQDC is tolerant to transmission impairments and environmental perturbations. The protocols are based on a new quantum message transmission operation termed Tele-Fetch. Like QKD, their strength depends on physical principles rather than mathematical complexity.
△ Less
Submitted 3 December, 2018; v1 submitted 15 October, 2018;
originally announced October 2018.
-
Quantum Computing Assisted Medium Access Control for Multiple Client Station Networks
Authors:
Michel Barbeau,
Steve R. Cloutier,
Joaquin Garcia-Alfaro
Abstract:
A medium access control protocol based on quantum entanglement has been introduced by Berces and Imre (2006) and Van Meter (2012). This protocol entirely avoids collisions. It is assumed that the network consists of one access point and two client stations. We extend this scheme to a network with an arbitrary number of client stations. We propose three approaches, namely, the qubit distribution, t…
▽ More
A medium access control protocol based on quantum entanglement has been introduced by Berces and Imre (2006) and Van Meter (2012). This protocol entirely avoids collisions. It is assumed that the network consists of one access point and two client stations. We extend this scheme to a network with an arbitrary number of client stations. We propose three approaches, namely, the qubit distribution, transmit first election and temporal ordering protocols. The qubit distribution protocol leverages the concepts of Bell-EPR pair or W state triad. It works for networks of up to four CSs. With up to three CSs, there is no probability of collision. In a four-CS network, there is a low probability of collision. The transmit first election protocol and temporal ordering protocols work for a network with any number of CSs. The transmit first election builds upon the concept of W state of size corresponding to the number of client stations. It is fair and collision free. The temporal ordering protocol employs the concepts of Lehmer code and quantum oracle. It is collision free, has a normalized throughput of 100% and achieves quasi-fairness.
△ Less
Submitted 1 July, 2015;
originally announced July 2015.