-
Automated Quantum Circuit Generation for Computing Inverse Hash Functions
Authors:
Elena R. Henderson,
Jessie M. Henderson,
William V. Oxford,
Mitchell A. Thornton
Abstract:
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known. Consequently, hash functions can be cryptographically secure, and they are employed…
▽ More
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known. Consequently, hash functions can be cryptographically secure, and they are employed in encryption, authentication, and other security methods. It has been suggested that such cryptographically-secure hash functions will play a critical role in the era of post-quantum cryptography (PQC), as they do in conventional systems. In this work, we introduce a procedure that leverages the principle of reversibility to generate circuits that invert hash functions. We provide a proof-of-concept implementation and describe methods that allow for scaling the hash function inversion approach. Specifically, we implement one manifestation of the algorithm as part of a more general automated quantum circuit synthesis, compilation, and optimization toolkit. We illustrate production of reversible circuits for crypto-hash functions that inherently provide the inverse of the function, and we describe data structures that increase the scalability of the hash function inversion approach.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks
Authors:
Elena R. Henderson,
Jessie M. Henderson,
Hiva Shahoei,
William V. Oxford,
Eric C. Larson,
Duncan L. MacFarlane,
Mitchell A. Thornton
Abstract:
Physically unclonable functions (PUFs) are designed to act as device 'fingerprints.' Given an input challenge, the PUF circuit should produce an unpredictable response for use in situations such as root-of-trust applications and other hardware-level cybersecurity applications. PUFs are typically subcircuits present within integrated circuits (ICs), and while conventional IC PUFs are well-understoo…
▽ More
Physically unclonable functions (PUFs) are designed to act as device 'fingerprints.' Given an input challenge, the PUF circuit should produce an unpredictable response for use in situations such as root-of-trust applications and other hardware-level cybersecurity applications. PUFs are typically subcircuits present within integrated circuits (ICs), and while conventional IC PUFs are well-understood, several implementations have proven vulnerable to malicious exploits, including those perpetrated by machine learning (ML)-based attacks. Such attacks can be difficult to prevent because they are often designed to work even when relatively few challenge-response pairs are known in advance. Hence the need for both more resilient PUF designs and analysis of ML-attack susceptibility. Previous work has developed a PUF for photonic integrated circuits (PICs). A PIC PUF not only produces unpredictable responses given manufacturing-introduced tolerances, but is also less prone to electromagnetic radiation eavesdrop** attacks than a purely electronic IC PUF. In this work, we analyze the resilience of the proposed photonic PUF when subjected to ML-based attacks. Specifically, we describe a computational PUF model for producing the large datasets required for training ML attacks; we analyze the quality of the model; and we discuss the modeled PUF's susceptibility to ML-based attacks. We find that the modeled PUF generates distributions that resemble uniform white noise, explaining the exhibited resilience to neural-network-based attacks designed to exploit latent relationships between challenges and responses. Preliminary analysis suggests that the PUF exhibits similar resilience to generative adversarial networks, and continued development will show whether more-sophisticated ML approaches better compromise the PUF and -- if so -- how design modifications might improve resilience.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
A Photonic Physically Unclonable Function's Resilience to Multiple-Valued Machine Learning Attacks
Authors:
Jessie M. Henderson,
Elena R. Henderson,
Clayton A. Harper,
Hiva Shahoei,
William V. Oxford,
Eric C. Larson,
Duncan L. MacFarlane,
Mitchell A. Thornton
Abstract:
Physically unclonable functions (PUFs) identify integrated circuits using nonlinearly-related challenge-response pairs (CRPs). Ideally, the relationship between challenges and corresponding responses is unpredictable, even if a subset of CRPs is known. Previous work developed a photonic PUF offering improved security compared to non-optical counterparts. Here, we investigate this PUF's susceptibil…
▽ More
Physically unclonable functions (PUFs) identify integrated circuits using nonlinearly-related challenge-response pairs (CRPs). Ideally, the relationship between challenges and corresponding responses is unpredictable, even if a subset of CRPs is known. Previous work developed a photonic PUF offering improved security compared to non-optical counterparts. Here, we investigate this PUF's susceptibility to Multiple-Valued-Logic-based machine learning attacks. We find that approximately 1,000 CRPs are necessary to train models that predict response bits better than random chance. Given the significant challenge of acquiring a vast number of CRPs from a photonic PUF, our results demonstrate photonic PUF resilience against such attacks.
△ Less
Submitted 2 March, 2024;
originally announced March 2024.
-
Detecting gamma-band responses to the speech envelope for the ICASSP 2024 Auditory EEG Decoding Signal Processing Grand Challenge
Authors:
Mike Thornton,
Jonas Auernheimer,
Constantin Jehn,
Danilo Mandic,
Tobias Reichenbach
Abstract:
The 2024 ICASSP Auditory EEG Signal Processing Grand Challenge concerns the decoding of electroencephalography (EEG) measurements taken from participants who listened to speech material. This work details our solution to the match-mismatch sub-task: given a short temporal segment of EEG recordings and several candidate speech segments, the task is to classify which of the speech segments was time-…
▽ More
The 2024 ICASSP Auditory EEG Signal Processing Grand Challenge concerns the decoding of electroencephalography (EEG) measurements taken from participants who listened to speech material. This work details our solution to the match-mismatch sub-task: given a short temporal segment of EEG recordings and several candidate speech segments, the task is to classify which of the speech segments was time-aligned with the EEG signals. We show that high-frequency gamma-band responses to the speech envelope can be detected with a high accuracy. By jointly assessing gamma-band responses and low-frequency envelope tracking, we develop a match-mismatch decoder which placed first in this task.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Decoding of Selective Attention to Speech From Ear-EEG Recordings
Authors:
Mike Thornton,
Danilo Mandic,
Tobias Reichenbach
Abstract:
Many people with hearing loss struggle to comprehend speech in crowded auditory scenes, even when they are using hearing aids. Future hearing technologies which can identify the focus of a listener's auditory attention, and selectively amplify that sound alone, could improve the experience that this patient group has with their hearing aids. In this work, we present the results of our experiments…
▽ More
Many people with hearing loss struggle to comprehend speech in crowded auditory scenes, even when they are using hearing aids. Future hearing technologies which can identify the focus of a listener's auditory attention, and selectively amplify that sound alone, could improve the experience that this patient group has with their hearing aids. In this work, we present the results of our experiments with an ultra-wearable in-ear electroencephalography (EEG) monitoring device. Participants listened to two competing speakers in an auditory attention experiment whilst their EEG was recorded. We show that typical neural responses to the speech envelope, as well as its onsets, can be recovered from such a device, and that the morphology of the recorded responses is indeed modulated by selective attention to speech. Features of the attended and ignored speech stream can also be reconstructed from the EEG recordings, with the reconstruction quality serving as a marker of selective auditory attention. Using the stimulus-reconstruction method, we show that with this device auditory attention can be decoded from short segments of EEG recordings which are of just a few seconds in duration. The results provide further evidence that ear-EEG systems offer good prospects for wearable auditory monitoring as well as future cognitively-steered hearing aids.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
Decoding Envelope and Frequency-Following EEG Responses to Continuous Speech Using Deep Neural Networks
Authors:
Mike Thornton,
Danilo Mandic,
Tobias Reichenbach
Abstract:
The electroencephalogram (EEG) offers a non-invasive means by which a listener's auditory system may be monitored during continuous speech perception. Reliable auditory-EEG decoders could facilitate the objective diagnosis of hearing disorders, or find applications in cognitively-steered hearing aids. Previously, we developed decoders for the ICASSP Auditory EEG Signal Processing Grand Challenge (…
▽ More
The electroencephalogram (EEG) offers a non-invasive means by which a listener's auditory system may be monitored during continuous speech perception. Reliable auditory-EEG decoders could facilitate the objective diagnosis of hearing disorders, or find applications in cognitively-steered hearing aids. Previously, we developed decoders for the ICASSP Auditory EEG Signal Processing Grand Challenge (SPGC). These decoders aimed to solve the match-mismatch task: given a short temporal segment of EEG recordings, and two candidate speech segments, the task is to identify which of the two speech segments is temporally aligned, or matched, with the EEG segment. The decoders made use of cortical responses to the speech envelope, as well as speech-related frequency-following responses, to relate the EEG recordings to the speech stimuli. Here we comprehensively document the methods by which the decoders were developed. We extend our previous analysis by exploring the association between speaker characteristics (pitch and sex) and classification accuracy, and provide a full statistical analysis of the final performance of the decoders as evaluated on a heldout portion of the dataset. Finally, the generalisation capabilities of the decoders are characterised, by evaluating them using an entirely different dataset which contains EEG recorded under a variety of speech-listening conditions. The results show that the match-mismatch decoders achieve accurate and robust classification accuracies, and they can even serve as auditory attention decoders without additional training.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Demonstration of a Hardware-Independent Toolkit for Automated Quantum Subcircuit Synthesis
Authors:
Elena R. Henderson,
Jessie M. Henderson,
Aviraj Sinha,
Eric C. Larson,
Mitchell A. Thornton
Abstract:
The quantum computer has become contemporary reality, with the first two-qubit machine of mere decades ago transforming into cloud-accessible devices with tens, hundreds, or -- in a few cases -- even thousands of qubits. While such hardware is noisy and still relatively small, the increasing number of operable qubits raises another challenge: how to develop the now-sizeable quantum circuits execut…
▽ More
The quantum computer has become contemporary reality, with the first two-qubit machine of mere decades ago transforming into cloud-accessible devices with tens, hundreds, or -- in a few cases -- even thousands of qubits. While such hardware is noisy and still relatively small, the increasing number of operable qubits raises another challenge: how to develop the now-sizeable quantum circuits executable on these machines. Preparing circuits manually for specifications of any meaningful size is at best tedious and at worst impossible, creating a need for automation. This article describes an automated quantum-software toolkit for synthesis, compilation, and optimization, which transforms classically-specified, irreversible functions into both technology-independent and technology-dependent quantum circuits. We also describe and analyze the toolkit's application to three situations -- quantum read-only memories, quantum random number generators, and quantum oracles -- and illustrate the toolkit's start-to-finish features, from the input of classical functions to the output of technology-dependent quantum circuits. Furthermore, we illustrate how the toolkit enables research beyond circuit synthesis, including comparison of synthesis and optimization methods and deeper understanding of even well-studied quantum algorithms. As quantum hardware continues to develop, such quantum circuit toolkits will play a critical role in realizing its potential.
△ Less
Submitted 8 February, 2024; v1 submitted 2 September, 2023;
originally announced September 2023.
-
CNN-Assisted Steganography -- Integrating Machine Learning with Established Steganographic Techniques
Authors:
Andrew Havard,
Theodore Manikas,
Eric C. Larson,
Mitchell A. Thornton
Abstract:
We propose a method to improve steganography by increasing the resilience of stego-media to discovery through steganalysis. Our approach enhances a class of steganographic approaches through the inclusion of a steganographic assistant convolutional neural network (SA-CNN). Previous research showed success in discovering the presence of hidden information within stego-images using trained neural ne…
▽ More
We propose a method to improve steganography by increasing the resilience of stego-media to discovery through steganalysis. Our approach enhances a class of steganographic approaches through the inclusion of a steganographic assistant convolutional neural network (SA-CNN). Previous research showed success in discovering the presence of hidden information within stego-images using trained neural networks as steganalyzers that are applied to stego-images. Our results show that such steganalyzers are less effective when SA-CNN is employed during the generation of a stego-image. We also explore the advantages and disadvantages of representing all the possible outputs of our SA-CNN within a smaller, discrete space, rather than a continuous space. Our SA-CNN enables certain classes of parametric steganographic algorithms to be customized based on characteristics of the cover media in which information is to be embedded. Thus, SA-CNN is adaptive in the sense that it enables the core steganographic algorithm to be especially configured for each particular instance of cover media. Experimental results are provided that employ a recent steganographic technique, S-UNIWARD, both with and without the use of SA-CNN. We then apply both sets of stego-images, those produced with and without SA-CNN, to an exmaple steganalyzer, Yedroudj-Net, and we compare the results. We believe that this approach for the integration of neural networks with hand-crafted algorithms increases the reliability and adaptability of steganographic algorithms.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
A Programmable True Random Number Generator Using Commercial Quantum Computers
Authors:
Aviraj Sinha,
Elena R. Henderson,
Jessie M. Henderson,
Eric C. Larson,
Mitchell A. Thornton
Abstract:
Random number generators (RNG) are essential elements in many cryptographic systems. True random number generators (TRNG) rely upon sources of randomness from natural processes such as those arising from quantum mechanics phenomena. We demonstrate that a quantum computer can serve as a high-quality, weakly random source for a generalized user-defined probability mass function (PMF). Specifically,…
▽ More
Random number generators (RNG) are essential elements in many cryptographic systems. True random number generators (TRNG) rely upon sources of randomness from natural processes such as those arising from quantum mechanics phenomena. We demonstrate that a quantum computer can serve as a high-quality, weakly random source for a generalized user-defined probability mass function (PMF). Specifically, QC measurement implements the process of variate sampling according to a user-specified PMF resulting in a word comprised of electronic bits that can then be processed by an extractor function to address inaccuracies due to non-ideal quantum gate operations and other system biases. We introduce an automated and flexible method for implementing a TRNG as a programmed quantum circuit that executes on commercially-available, gate-model quantum computers. The user specifies the desired word size as the number of qubits and a definition of the desired PMF. Based upon the user specification of the PMF, our compilation tool automatically synthesizes the desired TRNG as a structural OpenQASM file containing native gate operations that are optimized to reduce the circuit's quantum depth. The resulting TRNG provides multiple bits of randomness for each execution/measurement cycle; thus, the number of random bits produced in each execution is limited only by the size of the QC. We provide experimental results to illustrate the viability of this approach.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
Automated Quantum Oracle Synthesis with a Minimal Number of Qubits
Authors:
Jessie M. Henderson,
Elena R. Henderson,
Aviraj Sinha,
Mitchell A. Thornton,
D. Michael Miller
Abstract:
Several prominent quantum computing algorithms--including Grover's search algorithm and Shor's algorithm for finding the prime factorization of an integer--employ subcircuits termed 'oracles' that embed a specific instance of a mathematical function into a corresponding bijective function that is then realized as a quantum circuit representation. Designing oracles, and particularly, designing them…
▽ More
Several prominent quantum computing algorithms--including Grover's search algorithm and Shor's algorithm for finding the prime factorization of an integer--employ subcircuits termed 'oracles' that embed a specific instance of a mathematical function into a corresponding bijective function that is then realized as a quantum circuit representation. Designing oracles, and particularly, designing them to be optimized for a particular use case, can be a non-trivial task. For example, the challenge of implementing quantum circuits in the current era of NISQ-based quantum computers generally dictates that they should be designed with a minimal number of qubits, as larger qubit counts increase the likelihood that computations will fail due to one or more of the qubits decohering. However, some quantum circuits require that function domain values be preserved, which can preclude using the minimal number of qubits in the oracle circuit. Thus, quantum oracles must be designed with a particular application in mind. In this work, we present two methods for automatic quantum oracle synthesis. One of these methods uses a minimal number of qubits, while the other preserves the function domain values while also minimizing the overall required number of qubits. For each method, we describe known quantum circuit use cases, and illustrate implementation using an automated quantum compilation and optimization tool to synthesize oracles for a set of benchmark functions; we can then compare the methods with metrics including required qubit count and quantum circuit complexity.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
Relating EEG recordings to speech using envelope tracking and the speech-FFR
Authors:
Mike Thornton,
Danilo Mandic,
Tobias Reichenbach
Abstract:
During speech perception, a listener's electroencephalogram (EEG) reflects acoustic-level processing as well as higher-level cognitive factors such as speech comprehension and attention. However, decoding speech from EEG recordings is challenging due to the low signal-to-noise ratios of EEG signals. We report on an approach developed for the ICASSP 2023 'Auditory EEG Decoding' Signal Processing Gr…
▽ More
During speech perception, a listener's electroencephalogram (EEG) reflects acoustic-level processing as well as higher-level cognitive factors such as speech comprehension and attention. However, decoding speech from EEG recordings is challenging due to the low signal-to-noise ratios of EEG signals. We report on an approach developed for the ICASSP 2023 'Auditory EEG Decoding' Signal Processing Grand Challenge. A simple ensembling method is shown to considerably improve upon the baseline decoder performance. Even higher classification rates are achieved by jointly decoding the speech-evoked frequency-following response and responses to the temporal envelope of speech, as well as by fine-tuning the decoders to individual subjects. Our results could have applications in the diagnosis of hearing disorders or in cognitively steered hearing aids.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Automatic Modulation Classification with Deep Neural Networks
Authors:
Clayton Harper,
Mitchell Thornton,
Eric Larson
Abstract:
Automatic modulation classification is a desired feature in many modern software-defined radios. In recent years, a number of convolutional deep learning architectures have been proposed for automatically classifying the modulation used on observed signal bursts. However, a comprehensive analysis of these differing architectures and importance of each design element has not been carried out. Thus…
▽ More
Automatic modulation classification is a desired feature in many modern software-defined radios. In recent years, a number of convolutional deep learning architectures have been proposed for automatically classifying the modulation used on observed signal bursts. However, a comprehensive analysis of these differing architectures and importance of each design element has not been carried out. Thus it is unclear what tradeoffs the differing designs of these convolutional neural networks might have. In this research, we investigate numerous architectures for automatic modulation classification and perform a comprehensive ablation study to investigate the impacts of varying hyperparameters and design elements on automatic modulation classification performance. We show that a new state of the art in performance can be achieved using a subset of the studied design elements. In particular, we show that a combination of dilated convolutions, statistics pooling, and squeeze-and-excitation units results in the strongest performing classifier. We further investigate this best performer according to various other criteria, including short signal bursts, common misclassifications, and performance across differing modulation categories and modes.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Automated Quantum Memory Compilation with Improved Dynamic Range
Authors:
Aviraj Sinha,
Elena R. Henderson,
Jessie M. Henderson,
Mitchell A. Thornton
Abstract:
Emerging quantum algorithms that process data require that classical input data be represented as a quantum state. These data-processing algorithms often follow the gate model of quantum computing--which requires qubits to be initialized to a basis state, typically $\lvert 0 \rangle$--and thus often employ state generation circuits to transform the initialized basis state to a data-representation…
▽ More
Emerging quantum algorithms that process data require that classical input data be represented as a quantum state. These data-processing algorithms often follow the gate model of quantum computing--which requires qubits to be initialized to a basis state, typically $\lvert 0 \rangle$--and thus often employ state generation circuits to transform the initialized basis state to a data-representation state. There are many ways to encode classical data in a qubit, and the oft-applied approach of basis encoding does not allow optimization to the extent that other variants do. In this work, we thus consider automatic synthesis of addressable, quantum read-only memory (QROM) circuits, which act as data-encoding state-generation circuits. We investigate three data encoding approaches, one of which we introduce to provide improved dynamic range and precision. We present experimental results that compare these encoding methods for QROM synthesis to better understand the implications of and applications for each.
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
SN 2022ann: A type Icn supernova from a dwarf galaxy that reveals helium in its circumstellar environment
Authors:
K. W. Davis,
K. Taggart,
S. Tinyanont,
R. J. Foley,
V. A. Villar,
L. Izzo,
C. R. Angus,
M. J. Bustamante-Rosell,
D. A. Coulter,
N. Earl,
D. Farias,
J. Hjorth,
M. E. Huber,
D. O. Jones,
P. L. Kelly,
C. D. Kilpatrick,
D. Langeroodi,
H. -Y. Miao,
C. M. Pellegrino,
E. Ramirez-Ruiz,
C. L. Ransome,
S. Rest,
S. N. Sharief,
M. R. Siebert,
G. Terreran
, et al. (43 additional authors not shown)
Abstract:
We present optical and near-infrared (NIR) observations of the Type Icn supernova (SN Icn) 2022ann, the fifth member of its newly identified class of SNe. Its early optical spectra are dominated by narrow carbon and oxygen P-Cygni features with absorption velocities of 800 km/s; slower than other SNe Icn and indicative of interaction with a dense, H/He-poor circumstellar medium (CSM) that is outfl…
▽ More
We present optical and near-infrared (NIR) observations of the Type Icn supernova (SN Icn) 2022ann, the fifth member of its newly identified class of SNe. Its early optical spectra are dominated by narrow carbon and oxygen P-Cygni features with absorption velocities of 800 km/s; slower than other SNe Icn and indicative of interaction with a dense, H/He-poor circumstellar medium (CSM) that is outflowing slower than a typical Wolf-Rayet wind velocity of $>$1000 km/s. We identify helium in NIR spectra obtained two weeks after maximum and in optical spectra at three weeks, demonstrating that the CSM is not fully devoid of helium. We never detect broad spectral features from SN ejecta, including in spectra extending to the nebular phase, a unique characteristic among SNe~Icn. Compared to other SNe Icn, SN 2022ann has a low luminosity, with a peak o-band absolute magnitude of -17.7, and evolves slowly. We model the bolometric light curve and find it is well-described by 1.7 M_Sun of SN ejecta interacting with 0.2 M_sun of CSM. We place an upper limit of 0.04 M_Sun of Ni56 synthesized in the explosion. The host galaxy is a dwarf galaxy with a stellar mass of 10^7.34 M_Sun (implied metallicity of log(Z/Z_Sun) $\approx$ 0.10) and integrated star-formation rate of log(SFR) = -2.20 M_sun/yr; both lower than 97\% of the galaxies observed to produce core-collapse supernovae, although consistent with star-forming galaxies on the galaxy Main Sequence. The low CSM velocity, nickel and ejecta masses, and likely low-metallicity environment disfavour a single Wolf-Rayet progenitor star. Instead, a binary companion star is likely required to adequately strip the progenitor before explosion and produce a low-velocity outflow. The low CSM velocity may be indicative of the outer Lagrangian points in the stellar binary progenitor, rather than from the escape velocity of a single Wolf-Rayet-like massive star.
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Ear-EEG Sensitivity Modelling for Neural and Artifact Sources
Authors:
Metin Yarici,
Mike Thornton,
Danilo Mandic
Abstract:
The ear-EEG has emerged as a promising candidate for wearable brain monitoring in real-world scenarios. While experimental studies have validated ear-EEG in multiple scenarios, the source-sensor relationship for a variety of neural sources has not been established. In addition, a detailed theoretical analysis of the ear-EEG sensitivity to sources of artifacts is still missing. Within the present s…
▽ More
The ear-EEG has emerged as a promising candidate for wearable brain monitoring in real-world scenarios. While experimental studies have validated ear-EEG in multiple scenarios, the source-sensor relationship for a variety of neural sources has not been established. In addition, a detailed theoretical analysis of the ear-EEG sensitivity to sources of artifacts is still missing. Within the present study, the sensitivity of various configurations of ear-EEG is established in the presence of neural sources from a range of brain surface locations, in addition to ocular sources for the blink, vertical saccade, and horizontal saccade eye movements which produce artifacts in the EEG signal. Results conclusively support the introduction of ear-EEG into conventional EEG paradigms for monitoring neural activity that originates from within the temporal lobes, while also revealing the extent to which ear-EEG can be used for sources further away from these regions. The use of ear-EEG for sources that are located further away from the ears is supported through the analysis of the prominence of ocular artifacts in ear-EEG. The results from this study can be used to support both existing and prospective experimental ear-EEG studies and applications in the context of both neural and ocular artifact sensitivity.
△ Less
Submitted 18 July, 2022;
originally announced July 2022.
-
Capturing the geometry, function, and evolution of enzymes with 3D templates
Authors:
Ioannis G. Riziotis,
Janet M. Thornton
Abstract:
Structural templates are 3D signatures representing protein functional sites, such as ligand binding cavities, metal coordination motifs or catalytic sites. Here we explore methods to generate template libraries and algorithms to query structures for conserved 3D motifs. Applications of templates are discussed, as well as some exemplar cases for examining evolutionary links in enzymes. We also int…
▽ More
Structural templates are 3D signatures representing protein functional sites, such as ligand binding cavities, metal coordination motifs or catalytic sites. Here we explore methods to generate template libraries and algorithms to query structures for conserved 3D motifs. Applications of templates are discussed, as well as some exemplar cases for examining evolutionary links in enzymes. We also introduce the concept of using more than one template per structure to represent flexible sites, as an approach to better understand catalysis through snapshots captured in enzyme structures. Functional annotation from structure is an important topic that has recently resurfaced due to the new more accurate methods of protein structure prediction. Therefore, we anticipate that template-based functional site detection will be a powerful tool in the task of characterising a vast number of new protein models.
△ Less
Submitted 5 March, 2022;
originally announced March 2022.
-
Quantum steering as a resource for secure tripartite Quantum State Sharing
Authors:
Cailean Wilkinson,
Matthew Thornton,
Natalia Korolkova
Abstract:
Quantum State Sharing (QSS) is a protocol by which a (secret) quantum state may be securely split, shared between multiple potentially dishonest players, and reconstructed. Crucially the players are each assumed to be dishonest, and so QSS requires that only a collaborating authorised subset of players can access the original secret state; any dishonest unauthorised conspiracy cannot reconstruct i…
▽ More
Quantum State Sharing (QSS) is a protocol by which a (secret) quantum state may be securely split, shared between multiple potentially dishonest players, and reconstructed. Crucially the players are each assumed to be dishonest, and so QSS requires that only a collaborating authorised subset of players can access the original secret state; any dishonest unauthorised conspiracy cannot reconstruct it. We analyse a QSS protocol involving three untrusted players and demonstrate that quantum steering is the required resource which enables the protocol to proceed securely. We analyse the level of steering required to share any single-mode Gaussian secret which enables the states to be shared with the optimal use of resources.
△ Less
Submitted 2 June, 2023; v1 submitted 11 June, 2021;
originally announced June 2021.
-
Integrated source of path-entangled photon pairs with efficient pump self-rejection
Authors:
P. de la Hoz,
A. Sakovich,
A. Mikhalychev,
M. Thornton,
N. Korolkova,
D. Mogilevtsev
Abstract:
We present a scheme for an integrated four-wave mixing source of narrow-band path-entangled photon pairs with efficient spatial pump self-rejection. The scheme is based on correlated loss in a system of waveguides in Kerr nonlinear media. We demonstrate that this setup allows for upwards of 100dB pump rejection, without additional filtering. The effect is reached by driving the symmetric collectiv…
▽ More
We present a scheme for an integrated four-wave mixing source of narrow-band path-entangled photon pairs with efficient spatial pump self-rejection. The scheme is based on correlated loss in a system of waveguides in Kerr nonlinear media. We demonstrate that this setup allows for upwards of 100dB pump rejection, without additional filtering. The effect is reached by driving the symmetric collective mode that is strongly attenuated by an engineered dissipation, while photon pairs are born in the antisymmetric mode. A similar set-up can additionally be realized for generation of two-photon NOON states, also with pump self-rejection. We discuss implementation of the scheme by means of the coherent diffusive photonics, and demostrate its feasibility both in glass (such as fused silica-glass and IG2), and planar semiconductor waveguide structures in indium phosphide (InP) and in silicon.
△ Less
Submitted 31 May, 2021; v1 submitted 7 September, 2020;
originally announced September 2020.
-
Agile and versatile quantum communication: signatures and secrets
Authors:
Stefan Richter,
Matthew Thornton,
Imran Khan,
Hannah Scott,
Kevin Jaksch,
Ulrich Vogl,
Birgit Stiller,
Gerd Leuchs,
Christoph Marquardt,
Natalia Korolkova
Abstract:
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised. Conversely, versatile cryptography allows the user to switch the cryptographic task without requiring any knowledge of its inner workings. In this paper, we suggest how these related principles can be applied to the field of…
▽ More
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised. Conversely, versatile cryptography allows the user to switch the cryptographic task without requiring any knowledge of its inner workings. In this paper, we suggest how these related principles can be applied to the field of quantum cryptography by explicitly demonstrating two quantum cryptographic protocols, quantum digital signatures (QDS) and quantum secret sharing (QSS), on the same hardware sender and receiver platform. Crucially, the protocols differ only in their classical post-processing. The system is also suitable for quantum key distribution (QKD) and is highly compatible with deployed telecommunication infrastructures, since it uses standard quadrature phase shift keying (QPSK) encoding and heterodyne detection. For the first time, QDS protocols are modified to allow for postselection at the receiver, enhancing protocol performance. The cryptographic primitives QDS and QSS are inherently multipartite and we prove that they are secure not only when a player internal to the task is dishonest, but also when (external) eavesdrop** on the quantum channel is allowed. In our first proof-of-principle demonstration of an agile and versatile quantum communication system, the quantum states were distributed at GHz rates. This allows for a one-bit message to be securely signed using our QDS protocols in less than 0.05 ms over a 2 km fiber link and in less than 0.2~s over a 20 km fiber link. To our knowledge, this also marks the first demonstration of a continuous-variable direct QSS protocol.
△ Less
Submitted 19 December, 2020; v1 submitted 27 January, 2020;
originally announced January 2020.
-
Design of the coherent diffusive photon gun for generating non-classical states
Authors:
Matthew Thornton,
Anton Sakovich,
Alexander Mikhalychev,
Jesus Diaz Ferrer,
Pablo de la Hoz,
Natalia Korolkova,
Dmitri Mogilevtsev
Abstract:
We suggest and discuss a concept of deterministic integrated source of non-classical light based on the coherent diffusive photonics, a coherent light flow in a system of dissipatively coupled waveguides. We show how this practical quantum device can be realized with a system of single-mode waveguides laser-inscribed in nonlinear glass. We describe a hierarchy of models, from the complete multi-mo…
▽ More
We suggest and discuss a concept of deterministic integrated source of non-classical light based on the coherent diffusive photonics, a coherent light flow in a system of dissipatively coupled waveguides. We show how this practical quantum device can be realized with a system of single-mode waveguides laser-inscribed in nonlinear glass. We describe a hierarchy of models, from the complete multi-mode model of the waveguide network to the single mode coupled to a bath, analyze the conditions for validity of the simplest single-mode model and demonstrate feasibility of the generation of bright sub-Poissonian light states merely from a coherent input. Notably, the generation of non-classical states occurs at the initial stages of the dynamics, and can be accounted for in the linear model that allows us to circumvent the prohibiting computational complexity of the exact full quantum representation.
△ Less
Submitted 25 November, 2019; v1 submitted 3 July, 2019;
originally announced July 2019.
-
Entanglement in Higher-Radix Quantum Systems
Authors:
Kaitlin Smith,
Mitchell Thornton
Abstract:
Entanglement is an important phenomenon that enables quantum information processing algorithms and quantum communications protocols. Although entangled quantum states are often described in radix-2, higher-radix qudits can become entangled as well. In this work, we both introduce partial entanglement, a concept that does not exist for radix-2 quantum systems, and differentiate between partial and…
▽ More
Entanglement is an important phenomenon that enables quantum information processing algorithms and quantum communications protocols. Although entangled quantum states are often described in radix-2, higher-radix qudits can become entangled as well. In this work, we both introduce partial entanglement, a concept that does not exist for radix-2 quantum systems, and differentiate between partial and maximal entanglement within non-binary quantum information processing systems. We also develop and present higher-radix maximal entanglement generator circuits that are analogous to the well-known Bell state generator for binary quantum systems. Because higher-dimensioned qudits can be subjected to entangling processes that result in either partially or maximally entangled states, we demonstrate how higher-radix qudit circuits can be composed to generate these varying degrees of partial quantum entanglement. Theoretical results are provided for the general case where the radix is greater than two, and specific results based on a pair of radix-4 qudits are described.
△ Less
Submitted 2 June, 2019;
originally announced June 2019.
-
Reducing state updates via Gaussian-gated LSTMs
Authors:
Matthew Thornton,
Jithendar Anumula,
Shih-Chii Liu
Abstract:
Recurrent neural networks can be difficult to train on long sequence data due to the well-known vanishing gradient problem. Some architectures incorporate methods to reduce RNN state updates, therefore allowing the network to preserve memory over long temporal intervals. To address these problems of convergence, this paper proposes a timing-gated LSTM RNN model, called the Gaussian-gated LSTM (g-L…
▽ More
Recurrent neural networks can be difficult to train on long sequence data due to the well-known vanishing gradient problem. Some architectures incorporate methods to reduce RNN state updates, therefore allowing the network to preserve memory over long temporal intervals. To address these problems of convergence, this paper proposes a timing-gated LSTM RNN model, called the Gaussian-gated LSTM (g-LSTM). The time gate controls when a neuron can be updated during training, enabling longer memory persistence and better error-gradient flow. This model captures long-temporal dependencies better than an LSTM and the time gate parameters can be learned even from non-optimal initialization values. Because the time gate limits the updates of the neuron state, the number of computes needed for the network update is also reduced. By adding a computational budget term to the training loss, we can obtain a network which further reduces the number of computes by at least 10x. Finally, by employing a temporal curriculum learning schedule for the g-LSTM, we can reduce the convergence time of the equivalent LSTM network on long sequences.
△ Less
Submitted 22 January, 2019;
originally announced January 2019.
-
Using ZDDs in the Map** of Quantum Circuits
Authors:
Kaitlin Smith,
Mathias Soeken,
Bruno Schmitt,
Giovanni De Micheli,
Mitchell Thornton
Abstract:
A critical step in quantum compilation is the transformation of a technology-independent quantum circuit into a technology-dependent form for a targeted device. In addition to map** quantum gates into the supported gate set, it is necessary to map pseudo qubits in the technology-independent circuit into physical qubits of the technology-dependent circuit such that coupling constraints among qubi…
▽ More
A critical step in quantum compilation is the transformation of a technology-independent quantum circuit into a technology-dependent form for a targeted device. In addition to map** quantum gates into the supported gate set, it is necessary to map pseudo qubits in the technology-independent circuit into physical qubits of the technology-dependent circuit such that coupling constraints among qubits acting in multiple-qubit gates are satisfied. It is usually not possible to find such a map** without adding SWAP gates into the circuit. To cope with the technical limitations of NISQ-era quantum devices, it is advantageous to find a map** that requires as few additional gates as possible. The large search space of possible map**s makes this task a difficult combinatorial optimization problem. In this work, we demonstrate how zero-suppressed decision diagrams (ZDDs) can be used for typical implementation tasks in quantum map** algorithms. We show how to maximally partition a quantum circuit into blocks of adjacent gates, and if adjacent gates within a circuit do not share common map** permutations, we attempt to combine them using parallelized SWAP operations represented in a ZDD. Boundaries for the partitions are formed where adjacent gates are unable to be combined. Within each partition block, ZDDs represent all possible map**s of pseudo qubits to physical qubits.
△ Less
Submitted 1 May, 2020; v1 submitted 8 January, 2019;
originally announced January 2019.
-
Continuous-variable quantum digital signatures over insecure channels
Authors:
Matthew Thornton,
Hannah Scott,
Callum Croal,
Natalia Korolkova
Abstract:
Digital signatures ensure the integrity of a classical message and the authenticity of its sender. Despite their far-reaching use in modern communication, currently used signature schemes rely on computational assumptions and will be rendered insecure by a quantum computer. We present a quantum digital signatures (QDS) scheme whose security is instead based on the impossibility of perfectly and…
▽ More
Digital signatures ensure the integrity of a classical message and the authenticity of its sender. Despite their far-reaching use in modern communication, currently used signature schemes rely on computational assumptions and will be rendered insecure by a quantum computer. We present a quantum digital signatures (QDS) scheme whose security is instead based on the impossibility of perfectly and deterministically distinguishing between quantum states. Our continuous-variable (CV) scheme relies on phase measurement of a distributed alphabet of coherent states, and allows for secure message authentication against a quantum adversary performing collective beamsplitter and entangling-cloner attacks. Crucially, for the first time in the CV setting we allow for an eavesdropper on the quantum channels and yet retain shorter signature lengths than previous protocols with no eavesdropper. This opens up the possibility to implement CV QDS alongside existing CV quantum key distribution (QKD) platforms with minimal modification.
△ Less
Submitted 9 July, 2019; v1 submitted 23 December, 2018;
originally announced December 2018.