Gaussian-boson-sampling-enhanced dense subgraph finding shows limited advantage over efficient classical algorithms
Authors:
Naomi R. Solomons,
Oliver F. Thomas,
Dara P. S. McCutcheon
Abstract:
Recent claims of achieving exponential quantum advantage have attracted attention to Gaussian boson sampling (GBS), a potential application of which is dense subgraph finding. We investigate the effects of sources of error including loss and spectral impurity on GBS applied to dense subgraph finding algorithms. We find that the effectiveness of these algorithms is remarkably robust to errors, to s…
▽ More
Recent claims of achieving exponential quantum advantage have attracted attention to Gaussian boson sampling (GBS), a potential application of which is dense subgraph finding. We investigate the effects of sources of error including loss and spectral impurity on GBS applied to dense subgraph finding algorithms. We find that the effectiveness of these algorithms is remarkably robust to errors, to such an extent that there exist efficient classical algorithms that can simulate the underlying GBS. These results imply that the speedup of GBS-based algorithms for the dense subgraph problem over classical approaches is at most polynomial, though this could be achieved on a quantum device with dramatically less stringent requirements on loss and photon purity than general GBS.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
Scalable authentication and optimal flooding in a quantum network
Authors:
Naomi R. Solomons,
Alasdair I. Fletcher,
Djeylan Aktas,
Natarajan Venkatachalam,
Sören Wengerowsky,
Martin Lončarić,
Sebastian P. Neumann,
Bo Liu,
Željko Samec,
Mario Stipčević,
Rupert Ursin,
Stefano Pirandola,
John G. Rarity,
Siddarth Koduru Joshi
Abstract:
The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network te…
▽ More
The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed, and discuss their usefulness with the aid of example use cases. First, an authentication transfer protocol to manage a fundamental limitation of quantum communication -- the need for a pre-shared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (<35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
△ Less
Submitted 21 June, 2023; v1 submitted 28 January, 2021;
originally announced January 2021.