-
MRI-based and metabolomics-based age scores act synergetically for mortality prediction shown by multi-cohort federated learning
Authors:
Pedro Mateus,
Swier Garst,
Jing Yu,
Davy Cats,
Alexander G. J. Harms,
Mahlet Birhanu,
Marian Beekman,
P. Eline Slagboom,
Marcel Reinders,
Jeroen van der Grond,
Andre Dekker,
Jacobus F. A. Jansen,
Magdalena Beran,
Miranda T. Schram,
Pieter Jelle Visser,
Justine Moonen,
Mohsen Ghanbari,
Gennady Roshchupkin,
Dina Vojinovic,
Inigo Bermejo,
Hailiang Mei,
Esther E. Bron
Abstract:
Biological age scores are an emerging tool to characterize aging by estimating chronological age based on physiological biomarkers. Various scores have shown associations with aging-related outcomes. This study assessed the relation between an age score based on brain MRI images (BrainAge) and an age score based on metabolomic biomarkers (MetaboAge). We trained a federated deep learning model to e…
▽ More
Biological age scores are an emerging tool to characterize aging by estimating chronological age based on physiological biomarkers. Various scores have shown associations with aging-related outcomes. This study assessed the relation between an age score based on brain MRI images (BrainAge) and an age score based on metabolomic biomarkers (MetaboAge). We trained a federated deep learning model to estimate BrainAge in three cohorts. The federated BrainAge model yielded significantly lower error for age prediction across the cohorts than locally trained models. Harmonizing the age interval between cohorts further improved BrainAge accuracy. Subsequently, we compared BrainAge with MetaboAge using federated association and survival analyses. The results showed a small association between BrainAge and MetaboAge as well as a higher predictive value for the time to mortality of both scores combined than for the individual scores. Hence, our study suggests that both aging scores capture different aspects of the aging process.
△ Less
Submitted 2 September, 2024;
originally announced September 2024.
-
Prichain II: CloudGuardian Cloud Security Proposal with Blockchain
Authors:
Rodrigo Craveiro Rodrigues,
Pedro Miguel Calhau Mateus,
Valderi Reis Quietinho Leithardt
Abstract:
With the advancement of cloud computing, data storage, and security have become crucial. The growing adoption of cloud services by companies, accompanied by increased threats from cybersecurity, highlights the importance of privacy and ownership of user data. Between 2022 and 2023, there has been an increase of around 48% in cloud security threats, emphasizing the urgent need for strong security s…
▽ More
With the advancement of cloud computing, data storage, and security have become crucial. The growing adoption of cloud services by companies, accompanied by increased threats from cybersecurity, highlights the importance of privacy and ownership of user data. Between 2022 and 2023, there has been an increase of around 48% in cloud security threats, emphasizing the urgent need for strong security solutions. To face these challenges, in this project, we propose integrating the Ethereum network's blockchain technology with a database located in the PostgreSQL cloud. The proposed solution aims to provide bidirectional data synchronization and strict control of access mechanisms. Blockchain technology ensures immutability and transparency of transactions, while PostgreSQL provides efficient and scalable storage. Through rigorous testing in an adaptive traffic control scenario, the results obtained indicate that this solution offers a significantly high level of security due to the decentralization of data, confirming that this solution is effective, and making it a powerful new option to improve security in cloud environments. In conclusion, the solution proposed in this project not only increases information security but also demonstrates the practical feasibility of integrating blockchain with cloud relational databases. This two-way alignment improves protection against cyberattacks and ensures that user data is protected from unauthorized access and malicious changes.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Quantum Kolmogorov complexity and quantum correlations in deterministic-control quantum Turing machines
Authors:
Mariano Lemus,
Ricardo Faleiro,
Paulo Mateus,
Nikola Paunković,
André Souto
Abstract:
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it…
▽ More
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it to study three particular aspects of the algorithmic information contained in a quantum state: a comparison of the information in a quantum state with that of its classical representation as an array of real numbers, an exploration of the limits of quantum state copying in the context of algorithmic complexity, and study of the complexity of correlations in quantum systems, resulting in a correlation-aware definition for algorithmic mutual information that satisfies symmetry of information property.
△ Less
Submitted 15 January, 2024; v1 submitted 23 May, 2023;
originally announced May 2023.
-
Distributed Quantum-classical Hybrid Shor's Algorithm
Authors:
Ligang Xiao,
Daowen Qiu,
Le Luo,
Paulo Mateus
Abstract:
Shor's algorithm, which was proposed by Peter Shor [Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124--134], is considered as one of the most significant quantum algorithms. Shor's algorithm can factor large integers with a certain probability of success in polynomial time. However, Shor's algorithm requires an unbearable amount of qubits and circuit depth…
▽ More
Shor's algorithm, which was proposed by Peter Shor [Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124--134], is considered as one of the most significant quantum algorithms. Shor's algorithm can factor large integers with a certain probability of success in polynomial time. However, Shor's algorithm requires an unbearable amount of qubits and circuit depth in the NISQ (Noisy Intermediate-scale Quantum) era. To reduce the resources required for Shor's algorithm, we propose a new distributed quantum-classical hybrid order-finding algorithm for Shor's algorithm. The traditional order-finding algorithm needs to obtain an estimation of some $\dfrac{s}{r}$, where $r$ is the ``order'' and $s\in\{0,1,\cdots,r-1\}$. In our distributed algorithm, we use $k$ computers to estimate partial bits of $\dfrac{s}{r}$ separately. In order to reduce the errors of measuring results of these computers, we use classical programs to correct the measuring results of each computer to a certain extent. Compared with the traditional Shor's algorithm, our algorithm reduces nearly $(1-\dfrac{1}{k})L-\log_2k$ qubits for each computer when factoring an $L$-bit integer. Also, our algorithm reduces gate complexity and circuit depth to some extent for each computer. The communication complexity of our algorithm is $O(kL)$.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Distributed Shor's algorithm
Authors:
Ligang Xiao,
Daowen Qiu,
Le Luo,
Paulo Mateus
Abstract:
Shor's algorithm is one of the most important quantum algorithm proposed by Peter Shor [Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124--134]. Shor's algorithm can factor a large integer with certain probability and costs polynomial time in the length of the input integer. The key step of Shor's algorithm is the order-finding algorithm. Specifically, give…
▽ More
Shor's algorithm is one of the most important quantum algorithm proposed by Peter Shor [Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124--134]. Shor's algorithm can factor a large integer with certain probability and costs polynomial time in the length of the input integer. The key step of Shor's algorithm is the order-finding algorithm. Specifically, given an $L$-bit integer $N$, we first randomly pick an integer $a$ with $gcd(a,N)=1$, the order of $a$ modulo $N$ is the smallest positive integer $r$ such that $a^r\equiv 1 (\bmod N)$. The order-finding algorithm in Shor's algorithm first uses quantum operations to obtain an estimation of $\dfrac{s}{r}$ for some $s\in\{0, 1, \cdots, r-1\}$, then $r$ is obtained by means of classical algorithms. In this paper, we propose a distributed Shor's algorithm. The difference between our distributed algorithm and the traditional order-finding algorithm is that we use two quantum computers separately to estimate partial bits of $\dfrac{s}{r}$ for some $s\in\{0, 1, \cdots, r-1\}$. To ensure their measuring results correspond to the same $\dfrac{s}{r}$, we need employ quantum teleportation. We integrate the measuring results via classical post-processing. After that, we get an estimation of $\dfrac{s}{r}$ with high precision. Compared with the traditional Shor's algorithm that uses multiple controlling qubits, our algorithm reduces nearly $\dfrac{L}{2}$ qubits and reduces the circuit depth of each computer.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Quantum oblivious transfer: a short review
Authors:
Manuel B. Santos,
Paulo Mateus,
Armando N. Pinto
Abstract:
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Its aim is to develop primitives beyond the reach of classical cryptography or to improve on existing classical implementations. Although much of the work in this field is dedicated to quantum key distribution (QKD), some important steps were made towards the study and development of quantum oblivious…
▽ More
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Its aim is to develop primitives beyond the reach of classical cryptography or to improve on existing classical implementations. Although much of the work in this field is dedicated to quantum key distribution (QKD), some important steps were made towards the study and development of quantum oblivious transfer (QOT). It is possible to draw a comparison between the application structure of both QKD and QOT primitives. Just as QKD protocols allow quantum-safe communication, QOT protocols allow quantum-safe computation. However, the conditions under which QOT is actually quantum-safe have been subject to a great amount of scrutiny and study. In this review article, we survey the work developed around the concept of oblivious transfer in the area of theoretical quantum cryptography, with an emphasis on some proposed protocols and their security requirements. We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
△ Less
Submitted 26 June, 2022; v1 submitted 6 June, 2022;
originally announced June 2022.
-
Quantum Universally Composable Oblivious Linear Evaluation
Authors:
Manuel B. Santos,
Paulo Mateus,
Chrysoula Vlachou
Abstract:
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parties obliviously compute a linear function, f (x) = ax + b, i.e., each one provides their inputs that remain unknown to the other, in order to compute the output f (x) that only one of them receives. From both a structural and a security point of view, oblivious linear evaluation is fundamental for ar…
▽ More
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parties obliviously compute a linear function, f (x) = ax + b, i.e., each one provides their inputs that remain unknown to the other, in order to compute the output f (x) that only one of them receives. From both a structural and a security point of view, oblivious linear evaluation is fundamental for arithmetic-based secure multi-party computation protocols. In the classical case, oblivious linear evaluation protocols can be generated using oblivious transfer, and their quantum counterparts can, in principle, be constructed as straightforward extensions using quantum oblivious transfer. Here, we present the first, to the best of our knowledge, quantum protocol for oblivious linear evaluation that, furthermore, does not rely on quantum oblivious transfer. We start by presenting a semi-honest protocol, and then extend it to the dishonest setting employing a commit-and-open strategy. Our protocol uses high-dimensional quantum states to obliviously compute f (x) on Galois Fields of prime and prime-power dimension. These constructions utilize the existence of a complete set of mutually unbiased bases in prime-power dimension Hilbert spaces and their linear behaviour upon the Heisenberg-Weyl operators. We also generalize our protocol to achieve vector oblivious linear evaluation, where several instances of oblivious linear evaluation are generated, thus making the protocol more efficient. We prove the protocols to have static security in the framework of quantum universal composability.
△ Less
Submitted 18 October, 2024; v1 submitted 29 April, 2022;
originally announced April 2022.
-
Distributed quantum algorithm for Simon's problem
Authors:
Jiawei Tan,
Ligang Xiao,
Daowen Qiu,
Le Luo,
Paulo Mateus
Abstract:
Limited by today's physical devices, quantum circuits are usually noisy and difficult to be designed deeply. The novel computing architecture of distributed quantum computing is expected to reduce the noise and depth of quantum circuits. In this paper, we study the Simon's problem in distributed scenarios and design a distributed quantum algorithm to solve the problem. The algorithm proposed by us…
▽ More
Limited by today's physical devices, quantum circuits are usually noisy and difficult to be designed deeply. The novel computing architecture of distributed quantum computing is expected to reduce the noise and depth of quantum circuits. In this paper, we study the Simon's problem in distributed scenarios and design a distributed quantum algorithm to solve the problem. The algorithm proposed by us has the advantage of exponential acceleration compared with the classical distributed computing, and has the advantage of square acceleration compared with the best distributed quantum algorithm proposed before. In particular, the previous distributed quantum algorithm for Simon's problem can not be extended to the case of more than {\it two computing nodes} (i.e. two subproblems), but our distributed quantum algorithm can be extended to the case of {\it multiple computing nodes} (i.e. multiple subproblems) as well.
△ Less
Submitted 6 May, 2022; v1 submitted 24 April, 2022;
originally announced April 2022.
-
Testing Boolean Functions Properties
Authors:
Zhengwei Xie,
Daowen Qiu,
Guangya Cai,
Jozef Gruska,
Paulo Mateus
Abstract:
The goal in the area of functions property testing is to determine whether a given black-box Boolean function has a particular given property or is $\varepsilon$-far from having that property. We investigate here several types of properties testing for Boolean functions (identity, correlations and balancedness) using the Deutsch-Jozsa algorithm (for the Deutsch-Jozsa (D-J) problem) and also the am…
▽ More
The goal in the area of functions property testing is to determine whether a given black-box Boolean function has a particular given property or is $\varepsilon$-far from having that property. We investigate here several types of properties testing for Boolean functions (identity, correlations and balancedness) using the Deutsch-Jozsa algorithm (for the Deutsch-Jozsa (D-J) problem) and also the amplitude amplification technique.
At first, we study here a particular testing problem: namely whether a given Boolean function $f$, of $n$ variables, is identical with a given function $g$ or is $\varepsilon$-far from $g$, where $\varepsilon$ is the parameter. We present a one-sided error quantum algorithm to deal with this problem that has the query complexity $O(\frac{1}{\sqrt{\varepsilon}})$. Moreover, we show that our quantum algorithm is optimal. Afterwards we show that the classical randomized query complexity of this problem is $Θ(\frac{1}{\varepsilon})$. Secondly, we consider the D-J problem from the perspective of functional correlations and let $C(f,g)$ denote the correlation of $f$ and $g$. We propose an exact quantum algorithm for making distinction between $|C(f,g)|=\varepsilon$ and $|C(f,g)|=1$ using six queries, while the classical deterministic query complexity for this problem is $Θ(2^{n})$ queries. Finally, we propose a one-sided error quantum query algorithm for testing whether one Boolean function is balanced versus $\varepsilon$-far balanced using $O(\frac{1}{\varepsilon})$ queries. We also prove here that our quantum algorithm for balancedness testing is optimal. At the same time, for this balancedness testing problem we present a classical randomized algorithm with query complexity of $O(1/\varepsilon^{2})$. Also this randomized algorithm is optimal. Besides, we link the problems considered here together and generalize them to the general case.
△ Less
Submitted 9 November, 2021; v1 submitted 14 September, 2021;
originally announced September 2021.
-
A coherence-witnessing game and applications to semi-device-independent quantum key distribution
Authors:
Mário Silva,
Ricardo Faleiro,
Paulo Mateus,
Emmanuel Zambrini Cruzeiro
Abstract:
Semi-device-independent quantum key distribution aims to achieve a balance between the highest level of security, device independence, and experimental feasibility. Semi-quantum key distribution presents an intriguing approach that seeks to minimize users' reliance on quantum operations while maintaining security, thus enabling the development of simplified and hardware fault-tolerant quantum prot…
▽ More
Semi-device-independent quantum key distribution aims to achieve a balance between the highest level of security, device independence, and experimental feasibility. Semi-quantum key distribution presents an intriguing approach that seeks to minimize users' reliance on quantum operations while maintaining security, thus enabling the development of simplified and hardware fault-tolerant quantum protocols. In this work, we introduce a coherence-based, semi-device-independent, semi-quantum key distribution protocol built upon a noise-robust version of a coherence equality game that witnesses various types of coherence. Security is proven in the bounded quantum storage model, requiring users to implement only classical operations, specifically fixed-basis detections.
△ Less
Submitted 17 August, 2023; v1 submitted 11 March, 2021;
originally announced March 2021.
-
On the minmax regret for statistical manifolds: the role of curvature
Authors:
Bruno Mera,
Paulo Mateus,
Alexandra M. Carvalho
Abstract:
Model complexity plays an essential role in its selection, namely, by choosing a model that fits the data and is also succinct. Two-part codes and the minimum description length have been successful in delivering procedures to single out the best models, avoiding overfitting. In this work, we pursue this approach and complement it by performing further assumptions in the parameter space. Concretel…
▽ More
Model complexity plays an essential role in its selection, namely, by choosing a model that fits the data and is also succinct. Two-part codes and the minimum description length have been successful in delivering procedures to single out the best models, avoiding overfitting. In this work, we pursue this approach and complement it by performing further assumptions in the parameter space. Concretely, we assume that the parameter space is a smooth manifold, and by using tools of Riemannian geometry, we derive a sharper expression than the standard one given by the stochastic complexity, where the scalar curvature of the Fisher information metric plays a dominant role. Furthermore, we derive the minmax regret for general statistical manifolds and apply our results to derive optimal dimensional reduction in the context of principal component analysis.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
On the complexity of finding the maximum entropy compatible quantum state
Authors:
Serena Di Giorgio,
Paulo Mateus
Abstract:
Herein we study the problem of recovering a density operator from a set of compatible marginals, motivated from limitations of physical observations. Given that the set of compatible density operators is not singular, we adopt Jaynes' principle and wish to characterize a compatible density operator with maximum entropy. We first show that comparing the entropy of compatible density operators is QS…
▽ More
Herein we study the problem of recovering a density operator from a set of compatible marginals, motivated from limitations of physical observations. Given that the set of compatible density operators is not singular, we adopt Jaynes' principle and wish to characterize a compatible density operator with maximum entropy. We first show that comparing the entropy of compatible density operators is QSZK-complete, even for the simplest case of 3-chains. Then, we focus on the particular case of quantum Markov chains and trees and establish that for these cases, there exists a quantum polynomial circuit that constructs the maximum entropy compatible density operator. Finally, we extend the Chow-Liu algorithm to the same subclass of quantum states.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Exploring hydrogen production for self-energy generation in electroremediation: A proof of concept
Authors:
C. Magroa,
J. Almeidaa,
J. M. Paz-Garcia,
E. P. Mateus,
A. B. Ribeiro
Abstract:
Electrodialytic technologies are clean up processes based on the application of a low-level electrical current to produce electrolysis reactions and the consequent electrochemically induced transport of contaminants. These treatments inherently produce electrolytic hydrogen, an energy carrier, at the cathode compartment, in addition to other cathode reactions. However, exploring this by-product fo…
▽ More
Electrodialytic technologies are clean up processes based on the application of a low-level electrical current to produce electrolysis reactions and the consequent electrochemically induced transport of contaminants. These treatments inherently produce electrolytic hydrogen, an energy carrier, at the cathode compartment, in addition to other cathode reactions. However, exploring this by-product for self energy generation in electroremediation has never been researched. In this work we present the study of hydrogen production during the electrodialytic treatment of three different environmental matrices.
△ Less
Submitted 14 February, 2020;
originally announced February 2020.
-
Emerging organic contaminants in wastewater: Understanding electrochemical reactors for triclosan and its by-products degradation
Authors:
Catia Magro,
Eduardo P. Mateus,
Juan M. Paz-Garcia,
Alexandra B. Ribeiro
Abstract:
Degradation technologies applied to emerging organic contaminants from human activities are one of the major water challenges in the contamination legacy. Triclosan is an emerging contaminant, commonly used as antibacterial agent in personal care products. Triclosan is stable, lipophilic and it is proved to have ecotoxicologic effects in organics. This induces great concern since its elimination i…
▽ More
Degradation technologies applied to emerging organic contaminants from human activities are one of the major water challenges in the contamination legacy. Triclosan is an emerging contaminant, commonly used as antibacterial agent in personal care products. Triclosan is stable, lipophilic and it is proved to have ecotoxicologic effects in organics. This induces great concern since its elimination in wastewater treatment plants is not efficient and its by-products (e.g. methyl-triclosan, 2,4-dichlorophenol or 2,4,6-trichlorophenol) are even more hazardous to several environmental compartments. This work provides understanding of two different electrochemical reactors for the degradation of triclosan and its derivative by-products in effluent. A batch reactor and a flow reactor (mimicking a secondary settling tank in a wastewater treatment plant) were tested with two different working anodes: Ti/MMO and Nb/BDD. The degradation efficiency and kinetics were evaluated to find the best combination of current density, electrodes and set-up design. For both reactors the best electrode combination was achieved with Ti/MMO as anode. The batch reactor at 7 mA/cm2 during 4 h attained degradation rates below the detection limit for triclosan and 2,4,6-trichlorophenol and, 94% and 43% for 2,4-dichlorophenol and methyl triclosan, respectively. The flow reactor obtained, in approximately 1 h, degradation efficiencies between 41% and 87% for the four contaminants. This study suggests an alternative technology for emerging organic contaminants degradation, since the combination of a low current density with the flow and matrix induced disturbance increases and speeds up the compounds elimination in a real environmental matrix.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
A Private Quantum Bit String Commitment
Authors:
Mariana Gama,
Paulo Mateus,
André Souto
Abstract:
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticat…
▽ More
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticated channel. The protocol remains secure (but not private) if we realize the random oracles as physical unclonable functions in the so-called bad PUF model with access before the opening phase.
△ Less
Submitted 31 January, 2020;
originally announced January 2020.
-
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
Authors:
Mariano Lemus,
Mariana F. Ramos,
Preeti Yadav,
Nuno A. Silva,
Nelson J. Muga,
Andre Souto,
Nikola Paunkovic,
Paulo Mateus,
Armando N. Pinto
Abstract:
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments us…
▽ More
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach, quantum and classical, we obtain a practical and high-speed oblivious transfer protocol, secure even against quantum computer attacks. The oblivious distributed keys allow implementing a fast and secure oblivious transfer protocol, which can pave the way for the widespread of applications based on secure multiparty computation.
△ Less
Submitted 17 June, 2020; v1 submitted 25 September, 2019;
originally announced September 2019.
-
Experimental Semi-quantum Key Distribution With Classical Users
Authors:
Francesco Massa,
Preeti Yadav,
Amir Moqanaki,
Walter O. Krawec,
Paulo Mateus,
Nikola Paunković,
André Souto,
Philip Walther
Abstract:
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanic…
▽ More
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanics and therefore requires the users to be capable of performing quantum operations, such as state preparation or measurements in multiple bases. A natural question is whether and to what extent these requirements can be relaxed and the quantum capabilities of the users reduced. Here we demonstrate a novel quantum key distribution scheme, where users are fully classical. In our protocol, the quantum operations are performed by an untrusted third party acting as a server, which gives the users access to a superimposed single photon, and the key exchange is achieved via interaction-free measurements on the shared state. We also provide a full security proof of the protocol by computing the secret key rate in the realistic scenario of finite-resources, as well as practical experimental conditions of imperfect photon source and detectors. Our approach deepens the understanding of the fundamental principles underlying quantum key distribution and, at the same time, opens up new interesting possibilities for quantum cryptography networks
△ Less
Submitted 18 September, 2022; v1 submitted 5 August, 2019;
originally announced August 2019.
-
Time Series Imputation
Authors:
Samuel Arcadinho,
Paulo Mateus
Abstract:
Multivariate time series is a very active topic in the research community and many machine learning tasks are being used in order to extract information from this type of data. However, in real-world problems data has missing values, which may difficult the application of machine learning techniques to extract information. In this paper we focus on the task of imputation of time series. Many imput…
▽ More
Multivariate time series is a very active topic in the research community and many machine learning tasks are being used in order to extract information from this type of data. However, in real-world problems data has missing values, which may difficult the application of machine learning techniques to extract information. In this paper we focus on the task of imputation of time series. Many imputation methods for time series are based on regression methods. Unfortunately, these methods perform poorly when the variables are categorical. To address this case, we propose a new imputation method based on Expectation Maximization over dynamic Bayesian networks. The approach is assessed with synthetic and real data, and it outperforms several state-of-the art methods.
△ Less
Submitted 22 March, 2019;
originally announced March 2019.
-
Recoverability from direct quantum correlations
Authors:
S. Di Giorgio,
P. Mateus,
B. Mera
Abstract:
We address the problem of compressing density operators defined on a finite dimensional Hilbert space which assumes a tensor product decomposition. In particular, we look for an efficient procedure for learning the most likely density operator, according to Jaynes' principle, given a chosen set of partial information obtained from the unknown quantum system we wish to describe. For complexity reas…
▽ More
We address the problem of compressing density operators defined on a finite dimensional Hilbert space which assumes a tensor product decomposition. In particular, we look for an efficient procedure for learning the most likely density operator, according to Jaynes' principle, given a chosen set of partial information obtained from the unknown quantum system we wish to describe. For complexity reasons, we restrict our analysis to tree-structured sets of bipartite marginals. We focus on the tripartite scenario, where we solve the problem for the couples of measured marginals which are compatible with a quantum Markov chain, providing then an algebraic necessary and sufficient condition for the compatibility to be verified. We introduce the generalization of the procedure to the n-partite scenario, giving some preliminary results. In particular, we prove that if the pairwise Markov condition holds between the subparts then the choice of the best set of tree-structured bipartite marginals can be performed efficiently. Moreover, we provide a new characterisation of quantum Markov chains in terms of quantum Bayesian updating processes.
△ Less
Submitted 26 February, 2019;
originally announced February 2019.
-
Synthesis of Quantum Images Using Phase Rotation
Authors:
Shiping Du,
Daowen Qiu,
Jozef Gruska,
Paulo Mateus
Abstract:
A topic about synthesis of quantum images is proposed, and a specific phase rotation transform constructed is adopted to theoretically realise the synthesis of two quantum images. The synthesis strategy of quantum images comprises three steps, which include:
(1) In the stage of phase extraction, we obtain the phases of the state of the quantum image by transforming the state of the quantum image…
▽ More
A topic about synthesis of quantum images is proposed, and a specific phase rotation transform constructed is adopted to theoretically realise the synthesis of two quantum images. The synthesis strategy of quantum images comprises three steps, which include:
(1) In the stage of phase extraction, we obtain the phases of the state of the quantum image by transforming the state of the quantum image to prepare the conditions for multiple phases extraction.
(2) In the stage of rotation operator construction, the phases obtained in the first stage are used to construct the rotation operator where a mechanism is introduced into it to reduce the phase overflow.
(3) In the stage of application of the rotation operator, we apply the operator constructed in the second stage on the state of quantum image to get a goal state.
Additionally, numerical analysis gives the joint uncertainty relation of the pixel of the synthesized quantum image.
The analysis result about the compression ratio indicates that the phase rotation transform and the overflow control mechanism are effective.
△ Less
Submitted 13 November, 2018;
originally announced November 2018.
-
Quantum contract signing with entangled pairs
Authors:
P. Yadav,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can o…
▽ More
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can obtain a signed copy of the contract, while Alice cannot, can be made arbitrarily small, and scales as $N^{-1/2}$, where $4N$ is the total number of rounds (communications between the two clients) of the protocol. Thus, the protocol is {\em optimistic}, as the cheating is not successful, and the clients rarely have to contact Trent to confirm their honesty by delivering the actual signed certificates of the contract. Unlike the previous protocol [Paunković, et al., 2017], in the present proposal, a single client can obtain the signed contract alone, without the need for the other client's presence. When first contacting Trent, the clients do not have to agree upon a definitive contract. Moreover, even upon terminating the protocol, the clients do not reveal the actual contract to Trent. Finally, the protocol is based on the laws of physics, rather than on mathematical conjectures and the exchange of a large number of signed authenticated messages during the actual contract signing process. Therefore, it is {\em abuse-free}, as Alice and Bob cannot prove they are involved in the contract signing process.
△ Less
Submitted 3 September, 2019; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Quantum key distribution with quantum walks
Authors:
Chrysoula Vlachou,
Walter Krawec,
Paulo Mateus,
Nikola Paunkovic,
Andre Souto
Abstract:
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle att…
▽ More
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle attacks. Furthermore, we present a one-way protocol and prove its security. Finally, we propose a semi-quantum variation and prove its robustness against eavesdropping.
△ Less
Submitted 3 October, 2018; v1 submitted 22 October, 2017;
originally announced October 2017.
-
Quantum machines with classical control
Authors:
Paulo Mateus,
Daowen Qiu,
Andre Souto
Abstract:
Herein we survey the main results concerning quantum automata and machines with classical control. These machines were originally proposed by Sernadas et al in [37], during the FCT QuantLog project. First, we focus on the expressivity of quantum automata with both quantum and classical states. We revise the result obtained in [32] where it was proved that such automata are able to recognise, with…
▽ More
Herein we survey the main results concerning quantum automata and machines with classical control. These machines were originally proposed by Sernadas et al in [37], during the FCT QuantLog project. First, we focus on the expressivity of quantum automata with both quantum and classical states. We revise the result obtained in [32] where it was proved that such automata are able to recognise, with exponentially less states than deterministic finite automata, a family of regular languages that cannot be recognised by other types of quantum automata. Finally, we revise the concept of quantum Turing machine with classical control introduced in [25]. The novelty of these machines consists in the fact that their termination problem is completely deterministic, in opposition to other notions in the literature. Concretely, we revisit the result that such machines fulfil the s-m-n property, while keeping the expressivity of a quantum model for computation.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Optimal control of non-autonomous SEIRS models with vaccination and treatment
Authors:
Joaquim P. Mateus,
Paulo Rebelo,
Silvério Rosa,
César M. Silva,
Delfim F. M. Torres
Abstract:
We study an optimal control problem for a non-autonomous SEIRS model with incidence given by a general function of the infective, the susceptible and the total population, and with vaccination and treatment as control variables. We prove existence and uniqueness results for our problem and, for the case of mass-action incidence, we present some simulation results designed to compare an autonomous…
▽ More
We study an optimal control problem for a non-autonomous SEIRS model with incidence given by a general function of the infective, the susceptible and the total population, and with vaccination and treatment as control variables. We prove existence and uniqueness results for our problem and, for the case of mass-action incidence, we present some simulation results designed to compare an autonomous and corresponding periodic model, as well as the controlled versus uncontrolled models.
△ Less
Submitted 28 May, 2018; v1 submitted 21 June, 2017;
originally announced June 2017.
-
Security of a single-state semi-quantum key distribution protocol
Authors:
Wei Zhang,
Daowen Qiu,
Paulo Mateus
Abstract:
Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channe…
▽ More
Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. But there are few works concerned about their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise can they tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by $Zou$ et al. in [Phys. Rev. A. 79]. We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that all error rates are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. we make an illustration of the protocol under the circumstance of the reverse quantum channel is a depolarizing one with parameter $q$. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.
△ Less
Submitted 15 June, 2017; v1 submitted 10 December, 2016;
originally announced December 2016.
-
Analyses and improvement of a broadcasting multiple blind signature scheme based on quantum GHZ entanglement
Authors:
Wei Zhang,
Daowen Qiu,
Xiangfu Zou,
Paulo Mateus
Abstract:
A broadcasting multiple blind signature scheme based on quantum GHZ entanglement has been presented recently by Tian et al. It is said that the scheme's unconditional security is guaranteed by adopting quantum key preparation, quantum encryption algorithm and quantum entanglement. In this paper, we prove that each signatory can get the signed message just by an intercept-resend attack. Then, we sh…
▽ More
A broadcasting multiple blind signature scheme based on quantum GHZ entanglement has been presented recently by Tian et al. It is said that the scheme's unconditional security is guaranteed by adopting quantum key preparation, quantum encryption algorithm and quantum entanglement. In this paper, we prove that each signatory can get the signed message just by an intercept-resend attack. Then, we show there still exists some participant attacks and external attacks. Specifically, we verify the message sender Alice can impersonate each signatory to sign the message at will, and so is the signature collector Charlie. Also, we demonstrate that the receiver Bob can forge the signature successfully, and with respect to the external attacks, the eavesdropper Eve can modify the signature at random. Besides, we discover Eve can change the signed message at will, and Eve can impersonate Alice as the message sender without being discovered. In particular, we propose an improved scheme based on the original one and show that it is secure against not only the attacks mentioned above but also some collusion attacks.
△ Less
Submitted 2 April, 2017; v1 submitted 2 December, 2016;
originally announced December 2016.
-
Quantum key distribution by phase flipping of coherent states of light
Authors:
G. A. Barbosa,
J. van de Graaf,
P. Mateus,
N. Paunković
Abstract:
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of…
▽ More
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of light, such that a complex phase of each pulse is rotated by the corresponding phase rotation. The encoding of $i$-th bit of the key $r=r_1 \dots r_\ell$ is done by further performing phase rotation $r_i π$ (with $r_i = 0,1$) on the $i$-th coherent state pulse. In order to protect the protocol against the man-in-the-middle attack, we introduce a verification procedure, and analyse the protocol's security using the Holevo bound. We also analyse the possibility of beam splitting-like and of collective attacks, showing the impossibility of the former and, in the case of our protocol, the inadequacy of the latter. While we cannot prove full perfect security against the most general attacks allowed by the laws of quantum mechanics, our protocol achieves faster quantum key distribution, over larger distances and with lower costs, than the single-photon counterparts, maintaining at least practical security against the current and the near future technologies.
△ Less
Submitted 3 May, 2017; v1 submitted 22 September, 2016;
originally announced September 2016.
-
Decision and optimization problems in the Unreliable-Circuit Logic
Authors:
J. Rasga,
C. Sernadas,
P. Mateus,
A. Sernadas
Abstract:
The ambition constrained validity and the model witness problems in the logic UCL, for reasoning about circuits with unreliable gates, are analyzed. Moreover, two additional problems, motivated by the applications, are studied. One consists of finding bounds on the reliability rate of the gates that ensure that a given circuit has an intended success rate. The other consists of finding a reliabili…
▽ More
The ambition constrained validity and the model witness problems in the logic UCL, for reasoning about circuits with unreliable gates, are analyzed. Moreover, two additional problems, motivated by the applications, are studied. One consists of finding bounds on the reliability rate of the gates that ensure that a given circuit has an intended success rate. The other consists of finding a reliability rate of the gates that maximizes the success rate of a given circuit. Sound and complete algorithms are developed for these problems and their computational complexity is studied.
△ Less
Submitted 28 July, 2016;
originally announced August 2016.
-
Quantum walks public key cryptographic system
Authors:
C. Vlachou,
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol t…
▽ More
Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public-key generation and encryption/decryption procedures.
△ Less
Submitted 3 February, 2016;
originally announced February 2016.
-
Existence of periodic solutions of a periodic SEIRS model with general incidence
Authors:
César M. Silva,
Joaquim P. Mateus
Abstract:
For a family of periodic SEIRS models with general incidence, we prove the existence of at least one endemic periodic orbit when R_0>1. Additionally, we prove the existence of a unique disease-free periodic orbit, that is globally asymptotically stable when R_0<1. In particular, our main result establishes a sharp threshold between existence and non-existence of endemic periodic orbits for this fa…
▽ More
For a family of periodic SEIRS models with general incidence, we prove the existence of at least one endemic periodic orbit when R_0>1. Additionally, we prove the existence of a unique disease-free periodic orbit, that is globally asymptotically stable when R_0<1. In particular, our main result establishes a sharp threshold between existence and non-existence of endemic periodic orbits for this family of models.
△ Less
Submitted 4 December, 2015;
originally announced December 2015.
-
Oblivious transfer based on single-qubit rotations
Authors:
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing o…
▽ More
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing only "few-qubit" coherent measurements. We also present a single-bit oblivious transfer based on the proposed bit-string protocol. The protocol can be implemented with current technology based on optics.
△ Less
Submitted 4 September, 2017; v1 submitted 30 July, 2014;
originally announced July 2014.
-
Noise and measurement errors in a practical two-state quantum bit commitment protocol
Authors:
Ricardo Loura,
Álvaro J. Almeida,
Paulo S. André,
Armando N. Pinto,
Paulo Mateus,
Nikola Paunković
Abstract:
We present a two-state practical quantum bit commitment protocol, the security of which is based on the current technological limitations, namely the nonexistence of either stable long-term quantum memories or nondemolition measurements. For an optical realization of the protocol, we model the errors, which occur due to the noise and equipment (source, fibers, and detectors) imperfections, accumul…
▽ More
We present a two-state practical quantum bit commitment protocol, the security of which is based on the current technological limitations, namely the nonexistence of either stable long-term quantum memories or nondemolition measurements. For an optical realization of the protocol, we model the errors, which occur due to the noise and equipment (source, fibers, and detectors) imperfections, accumulated during emission, transmission, and measurement of photons. The optical part is modeled as a combination of a depolarizing channel (white noise), unitary evolution (e.g., systematic rotation of the polarization axis of photons), and two other basis-dependent channels, namely the phase- and bit-flip channels. We analyze quantitatively the effects of noise using two common information-theoretic measures of probability distribution distinguishability: the fidelity and the relative entropy. In particular, we discuss the optimal cheating strategy and show that it is always advantageous for a cheating agent to add some amount of white noise - the particular effect not being present in standard quantum security protocols. We also analyze the protocol's security when the use of (im)perfect nondemolition measurements and noisy or bounded quantum memories is allowed. Finally, we discuss errors occurring due to a finite detector efficiency, dark counts, and imperfect single-photon sources, and we show that the effects are the same as those of standard quantum cryptography.
△ Less
Submitted 2 June, 2014;
originally announced June 2014.
-
Oblivious transfer based on quantum state computational distinguishability
Authors:
A. Souto,
P. Mateus,
P. Adão,
N. Paunković
Abstract:
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that fa…
▽ More
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that factoring is unfeasible. To overcome this, quantum mechanics has been used intensively in the past decades, and alternatives resistant to quantum attacks have been developed in order to fulfill the (potential) lack of security of a significant number of classical schemes.
In this paper, we present a quantum computationally secure protocol for oblivious transfer between two parties, under the assumption of quantum hardness of state distinguishability. The protocol is feasible, in the sense that it is implementable in polynomial time.
△ Less
Submitted 24 March, 2014;
originally announced March 2014.
-
A non-autonomous SEIRS model with general incidence rate
Authors:
Joaquim P. Mateus,
César M. Silva
Abstract:
For a non-autonomous SEIRS model with general incidence, that admits [T. Kuniya and Y. Nakata, Permanence and extinction for a nonautonomous SEIRS epidemic model, Appl. Math. Computing 218, 9321-9331 (2012)] as a very particular case, we obtain conditions for extinction and strong persistence of the infectives. Our conditions are computed for several particular settings and extend the hypothesis o…
▽ More
For a non-autonomous SEIRS model with general incidence, that admits [T. Kuniya and Y. Nakata, Permanence and extinction for a nonautonomous SEIRS epidemic model, Appl. Math. Computing 218, 9321-9331 (2012)] as a very particular case, we obtain conditions for extinction and strong persistence of the infectives. Our conditions are computed for several particular settings and extend the hypothesis of several proposed non-autonomous models. Additionally we show that our conditions are robust in the sense that they persist under small perturbations of the parameters in some suitable family. We also present some simulations that illustrate our results.
△ Less
Submitted 13 November, 2013;
originally announced November 2013.
-
State succinctness of two-way finite automata with quantum and classical states
Authors:
Shenggen Zheng,
Daowen Qiu,
Jozef Gruska,
Lvzhou Li,
Paulo Mateus
Abstract:
{\it Two-way quantum automata with quantum and classical states} (2QCFA) were introduced by Ambainis and Watrous in 2002. In this paper we study state succinctness of 2QCFA.
For any $m\in {\mathbb{Z}}^+$ and any $ε<1/2$, we show that: {enumerate} there is a promise problem $A^{eq}(m)$ which can be solved by a 2QCFA with one-sided error $ε$ in a polynomial expected running time with a constant nu…
▽ More
{\it Two-way quantum automata with quantum and classical states} (2QCFA) were introduced by Ambainis and Watrous in 2002. In this paper we study state succinctness of 2QCFA.
For any $m\in {\mathbb{Z}}^+$ and any $ε<1/2$, we show that: {enumerate} there is a promise problem $A^{eq}(m)$ which can be solved by a 2QCFA with one-sided error $ε$ in a polynomial expected running time with a constant number (that depends neither on $m$ nor on $\varepsilon$) of quantum states and $\mathbf{O}(\log{\frac{1}ε)}$ classical states, whereas the sizes of the corresponding {\it deterministic finite automata} (DFA), {\it two-way nondeterministic finite automata} (2NFA) and polynomial expected running time {\it two-way probabilistic finite automata} (2PFA) are at least $2m+2$, $\sqrt{\log{m}}$, and $\sqrt[3]{(\log m)/b}$, respectively; there exists a language $L^{twin}(m)=\{wcw| w\in\{a,b\}^*\}$ over the alphabet $Σ=\{a,b,c\}$ which can be recognized by a 2QCFA with one-sided error $ε$ in an exponential expected running time with a constant number of quantum states and $\mathbf{O}(\log{\frac{1}ε)}$ classical states, whereas the sizes of the corresponding DFA, 2NFA and polynomial expected running time 2PFA are at least $2^m$, $\sqrt{m}$, and $\sqrt[3]{m/b}$, respectively; {enumerate} where $b$ is a constant.
△ Less
Submitted 23 May, 2012; v1 submitted 13 February, 2012;
originally announced February 2012.
-
Secure $N$-dimensional Simultaneous Dense Coding and Applications
Authors:
Haozhen Situ,
Daowen Qiu,
Paulo Mateus,
Nikola Paunković
Abstract:
Simultaneous dense coding guarantees that Bob and Charlie simultaneously receive their respective information from Alice in their respective processes of dense coding. The idea is to use the so-called locking operation to "lock" the entanglement channels, thus requiring a joint unlocking operation by Bob and Charlie in order to simultaneously obtain the information sent by Alice. We present some n…
▽ More
Simultaneous dense coding guarantees that Bob and Charlie simultaneously receive their respective information from Alice in their respective processes of dense coding. The idea is to use the so-called locking operation to "lock" the entanglement channels, thus requiring a joint unlocking operation by Bob and Charlie in order to simultaneously obtain the information sent by Alice. We present some new results on simultaneous dense coding: (1) We propose three simultaneous dense coding protocols, which use different $N$-dimensional entanglement (Bell state, W state and GHZ state). (2) Besides the quantum Fourier transform, two new locking operators are introduced (the double controlled-NOT operator and the SWAP operator). (3) In the case that spatially distant Bob and Charlie have to finalise the protocol by implementing the unlocking operation through communication, we improve our protocol's fairness, with respect to Bob and Charlie, by implementing the unlocking operation in series of steps. (4) We improve the security of simultaneous dense coding against the intercept-resend attack. (5) We show that simultaneous dense coding can be used to implement a fair contract signing protocol. (6) We also show that the $N$-dimensional quantum Fourier transform can act as the locking operator in simultaneous teleportation of $N$-level quantum systems.
△ Less
Submitted 23 February, 2016; v1 submitted 20 June, 2011;
originally announced June 2011.
-
Fair and optimistic quantum contract signing
Authors:
N. Paunkovic,
J. Bouda,
P. Mateus
Abstract:
We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged be…
▽ More
We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged between the clients. Our protocol is not based on the exchange of signed messages: its fairness is based on the laws of quantum mechanics. Thus, it is abuse-free, and the clients do not have to generate new keys for each message during the Exchange phase. We discuss a real-life scenario when the measurement errors and qubit state corruption due to noisy channels occur and argue that for real, good enough measurement apparatus and transmission channels, our protocol would still be fair. Our protocol could be implemented by today's technology, as it requires in essence the same type of apparatus as the one needed for BB84 cryptographic protocol. Finally, we briefly discuss two alternative versions of the protocol, one that uses only two states (based on B92 protocol) and the other that uses entangled pairs, and show that it is possible to generalize our protocol to an arbitrary number of clients.
△ Less
Submitted 18 October, 2011; v1 submitted 15 June, 2011;
originally announced June 2011.
-
Characterizations of one-way general quantum finite automata
Authors:
Lvzhou Li,
Daowen Qiu,
Xiangfu Zou,
Lvjun Li,
Lihua Wu,
Paulo Mateus
Abstract:
In this paper we study a generalized model named one-way general quantum finite automata} (1gQFA), in which each symbol in the input alphabet induces a trace-preserving quantum operation, instead of a unitary transformation. Two different kinds of 1gQFA will be studied: measure-once one-way general quantum finite automata} (MO-1gQFA), and measure-many one-way general quantum finite automata (MM-1g…
▽ More
In this paper we study a generalized model named one-way general quantum finite automata} (1gQFA), in which each symbol in the input alphabet induces a trace-preserving quantum operation, instead of a unitary transformation. Two different kinds of 1gQFA will be studied: measure-once one-way general quantum finite automata} (MO-1gQFA), and measure-many one-way general quantum finite automata (MM-1gQFA). We prove that MO-1gQFA recognize, with bounded error, precisely the set of all regular languages. We prove that MM-1gQFA also recognize only regular languages with bounded error. Thus, MM-1gQFA and MO-1gQFA have the same language recognition power, which is greatly different from the conventional case in which the number of times the measurement is performed in the computation generally affects the language recognition power of one-way QFA. Finally, we present a sufficient and necessary condition for two MM-1gQFA to be equivalent.
△ Less
Submitted 24 October, 2010; v1 submitted 17 November, 2009;
originally announced November 2009.
-
Exponentially more concise quantum recognition of non-RMM regular languages
Authors:
Daowen Qiu,
Lvzhou Li,
Paulo Mateus,
Amilcar Sernadas
Abstract:
We show that there are quantum devices that accept all regular languages and that are exponentially more concise than deterministic finite automata (DFA). For this purpose, we introduce a new computing model of {\it one-way quantum finite automata} (1QFA), namely, {\it one-way quantum finite automata together with classical states} (1QFAC), which extends naturally both measure-only 1QFA and DFA an…
▽ More
We show that there are quantum devices that accept all regular languages and that are exponentially more concise than deterministic finite automata (DFA). For this purpose, we introduce a new computing model of {\it one-way quantum finite automata} (1QFA), namely, {\it one-way quantum finite automata together with classical states} (1QFAC), which extends naturally both measure-only 1QFA and DFA and whose state complexity is upper-bounded by both. The original contributions of the paper are the following. First, we show that the set of languages accepted by 1QFAC with bounded error consists precisely of all regular languages. Second, we prove that 1QFAC are at most exponentially more concise than DFA. Third, we show that the previous bound is tight for families of regular languages that are not recognized by measure-once (RMO), measure-many (RMM) and multi-letter 1QFA. % More concretely we exhibit regular languages $L^0(m)$ for $m$ prime such that: (i) $L^0(m)$ cannot be recognized by measure-once, measure-many and multi-letter 1QFA; (ii) the minimal DFA that accepts $L^0(m)$ has $O(m)$ states; (iii) there is a 1QFAC with constant classical states and $O(\log(m))$ quantum basis that accepts $L^0(m)$. Fourth, we give a polynomial-time algorithm for determining whether any two 1QFAC are equivalent. Finally, we show that state minimization of 1QFAC is decidable within EXPSPACE. We conclude the paper by posing some open problems.
△ Less
Submitted 18 May, 2013; v1 submitted 8 September, 2009;
originally announced September 2009.
-
Decidability of the Equivalence of Multi-Letter Quantum Finite Automata
Authors:
Daowen Qiu,
Xiangfu Zou,
Lvzhou Li,
Paulo Mateus
Abstract:
Multi-letter {\it quantum finite automata} (QFAs) were a quantum variant of classical {\it one-way multi-head finite automata} (J. Hromkovič, Acta Informatica 19 (1983) 377-384), and it has been shown that this new one-way QFAs (multi-letter QFAs) can accept with no error some regular languages $(a+b)^{*}b$ that are unacceptable by the previous one-way QFAs. In this paper, we study the decidabilit…
▽ More
Multi-letter {\it quantum finite automata} (QFAs) were a quantum variant of classical {\it one-way multi-head finite automata} (J. Hromkovič, Acta Informatica 19 (1983) 377-384), and it has been shown that this new one-way QFAs (multi-letter QFAs) can accept with no error some regular languages $(a+b)^{*}b$ that are unacceptable by the previous one-way QFAs. In this paper, we study the decidability of the equivalence of multi-letter QFAs, and the main technical contributions are as follows: (1) We show that any two automata, a $k_{1}$-letter QFA ${\cal A}_1$ and a $k_{2}$-letter QFA ${\cal A}_2$, over the same input alphabet $Σ$ are equivalent if and only if they are $(n^2m^{k-1}-m^{k-1}+k)$-equivalent, where $m=|Σ|$ is the cardinality of $Σ$, $k=\max(k_{1},k_{2})$, and $n=n_{1}+n_{2}$, with $n_{1}$ and $n_{2}$ being the numbers of states of ${\cal A}_{1}$ and ${\cal A}_{2}$, respectively. When $k=1$, we obtain the decidability of equivalence of measure-once QFAs in the literature. It is worth mentioning that our technical method is essentially different from that for the decidability of the case of single input alphabet (i.e., $m=1$). (2) However, if we determine the equivalence of multi-letter QFAs by checking all strings of length not more than $ n^2m^{k-1}-m^{k-1}+k$, then the worst time complexity is exponential, i.e., $O(n^6m^{n^2m^{k-1}-m^{k-1}+2k-1})$. Therefore, we design a polynomial-time $O(m^{2k-1}n^{8}+km^kn^{6})$ algorithm for determining the equivalence of any two multi-letter QFAs. Here, the time complexity is concerning the number of states in the multi-letter QFAs, and $k$ is thought of as a constant.
△ Less
Submitted 24 October, 2010; v1 submitted 4 December, 2008;
originally announced December 2008.
-
Improving Classical Authentication with Quantum Communication
Authors:
F. M. Assis,
P. Mateus,
Y. Omar
Abstract:
We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security t…
▽ More
We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security than the classical XOR function introduced by Brassard. Furthermore, we establish the relationship between the bias of a PRG and the amount of information about the key that the attacker can retrieve from a block of authenticated messages. Finally, we prove that quantum resources can improve both the secrecy of the key generated by the PRG and the secrecy of the tag obtained with a hidden hash function.
△ Less
Submitted 11 February, 2010; v1 submitted 6 June, 2008;
originally announced June 2008.
-
Quantum Pattern Matching
Authors:
P. Mateus,
Y. Omar
Abstract:
We propose a quantum algorithm for closest pattern matching which allows us to search for as many distinct patterns as we wish in a given string (database), requiring a query function per symbol of the pattern alphabet. This represents a significant practical advantage when compared to Grover's search algorithm as well as to other quantum pattern matching methods, which rely on building specific…
▽ More
We propose a quantum algorithm for closest pattern matching which allows us to search for as many distinct patterns as we wish in a given string (database), requiring a query function per symbol of the pattern alphabet. This represents a significant practical advantage when compared to Grover's search algorithm as well as to other quantum pattern matching methods, which rely on building specific queries for particular patterns. Our method makes arbitrary searches on long static databases much more realistic and implementable. Our algorithm, inspired by Grover's, returns the position of the closest substring to a given pattern of size $M$ with non-negligible probability in $O(\sqrt{N})$ queries, where $N$ is the size of the string. Furthermore, we give the full recipe to implement our algorithm (together with its total circuit complexity), thus offering an oracle-based quantum algorithm ready to be implemented.
△ Less
Submitted 31 August, 2005;
originally announced August 2005.
-
Weakly complete axiomatization of exogenous quantum propositional logic
Authors:
P. Mateus,
A. Sernadas
Abstract:
A weakly complete finitary axiomatization for EQPL (exogenous quantum propositional logic) is presented. The proof is carried out using a non trivial extension of the Fagin-Halpern-Megiddo technique together with three Henkin style completions.
A weakly complete finitary axiomatization for EQPL (exogenous quantum propositional logic) is presented. The proof is carried out using a non trivial extension of the Fagin-Halpern-Megiddo technique together with three Henkin style completions.
△ Less
Submitted 22 March, 2005;
originally announced March 2005.
-
Paracategories I: internal parategories and saturated partial algebras
Authors:
Claudio Hermida,
Paulo Mateus
Abstract:
Based on the monoid classifier, we give an alternative axiomatization of Freyd's paracategories, which can be interpreted in any bicategory of partial maps. Assuming furthermore a free-monoid monad T in our ambient category, and coequalisers satisfying some exactness conditions, we give an abstract envelope construction, putting paramonoids (and paracategories) in the more general context of par…
▽ More
Based on the monoid classifier, we give an alternative axiomatization of Freyd's paracategories, which can be interpreted in any bicategory of partial maps. Assuming furthermore a free-monoid monad T in our ambient category, and coequalisers satisfying some exactness conditions, we give an abstract envelope construction, putting paramonoids (and paracategories) in the more general context of partial algebras. We introduce for the latter the crucial notion of saturation, which characterises those partial algebras which are isomorphic to the ones obtained from their enveloping algebras. We also set up a factorisation system for partial algebras, via epimorphisms and (monic) Kleene morphisms and relate the latter to saturation.
△ Less
Submitted 6 March, 2003;
originally announced March 2003.