-
On the Communication Complexity of Secure Multi-Party Computation With Aborts
Authors:
James Bartusek,
Thiago Bergamaschi,
Seri Khoury,
Saachi Mutreja,
Orr Paradise
Abstract:
A central goal of cryptography is Secure Multi-party Computation (MPC), where $n$ parties desire to compute a function of their joint inputs without letting any party learn about the inputs of its peers. Unfortunately, it is well-known that MPC guaranteeing output delivery to every party is infeasible when a majority of the parties are malicious. In fact, parties operating over a point-to-point ne…
▽ More
A central goal of cryptography is Secure Multi-party Computation (MPC), where $n$ parties desire to compute a function of their joint inputs without letting any party learn about the inputs of its peers. Unfortunately, it is well-known that MPC guaranteeing output delivery to every party is infeasible when a majority of the parties are malicious. In fact, parties operating over a point-to-point network (i.e. without access to a broadcast channel) cannot even reach an agreement on the output when more than one third of the parties are malicious (Lamport, Shostak, and Pease, JACM 1980).
Motivated by this infeasibility in the point-to-point model, Goldwasser and Lindell (J. Cryptol 2005) introduced a definition of MPC that does not require agreement, referred to as MPC with selective abort. Under this definition, any party may abort the protocol if they detect malicious behavior. They showed that MPC with selective abort is feasible for any number of malicious parties by implementing a broadcast functionality with abort.
While the model of MPC with abort has attracted much attention over the years, little is known about its communication complexity over point-to-point networks. In this work, we study the communication complexity of MPC with abort and devise nearly-optimal communication efficient protocols in this model. Namely, we prove trade-offs between the number of honest parties $h$, the communication complexity, and the locality of the protocols. Here, locality is a bound on the number of peers with which each party must communicate.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Quantum computational advantage with constant-temperature Gibbs sampling
Authors:
Thiago Bergamaschi,
Chi-Fang Chen,
Yunchao Liu
Abstract:
A quantum system coupled to a bath at some fixed, finite temperature converges to its Gibbs state. This thermalization process defines a natural, physically-motivated model of quantum computation. However, whether quantum computational advantage can be achieved within this realistic physical setup has remained open, due to the challenge of finding systems that thermalize quickly, but are classical…
▽ More
A quantum system coupled to a bath at some fixed, finite temperature converges to its Gibbs state. This thermalization process defines a natural, physically-motivated model of quantum computation. However, whether quantum computational advantage can be achieved within this realistic physical setup has remained open, due to the challenge of finding systems that thermalize quickly, but are classically intractable. Here we consider sampling from the measurement outcome distribution of quantum Gibbs states at constant temperatures, and prove that this task demonstrates quantum computational advantage. We design a family of commuting almost-local Hamiltonians (parent Hamiltonians of shallow quantum circuits) and prove that they rapidly converge to their Gibbs states under the standard physical model of thermalization (as a continuous-time quantum Markov chain). On the other hand, we show that no polynomial time classical algorithm can sample from the measurement outcome distribution by reducing to the classical hardness of sampling from noiseless shallow quantum circuits. The key step in the reduction is constructing a fault-tolerance scheme for shallow IQP circuits against input noise.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
On Split-State Quantum Tamper Detection and Non-Malleability
Authors:
Thiago Bergamaschi,
Naresh Goud Boddu
Abstract:
Tamper-detection codes (TDCs) and non-malleable codes (NMCs) are now fundamental objects at the intersection of cryptography and coding theory. Both of these primitives represent natural relaxations of error-correcting codes and offer related security guarantees in adversarial settings where error correction is impossible. While in a TDC, the decoder is tasked with either recovering the original m…
▽ More
Tamper-detection codes (TDCs) and non-malleable codes (NMCs) are now fundamental objects at the intersection of cryptography and coding theory. Both of these primitives represent natural relaxations of error-correcting codes and offer related security guarantees in adversarial settings where error correction is impossible. While in a TDC, the decoder is tasked with either recovering the original message or rejecting it, in an NMC, the decoder is additionally allowed to output a completely unrelated message.
In this work, we study quantum analogs of one of the most well-studied adversarial tampering models: the so-called split-state tampering model. In the $t$-split-state model, the codeword (or code-state) is divided into $t$ shares, and each share is tampered with "locally". Previous research has primarily focused on settings where the adversaries' local quantum operations are assisted by an unbounded amount of pre-shared entanglement, while the code remains unentangled, either classical or separable.
We construct quantum TDCs and NMCs in several $\textit{resource-restricted}$ analogs of the split-state model, which are provably impossible using just classical codes. In particular, against split-state adversaries restricted to local (unentangled) operations, local operations and classical communication, as well as a "bounded storage model" where they are limited to a finite amount of pre-shared entanglement. We complement our code constructions in two directions. First, we present applications to designing secret sharing schemes, which inherit similar non-malleable and tamper-detection guarantees. Second, we discuss connections between our codes and quantum encryption schemes, which we leverage to prove singleton-type bounds on the capacity of certain families of quantum NMCs in the split-state model.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
Hadronic Structure, Conformal Maps, and Analytic Continuation
Authors:
Thomas Bergamaschi,
William I. Jay,
Patrick R. Oare
Abstract:
We present a method for analytic continuation of retarded Green functions, including Euclidean Green functions computed using lattice QCD. The method is based on conformal maps and construction of an interpolation function which is analytic in the upper half plane. A novel aspect of our method is rigorous bounding of systematic uncertainties, which are handled by constructing the full space of int…
▽ More
We present a method for analytic continuation of retarded Green functions, including Euclidean Green functions computed using lattice QCD. The method is based on conformal maps and construction of an interpolation function which is analytic in the upper half plane. A novel aspect of our method is rigorous bounding of systematic uncertainties, which are handled by constructing the full space of interpolating functions (at each point in the upper half-plane) consistent with the given Euclidean data and the constraints of analyticity. The resulting Green function in the upper half-plane has an appealing interpretation as a smeared spectral function.
△ Less
Submitted 13 June, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Pauli Manipulation Detection codes and Applications to Quantum Communication over Adversarial Channels
Authors:
Thiago Bergamaschi
Abstract:
We introduce and explicitly construct a quantum code we coin a "Pauli Manipulation Detection" code (or PMD), which detects every Pauli error with high probability. We apply them to construct the first near-optimal codes for two tasks in quantum communication over adversarial channels. Our main application is an approximate quantum code over qubits which can efficiently correct from a number of (wo…
▽ More
We introduce and explicitly construct a quantum code we coin a "Pauli Manipulation Detection" code (or PMD), which detects every Pauli error with high probability. We apply them to construct the first near-optimal codes for two tasks in quantum communication over adversarial channels. Our main application is an approximate quantum code over qubits which can efficiently correct from a number of (worst-case) erasure errors approaching the quantum Singleton bound. Our construction is based on the composition of a PMD code with a stabilizer code which is list-decodable from erasures.
Our second application is a quantum authentication code for "qubit-wise" channels, which does not require a secret key. Remarkably, this gives an example of a task in quantum communication which is provably impossible classically. Our construction is based on a combination of PMD codes, stabilizer codes, and classical non-malleable codes (Dziembowski et al., 2009), and achieves "minimal redundancy" (rate $1-o(1)$).
△ Less
Submitted 12 June, 2024; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Approaching the Quantum Singleton Bound with Approximate Error Correction
Authors:
Thiago Bergamaschi,
Louis Golowich,
Sam Gunn
Abstract:
It is well known that no quantum error correcting code of rate $R$ can correct adversarial errors on more than a $(1-R)/4$ fraction of symbols. But what if we only require our codes to *approximately* recover the message? We construct efficiently-decodable approximate quantum codes against adversarial error rates approaching the quantum Singleton bound of $(1-R)/2$, for any constant rate $R$. More…
▽ More
It is well known that no quantum error correcting code of rate $R$ can correct adversarial errors on more than a $(1-R)/4$ fraction of symbols. But what if we only require our codes to *approximately* recover the message? We construct efficiently-decodable approximate quantum codes against adversarial error rates approaching the quantum Singleton bound of $(1-R)/2$, for any constant rate $R$. Moreover, the size of the alphabet is a constant independent of the message length and the recovery error is exponentially small in the message length. Central to our construction is a notion of quantum list decoding and an implementation involving folded quantum Reed-Solomon codes.
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
Improved Product-state Approximation Algorithms for Quantum Local Hamiltonians
Authors:
Thiago Bergamaschi
Abstract:
The ground state energy and the free energy of Quantum Local Hamiltonians are fundamental quantities in quantum many-body physics, however, it is QMA-Hard to estimate them in general. In this paper, we develop new techniques to find classical, additive error product-state approximations for these quantities on certain families of Quantum $k$-Local Hamiltonians. Namely, those which are either dense…
▽ More
The ground state energy and the free energy of Quantum Local Hamiltonians are fundamental quantities in quantum many-body physics, however, it is QMA-Hard to estimate them in general. In this paper, we develop new techniques to find classical, additive error product-state approximations for these quantities on certain families of Quantum $k$-Local Hamiltonians. Namely, those which are either dense, have low threshold rank, or are defined on a sparse graph that excludes a fixed minor, building on the methods and the systems studied by Brandão and Harrow, Gharibian and Kempe, and Bansal, Bravyi and Terhal.
We present two main technical contributions. First, we discuss a connection between product-state approximations of local Hamiltonians and combinatorial graph property testing. We develop a series of weak Szemerédi regularity lemmas for $k$-local Hamiltonians, built on those of Frieze and Kannan and others. We use them to develop constant time sampling algorithms, and to characterize the `vertex sample complexity' of the Local Hamiltonian problem, in an analog to a classical result by Alon, de la Vega, Kannan and Karpinski. Second, we build on the information-theoretic product-state approximation techniques by Brandão and Harrow, extending their results to the free energy and to an asymmetric graph setting. We leverage this structure to define families of algorithms for the free energy at low temperatures, and new algorithms for certain sparse graph families.
△ Less
Submitted 16 October, 2022;
originally announced October 2022.
-
Demonstration of tunable three-body interactions between superconducting qubits
Authors:
Tim Menke,
William P. Banner,
Thomas R. Bergamaschi,
Agustin Di Paolo,
Antti Vepsäläinen,
Steven J. Weber,
Roni Winik,
Alexander Melville,
Bethany M. Niedzielski,
Danna Rosenberg,
Kyle Serniak,
Mollie E. Schwartz,
Jonilyn L. Yoder,
Alán Aspuru-Guzik,
Simon Gustavsson,
Jeffrey A. Grover,
Cyrus F. Hirjibehedin,
Andrew J. Kerman,
William D. Oliver
Abstract:
Nonpairwise multi-qubit interactions present a useful resource for quantum information processors. Their implementation would facilitate more efficient quantum simulations of molecules and combinatorial optimization problems, and they could simplify error suppression and error correction schemes. Here we present a superconducting circuit architecture in which a coupling module mediates 2-local and…
▽ More
Nonpairwise multi-qubit interactions present a useful resource for quantum information processors. Their implementation would facilitate more efficient quantum simulations of molecules and combinatorial optimization problems, and they could simplify error suppression and error correction schemes. Here we present a superconducting circuit architecture in which a coupling module mediates 2-local and 3-local interactions between three flux qubits by design. The system Hamiltonian is estimated via multi-qubit pulse sequences that implement Ramsey-type interferometry between all neighboring excitation manifolds in the system. The 3-local interaction is coherently tunable over several MHz via the coupler flux biases and can be turned off, which is important for applications in quantum annealing, analog quantum simulation, and gate-model quantum computation.
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
Distinguishing multi-spin interactions from lower-order effects
Authors:
Thomas R. Bergamaschi,
Tim Menke,
William P. Banner,
Agustin Di Paolo,
Steven J. Weber,
Cyrus F. Hirjibehedin,
Andrew J. Kerman,
William D. Oliver
Abstract:
Multi-spin interactions can be engineered with artificial quantum spins. However, it is challenging to verify such interactions experimentally. Here we describe two methods to characterize the $n$-local coupling of $n$ spins. First, we analyze the variation of the transition energy of the static system as a function of local spin fields. Standard measurement techniques are employed to distinguish…
▽ More
Multi-spin interactions can be engineered with artificial quantum spins. However, it is challenging to verify such interactions experimentally. Here we describe two methods to characterize the $n$-local coupling of $n$ spins. First, we analyze the variation of the transition energy of the static system as a function of local spin fields. Standard measurement techniques are employed to distinguish $n$-local interactions between up to five spins from lower-order contributions in the presence of noise and spurious fields and couplings. Second, we show a detection technique that relies on time dependent driving of the coupling term. Generalizations to larger system sizes are analyzed for both static and dynamic detection methods, and we find that the dynamic method is asymptotically optimal when increasing the system size. The proposed methods enable robust exploration of multi-spin interactions across a broad range of both coupling strengths and qubit modalities.
△ Less
Submitted 24 November, 2021;
originally announced November 2021.
-
Simulated Quantum Annealing is Efficient on the Spike Hamiltonian
Authors:
Thiago Bergamaschi
Abstract:
In this work we study the convergence of a classical algorithm called Simulated Quantum Annealing (SQA) on the Spike Hamiltonian, a specific toy model Hamiltonian for quantum-mechanical tunneling introduced by [FGG02]. This toy model Hamiltonian encodes a simple bit-symmetric cost function f in the computational basis, and is used to emulate local minima in more complex optimization problems. In p…
▽ More
In this work we study the convergence of a classical algorithm called Simulated Quantum Annealing (SQA) on the Spike Hamiltonian, a specific toy model Hamiltonian for quantum-mechanical tunneling introduced by [FGG02]. This toy model Hamiltonian encodes a simple bit-symmetric cost function f in the computational basis, and is used to emulate local minima in more complex optimization problems. In previous work [CH16] showed that SQA runs in polynomial time in much of the regime of spikes that QA does, pointing to evidence against an exponential speedup through tunneling. In this paper we extend their analysis to the remaining polynomial regime of energy gaps of the spike Hamiltonian, to show that indeed QA presents no exponential speedup with respect to SQA on this family of toy models.
△ Less
Submitted 30 November, 2020;
originally announced November 2020.
-
New Techniques and Fine-Grained Hardness for Dynamic Near-Additive Spanners
Authors:
Thiago Bergamaschi,
Monika Henzinger,
Maximilian Probst Gutenberg,
Virginia Vassilevska Williams,
Nicole Wein
Abstract:
Maintaining and updating shortest paths information in a graph is a fundamental problem with many applications. As computations on dense graphs can be prohibitively expensive, and it is preferable to perform the computations on a sparse skeleton of the given graph that roughly preserves the shortest paths information. Spanners and emulators serve this purpose. This paper develops fast dynamic algo…
▽ More
Maintaining and updating shortest paths information in a graph is a fundamental problem with many applications. As computations on dense graphs can be prohibitively expensive, and it is preferable to perform the computations on a sparse skeleton of the given graph that roughly preserves the shortest paths information. Spanners and emulators serve this purpose. This paper develops fast dynamic algorithms for sparse spanner and emulator maintenance and provides evidence from fine-grained complexity that these algorithms are tight.
Under the popular OMv conjecture, we show that there can be no decremental or incremental algorithm that maintains an $n^{1+o(1)}$ edge (purely additive) $+n^δ$-emulator for any $δ<1/2$ with arbitrary polynomial preprocessing time and total update time $m^{1+o(1)}$. Also, under the Combinatorial $k$-Clique hypothesis, any fully dynamic combinatorial algorithm that maintains an $n^{1+o(1)}$ edge $(1+ε,n^{o(1)})$-spanner or emulator must either have preprocessing time $mn^{1-o(1)}$ or amortized update time $m^{1-o(1)}$. Both of our conditional lower bounds are tight.
As the above fully dynamic lower bound only applies to combinatorial algorithms, we also develop an algebraic spanner algorithm that improves over the $m^{1-o(1)}$ update time for dense graphs. For any constant $ε\in (0,1]$, there is a fully dynamic algorithm with worst-case update time $O(n^{1.529})$ that whp maintains an $n^{1+o(1)}$ edge $(1+ε,n^{o(1)})$-spanner.
Our new algebraic techniques and spanner algorithms allow us to also obtain (1) a new fully dynamic algorithm for All-Pairs Shortest Paths (APSP) with update and path query time $O(n^{1.9})$; (2) a fully dynamic $(1+ε)$-approximate APSP algorithm with update time $O(n^{1.529})$; (3) a fully dynamic algorithm for near-$2$-approximate Steiner tree maintenance.
△ Less
Submitted 20 September, 2021; v1 submitted 20 October, 2020;
originally announced October 2020.