-
Scalable improvement of the generalized Toffoli gate realization using trapped-ion-based qutrits
Authors:
Anastasiia S. Nikolaeva,
Ilia V. Zalivako,
Alexander S. Borisenko,
Nikita V. Semenin,
Kristina P. Galstyan,
Andrey E. Korolkov,
Evgeniy O. Kiktenko,
Ksenia Yu. Khabarova,
Ilya A. Semerikov,
Aleksey K. Fedorov,
Nikolay N. Kolachevsky
Abstract:
An efficient implementation of the Toffoli gate is of conceptual importance for running various quantum algorithms, including Grover's search and Shor's integer factorization. However, direct realizations of the Toffoli gate require either a prohibitive growth of the number of two-qubit gates or using ancilla qubits, whereas both of these resources are limited in the current generation of noisy in…
▽ More
An efficient implementation of the Toffoli gate is of conceptual importance for running various quantum algorithms, including Grover's search and Shor's integer factorization. However, direct realizations of the Toffoli gate require either a prohibitive growth of the number of two-qubit gates or using ancilla qubits, whereas both of these resources are limited in the current generation of noisy intermediate-scale quantum devices. Here we experimentally demonstrate a scalable improvement of the realization of the Toffoli gate using $^{171}$Yb$^{+}$ trapped-ion-based dual-type optic-microwave qutrits ($d=3$) for the cases of three-, four-qubit and five-qubit versions of the Toffoli gate. With the use of the Molmer-Sorensen gate as a basic two-particle operation, we compare the standard qubit decomposition with the qutrit approach, where upper levels are used as ancillas. The presented decomposition requires only global control of the ancilla levels, which simplifies experimental implementation of the proposed approach. We present an estimation of the scalable improvement of our approach in the case of multi-qubit gates. As we expect, by combining this approach with the leveraging qudits ($d\geq4$) as a set of qubits, our approach may lead to a more efficient realization of various quantum algorithms. With qutrit-based decomposition in Grover's search with three ions, we experimentally demonstrate the 10\% increase in the average algorithm performance.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Supervised binary classification of small-scale digits images with a trapped-ion quantum processor
Authors:
Ilia V. Zalivako,
Alexander I. Gircha,
Anastasiia S. Nikolaeva,
Denis A. Drozhzhin,
Alexander S. Borisenko,
Andrei E. Korolkov,
Nikita V. Semenin,
Kristina P. Galstyan,
Pavel A. Kamenskikh,
Vasilii N. Smirnov,
Mikhail A. Aksenov,
Pavel L. Sidorov,
Evgeniy O. Kiktenko,
Ksenia Yu. Khabarova,
Aleksey K. Fedorov,
Nikolay N. Kolachevsky,
Ilya A. Semerikov
Abstract:
Here we present the results of benchmarking of a quantum processor based on trapped $^{171}$Yb$^{+}$ ions by performing basic quantum machine learning algorithms. Specifically, we carry out a supervised binary classification of small-scale digits images, which are intentionally chosen so that they can be classified with 100% accuracy, using a quantum-enhanced Support Vector Machine algorithm with…
▽ More
Here we present the results of benchmarking of a quantum processor based on trapped $^{171}$Yb$^{+}$ ions by performing basic quantum machine learning algorithms. Specifically, we carry out a supervised binary classification of small-scale digits images, which are intentionally chosen so that they can be classified with 100% accuracy, using a quantum-enhanced Support Vector Machine algorithm with up to four qubits. In our work, we specifically consider different types of quantum encodings of the dataset and different levels of transpilation optimizations for the corresponding quantum circuits. For each quantum encoding, we obtain a classifier that is of 100% accuracy on both training and test sets, which demonstrates that the quantum processor can correctly solve the basic classification task considered. As we expect, with the increase of the capabilities quantum processors, they can become a useful tool for machine learning.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Barren plateaus are swamped with traps
Authors:
Nikita A. Nemkov,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov
Abstract:
Two main challenges preventing efficient training of variational quantum algorithms and quantum machine learning models are local minima and barren plateaus. Typically, barren plateaus are associated with deep circuits, while shallow circuits have been shown to suffer from suboptimal local minima. We point out a simple mechanism that creates exponentially many poor local minima specifically in the…
▽ More
Two main challenges preventing efficient training of variational quantum algorithms and quantum machine learning models are local minima and barren plateaus. Typically, barren plateaus are associated with deep circuits, while shallow circuits have been shown to suffer from suboptimal local minima. We point out a simple mechanism that creates exponentially many poor local minima specifically in the barren plateau regime. These local minima are trivial solutions, optimizing only a few terms in the loss function, leaving the rest on their barren plateaus. More precisely, we show the existence of approximate local minima, optimizing a single loss term, and conjecture the existence of exact local minima, optimizing only a logarithmic fraction of all loss function terms. One implication of our findings is that simply yielding large gradients is not sufficient to render an initialization strategy a meaningful solution to the barren plateau problem.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
Achieving the volume-law entropy regime with random-sign Dicke states
Authors:
Oleg M. Sotnikov,
Ilia A. Iakovlev,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov,
Vladimir V. Mazurenko
Abstract:
Manipulating entanglement, which reflects non-local correlations in a quantum system and defines the complexity of describing its wave function, represents the extremely tough challenge in the fields of quantum computing, quantum information, and condensed matter physics. In this work, by the example of the well-structured Dicke states we demonstrate that the complexity of these real-valued wave f…
▽ More
Manipulating entanglement, which reflects non-local correlations in a quantum system and defines the complexity of describing its wave function, represents the extremely tough challenge in the fields of quantum computing, quantum information, and condensed matter physics. In this work, by the example of the well-structured Dicke states we demonstrate that the complexity of these real-valued wave functions can be accurately tuned by introducing a random-sign structure, which allows us to explore the regime of the volume-law entanglement. Importantly, setting nontrivial sign structure one can increase the entanglement entropy of the Dicke state to the values that are close to Page's estimates for Haar-random states. The practical realization of these random-sign Dicke states is possible on different physical platforms with shallow quantum circuits. On the level of the measurements the change in the quantum state complexity due to sign structure can be traced out with the dissimilarity measure that estimates multi-scale variety of patterns in bit-string arrays.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
What is computable and non-computable in the quantum domain: 7 statements and 3 conjectures
Authors:
Aleksey K. Fedorov,
Evgeniy O. Kiktenko
Abstract:
Recent progress in develo** computational devices based on quantum effects and demonstrations of solving various tasks using them has actualized the question of the origin of the quantum advantage. Although various attempts to quantify and characterize the nature of quantum computational advantage have been made, this question in the general context remains open: There is no universal approach t…
▽ More
Recent progress in develo** computational devices based on quantum effects and demonstrations of solving various tasks using them has actualized the question of the origin of the quantum advantage. Although various attempts to quantify and characterize the nature of quantum computational advantage have been made, this question in the general context remains open: There is no universal approach that helps to define a scope of problems that quantum computers are able to speed up, theoretically and in practice. Here we review an approach to this question based on the concept of complexity and reachability of quantum states. On the one hand, the class of quantum states that is of interest for quantum computing should be complex, i.e. non-simulatable with classical computers with less than exponential resources. On the other hand, such quantum states should be reachable on a practical quantum computer. This means that a unitary corresponding to the transformation of quantum states from initial to desired can be decomposed in a sequence of single- and two-qubit gates with of no more than polynomial in the number of qubits. Our consideration paves the way towards understanding the scope of problems that can be solved by a quantum computer by formulating a sequence of statements and conjectures on various sets of quantum states.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Towards multiqudit quantum processor based on a $^{171}$Yb$^{+}$ ion string: Realizing basic quantum algorithms
Authors:
Ilia V. Zalivako,
Anastasiia S. Nikolaeva,
Alexander S. Borisenko,
Andrei E. Korolkov,
Pavel L. Sidorov,
Kristina P. Galstyan,
Nikita V. Semenin,
Vasilii N. Smirnov,
Mikhail A. Aksenov,
Konstantin M. Makushin,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov,
Ilya A. Semerikov,
Ksenia Yu. Khabarova,
Nikolay N. Kolachevsky
Abstract:
We demonstrate a quantum processor based on a 3D linear Paul trap that uses $^{171}$Yb$^{+}$ ions with 8 individually controllable four-level qudits (ququarts), which is computationally equivalent to a 16-qubit quantum processor. The design of the developed ion trap provides high secular frequencies, low heating rate, which together with individual addressing and readout optical systems allows exe…
▽ More
We demonstrate a quantum processor based on a 3D linear Paul trap that uses $^{171}$Yb$^{+}$ ions with 8 individually controllable four-level qudits (ququarts), which is computationally equivalent to a 16-qubit quantum processor. The design of the developed ion trap provides high secular frequencies, low heating rate, which together with individual addressing and readout optical systems allows executing quantum algorithms. In each of the 8 ions, we use four electronic levels coupled by E2 optical transition at 435nm for qudit encoding. We present the results of single- and two- qubit operations benchmarking, generation of a 5-particle Greenberger-Horne-Zeilinger entangled state, and realizing basic quantum algorithms, including Bernstein-Vazirani and Grover's search algorithms as well as H$_2$ and LiH molecular simulations. Our results pave the way to scalable qudit-based quantum processors using trapped ions.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Realization of quantum algorithms with qudits
Authors:
Evgeniy O. Kiktenko,
Anastasiia S. Nikolaeva,
Aleksey K. Fedorov
Abstract:
The paradigm behind digital quantum computing inherits the idea of using binary information processing. The nature in fact gives much more rich structures of physical objects that can be used for encoding information, which is especially interesting in the quantum mechanical domain. In this Colloquium, we review several ideas indicating how multilevel quantum systems, also known as qudits, can be…
▽ More
The paradigm behind digital quantum computing inherits the idea of using binary information processing. The nature in fact gives much more rich structures of physical objects that can be used for encoding information, which is especially interesting in the quantum mechanical domain. In this Colloquium, we review several ideas indicating how multilevel quantum systems, also known as qudits, can be used for efficient realization of quantum algorithms, which are represented via standard qubit circuits. We focus on techniques of leveraging qudits for simplifying decomposition of multiqubit gates, and for compressing quantum information by encoding multiple qubits in a single qudit. As we discuss, these approaches can be efficiently combined. This allows reducing in the number of entangling (two-body) operations and the number of the used quantum information carriers compared to straightforward qubit realizations. These theoretical schemes can be implemented with quantum computing platforms of various nature, such as trapped ions, neutral atoms, superconducting junctions, and quantum light. We conclude with summarizing a set of open problems, whose resolving is an important further step towards employing universal qudit-based processors for running qubit algorithms.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Demonstration of a parity-time symmetry breaking phase transition using superconducting and trapped-ion qutrits
Authors:
Alena S. Kazmina,
Ilia V. Zalivako,
Alexander S. Borisenko,
Nikita A. Nemkov,
Anastasiia S. Nikolaeva,
Ilya A. Simakov,
Arina V. Kuznetsova,
Elena Yu. Egorova,
Kristina P. Galstyan,
Nikita V. Semenin,
Andrey E. Korolkov,
Ilya N. Moskalenko,
Nikolay N. Abramov,
Ilya S. Besedin,
Daria A. Kalacheva,
Viktor B. Lubsanov,
Aleksey N. Bolgar,
Evgeniy O. Kiktenko,
Ksenia Yu. Khabarova,
Alexey Galda,
Ilya A. Semerikov,
Nikolay N. Kolachevsky,
Nataliya Maleeva,
Aleksey K. Fedorov
Abstract:
Scalable quantum computers hold the promise to solve hard computational problems, such as prime factorization, combinatorial optimization, simulation of many-body physics, and quantum chemistry. While being key to understanding many real-world phenomena, simulation of non-conservative quantum dynamics presents a challenge for unitary quantum computation. In this work, we focus on simulating non-un…
▽ More
Scalable quantum computers hold the promise to solve hard computational problems, such as prime factorization, combinatorial optimization, simulation of many-body physics, and quantum chemistry. While being key to understanding many real-world phenomena, simulation of non-conservative quantum dynamics presents a challenge for unitary quantum computation. In this work, we focus on simulating non-unitary parity-time symmetric systems, which exhibit a distinctive symmetry-breaking phase transition as well as other unique features that have no counterpart in closed systems. We show that a qutrit, a three-level quantum system, is capable of realizing this non-equilibrium phase transition. By using two physical platforms -- an array of trapped ions and a superconducting transmon -- and by controlling their three energy levels in a digital manner, we experimentally simulate the parity-time symmetry-breaking phase transition. Our results indicate the potential advantage of multi-level (qudit) processors in simulating physical effects, where additional accessible levels can play the role of a controlled environment.
△ Less
Submitted 27 March, 2024; v1 submitted 31 October, 2023;
originally announced October 2023.
-
Eurasian-Scale Experimental Satellite-based Quantum Key Distribution with Detector Efficiency Mismatch Analysis
Authors:
Aleksandr V. Khmelev,
Alexey V. Duplinsky,
Ruslan M. Bakhshaliev,
Egor I. Ivchenko,
Liubov V. Pismeniuk,
Vladimir F. Mayboroda,
Ivan S. Nesterov,
Arkadiy N. Chernov,
Anton S. Trushechkin,
Evgeniy O. Kiktenko,
Vladimir L. Kurochkin,
Aleksey K. Fedorov
Abstract:
The Micius satellite is the pioneering initiative to demonstrate quantum teleportation, entanglement distribution, quantum key distribution (QKD), and quantum-secured communications experiments at the global scale. In this work, we report on the results of the 600-mm-aperture ground station design which has enabled the establishment of a quantum-secured link between the Zvenigorod and Nanshan grou…
▽ More
The Micius satellite is the pioneering initiative to demonstrate quantum teleportation, entanglement distribution, quantum key distribution (QKD), and quantum-secured communications experiments at the global scale. In this work, we report on the results of the 600-mm-aperture ground station design which has enabled the establishment of a quantum-secured link between the Zvenigorod and Nanshan ground stations using the Micius satellite. As a result of a quantum communications session, an overall sifted key of 2.5 Mbits and a total final key length of 310 kbits have been obtained. We present an extension of the security analysis of the realization of satellite-based QKD decoy-state protocol by taking into account the effect of the detection-efficiency mismatch for four detectors. We also simulate the QKD protocol for the satellite passage and by that validate our semi-empirical model for a realistic receiver, which is in good agreement with the experimental data. Our results pave the way to the considerations of realistic imperfection of the QKD systems, which are important in the context of their practical security.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
Quantum and quantum-inspired optimization for an in-core fuel management problem
Authors:
Sergey R. Usmanov,
Gleb V. Salakhov,
Anton A. Bozhedarov,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov
Abstract:
Operation management of nuclear power plants consists of several computationally hard problems. Searching for an in-core fuel loading pattern is among them. The main challenge of this combinatorial optimization problem is the exponential growth of the search space with a number of loading elements. Here we study a reloading problem in a Quadratic Unconstrained Binary Optimization (QUBO) form. Such…
▽ More
Operation management of nuclear power plants consists of several computationally hard problems. Searching for an in-core fuel loading pattern is among them. The main challenge of this combinatorial optimization problem is the exponential growth of the search space with a number of loading elements. Here we study a reloading problem in a Quadratic Unconstrained Binary Optimization (QUBO) form. Such a form allows us to apply various techniques, including quantum annealing, classical simulated annealing, and quantum-inspired algorithms in order to find fuel reloading patterns for several realistic configurations of nuclear reactors. We present the results of benchmarking the in-core fuel management problem in the QUBO form using the aforementioned computational techniques. This work demonstrates potential applications of quantum computers and quantum-inspired algorithms in the energy industry.
△ Less
Submitted 25 August, 2023;
originally announced August 2023.
-
Reliable confidence regions for quantum tomography using distribution moments
Authors:
D. O. Norkin,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
Quantum tomography is a widely applicable method for reconstructing unknown quantum states and processes. However, its applications in quantum technologies usually also require estimating the difference between prepared and target quantum states with reliable confidence intervals. In this work we suggest a computationally efficient and reliable scheme for determining well-justified error bars for…
▽ More
Quantum tomography is a widely applicable method for reconstructing unknown quantum states and processes. However, its applications in quantum technologies usually also require estimating the difference between prepared and target quantum states with reliable confidence intervals. In this work we suggest a computationally efficient and reliable scheme for determining well-justified error bars for quantum tomography. We approximate the probability distribution of the Hilbert-Schmidt distance between the target state and the estimation, which is given by the linear inversion, by calculating its two moments. We also present a generalization of this approach for quantum process tomography and deriving confidence intervals for affine functions. We benchmark our approach for a number of quantum tomography protocols using both simulation and demonstration with the use of a cloud-accessible quantum processor. The obtained results pave the way for the use of the suggested scheme for the complete characterization of quantum systems of various natures.
△ Less
Submitted 19 March, 2024; v1 submitted 24 July, 2023;
originally announced July 2023.
-
Minimizing the negativity of quantum circuits in overcomplete quasiprobability representations
Authors:
Denis A. Kulikov,
Vsevolod I. Yashin,
Aleksey K. Fedorov,
Evgeniy O. Kiktenko
Abstract:
The problem of simulatability of quantum processes using classical resources plays a cornerstone role for quantum computing. Quantum circuits can be simulated classically, e.g., using Monte Carlo sampling techniques applied to quasiprobability representations of circuits' basic elements, i.e., states, gates, and measurements. The effectiveness of the simulation is determined by the amount of the n…
▽ More
The problem of simulatability of quantum processes using classical resources plays a cornerstone role for quantum computing. Quantum circuits can be simulated classically, e.g., using Monte Carlo sampling techniques applied to quasiprobability representations of circuits' basic elements, i.e., states, gates, and measurements. The effectiveness of the simulation is determined by the amount of the negativity in the representation of these basic elements. Here we develop an approach for minimizing the total negativity of a given quantum circuit with respect to quasiprobability representations, that are overcomplete, i.e., are such that the dimensionality of corresponding quasistochastic vectors and matrices is larger than the squared dimension of quantum states. Our approach includes both optimization over equivalent quasistochastic vectors and matrices, which appear due to the overcompleteness, and optimization over overcomplete frames. We demonstrate the performance of the developed approach on some illustrative cases, and show its significant advantage compared to the standard overcomplete quasistochastic representations. We also study the negativity minimization of noisy brick-wall random circuits via a combination of increasing frame dimension and applying gate merging technique. We demonstrate that the former approach appears to be more efficient in the case of a strong decoherence.
△ Less
Submitted 8 February, 2024; v1 submitted 19 June, 2023;
originally announced June 2023.
-
Benchmarking a boson sampler with Hamming nets
Authors:
Ilia A. Iakovlev,
Oleg M. Sotnikov,
Ivan V. Dyakonov,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov,
Stanislav S. Straupe,
Vladimir V. Mazurenko
Abstract:
Analyzing the properties of complex quantum systems is crucial for further development of quantum devices, yet this task is typically challenging and demanding with respect to required amount of measurements. A special attention to this problem appears within the context of characterizing outcomes of noisy intermediate-scale quantum devices, which produce quantum states with specific properties so…
▽ More
Analyzing the properties of complex quantum systems is crucial for further development of quantum devices, yet this task is typically challenging and demanding with respect to required amount of measurements. A special attention to this problem appears within the context of characterizing outcomes of noisy intermediate-scale quantum devices, which produce quantum states with specific properties so that it is expected to be hard to simulate such states using classical resources. In this work, we address the problem of characterization of a boson sampling device, which uses interference of input photons to produce samples of non-trivial probability distributions that at certain condition are hard to obtain classically. For realistic experimental conditions the problem is to probe multi-photon interference with a limited number of the measurement outcomes without collisions and repetitions. By constructing networks on the measurements outcomes, we demonstrate a possibility to discriminate between regimes of indistinguishable and distinguishable bosons by quantifying the structures of the corresponding networks. Based on this we propose a machine-learning-based protocol to benchmark a boson sampler with unknown scattering matrix. Notably, the protocol works in the most challenging regimes of having a very limited number of bitstrings without collisions and repetitions. As we expect, our framework can be directly applied for characterizing boson sampling devices that are currently available in experiments.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Fourier expansion in variational quantum algorithms
Authors:
Nikita A. Nemkov,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov
Abstract:
The Fourier expansion of the loss function in variational quantum algorithms (VQA) contains a wealth of information, yet is generally hard to access. We focus on the class of variational circuits, where constant gates are Clifford gates and parameterized gates are generated by Pauli operators, which covers most practical cases while allowing much control thanks to the properties of stabilizer circ…
▽ More
The Fourier expansion of the loss function in variational quantum algorithms (VQA) contains a wealth of information, yet is generally hard to access. We focus on the class of variational circuits, where constant gates are Clifford gates and parameterized gates are generated by Pauli operators, which covers most practical cases while allowing much control thanks to the properties of stabilizer circuits. We give a classical algorithm that, for an $N$-qubit circuit and a single Pauli observable, computes coefficients of all trigonometric monomials up to a degree $m$ in time bounded by $\mathcal{O}(N2^m)$. Using the general structure and implementation of the algorithm we reveal several novel aspects of Fourier expansions in Clifford+Pauli VQA such as (i) reformulating the problem of computing the Fourier series as an instance of multivariate boolean quadratic system (ii) showing that the approximation given by a truncated Fourier expansion can be quantified by the $L^2$ norm and evaluated dynamically (iii) tendency of Fourier series to be rather sparse and Fourier coefficients to cluster together (iv) possibility to compute the full Fourier series for circuits of non-trivial sizes, featuring tens to hundreds of qubits and parametric gates.
△ Less
Submitted 16 April, 2023; v1 submitted 7 April, 2023;
originally announced April 2023.
-
Pitfalls of the sublinear QAOA-based factorization algorithm
Authors:
Sergey V. Grebnev,
Maxim A. Gavreev,
Evgeniy O. Kiktenko,
Anton P. Guglya,
Albert R. Efimov,
Aleksey K. Fedorov
Abstract:
Quantum computing devices are believed to be powerful in solving the prime factorization problem, which is at the heart of widely deployed public-key cryptographic tools. However, the implementation of Shor's quantum factorization algorithm requires significant resources scaling linearly with the number size; taking into account an overhead that is required for quantum error correction the estimat…
▽ More
Quantum computing devices are believed to be powerful in solving the prime factorization problem, which is at the heart of widely deployed public-key cryptographic tools. However, the implementation of Shor's quantum factorization algorithm requires significant resources scaling linearly with the number size; taking into account an overhead that is required for quantum error correction the estimation is that 20 millions of (noisy) physical qubits are required for factoring 2048-bit RSA key in 8 hours. Recent proposal by Yan et al. claims a possibility of solving the factorization problem with sublinear quantum resources. As we demonstrate in our work, this proposal lacks systematic analysis of the computational complexity of the classical part of the algorithm, which exploits the Schnorr's lattice-based approach. We provide several examples illustrating the need in additional resource analysis for the proposed quantum factorization algorithm.
△ Less
Submitted 14 December, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Universal quantum computing with qubits embedded in trapped-ion qudits
Authors:
Anastasiia S. Nikolaeva,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov
Abstract:
Recent developments in qudit-based quantum computing, in particular with trapped ions, open interesting possibilities for scaling quantum processors without increasing the number of physical information carriers. In this work, we propose a method for compiling quantum circuits in the case, where qubits are embedded into qudits of experimentally relevant dimensionalities, $d=3,\ldots,8$, for the tr…
▽ More
Recent developments in qudit-based quantum computing, in particular with trapped ions, open interesting possibilities for scaling quantum processors without increasing the number of physical information carriers. In this work, we propose a method for compiling quantum circuits in the case, where qubits are embedded into qudits of experimentally relevant dimensionalities, $d=3,\ldots,8$, for the trapped-ion platform. In particular, we demonstrate how single-qubit, two-qubit, and multiqubit gates can be realized using single-qudit operations and the Molmer-Sorensen (MS) gate as a basic two-particle operation. We expect that our findings are directly applicable to trapped-ion-based qudit processors.
△ Less
Submitted 1 July, 2024; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Quantum and quantum-inspired optimization for solving the minimum bin packing problem
Authors:
A. A. Bozhedarov,
A. S. Boev,
S. R. Usmanov,
G. V. Salahov,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
Quantum computing devices are believed to be powerful in solving hard computational tasks, in particular, combinatorial optimization problems. In the present work, we consider a particular type of the minimum bin packing problem, which can be used for solving the problem of filling spent nuclear fuel in deep-repository canisters that is relevant for atomic energy industry. We first redefine the af…
▽ More
Quantum computing devices are believed to be powerful in solving hard computational tasks, in particular, combinatorial optimization problems. In the present work, we consider a particular type of the minimum bin packing problem, which can be used for solving the problem of filling spent nuclear fuel in deep-repository canisters that is relevant for atomic energy industry. We first redefine the aforementioned problem it in terms of quadratic unconstrained binary optimization. Such a representation is natively compatible with existing quantum annealing devices as well as quantum-inspired algorithms. We then present the results of the numerical comparison of quantum and quantum-inspired methods. Results of our study indicate on the possibility to solve industry-relevant problems of atomic energy industry using quantum and quantum-inspired optimization.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Generalized Toffoli gate decomposition using ququints: Towards realizing Grover's algorithm with qudits
Authors:
Anastasiia S. Nikolaeva,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov
Abstract:
Qubits, which are quantum counterparts of classical bits, are used as basic information units for quantum information processing, whereas underlying physical information carriers, e.g. (artificial) atoms or ions, admit encoding of more complex multilevel states -- qudits. Recently, significant attention is paid to the idea of using qudit encoding as a way for further scaling quantum processors. In…
▽ More
Qubits, which are quantum counterparts of classical bits, are used as basic information units for quantum information processing, whereas underlying physical information carriers, e.g. (artificial) atoms or ions, admit encoding of more complex multilevel states -- qudits. Recently, significant attention is paid to the idea of using qudit encoding as a way for further scaling quantum processors. In this work, we present an efficient decomposition of the generalized Toffoli gate on the five-level quantum systems, so-called ququints, that uses ququints' space as the space of two qubits with a joint ancillary state. The basic two-qubit operation that we use is a version of controlled-phase gate. The proposed $N$-qubit Toffoli gate decomposition has $O(N)$ asymptotic depth using no ancillary qubits. We then apply our results for Grover's algorithm, where we indicate on the sizable advantage of the using qudit-based approach with the proposed decomposition. We expect that our results are applicable for quantum processors based on various physical platforms.
△ Less
Submitted 27 February, 2023; v1 submitted 23 December, 2022;
originally announced December 2022.
-
Quantum-inspired optimization for wavelength assignment
Authors:
Aleksey S. Boev,
Sergey R. Usmanov,
Alexander M. Semenov,
Maria M. Ushakova,
Gleb V. Salahov,
Alena S. Mastiukova,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov
Abstract:
Problems related to wavelength assignment (WA) in optical communications networks involve allocating transmission wavelengths for known transmission paths between nodes that minimize a certain objective function, for example, the total number of wavelengths. Playing a central role in modern telecommunications, this problem belongs to NP-complete class for a general case, so that obtaining optimal…
▽ More
Problems related to wavelength assignment (WA) in optical communications networks involve allocating transmission wavelengths for known transmission paths between nodes that minimize a certain objective function, for example, the total number of wavelengths. Playing a central role in modern telecommunications, this problem belongs to NP-complete class for a general case, so that obtaining optimal solutions for industry relevant cases is exponentially hard. In this work, we propose and develop a quantum-inspired algorithm for solving the wavelength assignment problem. We propose an advanced embedding procedure for this problem into the quadratic unconstrained binary optimization (QUBO) form having an improvement in the number of iterations with price-to-pay being a slight increase in the number of variables ("spins"). Then we compare a quantum-inspired technique for solving the corresponding QUBO form against classical heuristic and industrial combinatorial solvers. The obtained numerical results indicate on an advantage of the quantum-inspired approach in a substantial number of test cases against the industrial combinatorial solver that works in the standard setting. Our results pave the way to the use of quantum-inspired algorithms for practical problems in telecommunications and open a perspective for the further analysis of the employ of quantum computing devices.
△ Less
Submitted 19 January, 2023; v1 submitted 1 November, 2022;
originally announced November 2022.
-
Exploring postselection-induced quantum phenomena with time-bidirectional state formalism
Authors:
Evgeniy O. Kiktenko
Abstract:
Here we present the time-bidirectional state formalism (TBSF) unifying in a general manner the standard quantum mechanical formalism with no postselection and the time-symmetrized two-state (density) vector formalism, which deals with postselected states. In the proposed approach, a quantum particle's state, called a time-bidirectional state, is equivalent to a joined state of two particles propag…
▽ More
Here we present the time-bidirectional state formalism (TBSF) unifying in a general manner the standard quantum mechanical formalism with no postselection and the time-symmetrized two-state (density) vector formalism, which deals with postselected states. In the proposed approach, a quantum particle's state, called a time-bidirectional state, is equivalent to a joined state of two particles propagating in opposite time directions. For a general time-bidirectional state, we derive outcome probabilities of generalized measurements, as well as mean and weak values of Hermitian observables. We also show how the obtained expressions reduce to known ones in the special cases of no postselection and generalized two-state (density) vectors. Then we develop tomography protocols based on mutually unbiased bases and a symmetric informationally complete positive operator-valued measure, allowing experimental reconstruction of an unknown single qubit time-bidirectional state. Finally, we employ the developed techniques for tracking of a qubit's time-reversal journey in a quantum teleportation protocol realized with a cloud-accessible noisy superconducting quantum processor. The obtained results justify an existence of a postselection-induced qubit's proper time-arrow, which is different from the time-arrow of a classical observer, and demonstrate capabilities of the TBSF for exploring quantum phenomena brought forth by a postselection in the presence of noise.
△ Less
Submitted 23 March, 2023; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Suppressing decoherence in quantum state transfer with unitary operations
Authors:
Maxim A. Gavreev,
Evgeniy O. Kiktenko,
Alena S. Mastiukova,
Aleksey K. Fedorov
Abstract:
Decoherence is the fundamental obstacle limiting the performance of quantum information processing devices. The problem of transmitting a quantum state (known or unknown) from one place to another is of great interest in this context. In this work, by following the recent theoretical proposal [Opt. Eng. {\bf 59}, 061625 (2020)] we study an application of quantum state-dependent pre- and post-proce…
▽ More
Decoherence is the fundamental obstacle limiting the performance of quantum information processing devices. The problem of transmitting a quantum state (known or unknown) from one place to another is of great interest in this context. In this work, by following the recent theoretical proposal [Opt. Eng. {\bf 59}, 061625 (2020)] we study an application of quantum state-dependent pre- and post-processing unitary operations for protecting the given (multi-qubit) quantum state against the effect of decoherence acting on all qubits. We observe the increase in the fidelity of the output quantum state both in a quantum emulation experiment, where all protecting unitaries are perfect, and in a real experiment with a cloud-accessible quantum processor, where protecting unitaries themselves are affected by the noise. We expect the considered approach can be useful for analyzing capabilities of quantum information processing devices in transmitting known quantum states. We also demonstrate an applicability of the developed approach for suppressing decoherence in the process of distributing a two-qubit state over remote physical qubits of a quantum processor.
△ Less
Submitted 11 January, 2023; v1 submitted 9 August, 2022;
originally announced August 2022.
-
Realizing a class of stabilizer quantum error correction codes using a single ancilla and circular connectivity
Authors:
A. V. Antipov,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
We describe a class of "neighboring-blocks" stabilizer quantum error correction codes and demonstrate that such class of codes can be implemented in a resource-efficient manner using a single ancilla and circular near-neighbor qubit connectivity. We propose an implementation for syndrome-measurement circuits for codes from the class and illustrate its workings for cases of 3-qubit repetition code,…
▽ More
We describe a class of "neighboring-blocks" stabilizer quantum error correction codes and demonstrate that such class of codes can be implemented in a resource-efficient manner using a single ancilla and circular near-neighbor qubit connectivity. We propose an implementation for syndrome-measurement circuits for codes from the class and illustrate its workings for cases of 3-qubit repetition code, Laflamme's 5-qubit code, and Shor's 9-qubit code. For 3-qubit repetition code and Laflamme's 5-qubit code suggested scheme has the property that it uses only native two-qubit CNS gates, which potentially reduces the amount of non-correctable errors due to the shorter gate time. Elements of the scheme can be used to implement surface code with near-neighbour connectivity using single ancilla, as demonstrated in an example. We developed efficient decoding procedures for repetition codes and the Laflamme's 5-qubit code using a minimum weight-perfect matching approach to account for the specific order of measurements in our scheme. The analysis of noise levels for which the scheme could show improvements in the fidelity of a stored logical qubit in the 3-qubit repetition code and Laflamme's 5-qubit code cases is provided. We complement our results by realizing the developed scheme for a 3-qubit code using an IBM quantum processor and the Laflamme's 5-qubit code using the state-vector simulator.
△ Less
Submitted 4 March, 2023; v1 submitted 27 July, 2022;
originally announced July 2022.
-
Continuous monitoring for noisy intermediate-scale quantum processors
Authors:
Y. F. Zolotarev,
I. A. Luchnikov,
J. A. López-Saldívar,
A. K. Fedorov,
E. O. Kiktenko
Abstract:
We present a continuous monitoring system for intermediate-scale quantum processors that allows extracting estimates of noisy native gate and read-out measurements based on the set of executed quantum circuits and resulting measurement outcomes. In contrast to standard approaches for calibration and benchmarking quantum processors, the executed circuits, which are input to the monitoring system, a…
▽ More
We present a continuous monitoring system for intermediate-scale quantum processors that allows extracting estimates of noisy native gate and read-out measurements based on the set of executed quantum circuits and resulting measurement outcomes. In contrast to standard approaches for calibration and benchmarking quantum processors, the executed circuits, which are input to the monitoring system, are assumed to be out of any control. We provide the results of applying our system to the synthetically generated data obtained from a quantum emulator, as well as to the experimental data collected from a publicly accessible cloud-based quantum processor. In the both cases, we demonstrate that the developed approach provides valuable results about inherent noises of emulators/processors. Considering that our approach uses only already accessible data from implemented circuits without the need to run additional algorithms, the monitoring system can complement existing approaches. We expect that our monitoring system can become a useful tool for various quantum computers in the near-term horizon, including publicly accessible cloud-based platforms, and reduce resources that are required for their benchmarking and calibration.
△ Less
Submitted 10 January, 2023; v1 submitted 12 May, 2022;
originally announced May 2022.
-
Efficient variational synthesis of quantum circuits with coherent multi-start optimization
Authors:
Nikita A. Nemkov,
Evgeniy O. Kiktenko,
Ilia A. Luchnikov,
Aleksey K. Fedorov
Abstract:
We consider the problem of the variational quantum circuit synthesis into a gate set consisting of the CNOT gate and arbitrary single-qubit (1q) gates with the primary target being the minimization of the CNOT count. First we note that along with the discrete architecture search suffering from the combinatorial explosion of complexity, optimization over 1q gates can also be a crucial roadblock due…
▽ More
We consider the problem of the variational quantum circuit synthesis into a gate set consisting of the CNOT gate and arbitrary single-qubit (1q) gates with the primary target being the minimization of the CNOT count. First we note that along with the discrete architecture search suffering from the combinatorial explosion of complexity, optimization over 1q gates can also be a crucial roadblock due to the omnipresence of local minimums (well known in the context of variational quantum algorithms but apparently underappreciated in the context of the variational compiling). Taking the issue seriously, we make an extensive search over the initial conditions an essential part of our approach. Another key idea we propose is to use parametrized two-qubit (2q) controlled phase gates, which can interpolate between the identity gate and the CNOT gate, and allow a continuous relaxation of the discrete architecture search, which can be executed jointly with the optimization over 1q gates. This coherent optimization of the architecture together with 1q gates appears to work surprisingly well in practice, sometimes even outperforming optimization over 1q gates alone (for fixed optimal architectures). As illustrative examples and applications we derive 8 CNOT and T depth 3 decomposition of the 3q Toffoli gate on the nearest-neighbor topology, rediscover known best decompositions of the 4q Toffoli gate on all 4q topologies including a 1 CNOT gate improvement on the star-shaped topology, and propose decomposition of the 5q Toffoli gate on the nearest-neighbor topology with 48 CNOT gates. We also benchmark the performance of our approach on a number of 5q quantum circuits from the ibm_qx_map** database showing that it is highly competitive with the existing software. The algorithm developed in this work is available as a Python package CPFlow.
△ Less
Submitted 21 April, 2023; v1 submitted 2 May, 2022;
originally announced May 2022.
-
Learning entanglement breakdown as a phase transition by confusion
Authors:
M. A. Gavreev,
A. S. Mastiukova,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
Quantum technologies require methods for preparing and manipulating entangled multiparticle states. However, the problem of determining whether a given quantum state is entangled or separable is known to be an NP-hard problem in general, and even the task of detecting entanglement breakdown for a given class of quantum states is difficult. In this work, we develop an approach for revealing entangl…
▽ More
Quantum technologies require methods for preparing and manipulating entangled multiparticle states. However, the problem of determining whether a given quantum state is entangled or separable is known to be an NP-hard problem in general, and even the task of detecting entanglement breakdown for a given class of quantum states is difficult. In this work, we develop an approach for revealing entanglement breakdown using a machine learning technique, which is known as 'learning by confusion'. We consider a family of quantum states, which is parameterized such that there is a single critical value dividing states within this family into separate and entangled. We demonstrate the 'learning by confusion' scheme allows us to determine the critical value. Specifically, we study the performance of the method for the two-qubit, two-qutrit, and two-ququart entangled state. In addition, we investigate the properties of the local depolarization and the generalized amplitude dam** channel in the framework of the confusion scheme. Within our approach and setting the parameterization of special trajectories, we obtain an entanglement-breakdown 'phase diagram' of a quantum channel, which indicates regions of entangled (separable) states and the entanglement-breakdown region. Then we extend the way of using the 'learning by confusion' scheme for recognizing whether an arbitrary given state is entangled or separable. We show that the developed method provides correct answers for a variety of states, including entangled states with positive partial transpose. We also present a more practical version of the method, which is suitable for studying entanglement breakdown in noisy intermediate-scale quantum devices. We demonstrate its performance using an available cloud-based IBM quantum processor.
△ Less
Submitted 14 October, 2022; v1 submitted 1 February, 2022;
originally announced February 2022.
-
Efficient realization of quantum primitives for Shor's algorithm using PennyLane library
Authors:
A. V. Antipov,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
Efficient realization of quantum algorithms is among main challenges on the way towards practical quantum computing. Various libraries and frameworks for quantum software engineering have been developed. Here we present a software package containing implementations of various quantum gates and well-known quantum algorithms using PennyLane library. Additoinally, we used a simplified technique for d…
▽ More
Efficient realization of quantum algorithms is among main challenges on the way towards practical quantum computing. Various libraries and frameworks for quantum software engineering have been developed. Here we present a software package containing implementations of various quantum gates and well-known quantum algorithms using PennyLane library. Additoinally, we used a simplified technique for decomposition of algorithms into a set of gates which are native for trapped-ion quantum processor and realized this technique using PennyLane library. The decomposition is used to analyze resources required for an execution of Shor's algorithm on the level of native operations of trapped-ion quantum computer. Our original contribution is the derivation of coefficients needed for implementation of the decomposition. Templates within the package include all required elements from the quantum part of Shor's algorithm, specifically, efficient modular exponentiation and quantum Fourier transform that can be realized for an arbitrary number of qubits specified by a user. All the qubit operations are decomposed into elementary gates realized in PennyLane library. Templates from the developed package can be used as qubit-operations when defining a QNode.
△ Less
Submitted 15 July, 2022; v1 submitted 14 January, 2022;
originally announced January 2022.
-
Decomposing the generalized Toffoli gate with qutrits
Authors:
A. S. Nikolaeva,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
The problem of finding efficient decompositions of multi-qubit gates is of importance for quantum computing, especially, in application to existing noisy intermediate-scale quantum devices, whose resources are substantially limited. Here we propose a decomposition scheme for a generalized $N$-qubit Toffoli gate with the use of $2N-3$ two-qutrit gates for arbitrary connectivity. The fixed number of…
▽ More
The problem of finding efficient decompositions of multi-qubit gates is of importance for quantum computing, especially, in application to existing noisy intermediate-scale quantum devices, whose resources are substantially limited. Here we propose a decomposition scheme for a generalized $N$-qubit Toffoli gate with the use of $2N-3$ two-qutrit gates for arbitrary connectivity. The fixed number of the required additional levels (the choice of qutrits is optimal) and the use of the iSWAP gate as a native operation make our approach directly applicable for ongoing experiments with superconducting quantum processors. Specifically, we present a blueprint of the realization of the proposed scheme for the Aspen-9 processor supporting quantum operations with qutrits.
△ Less
Submitted 4 April, 2022; v1 submitted 29 December, 2021;
originally announced December 2021.
-
Efficient realization of quantum algorithms with qudits
Authors:
Anastasiia S. Nikolaeva,
Evgeniy O. Kiktenko,
Aleksey K. Fedorov
Abstract:
The development of a universal fault-tolerant quantum computer that can solve efficiently various difficult computational problems is an outstanding challenge for science and technology. In this work, we propose a technique for an efficient implementation of quantum algorithms with multilevel quantum systems (qudits). Our method uses a transpilation of a circuit in the standard qubit form, which d…
▽ More
The development of a universal fault-tolerant quantum computer that can solve efficiently various difficult computational problems is an outstanding challenge for science and technology. In this work, we propose a technique for an efficient implementation of quantum algorithms with multilevel quantum systems (qudits). Our method uses a transpilation of a circuit in the standard qubit form, which depends on the parameters of a qudit-based processor, such as their number and the number of accessible levels. This approach provides a qubit-to-qudit map** and comparison to a standard realization of quantum algorithms highlighting potential advantages of qudits. We provide an explicit scheme of transpiling qubit circuits into sequences of single-qudit and two-qudit gates taken from a particular universal set. We then illustrate our method by considering an example of an efficient implementation of a $6$-qubit quantum algorithm with qudits. We expect that our findings are of relevance for ongoing experiments with noisy intermediate-scale quantum devices that operate with information carrier allowing qudit encodings, such as trapped ions and neutral atoms as well as optical and solid-state systems.
△ Less
Submitted 1 July, 2024; v1 submitted 8 November, 2021;
originally announced November 2021.
-
Confidence polytopes for quantum process tomography
Authors:
E. O. Kiktenko,
D. O. Norkin,
A. K. Fedorov
Abstract:
In the present work, we propose a generalization of the confidence polytopes approach for quantum state tomography (QST) to the case of quantum process tomography (QPT). Our approach allows obtaining a confidence region in the polytope form for a Choi matrix of an unknown quantum channel based on the measurement results of the corresponding QPT experiment. The method uses the improved version of t…
▽ More
In the present work, we propose a generalization of the confidence polytopes approach for quantum state tomography (QST) to the case of quantum process tomography (QPT). Our approach allows obtaining a confidence region in the polytope form for a Choi matrix of an unknown quantum channel based on the measurement results of the corresponding QPT experiment. The method uses the improved version of the expression for confidence levels for the case of several positive operator-valued measures (POVMs). We then demonstrate how confidence polytopes can be employed for calculating confidence intervals for affine functions of quantum states (Choi matrices), such as fidelities and observables mean values, which are used both in QST and QPT settings. As we propose, this problem can be efficiently solved using linear programming tools. We also study the performance and scalability of the developed approach on the basis of simulation and experimental data collected using IBM cloud quantum processor.
△ Less
Submitted 18 January, 2022; v1 submitted 10 September, 2021;
originally announced September 2021.
-
Practical quantum multiparty signatures using quantum-key-distribution networks
Authors:
E. O. Kiktenko,
A. S. Zelenetsky,
A. K. Fedorov
Abstract:
Digital signatures are widely used for providing security of communications. At the same time, the security of currently deployed digital signature protocols is based on unproven computational assumptions. An efficient way to ensure an unconditional (information-theoretic) security of communication is to use quantum key distribution (QKD), whose security is based on laws of quantum mechanics. In t…
▽ More
Digital signatures are widely used for providing security of communications. At the same time, the security of currently deployed digital signature protocols is based on unproven computational assumptions. An efficient way to ensure an unconditional (information-theoretic) security of communication is to use quantum key distribution (QKD), whose security is based on laws of quantum mechanics. In this work, we develop an unconditionally secure signature scheme that guarantees authenticity and transferability of arbitrary length messages in a QKD network. In the proposed setup, the QKD network consists of two subnetworks: (i) an internal network that includes the signer and with limitation on the number of malicious nodes and (ii) an external network that has no assumptions on the number of malicious nodes. A consequence of the absence of the trust assumption in the external subnetwork is the necessity of assistance from internal subnetwork recipients for the verification of message-signature pairs by external subnetwork recipients. We provide a comprehensive security analysis of the developed scheme, perform an optimization of the scheme parameters with respect to the secret key consumption, and demonstrate that the developed scheme is compatible with the capabilities of currently available QKD devices.
△ Less
Submitted 18 January, 2022; v1 submitted 27 July, 2021;
originally announced July 2021.
-
Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
Authors:
S. E. Yunakovsky,
M. Kot,
N. O. Pozhar,
D. Nabokov,
M. A. Kudinov,
A. Guglya,
E. O. Kiktenko,
E. Kolycheva,
A. Borisov,
A. K. Fedorov
Abstract:
Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to…
▽ More
Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions. Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall security of the PKI. We attempt to provide a set of security recommendations regarding the PKI from the viewpoints of attacks with quantum computers.
△ Less
Submitted 23 June, 2021; v1 submitted 4 May, 2021;
originally announced May 2021.
-
Optimizing the deployment of quantum key distribution switch-based networks
Authors:
Andrey Tayduganov,
Vadim Rodimin,
Evgeniy O. Kiktenko,
Vladimir Kurochkin,
Evgeniy Krivoshein,
Sergey Khanenkov,
Vasilisa Usova,
Lyudmila Stefanenko,
Yury Kurochkin,
A. K. Fedorov
Abstract:
Quantum key distribution (QKD) networks provide an infrastructure for establishing information-theoretic secure keys between legitimate parties via quantum and authentic classical channels. The deployment of QKD networks in real-world conditions faces several challenges, which are related in particular to the high costs of QKD devices and the condition to provide reasonable secret key rates. In th…
▽ More
Quantum key distribution (QKD) networks provide an infrastructure for establishing information-theoretic secure keys between legitimate parties via quantum and authentic classical channels. The deployment of QKD networks in real-world conditions faces several challenges, which are related in particular to the high costs of QKD devices and the condition to provide reasonable secret key rates. In this work, we present a QKD network architecture that provides a significant reduction in the cost of deploying QKD networks by using optical switches and reducing the number of QKD receiver devices, which use single-photon detectors. We describe the corresponding modification of the QKD network protocol. We also provide estimations for a network link of a total of 670 km length consisting of 8 nodes, and demonstrate that the switch-based architecture allows achieving significant resource savings of up to 28%, while the throughput is reduced by 8% only.
△ Less
Submitted 22 July, 2021; v1 submitted 9 April, 2021;
originally announced April 2021.
-
Probing non-Markovian quantum dynamics with data-driven analysis: Beyond "black-box" machine learning models
Authors:
I. A. Luchnikov,
E. O. Kiktenko,
M. A. Gavreev,
H. Ouerdane,
S. N. Filippov,
A. K. Fedorov
Abstract:
A precise understanding of the influence of a quantum system's environment on its dynamics, which is at the heart of the theory of open quantum systems, is crucial for further progress in the development of controllable large-scale quantum systems. However, existing approaches to account for complex system-environment interaction in the presence of memory effects are either based on heuristic and…
▽ More
A precise understanding of the influence of a quantum system's environment on its dynamics, which is at the heart of the theory of open quantum systems, is crucial for further progress in the development of controllable large-scale quantum systems. However, existing approaches to account for complex system-environment interaction in the presence of memory effects are either based on heuristic and oversimplified principles or give rise to computational difficulties. In practice, one can leverage on available experimental data and replace first-principles simulations with a data-driven analysis that is often much simpler. Inspired by recent advances in data analysis and machine learning, we propose a data-driven approach to the analysis of the non-Markovian dynamics of open quantum systems. Our method allows, on the one hand, capturing the most important characteristics of open quantum systems such as the effective dimension of the environment and the spectrum of the joint system-environment quantum dynamics, and, on the other hand, reconstructing a predictive model of non-Markovian quantum dynamics, and denoising the measured quantum trajectories. We demonstrate the performance of the proposed approach with various models of open quantum systems, including a qubit coupled with a finite environment, a spin-boson model, and the damped Jaynes-Cummings model.
△ Less
Submitted 7 October, 2022; v1 submitted 26 March, 2021;
originally announced March 2021.
-
Security of the decoy state method for quantum key distribution
Authors:
A. S. Trushechkin,
E. O. Kiktenko,
D. A. Kronberg,
A. K. Fedorov
Abstract:
Quantum cryptography or, more precisely, quantum key distribution (QKD), is one of the advanced areas in the field of quantum technologies. The confidentiality of keys distributed with the use of QKD protocols is guaranteed by the fundamental laws of quantum mechanics. This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of…
▽ More
Quantum cryptography or, more precisely, quantum key distribution (QKD), is one of the advanced areas in the field of quantum technologies. The confidentiality of keys distributed with the use of QKD protocols is guaranteed by the fundamental laws of quantum mechanics. This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. We give a formal security proof of the decoy state method against all possible attacks. We compare two widely known attacks on multiphoton pulses: photon-number splitting and beam splitting. Finally, we discuss the equivalence of polarization and phase coding.
△ Less
Submitted 27 March, 2021; v1 submitted 25 January, 2021;
originally announced January 2021.
-
Blind information reconciliation with polar codes for quantum key distribution
Authors:
E. O. Kiktenko,
A. O. Malyshev,
A. K. Fedorov
Abstract:
We suggest a new protocol for the information reconciliation stage of quantum key distribution based on polar codes. The suggested approach is based on the blind technique, which is proved to be useful for low-density parity-check (LDPC) codes. We show that the suggested protocol outperforms the blind reconciliation with LDPC codes, especially when there are high fluctuations in quantum bit error…
▽ More
We suggest a new protocol for the information reconciliation stage of quantum key distribution based on polar codes. The suggested approach is based on the blind technique, which is proved to be useful for low-density parity-check (LDPC) codes. We show that the suggested protocol outperforms the blind reconciliation with LDPC codes, especially when there are high fluctuations in quantum bit error rate (QBER).
△ Less
Submitted 27 August, 2020;
originally announced August 2020.
-
Minimal informationally complete measurements for probability representation of quantum dynamics
Authors:
V. I. Yashin,
E. O. Kiktenko,
A. S. Mastiukova,
A. K. Fedorov
Abstract:
In the present work, we suggest an approach for describing dynamics of finite-dimensional quantum systems in terms of pseudostochastic maps acting on probability distributions, which are obtained via minimal informationally complete quantum measurements. The suggested method for probability representation of quantum dynamics preserves the tensor product structure, which makes it favourable for the…
▽ More
In the present work, we suggest an approach for describing dynamics of finite-dimensional quantum systems in terms of pseudostochastic maps acting on probability distributions, which are obtained via minimal informationally complete quantum measurements. The suggested method for probability representation of quantum dynamics preserves the tensor product structure, which makes it favourable for the analysis of multi-qubit systems. A key advantage of the suggested approach is that minimal informationally complete positive operator-valued measures (MIC-POVMs) are easier to construct in comparison with their symmetric versions (SIC-POVMs). We establish a correspondence between the standard quantum-mechanical formalism and the MIC-POVM-based probability formalism. Within the latter approach, we derive equations for the unitary von-Neumann evolution and the Markovian dissipative evolution, which is governed by the Gorini-Kossakowski-Sudarshan-Lindblad (GKSL) generator. We apply the MIC-POVM-based probability representation to the digital quantum computing model. In particular, for the case of spin-$1/2$ evolution, we demonstrate identifying a transition of a dissipative quantum dynamics to a completely classical-like stochastic dynamics. One of the most important findings is that the MIC-POVM-based probability representation gives more strict requirements for revealing the non-classical character of dissipative quantum dynamics in comparison with the SIC-POVM-based approach. Our results give a physical interpretation of quantum computations and pave a way for exploring the resources of noisy intermediate-scale quantum (NISQ) devices.
△ Less
Submitted 16 October, 2020; v1 submitted 22 June, 2020;
originally announced June 2020.
-
Genome assembly using quantum and quantum-inspired annealing
Authors:
A. S. Boev,
A. S. Rakitko,
S. R. Usmanov,
A. N. Kobzeva,
I. V. Popov,
V. V. Ilinsky,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
Recent advances in DNA sequencing open prospects to make whole-genome analysis rapid and reliable, which is promising for various applications including personalized medicine. However, existing techniques for {\it de novo} genome assembly, which is used for the analysis of genomic rearrangements, chromosome phasing, and reconstructing genomes without a reference, require solving tasks of high comp…
▽ More
Recent advances in DNA sequencing open prospects to make whole-genome analysis rapid and reliable, which is promising for various applications including personalized medicine. However, existing techniques for {\it de novo} genome assembly, which is used for the analysis of genomic rearrangements, chromosome phasing, and reconstructing genomes without a reference, require solving tasks of high computational complexity. Here we demonstrate a method for solving genome assembly tasks with the use of quantum and quantum-inspired optimization techniques. Within this method, we present experimental results on genome assembly using quantum annealers both for simulated data and the $φ$X 174 bacteriophage. Our results pave a way for an increase in the efficiency of solving bioinformatics problems with the use of quantum computing and, in particular, quantum annealing. We expect that the new generation of quantum annealing devices would outperform existing techniques for {\it de novo} genome assembly. To the best of our knowledge, this is the first experimental study of de novo genome assembly problems both for real and synthetic data on quantum annealing devices and quantum-inspired techniques.
△ Less
Submitted 24 June, 2021; v1 submitted 14 April, 2020;
originally announced April 2020.
-
Security analysis of the W-OTS$^+$ signature scheme: Updating security bounds
Authors:
M. A. Kudinov,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
In this work, we discuss in detail a flaw in the original security proof of the W-OTS${^+}$ variant of the Winternitz one-time signature scheme, which is an important component for various stateless and stateful many-time hash-based digital signature schemes. We update the security proof for the W-OTS${^+}$ scheme and derive the corresponding security level. Our result is of importance for the sec…
▽ More
In this work, we discuss in detail a flaw in the original security proof of the W-OTS${^+}$ variant of the Winternitz one-time signature scheme, which is an important component for various stateless and stateful many-time hash-based digital signature schemes. We update the security proof for the W-OTS${^+}$ scheme and derive the corresponding security level. Our result is of importance for the security analysis of hash-based digital signature schemes.
△ Less
Submitted 22 July, 2021; v1 submitted 18 February, 2020;
originally announced February 2020.
-
Tomographic and entropic analysis of modulated signals
Authors:
A. S. Mastiukova,
M. A. Gavreev,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
We study an application of the quantum tomography framework for the time-frequency analysis of modulated signals. In particular, we calculate optical tomographic representations and Wigner-Ville distributions for signals with amplitude and frequency modulations. We also consider time-frequency entropic relations for modulated signals, which are naturally associated with the Fourier analysis. A num…
▽ More
We study an application of the quantum tomography framework for the time-frequency analysis of modulated signals. In particular, we calculate optical tomographic representations and Wigner-Ville distributions for signals with amplitude and frequency modulations. We also consider time-frequency entropic relations for modulated signals, which are naturally associated with the Fourier analysis. A numerical toolbox for calculating optical time-frequency tomograms based on pseudo Wigner-Ville distributions for modulated signals is provided.
△ Less
Submitted 27 September, 2020; v1 submitted 20 January, 2020;
originally announced January 2020.
-
Advanced attribute-based protocol based on the modified secret sharing scheme
Authors:
M. A. Kudinov,
A. A. Chilikov,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achieved by linearly enlarging public parameters in the access formula. We then use this scheme for designing an attribute-based encryption protocol relate…
▽ More
We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achieved by linearly enlarging public parameters in the access formula. We then use this scheme for designing an attribute-based encryption protocol related to some access structure in terms of attributes. We demonstrate that the universe of possible attributes does not affect the resulting efficiency of the scheme. The security proofs for both constructions are provided.
△ Less
Submitted 23 November, 2020; v1 submitted 6 December, 2019;
originally announced December 2019.
-
Estimating the precision for quantum process tomography
Authors:
E. O. Kiktenko,
D. N. Kublikova,
A. K. Fedorov
Abstract:
Quantum tomography is a widely applicable tool for complete characterization of quantum states and processes. In the present work, we develop a method for precision-guaranteed quantum process tomography. With the use of the Choi-Jamiolkowski isomorphism, we generalize the recently suggested extended norm minimization estimator for the case of quantum processes. Our estimator is based on the Hilber…
▽ More
Quantum tomography is a widely applicable tool for complete characterization of quantum states and processes. In the present work, we develop a method for precision-guaranteed quantum process tomography. With the use of the Choi-Jamiolkowski isomorphism, we generalize the recently suggested extended norm minimization estimator for the case of quantum processes. Our estimator is based on the Hilbert-Schmidt distance for quantum processes. Specifically, we discuss the application of our method for characterizing quantum gates of a superconducting quantum processor in the framework of the IBM Q Experience.
△ Less
Submitted 16 January, 2020; v1 submitted 1 November, 2019;
originally announced November 2019.
-
Scalable quantum computing with qudits on a graph
Authors:
E. O. Kiktenko,
A. S. Nikolaeva,
Peng Xu,
G. V. Shlyapnikov,
A. K. Fedorov
Abstract:
We show a significant reduction of the number of quantum operations and the improvement of the circuit depth for the realization of the Toffoli gate by using qudits. This is done by establishing a general relation between the dimensionality of qudits and their topology of connections for a scalable multi-qudit processor, where higher qudit levels are used for substituting ancillas. The suggested m…
▽ More
We show a significant reduction of the number of quantum operations and the improvement of the circuit depth for the realization of the Toffoli gate by using qudits. This is done by establishing a general relation between the dimensionality of qudits and their topology of connections for a scalable multi-qudit processor, where higher qudit levels are used for substituting ancillas. The suggested model is of importance for the realization of quantum algorithms and as a method of quantum error correction codes for single-qubit operations.
△ Less
Submitted 11 February, 2020; v1 submitted 19 September, 2019;
originally announced September 2019.
-
Probability representation of quantum dynamics using pseudostochastic maps
Authors:
E. O. Kiktenko,
A. O. Malyshev,
A. S. Mastiukova,
V. I. Man'ko,
A. K. Fedorov,
D. Chruściński
Abstract:
In this work, we consider a probability representation of quantum dynamics for finite-dimensional quantum systems with the use of pseudostochastic maps acting on true probability distributions. These probability distributions are obtained via symmetric informationally complete positive operator-valued measure (SIC-POVM) and can be directly accessible in an experiment. We provide SIC-POVM probabili…
▽ More
In this work, we consider a probability representation of quantum dynamics for finite-dimensional quantum systems with the use of pseudostochastic maps acting on true probability distributions. These probability distributions are obtained via symmetric informationally complete positive operator-valued measure (SIC-POVM) and can be directly accessible in an experiment. We provide SIC-POVM probability representations both for unitary evolution of the density matrix governed by the von Neumann equation and dissipative evolution governed by Markovian master equation. In particular, we discuss whereas the quantum dynamics can be simulated via classical random processes in terms of the conditions for the master equation generator in the SIC-POVM probability representation. We construct practical measures of nonclassicality non-Markovianity of quantum processes and apply them for studying experimental realization of quantum circuits realized with the IBM cloud quantum processor.
△ Less
Submitted 12 May, 2020; v1 submitted 9 August, 2019;
originally announced August 2019.
-
Protecting quantum systems from decoherence with unitary operations
Authors:
E. O. Kiktenko,
A. S. Mastiukova,
A. K. Fedorov
Abstract:
Decoherence is a fundamental obstacle to the implementation of large-scale and low-noise quantum information processing devices. In this work, we suggest an approach for suppressing errors by employing pre-processing and post-processing unitary operations, which precede and follow the action of a decoherence channel. In contrast to quantum error correction and measurement-based methods, the sugges…
▽ More
Decoherence is a fundamental obstacle to the implementation of large-scale and low-noise quantum information processing devices. In this work, we suggest an approach for suppressing errors by employing pre-processing and post-processing unitary operations, which precede and follow the action of a decoherence channel. In contrast to quantum error correction and measurement-based methods, the suggested approach relies on specifically designed unitary operators for a particular state without the need in ancillary qubits or post-selection procedures. We consider the case of decoherence channels acting on a single qubit belonging to a many-qubit state. Pre-processing and post-processing operators can be either individual, that is acting on the qubit effected by the decoherence channel only, or collective, that is acting on the whole multi-qubit state. We give a classification of possible strategies for the protection scheme, analyze them, and derive expressions for the optimal unitary operators providing the maximal value of the fidelity regarding initial and final states. Specifically, we demonstrate the equivalence of the schemes where one of the unitary operations is individual while the other is collective. We then consider the realization of our approach for the basic decoherence models, which include single-qubit depolarizing, dephasing, and amplitude dam** channels. We also demonstrate that the decoherence robustness of multi-qubit states for these decoherence models is determined by the entropy of the reduced state of the qubit undergoing the decoherence channel.
△ Less
Submitted 23 February, 2020; v1 submitted 3 July, 2019;
originally announced July 2019.
-
Proof-of-forgery for hash-based signatures
Authors:
E. O. Kiktenko,
M. A. Kudinov,
A. A. Bulychev,
A. K. Fedorov
Abstract:
In the present work, a peculiar property of hash-based signatures allowing detection of their forgery event is explored. This property relies on the fact that a successful forgery of a hash-based signature most likely results in a collision with respect to the employed hash function, while the demonstration of this collision could serve as convincing evidence of the forgery. Here we prove that wit…
▽ More
In the present work, a peculiar property of hash-based signatures allowing detection of their forgery event is explored. This property relies on the fact that a successful forgery of a hash-based signature most likely results in a collision with respect to the employed hash function, while the demonstration of this collision could serve as convincing evidence of the forgery. Here we prove that with properly adjusted parameters Lamport and Winternitz one-time signatures schemes could exhibit a forgery detection availability property. This property is of significant importance in the framework of crypto-agility paradigm since the considered forgery detection serves as an alarm that the employed cryptographic hash function becomes insecure to use and the corresponding scheme has to be replaced.
△ Less
Submitted 8 September, 2021; v1 submitted 30 May, 2019;
originally announced May 2019.
-
Detecting brute-force attacks on cryptocurrency wallets
Authors:
E. O. Kiktenko,
M. A. Kudinov,
A. K. Fedorov
Abstract:
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks.…
▽ More
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks. Using Bitcoin as an example, we demonstrate that if the attack is implemented successfully, a legitimate user is able to prove that fact of this attack with a high probability. We also consider two options for modification of existing cryptocurrency protocols for dealing with this type of attacks. First, we discuss a modification that requires introducing changes in the Bitcoin protocol and allows diminishing the motivation to attack wallets. Second, an alternative option is the construction of special smart-contracts, which reward the users for providing evidence of the brute-force attack. The execution of this smart-contract can work as an automatic alarm that the employed cryptographic mechanisms, and (particularly) hash functions, have an evident vulnerability.
△ Less
Submitted 19 December, 2019; v1 submitted 15 April, 2019;
originally announced April 2019.
-
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Authors:
E. O. Kiktenko,
A. A. Bulychev,
P. A. Karagodin,
N. O. Pozhar,
M. N. Anufriev,
A. K. Fedorov
Abstract:
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in recent decades. One of the most promising candidates for a post-quantum signature scheme is SPHINCS$^+$, which is based on cryptographic hash fun…
▽ More
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in recent decades. One of the most promising candidates for a post-quantum signature scheme is SPHINCS$^+$, which is based on cryptographic hash functions. In this contribution, we analyze the use of the new Russian standardized hash function, known as Streebog, for the implementation of the SPHINCS$^+$ signature scheme. We provide a performance comparison with SHA-256-based instantiation and give benchmarks for various sets of parameters.
△ Less
Submitted 27 June, 2020; v1 submitted 13 April, 2019;
originally announced April 2019.
-
Lightweight authentication for quantum key distribution
Authors:
E. O. Kiktenko,
A. O. Malyshev,
M. A. Gavreev,
A. A. Bozhedarov,
N. O. Pozhar,
M. N. Anufriev,
A. K. Fedorov
Abstract:
Quantum key distribution (QKD) enables unconditionally secure communication between distinct parties using a quantum channel and an authentic public channel. Reducing the portion of quantum-generated secret keys, that is consumed during the authentication procedure, is of significant importance for improving the performance of QKD systems. In the present work, we develop a lightweight authenticati…
▽ More
Quantum key distribution (QKD) enables unconditionally secure communication between distinct parties using a quantum channel and an authentic public channel. Reducing the portion of quantum-generated secret keys, that is consumed during the authentication procedure, is of significant importance for improving the performance of QKD systems. In the present work, we develop a lightweight authentication protocol for QKD based on a `**-pong' scheme of authenticity check for QKD. An important feature of this scheme is that the only one authentication tag is generated and transmitted during each of the QKD post-processing rounds. For the tag generation purpose, we design an unconditionally secure procedure based on the concept of key recycling. The procedure is based on the combination of almost universal$_2$ polynomial hashing, XOR universal$_2$ Toeplitz hashing, and one-time pad (OTP) encryption. We demonstrate how to minimize both the length of the recycled key and the size of the authentication key, that is required for OTP encryption. As a result, in real case scenarios, the portion of quantum-generated secret keys that is consumed for the authentication purposes is below 1\%. Finally, we provide a security analysis of the full quantum key growing process in the framework of universally composable security.
△ Less
Submitted 23 September, 2020; v1 submitted 25 March, 2019;
originally announced March 2019.
-
Revealing quantum chaos with machine learning
Authors:
Y. A. Kharkov,
V. E. Sotskov,
A. A. Karazeev,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
Understanding properties of quantum matter is an outstanding challenge in science. In this paper, we demonstrate how machine-learning methods can be successfully applied for the classification of various regimes in single-particle and many-body systems. We realize neural network algorithms that perform a classification between regular and chaotic behavior in quantum billiard models with remarkably…
▽ More
Understanding properties of quantum matter is an outstanding challenge in science. In this paper, we demonstrate how machine-learning methods can be successfully applied for the classification of various regimes in single-particle and many-body systems. We realize neural network algorithms that perform a classification between regular and chaotic behavior in quantum billiard models with remarkably high accuracy. We use the variational autoencoder for autosupervised classification of regular/chaotic wave functions, as well as demonstrating that variational autoencoders could be used as a tool for detection of anomalous quantum states, such as quantum scars. By taking this method further, we show that machine learning techniques allow us to pin down the transition from integrability to many-body quantum chaos in Heisenberg XXZ spin chains. For both cases, we confirm the existence of universal W shapes that characterize the transition. Our results pave the way for exploring the power of machine learning tools for revealing exotic phenomena in quantum many-body systems.
△ Less
Submitted 11 February, 2020; v1 submitted 25 February, 2019;
originally announced February 2019.
-
Quantum communication protocols as a benchmark for quantum computers
Authors:
A. A. Zhukov,
E. O. Kiktenko,
A. A. Elistratov,
W. V. Pogosov,
Yu. E. Lozovik
Abstract:
We point out that realization of quantum communication protocols in programmable quantum computers provides a deep benchmark for capabilities of real quantum hardware. Particularly, it is prospective to focus on measurements of entropy-based characteristics of the performance and to explore whether a "quantum regime" is preserved. We perform proof-of-principle implementations of superdense coding…
▽ More
We point out that realization of quantum communication protocols in programmable quantum computers provides a deep benchmark for capabilities of real quantum hardware. Particularly, it is prospective to focus on measurements of entropy-based characteristics of the performance and to explore whether a "quantum regime" is preserved. We perform proof-of-principle implementations of superdense coding and quantum key distribution BB84 using 5- and 16-qubit superconducting quantum processors of IBM Quantum Experience. We focus on the ability of these quantum machines to provide an efficient transfer of information between distant parts of the processors by placing Alice and Bob at different qubits of the devices. We also examine the ability of quantum devices to serve as quantum memory and to store entangled states used in quantum communication. Another issue we address is an error mitigation. Although it is at odds with benchmarking, this problem is nevertheless of importance in a general context of quantum computation with noisy quantum devices. We perform such a mitigation and noticeably improve some results.
△ Less
Submitted 3 December, 2018;
originally announced December 2018.