-
A Better Match for Drivers and Riders: Reinforcement Learning at Lyft
Authors:
Xabi Azagirre,
Akshay Balwally,
Guillaume Candeli,
Nicholas Chamandy,
Benjamin Han,
Alona King,
Hyungjun Lee,
Martin Loncaric,
Sebastien Martin,
Vijay Narasiman,
Zhiwei,
Qin,
Baptiste Richard,
Sara Smoot,
Sean Taylor,
Garrett van Ryzin,
Di Wu,
Fei Yu,
Alex Zamoshchin
Abstract:
To better match drivers to riders in our ridesharing application, we revised Lyft's core matching algorithm. We use a novel online reinforcement learning approach that estimates the future earnings of drivers in real time and use this information to find more efficient matches. This change was the first documented implementation of a ridesharing matching algorithm that can learn and improve in rea…
▽ More
To better match drivers to riders in our ridesharing application, we revised Lyft's core matching algorithm. We use a novel online reinforcement learning approach that estimates the future earnings of drivers in real time and use this information to find more efficient matches. This change was the first documented implementation of a ridesharing matching algorithm that can learn and improve in real time. We evaluated the new approach during weeks of switchback experimentation in most Lyft markets, and estimated how it benefited drivers, riders, and the platform. In particular, it enabled our drivers to serve millions of additional riders each year, leading to more than $30 million per year in incremental revenue. Lyft rolled out the algorithm globally in 2021.
△ Less
Submitted 13 November, 2023; v1 submitted 20 October, 2023;
originally announced October 2023.
-
Entanglement distribution quantum networking within deployed telecommunications fibre-optic infrastructure
Authors:
Marcus J Clark,
Obada Alia,
Rui Wang,
Sima Bahrani,
Matej Peranic,
Djeylan Aktas,
George T Kanellos,
Martin Loncaric,
Zeljko Samec,
Anton Radman,
Mario Stipcevic,
Reza Nejabati,
Dimitra Simeonidou,
John G Rarity,
Siddarth K Joshi
Abstract:
Quantum networks have been shown to connect users with full-mesh topologies without trusted nodes. We present advancements on our scalable polarisation entanglement-based quantum network testbed, which has the ability to perform protocols beyond simple quantum key distribution. Our approach utilises wavelength multiplexing, which is ideal for quantum networks across local metropolitan areas due to…
▽ More
Quantum networks have been shown to connect users with full-mesh topologies without trusted nodes. We present advancements on our scalable polarisation entanglement-based quantum network testbed, which has the ability to perform protocols beyond simple quantum key distribution. Our approach utilises wavelength multiplexing, which is ideal for quantum networks across local metropolitan areas due to the ease of connecting additional users to the network without increasing the resource requirements per user. We show a 10 user fully connected quantum network with metropolitan scale deployed fibre links, demonstrating polarisation stability and the ability to generate secret keys over a period of 10.8 days with a network wide average-effective secret key rate of 3.38 bps.
△ Less
Submitted 10 February, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
Polarization compensation methods for quantum communication networks
Authors:
Matej Peranic,
Marcus Clark,
Rui Wang,
Sima Bahrani,
Obada Alia,
Soren Wengerowsky,
Anton Radman,
Martin Loncaric,
Mario Stipcevic,
John Rarity,
Reza Nejabati,
Siddarth K Joshi
Abstract:
The information-theoretic unconditional security offered by quantum key distribution has spurred the development of larger quantum communication networks. However, as these networks grow so does the strong need to reduce complexity and overheads. Polarization based entanglement distribution networks are a promising approach due to their scalability and lack of trusted nodes. Nevertheless, they are…
▽ More
The information-theoretic unconditional security offered by quantum key distribution has spurred the development of larger quantum communication networks. However, as these networks grow so does the strong need to reduce complexity and overheads. Polarization based entanglement distribution networks are a promising approach due to their scalability and lack of trusted nodes. Nevertheless, they are only viable if the birefringence of all optical distribution fibres in the network is compensated to preserve the polarization based quantum state. The brute force approach would require a few hundred fibre polarization controllers for even a moderately sized network. Instead, we propose and investigate four different methods of polarization compensation. We compare them based on complexity, effort, level of disruption to network operations and performance.
△ Less
Submitted 30 November, 2023; v1 submitted 29 August, 2022;
originally announced August 2022.
-
Deploying an inter-European quantum network
Authors:
Domenico Ribezzo,
Mujtaba Zahidy,
Ilaria Vagniluca,
Nicola Biagi,
Saverio Francesconi,
Tommaso Occhipinti,
Leif K. Oxenløwe,
Martin Lončarić,
Ivan Cvitić,
Mario Stipčević,
Žiga Pušavec,
Rainer Kaltenbaek,
Anton Ramšak,
Francesco Cesa,
Giorgio Giorgetti,
Francesco Scazza,
Angelo Bassi,
Paolo De Natale,
Francesco Saverio Cataliotti,
Massimo Inguscio,
Davide Bacco,
Alessandro Zavatta
Abstract:
Around forty years have passed since the first pioneering works have introduced the possibility of using quantum physics to strongly enhance communications safety. Nowadays Quantum Cryptography, and in particular, Quantum Key Distribution (QKD) exited the physics laboratories to become commercial technologies that increasingly trigger the attention of States, military forces, banks, and private co…
▽ More
Around forty years have passed since the first pioneering works have introduced the possibility of using quantum physics to strongly enhance communications safety. Nowadays Quantum Cryptography, and in particular, Quantum Key Distribution (QKD) exited the physics laboratories to become commercial technologies that increasingly trigger the attention of States, military forces, banks, and private corporations. This work takes on the challenge of bringing QKD closer to a consumer technology: optical fibers deployed and used by telecommunication companies of different States have been used to realize a quantum network, the first-ever connecting three different countries. This pushes towards the necessary coexistence of QKD and classical communications on the same infrastructure, which currently represents a main limit of this technology. Our network connects Trieste to Rijeka and Ljubljana via a trusted node in Postojna; a key rate of over 3 kbps has been achieved in the shortest link, and a 7-hour long measurement has demonstrated the system stability and reliability. Finally, the network has been used for a public demonstration of QKD at the G20 Digital Ministers' Meeting in Trieste. The reported experimental results, together with the significant interest that one of the most important events of international politics has attracted, showcase the maturity of the QKD technology bundle, placing it in the spotlight for consumer applications in the near term.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Unconditionally secure digital signatures implemented in an 8-user quantum network
Authors:
Yoann Pelet,
Ittoop Vergheese Puthoor,
Natarajan Venkatachalam,
Sören Wengerowsky,
Martin Lončarić,
Sebastian Philipp Neumann,
Bo Liu,
Željko Samec,
Mario Stipčević,
Rupert Ursin,
Erika Andersson,
John G. Rarity,
Djeylan Aktas,
Siddarth Koduru Joshi
Abstract:
The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forg…
▽ More
The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forging, repudiation and messages are transferrable. We show the feasibility of unconditionally secure signatures using only bi-partite entangled states distributed throughout the network and experimentally evaluate the performance of the protocol in real world scenarios with varying message lengths.
△ Less
Submitted 10 February, 2022; v1 submitted 9 February, 2022;
originally announced February 2022.
-
Scalable authentication and optimal flooding in a quantum network
Authors:
Naomi R. Solomons,
Alasdair I. Fletcher,
Djeylan Aktas,
Natarajan Venkatachalam,
Sören Wengerowsky,
Martin Lončarić,
Sebastian P. Neumann,
Bo Liu,
Željko Samec,
Mario Stipčević,
Rupert Ursin,
Stefano Pirandola,
John G. Rarity,
Siddarth Koduru Joshi
Abstract:
The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network te…
▽ More
The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed, and discuss their usefulness with the aid of example use cases. First, an authentication transfer protocol to manage a fundamental limitation of quantum communication -- the need for a pre-shared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (<35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
△ Less
Submitted 21 June, 2023; v1 submitted 28 January, 2021;
originally announced January 2021.
-
Experimental implementation of secure anonymous protocols on an eight-user quantum network
Authors:
Zixin Huang,
Siddarth Koduru Joshi,
Djeylan Aktas,
Cosmo Lupo,
Armanda O. Quintavalle,
Natarajan Venkatachalam,
Sören Wengerowsky,
Martin Lončarić,
Sebastian Philipp Neumann,
Bo Liu,
Željko Samec,
Laurent Kling,
Mario Stipčević,
Rupert Ursin,
John G. Rarity
Abstract:
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications, often knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here we experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network using polar…
▽ More
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications, often knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here we experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network using polarisation-entangled photon pairs. At the heart of these protocols is anonymous broadcasting, which is a cryptographic primitive that allows one user to reveal one bit of information while kee** her identity anonymous. For a network of $n$ users, the protocols retain anonymity for the sender, given less than $n-2$ users are dishonest. This is one of the earliest implementations of genuine multi-user cryptographic protocols beyond standard QKD. Our anonymous protocols enhance the functionality of any fully-connected Quantum Key Distribution network without trusted nodes.
△ Less
Submitted 18 November, 2020;
originally announced November 2020.
-
A trusted-node-free eight-user metropolitan quantum communication network
Authors:
Siddarth Koduru Joshi,
Djeylan Aktas,
Sören Wengerowsky,
Martin Lončarić,
Sebastian Philipp Neumann,
Bo Liu,
Thomas Scheidl,
Guillermo Currás-Lorenzo,
Željko Samec,
Laurent Kling,
Alex Qiu,
Mohsen Razavi,
Mario Stipčević,
John G. Rarity,
Rupert Ursin
Abstract:
Quantum communication is rapidly gaining popularity due to its high security and technological maturity. However, most implementations are limited to just two communicating parties (users). Quantum communication networks aim to connect a multitude of users. Here we present a fully connected quantum communication network on a city wide scale without active switching or trusted nodes. We demonstrate…
▽ More
Quantum communication is rapidly gaining popularity due to its high security and technological maturity. However, most implementations are limited to just two communicating parties (users). Quantum communication networks aim to connect a multitude of users. Here we present a fully connected quantum communication network on a city wide scale without active switching or trusted nodes. We demonstrate simultaneous and secure connections between all 28 pairings of 8 users. Our novel network topology is easily scalable to many users, allows traffic management features and minimises the infrastructure as well as the user hardware needed.
△ Less
Submitted 11 September, 2020; v1 submitted 18 July, 2019;
originally announced July 2019.
-
Learning Hash Codes via Hamming Distance Targets
Authors:
Martin Loncaric,
Bowei Liu,
Ryan Weber
Abstract:
We present a powerful new loss function and training scheme for learning binary hash codes with any differentiable model and similarity function. Our loss function improves over prior methods by using log likelihood loss on top of an accurate approximation for the probability that two inputs fall within a Hamming distance target. Our novel training scheme obtains a good estimate of the true gradie…
▽ More
We present a powerful new loss function and training scheme for learning binary hash codes with any differentiable model and similarity function. Our loss function improves over prior methods by using log likelihood loss on top of an accurate approximation for the probability that two inputs fall within a Hamming distance target. Our novel training scheme obtains a good estimate of the true gradient by better sampling inputs and evaluating loss terms between all pairs of inputs in each minibatch. To fully leverage the resulting hashes, we use multi-indexing. We demonstrate that these techniques provide large improvements to a similarity search tasks. We report the best results to date on competitive information retrieval tasks for ImageNet and SIFT 1M, improving MAP from 73% to 84% and reducing query cost by a factor of 2-8, respectively.
△ Less
Submitted 1 October, 2018;
originally announced October 2018.
-
Convolutional Hashing for Automated Scene Matching
Authors:
Martin Loncaric,
Bowei Liu,
Ryan Weber
Abstract:
We present a powerful new loss function and training scheme for learning binary hash functions. In particular, we demonstrate our method by creating for the first time a neural network that outperforms state-of-the-art Haar wavelets and color layout descriptors at the task of automated scene matching. By accurately relating distance on the manifold of network outputs to distance in Hamming space,…
▽ More
We present a powerful new loss function and training scheme for learning binary hash functions. In particular, we demonstrate our method by creating for the first time a neural network that outperforms state-of-the-art Haar wavelets and color layout descriptors at the task of automated scene matching. By accurately relating distance on the manifold of network outputs to distance in Hamming space, we achieve a 100-fold reduction in nontrivial false positive rate and significantly higher true positive rate. We expect our insights to provide large wins for hashing models applied to other information retrieval hashing tasks as well.
△ Less
Submitted 8 February, 2018;
originally announced February 2018.