Skip to main content

Showing 1–20 of 20 results for author: Doosti, M

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2504.17612  [pdf, other

    quant-ph

    Selectively Blind Quantum Computation

    Authors: Abbas Poshtvan, Oleksandra Lapiha, Mina Doosti, Dominik Leichtle, Luka Music, Elham Kashefi

    Abstract: Known protocols for secure delegation of quantum computations from a client to a server in an information theoretic setting require quantum communication. In this work, we investigate methods to reduce communication overhead. First, we establish an impossibility result by proving that server-side local processes cannot decrease quantum communication requirements of secure delegation protocols. We… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

  2. arXiv:2504.11552  [pdf, other

    quant-ph

    Hybrid Authentication Protocols for Advanced Quantum Networks

    Authors: Suchetana Goswami, Mina Doosti, Elham Kashefi

    Abstract: Authentication is a fundamental building block of secure quantum networks, essential for quantum cryptographic protocols and often debated as a key limitation of quantum key distribution (QKD) in security standards. Most quantum-safe authentication schemes rely on small pre-shared keys or post-quantum computational assumptions. In this work, we introduce a new authentication approach that combines… ▽ More

    Submitted 15 April, 2025; originally announced April 2025.

    Comments: 15 Pages, 3 Figures, Comments are welcome!

  3. arXiv:2410.11957  [pdf, other

    quant-ph cs.LG

    Agnostic Process Tomography

    Authors: Chirag Wadhwa, Laura Lewis, Elham Kashefi, Mina Doosti

    Abstract: Characterizing a quantum system by learning its state or evolution is a fundamental problem in quantum physics and learning theory with a myriad of applications. Recently, as a new approach to this problem, the task of agnostic state tomography was defined, in which one aims to approximate an arbitrary quantum state by a simpler one in a given class. Generalizing this notion to quantum processes,… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

    Comments: 11+52 pages, 2 figures, 1 table

  4. arXiv:2407.12618  [pdf, ps, other

    quant-ph cs.CE

    A Brief Review of Quantum Machine Learning for Financial Services

    Authors: Mina Doosti, Petros Wallden, Conor Brian Hamill, Robert Hankache, Oliver Thomson Brown, Chris Heunen

    Abstract: This review paper examines state-of-the-art algorithms and techniques in quantum machine learning with potential applications in finance. We discuss QML techniques in supervised learning tasks, such as Quantum Variational Classifiers, Quantum Kernel Estimation, and Quantum Neural Networks (QNNs), along with quantum generative AI techniques like Quantum Transformers and Quantum Graph Neural Network… ▽ More

    Submitted 17 July, 2024; originally announced July 2024.

    Comments: 19 pages

  5. arXiv:2407.06026  [pdf, other

    quant-ph

    Variational quantum cloning machine on a photonic integrated interferometer

    Authors: Francesco Hoch, Giovanni Rodari, Eugenio Caruccio, Beatrice Polacchi, Gonzalo Carvacho, Taira Giordani, Mina Doosti, Sebastià Nicolau, Ciro Pentangelo, Simone Piacentini, Andrea Crespi, Francesco Ceccarelli, Roberto Osellame, Ernesto F. Galvão, Nicolò Spagnolo, Fabio Sciarrino

    Abstract: A seminal task in quantum information theory is to realize a device able to produce copies of a generic input state with the highest possible output fidelity, thus realizing an \textit{optimal} quantum cloning machine. Recently, the concept of variational quantum cloning was introduced: a quantum machine learning algorithm through which, by exploiting a classical feedback loop informed by the outp… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

    Comments: 9 pages, 4 figures

  6. arXiv:2406.19382  [pdf, ps, other

    quant-ph

    Characterizing Contextuality via Rank Separation with Applications to Cloning

    Authors: Farid Shahandeh, Theodoros Yianni, Mina Doosti

    Abstract: Quantum contextuality is a key nonclassical feature essential for understanding advantages in quantum computation and communication. We introduce a new framework to study contextuality based solely on information processing statistics. This simple and intuitive perspective leads to a powerful criterion denoted as rank separation for identifying contextuality in various quantum scenarios. We showca… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: 7 pages, comments are encouraged

  7. arXiv:2405.12085  [pdf, other

    quant-ph cs.CC cs.CR cs.LG

    Noise-tolerant learnability of shallow quantum circuits from statistics and the cost of quantum pseudorandomness

    Authors: Chirag Wadhwa, Mina Doosti

    Abstract: In this work, we study the learnability of quantum circuits in the near term. We demonstrate the natural robustness of quantum statistical queries for learning quantum processes, motivating their use as a theoretical tool for near-term learning problems. We adapt a learning algorithm for constant-depth quantum circuits to the quantum statistical query setting, and show that such circuits can be le… ▽ More

    Submitted 27 April, 2025; v1 submitted 20 May, 2024; originally announced May 2024.

    Comments: 20+7 pages, 1 figure, 1 table. v3: Improved presentation

  8. arXiv:2310.12780  [pdf, other

    quant-ph

    Towards a Unified Quantum Protocol Framework: Classification, Implementation, and Use Cases

    Authors: Shraddha Singh, Mina Doosti, Natansh Mathur, Mahshid Delavar, Atul Mantri, Harold Ollivier, Elham Kashefi

    Abstract: We present a framework for the unification and standardization of quantum network protocols, making their realization easier and expanding their use cases to a broader range of communities interested in quantum technologies. Our framework is available as an open-source repository, the Quantum Protocol Zoo. We follow a modular approach by identifying two key components: Functionality, which connect… ▽ More

    Submitted 2 December, 2023; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: 12 pages, 6 figures

  9. arXiv:2310.02075  [pdf, other

    quant-ph cs.CC cs.LG

    Learning Quantum Processes with Quantum Statistical Queries

    Authors: Chirag Wadhwa, Mina Doosti

    Abstract: In this work, we initiate the study of learning quantum processes from quantum statistical queries. We focus on two fundamental learning tasks in this new access model: shadow tomography of quantum processes and process tomography with respect to diamond distance. For the former, we present an efficient average-case algorithm along with a nearly matching lower bound with respect to the number of o… ▽ More

    Submitted 5 May, 2025; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: 32 pages, 2 figures. Corrected proofs and improved presentation. Accepted in Quantum

    Journal ref: Quantum 9, 1739 (2025)

  10. arXiv:2307.04733  [pdf, other

    quant-ph cs.CR cs.IT cs.LG

    A unifying framework for differentially private quantum algorithms

    Authors: Armando Angrisani, Mina Doosti, Elham Kashefi

    Abstract: Differential privacy is a widely used notion of security that enables the processing of sensitive information. In short, differentially private algorithms map "neighbouring" inputs to close output distributions. Prior work proposed several quantum extensions of differential privacy, each of them built on substantially different notions of neighbouring quantum states. In this paper, we propose a no… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: This articles supersedes arXiv:2203.03604

  11. arXiv:2304.01881  [pdf, other

    quant-ph cs.CR

    Establishing shared secret keys on quantum line networks: protocol and security

    Authors: Mina Doosti, Lucas Hanouz, Anne Marin, Elham Kashefi, Marc Kaplan

    Abstract: We show the security of multi-user key establishment on a single line of quantum communication. More precisely, we consider a quantum communication architecture where the qubit generation and measurement happen at the two ends of the line, whilst intermediate parties are limited to single-qubit unitary transforms. This network topology has been previously introduced to implement quantum-assisted s… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Comments: 23 pages, 4 figures, comments are welcome

  12. arXiv:2210.17545  [pdf, other

    quant-ph cs.CR cs.LG

    Unclonability and Quantum Cryptanalysis: From Foundations to Applications

    Authors: Mina Doosti

    Abstract: The impossibility of creating perfect identical copies of unknown quantum systems is a fundamental concept in quantum theory and one of the main non-classical properties of quantum information. This limitation imposed by quantum mechanics, famously known as the no-cloning theorem, has played a central role in quantum cryptography as a key component in the security of quantum protocols. In this the… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

    Comments: PhD Thesis. Defended 17th August 2022, University of Edinburgh

  13. arXiv:2203.03604  [pdf, ps, other

    quant-ph cs.CR cs.DS cs.LG

    Differential Privacy Amplification in Quantum and Quantum-inspired Algorithms

    Authors: Armando Angrisani, Mina Doosti, Elham Kashefi

    Abstract: Differential privacy provides a theoretical framework for processing a dataset about $n$ users, in a way that the output reveals a minimal information about any single user. Such notion of privacy is usually ensured by noise-adding mechanisms and amplified by several processes, including subsampling, shuffling, iteration, mixing and diffusion. In this work, we provide privacy amplification bounds… ▽ More

    Submitted 21 August, 2023; v1 submitted 7 March, 2022; originally announced March 2022.

    Comments: This article is superseded by arXiv:2307.04733

  14. arXiv:2110.11724  [pdf, other

    quant-ph cs.CR

    On the Connection Between Quantum Pseudorandomness and Quantum Hardware Assumptions

    Authors: Mina Doosti, Niraj Kumar, Elham Kashefi, Kaushik Chakraborty

    Abstract: This paper, for the first time, addresses the questions related to the connections between the quantum pseudorandomness and quantum hardware assumptions, specifically quantum physical unclonable functions (qPUFs). Our results show that the efficient pseudorandom quantum states (PRS) are sufficient to construct the challenge set for the universally unforgeable qPUF, improving the previous existing… ▽ More

    Submitted 30 March, 2022; v1 submitted 22 October, 2021; originally announced October 2021.

    Comments: 33 pages, 4 figures

  15. Quantum Lock: A Provable Quantum Communication Advantage

    Authors: Kaushik Chakraborty, Mina Doosti, Yao Ma, Chirag Wadhwa, Myrto Arapinis, Elham Kashefi

    Abstract: Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. Gao et al. discussed the vulnerability of most current-day PUFs to sophisticated machine learning-based attacks. We address this problem by integrating classical PUFs and existing quantum communication technology. Specifically, this paper proposes a generic design o… ▽ More

    Submitted 12 May, 2023; v1 submitted 18 October, 2021; originally announced October 2021.

    Comments: 47 pages, 13 figures

    Journal ref: Quantum 7, 1014 (2023)

  16. arXiv:2103.13994  [pdf, other

    quant-ph cs.CR

    A Unified Framework For Quantum Unforgeability

    Authors: Mina Doosti, Mahshid Delavar, Elham Kashefi, Myrto Arapinis

    Abstract: In this paper, we continue the line of work initiated by Boneh and Zhandry at CRYPTO 2013 and EUROCRYPT 2013 in which they formally define the notion of unforgeability against quantum adversaries specifically, for classical message authentication codes and classical digital signatures schemes. We develop a general and parameterised quantum game-based security model unifying unforgeability for both… ▽ More

    Submitted 1 October, 2021; v1 submitted 25 March, 2021; originally announced March 2021.

    Comments: 50 pages, 5 figures

  17. arXiv:2012.11424  [pdf, other

    quant-ph cs.AI cs.CR cs.LG

    Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis

    Authors: Brian Coyle, Mina Doosti, Elham Kashefi, Niraj Kumar

    Abstract: Cryptanalysis on standard quantum cryptographic systems generally involves finding optimal adversarial attack strategies on the underlying protocols. The core principle of modelling quantum attacks in many cases reduces to the adversary's ability to clone unknown quantum states which facilitates the extraction of some meaningful secret information. Explicit optimal attack strategies typically requ… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: 16 pages main text, 25 pages supplementary material, 20 figures. Comments welcome

    Journal ref: Phys. Rev. A 105, 042604, 2022

  18. arXiv:2006.04522  [pdf, other

    quant-ph cs.CR

    Client-Server Identification Protocols with Quantum PUF

    Authors: Mina Doosti, Niraj Kumar, Mahshid Delavar, Elham Kashefi

    Abstract: Recently, major progress has been made towards the realisation of quantum internet to enable a broad range of classically intractable applications. These applications such as delegated quantum computation require running a secure identification protocol between a low-resource and a high-resource party to provide secure communication. In this work, we propose two identification protocols based on t… ▽ More

    Submitted 1 October, 2021; v1 submitted 8 June, 2020; originally announced June 2020.

    Comments: 40 pages, 11 figures

    Journal ref: ACM Transactions on Quantum Computing; Volume 2 Issue 3 September 2021 Article No. 12 pp 1-40

  19. Quantum Physical Unclonable Functions: Possibilities and Impossibilities

    Authors: Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi

    Abstract: A Physical Unclonable Function (PUF) is a device with unique behaviour that is hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF-based applications have been explored theoretically as well as being implemented in practical settings. Recently, the inherent unclonability of quantum states has been exploited to derive the quantum analogue of PUF as well as new pr… ▽ More

    Submitted 2 June, 2021; v1 submitted 4 October, 2019; originally announced October 2019.

    Comments: 32 pages including the appendix

    Journal ref: Quantum 5, 475 (2021)

  20. Universal superposition of arbitrary orthogonal states

    Authors: Mina Doosti, Farzad Kianvash, Vahid Karimipour

    Abstract: It is known that no quantum process can produce a predetermined superposition of unknown arbitrary states. It has already been shown that with some partial information about the states, one can produce with some probability such superpositions. Here we show that there are universal machines which can produce superpositions of unknown orthogonal states with unit probability. Our construction unrave… ▽ More

    Submitted 2 November, 2017; v1 submitted 14 August, 2017; originally announced August 2017.

    Comments: 13 pages, 2 figures, Accepted for publication in Physical Review A

    Journal ref: Phys. Rev. A 96, 052318 (2017)