Skip to main content

Showing 1–50 of 119 results for author: Kashefi, E

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2504.20989  [pdf, other

    quant-ph

    Photonic Quantum Convolutional Neural Networks with Adaptive State Injection

    Authors: Léo Monbroussou, Beatrice Polacchi, Verena Yacoub, Eugenio Caruccio, Giovanni Rodari, Francesco Hoch, Gonzalo Carvacho, Nicolò Spagnolo, Taira Giordani, Mattia Bossi, Abhiram Rajan, Niki Di Giano, Riccardo Albiero, Francesco Ceccarelli, Roberto Osellame, Elham Kashefi, Fabio Sciarrino

    Abstract: Linear optical architectures have been extensively investigated for quantum computing and quantum machine learning applications. Recently, proposals for photonic quantum machine learning have combined linear optics with resource adaptivity, such as adaptive circuit reconfiguration, which promises to enhance expressivity and improve algorithm performances and scalability. Moreover, linear optical p… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

  2. arXiv:2504.17612  [pdf, other

    quant-ph

    Selectively Blind Quantum Computation

    Authors: Abbas Poshtvan, Oleksandra Lapiha, Mina Doosti, Dominik Leichtle, Luka Music, Elham Kashefi

    Abstract: Known protocols for secure delegation of quantum computations from a client to a server in an information theoretic setting require quantum communication. In this work, we investigate methods to reduce communication overhead. First, we establish an impossibility result by proving that server-side local processes cannot decrease quantum communication requirements of secure delegation protocols. We… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

  3. arXiv:2504.11552  [pdf, other

    quant-ph

    Hybrid Authentication Protocols for Advanced Quantum Networks

    Authors: Suchetana Goswami, Mina Doosti, Elham Kashefi

    Abstract: Authentication is a fundamental building block of secure quantum networks, essential for quantum cryptographic protocols and often debated as a key limitation of quantum key distribution (QKD) in security standards. Most quantum-safe authentication schemes rely on small pre-shared keys or post-quantum computational assumptions. In this work, we introduce a new authentication approach that combines… ▽ More

    Submitted 15 April, 2025; originally announced April 2025.

    Comments: 15 Pages, 3 Figures, Comments are welcome!

  4. arXiv:2502.06717  [pdf, other

    quant-ph

    A Review and Collection of Metrics and Benchmarks for Quantum Computers: definitions, methodologies and software

    Authors: Deep Lall, Abhishek Agarwal, Weixi Zhang, Lachlan Lindoy, Tobias Lindström, Stephanie Webster, Simon Hall, Nicholas Chancellor, Petros Wallden, Raul Garcia-Patron, Elham Kashefi, Viv Kendon, Jonathan Pritchard, Alessandro Rossi, Animesh Datta, Theodoros Kapourniotis, Konstantinos Georgopoulos, Ivan Rungger

    Abstract: Quantum computers have the potential to provide an advantage over classical computers in a number of areas. Numerous metrics to benchmark the performance of quantum computers, ranging from their individual hardware components to entire applications, have been proposed over the years. Navigating the resulting extensive literature can be overwhelming. Objective comparisons are further hampered in pr… ▽ More

    Submitted 10 February, 2025; originally announced February 2025.

  5. arXiv:2410.24133  [pdf, other

    quant-ph

    On-Chip Verified Quantum Computation with an Ion-Trap Quantum Processing Unit

    Authors: Cica Gustiani, Dominik Leichtle, Daniel Mills, Jonathan Miller, Ross Grassie, Elham Kashefi

    Abstract: We present and experimentally demonstrate a novel approach to verification and benchmarking of quantum computing, implementing it on an ion-trap quantum computer. Unlike previous information-theoretically secure verification protocols, which typically require quantum communication between client and server, our approach is implemented entirely on-chip. This eliminates the need for a quantum client… ▽ More

    Submitted 3 January, 2025; v1 submitted 31 October, 2024; originally announced October 2024.

    Comments: 17 pages, 7 figures, comments welcome; v2, minor corrections and improvements

  6. arXiv:2410.11957  [pdf, other

    quant-ph cs.LG

    Agnostic Process Tomography

    Authors: Chirag Wadhwa, Laura Lewis, Elham Kashefi, Mina Doosti

    Abstract: Characterizing a quantum system by learning its state or evolution is a fundamental problem in quantum physics and learning theory with a myriad of applications. Recently, as a new approach to this problem, the task of agnostic state tomography was defined, in which one aims to approximate an arbitrary quantum state by a simpler one in a given class. Generalizing this notion to quantum processes,… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

    Comments: 11+52 pages, 2 figures, 1 table

  7. arXiv:2410.07024  [pdf, other

    quant-ph

    On the role of coherence for quantum computational advantage

    Authors: Hugo Thomas, Pierre-Emmanuel Emeriau, Elham Kashefi, Harold Ollivier, Ulysse Chabaud

    Abstract: Quantifying the resources available to a quantum computer appears to be necessary to separate quantum from classical computation. Among them, entanglement, magic and coherence are arguably of great significance. We introduce path coherence as a measure of the coherent paths interferences arising in a quantum computation. Leveraging the sum-over-paths formalism, we obtain a classical algorithm for… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

    Comments: 6 pages, 1 figure, 13 pages of appendix

  8. arXiv:2410.01572  [pdf, other

    quant-ph

    Towards quantum advantage with photonic state injection

    Authors: Léo Monbroussou, Eliott Z. Mamon, Hugo Thomas, Verena Yacoub, Ulysse Chabaud, Elham Kashefi

    Abstract: We propose a new scheme for near-term photonic quantum device that allows to increase the expressive power of the quantum models beyond what linear optics can do. This scheme relies upon state injection, a measurement-based technique that can produce states that are more controllable, and solve learning tasks that are not believed to be tackled classically. We explain how circuits made of linear o… ▽ More

    Submitted 2 October, 2024; originally announced October 2024.

  9. Subspace Preserving Quantum Convolutional Neural Network Architectures

    Authors: Léo Monbroussou, Jonas Landman, Letao Wang, Alex B. Grilo, Elham Kashefi

    Abstract: Subspace preserving quantum circuits are a class of quantum algorithms that, relying on some symmetries in the computation, can offer theoretical guarantees for their training. Those algorithms have gained extensive interest as they can offer polynomial speed-up and can be used to mimic classical machine learning algorithms. In this work, we propose a novel convolutional neural network architectur… ▽ More

    Submitted 27 September, 2024; originally announced September 2024.

    Journal ref: 2025, Quantum Science and Technology, Volume 10, Number 2

  10. arXiv:2407.09310  [pdf, other

    quant-ph

    Experimental verifiable multi-client blind quantum computing on a Qline architecture

    Authors: Beatrice Polacchi, Dominik Leichtle, Gonzalo Carvacho, Giorgio Milani, Nicolò Spagnolo, Marc Kaplan, Elham Kashefi, Fabio Sciarrino

    Abstract: The exploitation of certification tools by end users represents a fundamental aspect of the development of quantum technologies as the hardware scales up beyond the regime of classical simulatability. Certifying quantum networks becomes even more crucial when the privacy of their users is exposed to malicious quantum nodes or servers as in the case of multi-client distributed blind quantum computi… ▽ More

    Submitted 24 July, 2024; v1 submitted 12 July, 2024; originally announced July 2024.

    Comments: Minor changes in the description of the experimental setup

  11. arXiv:2405.05215  [pdf, other

    quant-ph

    Restricted Randomized Benchmarking with Universal Gates of Fixed Sequence Length

    Authors: Mohsen Mehrani, Kasra Masoudi, Rawad Mezher, Elham Kashefi, Debasis Sadhukhan

    Abstract: The standard randomized benchmarking protocol requires access to often complex operations that are not always directly accessible. Compiler optimization does not always ensure equal sequence length of the directly accessible universal gates for each random operation. We introduce a version of the RB protocol that creates Haar-randomness using a directly accessible universal gate set of equal seque… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 13 pages, 11 figures

  12. arXiv:2404.18104  [pdf, other

    quant-ph cs.CC

    The power of shallow-depth Toffoli and qudit quantum circuits

    Authors: Alex Bredariol Grilo, Elham Kashefi, Damian Markham, Michael de Oliveira

    Abstract: The relevance of shallow-depth quantum circuits has recently increased, mainly due to their applicability to near-term devices. In this context, one of the main goals of quantum circuit complexity is to find problems that can be solved by quantum shallow circuits but require more computational resources classically. Our first contribution in this work is to prove new separations between classica… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  13. arXiv:2404.10739  [pdf, other

    quant-ph

    Heuristic-free Verification-inspired Quantum Benchmarking

    Authors: Johannes Frank, Elham Kashefi, Dominik Leichtle, Michael de Oliveira

    Abstract: In this paper, we introduce a new approach to quantum benchmarking inspired by quantum verification motivating new paradigms of quantum benchmarking. Our proposed benchmark not only serves as a robust indicator of computational capability but also offers scalability, customizability, and universality. By providing formal statements regarding the quality of quantum devices while assuming device con… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 19 pages

  14. arXiv:2404.09973  [pdf, other

    quant-ph

    Quantum Error Suppression with Subgroup Stabilisation

    Authors: Bo Yang, Elham Kashefi, Dominik Leichtle, Harold Ollivier

    Abstract: Quantum state purification is the functionality that, given multiple copies of an unknown state, outputs a state with increased purity. This will be an essential building block for near- and middle-term quantum ecosystems before the availability of full fault tolerance, where one may want to suppress errors not only in expectation values but also in quantum states. We propose an effective state pu… ▽ More

    Submitted 13 June, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

    Comments: 32 pages, 14 figures

  15. arXiv:2403.10464  [pdf, other

    quant-ph

    Verification of Quantum Computations without Trusted Preparations or Measurements

    Authors: Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier

    Abstract: With the advent of delegated quantum computing as a service, verifying quantum computations is becoming a question of great importance. Existing information theoretically Secure Delegated Quantum Computing (SDQC) protocols require the client to possess the ability to perform either trusted state preparations or measurements. Whether it is possible to verify universal quantum computations with info… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: 15+12 pages, 4 figures

  16. arXiv:2403.09417  [pdf, other

    quant-ph

    Constrained and Vanishing Expressivity of Quantum Fourier Models

    Authors: Hela Mhiri, Leo Monbroussou, Mario Herrero-Gonzalez, Slimane Thabet, Elham Kashefi, Jonas Landman

    Abstract: In this work, we highlight an unforeseen behavior of the expressivity of Parameterized Quantum Circuits (PQC) for machine learning. A large class of these models, seen as Fourier Series which frequencies are derived from the encoding gates, were thought to have their Fourier coefficients mostly determined by the trainable gates. Here, we demonstrate a new correlation between the Fourier coefficien… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  17. arXiv:2310.12780  [pdf, other

    quant-ph

    Towards a Unified Quantum Protocol Framework: Classification, Implementation, and Use Cases

    Authors: Shraddha Singh, Mina Doosti, Natansh Mathur, Mahshid Delavar, Atul Mantri, Harold Ollivier, Elham Kashefi

    Abstract: We present a framework for the unification and standardization of quantum network protocols, making their realization easier and expanding their use cases to a broader range of communities interested in quantum technologies. Our framework is available as an open-source repository, the Quantum Protocol Zoo. We follow a modular approach by identifying two key components: Functionality, which connect… ▽ More

    Submitted 2 December, 2023; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: 12 pages, 6 figures

  18. Trainability and Expressivity of Hamming-Weight Preserving Quantum Circuits for Machine Learning

    Authors: Léo Monbroussou, Eliott Z. Mamon, Jonas Landman, Alex B. Grilo, Romain Kukla, Elham Kashefi

    Abstract: Quantum machine learning (QML) has become a promising area for real world applications of quantum computers, but near-term methods and their scalability are still important research topics. In this context, we analyze the trainability and controllability of specific Hamming weight preserving variational quantum circuits (VQCs). These circuits use qubit gates that preserve subspaces of the Hilbert… ▽ More

    Submitted 13 May, 2025; v1 submitted 27 September, 2023; originally announced September 2023.

    Journal ref: Quantum 9, 1745 (2025)

  19. arXiv:2307.04733  [pdf, other

    quant-ph cs.CR cs.IT cs.LG

    A unifying framework for differentially private quantum algorithms

    Authors: Armando Angrisani, Mina Doosti, Elham Kashefi

    Abstract: Differential privacy is a widely used notion of security that enables the processing of sensitive information. In short, differentially private algorithms map "neighbouring" inputs to close output distributions. Prior work proposed several quantum extensions of differential privacy, each of them built on substantially different notions of neighbouring quantum states. In this paper, we propose a no… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: This articles supersedes arXiv:2203.03604

  20. arXiv:2306.05195  [pdf, other

    quant-ph

    Multi-client distributed blind quantum computation with the Qline architecture

    Authors: Beatrice Polacchi, Dominik Leichtle, Leonardo Limongi, Gonzalo Carvacho, Giorgio Milani, Nicolò Spagnolo, Marc Kaplan, Fabio Sciarrino, Elham Kashefi

    Abstract: Universal blind quantum computing allows users with minimal quantum resources to delegate a quantum computation to a remote quantum server, while keeping intrinsically hidden input, algorithm, and outcome. State-of-art experimental demonstrations of such a protocol have only involved one client. However, an increasing number of multi-party algorithms, e.g. federated machine learning, require the c… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  21. Error Mitigation of BQP Computations using Measurement-Based Verification

    Authors: Joseph Harris, Elham Kashefi

    Abstract: We present a modular error mitigation protocol for running $\mathsf{BQP}$ computations on a quantum computer with time-dependent noise. Utilising existing tools from quantum verification and measurement-based quantum computation, our protocol interleaves standard computation rounds alongside test rounds for noise sampling and inherits an exponential bound (in the number of circuit runs) on the pro… ▽ More

    Submitted 5 February, 2025; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: 14 pages, 5 figures

    Journal ref: Phys. Rev. A 111, 022602 (2025)

  22. Verifiable blind quantum computing with trapped ions and single photons

    Authors: P. Drmota, D. P. Nadlinger, D. Main, B. C. Nichol, E. M. Ainley, D. Leichtle, A. Mantri, E. Kashefi, R. Srinivas, G. Araneda, C. J. Ballance, D. M. Lucas

    Abstract: We report the first hybrid matter-photon implementation of verifiable blind quantum computing. We use a trapped-ion quantum server and a client-side photonic detection system networked via a fibre-optic quantum link. The availability of memory qubits and deterministic entangling gates enables interactive protocols without post-selection - key requirements for any scalable blind server, which previ… ▽ More

    Submitted 5 April, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

  23. arXiv:2304.01881  [pdf, other

    quant-ph cs.CR

    Establishing shared secret keys on quantum line networks: protocol and security

    Authors: Mina Doosti, Lucas Hanouz, Anne Marin, Elham Kashefi, Marc Kaplan

    Abstract: We show the security of multi-user key establishment on a single line of quantum communication. More precisely, we consider a quantum communication architecture where the qubit generation and measurement happen at the two ends of the line, whilst intermediate parties are limited to single-qubit unitary transforms. This network topology has been previously introduced to implement quantum-assisted s… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Comments: 23 pages, 4 figures, comments are welcome

  24. arXiv:2303.08865  [pdf, other

    quant-ph cs.CR

    Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority

    Authors: Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier

    Abstract: Secure multi-party computation (SMPC) protocols allow several parties that distrust each other to collectively compute a function on their inputs. In this paper, we introduce a protocol that lifts classical SMPC to quantum SMPC in a composably and statistically secure way, even for a single honest party. Unlike previous quantum SMPC protocols, our proposal only requires very limited quantum resour… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 27+10 pages, 5 figures. This work supersedes arXiv:2102.12949

  25. arXiv:2303.02712  [pdf, other

    quant-ph

    Simplifying errors by symmetry and randomisation

    Authors: James Mills, Debasis Sadhukhan, Elham Kashefi

    Abstract: We present a set of methods to generate less complex error channels by quantum circuit parallelisation. The resulting errors are simplified as a consequence of their symmetrisation and randomisation. Initially, the case of a single error channel is analysed; these results are then generalised to multiple error channels. Error simplification for each method is shown to be either constant, linear, o… ▽ More

    Submitted 25 May, 2023; v1 submitted 5 March, 2023; originally announced March 2023.

    Comments: 19 pages, 11 figures, additional numerics for time-dependent error stabilisation, corrected typos, some restructuring

  26. arXiv:2210.13200  [pdf, other

    quant-ph

    Classically Approximating Variational Quantum Machine Learning with Random Fourier Features

    Authors: Jonas Landman, Slimane Thabet, Constantin Dalyac, Hela Mhiri, Elham Kashefi

    Abstract: Many applications of quantum computing in the near term rely on variational quantum circuits (VQCs). They have been showcased as a promising model for reaching a quantum advantage in machine learning with current noisy intermediate scale quantum computers (NISQ). It is often believed that the power of VQCs relies on their exponentially large feature space, and extensive works have explored the exp… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

  27. Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations

    Authors: Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier

    Abstract: With the advent of cloud-based quantum computing, it has become vital to provide strong guarantees that computations delegated by clients to quantum service providers have been executed faithfully. Secure - blind and verifiable - Delegated Quantum Computing (SDQC) has emerged as one of the key approaches to address this challenge, yet current protocols lack at least one of the following three ingr… ▽ More

    Submitted 3 May, 2024; v1 submitted 1 June, 2022; originally announced June 2022.

    Comments: 68 pages, 14 figures. Quantum Sci. Technol (2024)

  28. arXiv:2203.03604  [pdf, ps, other

    quant-ph cs.CR cs.DS cs.LG

    Differential Privacy Amplification in Quantum and Quantum-inspired Algorithms

    Authors: Armando Angrisani, Mina Doosti, Elham Kashefi

    Abstract: Differential privacy provides a theoretical framework for processing a dataset about $n$ users, in a way that the output reveals a minimal information about any single user. Such notion of privacy is usually ensured by noise-adding mechanisms and amplified by several processes, including subsampling, shuffling, iteration, mixing and diffusion. In this work, we provide privacy amplification bounds… ▽ More

    Submitted 21 August, 2023; v1 submitted 7 March, 2022; originally announced March 2022.

    Comments: This article is superseded by arXiv:2307.04733

  29. arXiv:2203.03591  [pdf, ps, other

    quant-ph cs.CR cs.DS cs.LG

    Quantum Local Differential Privacy and Quantum Statistical Query Model

    Authors: Armando Angrisani, Elham Kashefi

    Abstract: Quantum statistical queries provide a theoretical framework for investigating the computational power of a learner with limited quantum resources. This model is particularly relevant in the current context, where available quantum devices are subject to severe noise and have limited quantum memory. On the other hand, the framework of quantum differential privacy demonstrates that noise can, in som… ▽ More

    Submitted 21 August, 2023; v1 submitted 7 March, 2022; originally announced March 2022.

    Comments: This version significantly extends the previous one with new entropic inequalities under local privacy, a private version of the quantum Stein's Lemma and an application to private multi-party quantum computation

  30. arXiv:2112.06841  [pdf, other

    quant-ph cs.CR cs.IT cs.LG

    Probably approximately correct quantum source coding

    Authors: Armando Angrisani, Brian Coyle, Elham Kashefi

    Abstract: Information-theoretic lower bounds are often encountered in several branches of computer science, including learning theory and cryptography. In the quantum setting, Holevo's and Nayak's bounds give an estimate of the amount of classical information that can be stored in a quantum state. Previous works have shown how to combine information-theoretic tools with a counting argument to lower bound th… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: 13 pages, 1 figure

  31. Graph neural network initialisation of quantum approximate optimisation

    Authors: Nishant Jain, Brian Coyle, Elham Kashefi, Niraj Kumar

    Abstract: Approximate combinatorial optimisation has emerged as one of the most promising application areas for quantum computers, particularly those in the near term. In this work, we focus on the quantum approximate optimisation algorithm (QAOA) for solving the MaxCut problem. Specifically, we address two problems in the QAOA, how to initialise the algorithm, and how to subsequently train the parameters t… ▽ More

    Submitted 15 November, 2022; v1 submitted 4 November, 2021; originally announced November 2021.

    Comments: 12 pages, 8 Figures - publised version

    Journal ref: Quantum 6, 861 (2022)

  32. arXiv:2111.02527  [pdf, other

    quant-ph

    Benchmarking of Quantum Protocols

    Authors: Chin-Te Liao, Sima Bahrani, Francisco Ferreira da Silva, Elham Kashefi

    Abstract: Quantum network protocols offer new functionalities such as enhanced security to communication and computational systems. Despite the rapid progress in quantum hardware, it has not yet reached a level of maturity that enables execution of many quantum protocols in practical settings. To develop quantum protocols in real world, it is necessary to examine their performance considering the imperfecti… ▽ More

    Submitted 17 July, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: 16 pages, 7 figures

  33. arXiv:2110.11724  [pdf, other

    quant-ph cs.CR

    On the Connection Between Quantum Pseudorandomness and Quantum Hardware Assumptions

    Authors: Mina Doosti, Niraj Kumar, Elham Kashefi, Kaushik Chakraborty

    Abstract: This paper, for the first time, addresses the questions related to the connections between the quantum pseudorandomness and quantum hardware assumptions, specifically quantum physical unclonable functions (qPUFs). Our results show that the efficient pseudorandom quantum states (PRS) are sufficient to construct the challenge set for the universally unforgeable qPUF, improving the previous existing… ▽ More

    Submitted 30 March, 2022; v1 submitted 22 October, 2021; originally announced October 2021.

    Comments: 33 pages, 4 figures

  34. Quantum Lock: A Provable Quantum Communication Advantage

    Authors: Kaushik Chakraborty, Mina Doosti, Yao Ma, Chirag Wadhwa, Myrto Arapinis, Elham Kashefi

    Abstract: Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. Gao et al. discussed the vulnerability of most current-day PUFs to sophisticated machine learning-based attacks. We address this problem by integrating classical PUFs and existing quantum communication technology. Specifically, this paper proposes a generic design o… ▽ More

    Submitted 12 May, 2023; v1 submitted 18 October, 2021; originally announced October 2021.

    Comments: 47 pages, 13 figures

    Journal ref: Quantum 7, 1014 (2023)

  35. Mitigating errors by quantum verification and post-selection

    Authors: Rawad Mezher, James Mills, Elham Kashefi

    Abstract: Correcting errors due to noise in quantum circuits run on current and near-term quantum hardware is essential for any convincing demonstration of quantum advantage. Indeed, in many cases it has been shown that noise renders quantum circuits efficiently classically simulable, thereby destroying any quantum advantage potentially offered by an ideal (noiseless) implementation of these circuits. Alt… ▽ More

    Submitted 14 May, 2022; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: 15 pages, 5 figures, 2 tables

  36. arXiv:2109.04042  [pdf, other

    quant-ph

    Verifying BQP Computations on Noisy Devices with Minimal Overhead

    Authors: Dominik Leichtle, Luka Music, Elham Kashefi, Harold Ollivier

    Abstract: With the development of delegated quantum computation, clients will want to ensure confidentiality of their data and algorithms, and the integrity of their computations. While protocols for blind and verifiable quantum computation exist, they suffer from high overheads and from over-sensitivity: When running on noisy devices, imperfections trigger the same detection mechanisms as malicious attacks… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

    Comments: 6+9 pages, 2 figures. Extends the results of arxiv:2011.10005 to BQP and refines the discussion on applicability

  37. QEnclave -- A practical solution for secure quantum cloud computing

    Authors: Yao Ma, Elham Kashefi, Myrto Arapinis, Kaushik Chakraborty, Marc Kaplan

    Abstract: We introduce a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls. This device extends to quantum computing the classical concept of a secure enclave which isolates a computation from its environment to provide privacy and tamper-resistance. Remarkably, our QEnclave only performs single-qubit rotations, but can nev… ▽ More

    Submitted 21 September, 2021; v1 submitted 7 September, 2021; originally announced September 2021.

    Comments: 25 pages, 5 figures

  38. arXiv:2104.04742  [pdf, other

    quant-ph cs.CR

    Non-Destructive Zero-Knowledge Proofs on Quantum States, and Multi-Party Generation of Authorized Hidden GHZ States

    Authors: Léo Colisson, Frédéric Grosshans, Elham Kashefi

    Abstract: We propose the first generalization of the famous Non-Interactive Zero-Knowledge (NIZK) proofs to quantum languages (NIZKoQS) and we provide a protocol to prove advanced properties on a received quantum state non-destructively and non-interactively (a single message being sent from the prover to the verifier). In our second orthogonal contribution, we improve the costly Remote State Preparation… ▽ More

    Submitted 17 January, 2023; v1 submitted 10 April, 2021; originally announced April 2021.

    Comments: 59 pages, added a precise definition & proof of NIZKoQS

  39. arXiv:2103.13994  [pdf, other

    quant-ph cs.CR

    A Unified Framework For Quantum Unforgeability

    Authors: Mina Doosti, Mahshid Delavar, Elham Kashefi, Myrto Arapinis

    Abstract: In this paper, we continue the line of work initiated by Boneh and Zhandry at CRYPTO 2013 and EUROCRYPT 2013 in which they formally define the notion of unforgeability against quantum adversaries specifically, for classical message authentication codes and classical digital signatures schemes. We develop a general and parameterised quantum game-based security model unifying unforgeability for both… ▽ More

    Submitted 1 October, 2021; v1 submitted 25 March, 2021; originally announced March 2021.

    Comments: 50 pages, 5 figures

  40. arXiv:2102.13044  [pdf, other

    quant-ph

    Randomized Benchmarking with Stabilizer Verification and Gate Synthesis

    Authors: Ellen Derbyshire, Rawad Mezher, Theodoros Kapourniotis, Elham Kashefi

    Abstract: Recently, there has been an emergence of useful applications for noisy intermediate-scale quantum (NISQ) devices notably, though not exclusively, in the fields of quantum machine learning and variational quantum algorithms. In such applications, circuits of various depths and composed of different sets of gates are run on NISQ devices. Therefore, it is crucial to find practical ways to capture the… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

    Comments: 18 pages, 3 figures

  41. arXiv:2102.12949   

    quant-ph

    Delegating Multi-Party Quantum Computations vs. Dishonest Majority in Two Quantum Rounds

    Authors: Theodoros Kapourniotis, Elham Kashefi, Luka Music, Harold Ollivier

    Abstract: Multi-Party Quantum Computation (MPQC) has attracted a lot of attention as a potential killer-app for quantum networks through it's ability to preserve privacy and integrity of the highly valuable computations they would enable. Contributing to the latest challenges in this field, we present a composable protocol achieving blindness and verifiability even in the case of a single honest client. The… ▽ More

    Submitted 17 April, 2023; v1 submitted 25 February, 2021; originally announced February 2021.

    Comments: The proposed H/I-gadget (sec 5.1.2) turned out being insecure because the corrections to apply to the output state depended on the outcome and the desired operation (fig.6). This construction is now superseded by "Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority" (arxiv:2303.08865)

  42. arXiv:2101.05692  [pdf, other

    quant-ph

    Efficient Construction of Quantum Physical Unclonable Functions with Unitary t-designs

    Authors: Niraj Kumar, Rawad Mezher, Elham Kashefi

    Abstract: Quantum physical unclonable functions, or QPUFs, are rapidly emerging as theoretical hardware solutions to provide secure cryptographic functionalities such as key-exchange, message authentication, entity identification among others. Recent works have shown that in order to provide provable security of these solutions against any quantum polynomial time adversary, QPUFs are required to be a unitar… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: 22 pages, 6 figures

  43. Cryptographic approach to Quantum Metrology

    Authors: Nathan Shettell, Elham Kashefi, Damian Markham

    Abstract: We consider a cryptographically motivated framework for quantum metrology in the presence of a malicious adversary. We begin by devising an estimation strategy for a (potentially) altered resource (due to a malicious adversary) and quantify the amount of bias and the loss in precision as a function of the introduced uncertainty in the resource. By incorporating an appropriate cryptographic protoco… ▽ More

    Submitted 4 January, 2022; v1 submitted 5 January, 2021; originally announced January 2021.

    Comments: 3 figures, appendix

  44. arXiv:2012.11424  [pdf, other

    quant-ph cs.AI cs.CR cs.LG

    Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis

    Authors: Brian Coyle, Mina Doosti, Elham Kashefi, Niraj Kumar

    Abstract: Cryptanalysis on standard quantum cryptographic systems generally involves finding optimal adversarial attack strategies on the underlying protocols. The core principle of modelling quantum attacks in many cases reduces to the adversary's ability to clone unknown quantum states which facilitates the extraction of some meaningful secret information. Explicit optimal attack strategies typically requ… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: 16 pages main text, 25 pages supplementary material, 20 figures. Comments welcome

    Journal ref: Phys. Rev. A 105, 042604, 2022

  45. Securing Quantum Computations in the NISQ Era

    Authors: Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier

    Abstract: Recent experimental achievements motivate an ever-growing interest from companies starting to feel the limitations of classical computing. Yet, in light of ongoing privacy scandals, the future availability of quantum computing through remotely accessible servers pose peculiar challenges: Clients with quantum-limited capabilities want their data and algorithms to remain hidden, while being able to… ▽ More

    Submitted 13 September, 2021; v1 submitted 19 November, 2020; originally announced November 2020.

    Comments: 18 pages, 3 figures. Results from this article have been extended to allow verification of BQP computations in arXiv:2109.04042

    Journal ref: PRX Quantum 2, 040302 (2021)

  46. A Continuous Variable Born Machine

    Authors: Ieva Čepaitė, Brian Coyle, Elham Kashefi

    Abstract: Generative Modelling has become a promising use case for near term quantum computers. In particular, due to the fundamentally probabilistic nature of quantum mechanics, quantum computers naturally model and learn probability distributions, perhaps more efficiently than can be achieved classically. The Born machine is an example of such a model, easily implemented on near term quantum computers. Ho… ▽ More

    Submitted 2 November, 2020; originally announced November 2020.

    Comments: 17 pages, 5 figures

    Journal ref: Quantum Mach. Intell. 4, 6 (2022)

  47. arXiv:2010.07925  [pdf, ps, other

    quant-ph

    Secure Two-Party Quantum Computation Over Classical Channels

    Authors: Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri

    Abstract: Secure two-party computation considers the problem of two parties computing a joint function of their private inputs without revealing anything beyond the output. In this work, we consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel. Our first result shows that it is in general impossible to realize a two-party quantum functi… ▽ More

    Submitted 28 May, 2021; v1 submitted 15 October, 2020; originally announced October 2020.

    Comments: (v2) changed the title, added new results, and improved readability. 55 pages

  48. Optimal quantum-programmable projective measurements with coherent states

    Authors: Niraj Kumar, Ulysse Chabaud, Elham Kashefi, Damian Markham, Eleni Diamanti

    Abstract: We consider a device which can be programmed using coherent states of light to approximate a given projective measurement on an input coherent state. We provide and discuss three practical implementations of this programmable projective measurement device with linear optics, involving only balanced beam splitters and single photon threshold detectors. The three schemes optimally approximate any pr… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

    Comments: 19 pages, 8 figures

    Journal ref: Phys. Rev. Research 3, 043035 (2021)

  49. Certified Randomness From Steering Using Sequential Measurements

    Authors: Brian Coyle, Elham Kashefi, Matty Hoban

    Abstract: The generation of certifiable randomness is one of the most promising applications of quantum technologies. Furthermore, the intrinsic non-locality of quantum correlations allow us to certify randomness in a device-independent way, i.e. one need not make assumptions about the devices used. Due to the work of Curchod et. al., a single entangled two-qubit pure state can be used to produce arbitrary… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: 35 pages, 9 Figures. This is a pre-published extended version of a workshop edition which appeared in the proceedings of PC 2018 (EPTCS 273, 2018, pp. 14-26). The published version of this work is available below

    Journal ref: Cryptography 2019, 3(4)

  50. arXiv:2008.00691  [pdf, other

    quant-ph cs.LG

    Quantum versus Classical Generative Modelling in Finance

    Authors: Brian Coyle, Maxwell Henderson, Justin Chan Jin Le, Niraj Kumar, Marco Paini, Elham Kashefi

    Abstract: Finding a concrete use case for quantum computers in the near term is still an open question, with machine learning typically touted as one of the first fields which will be impacted by quantum technologies. In this work, we investigate and compare the capabilities of quantum versus classical models for the task of generative modelling in machine learning. We use a real world financial dataset con… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: 17 Pages, 19 Figures