Skip to main content

Showing 1–9 of 9 results for author: Karvonen, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.00206  [pdf, ps, other

    math.CT cs.DS

    Towards a Unified Theory of Time-Varying Data

    Authors: Benjamin Merlin Bumpus, James Fairbanks, Martti Karvonen, Wilmer Leal, Frédéric Simard

    Abstract: What is a time-varying graph, or a time-varying topological space and more generally what does it mean for a mathematical structure to vary over time? Here we introduce categories of narratives: powerful tools for studying temporal graphs and other time-varying data structures. Narratives are sheaves on posets of intervals of time which specify snapshots of a temporal object as well as relationshi… ▽ More

    Submitted 27 February, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Comments: Acknowledgements and related work added

    MSC Class: 68P05; 68R01; 18D70

  2. arXiv:2309.05155  [pdf, ps, other

    quant-ph cs.CC

    Uncloneable Quantum Advice

    Authors: Anne Broadbent, Martti Karvonen, Sébastien Lord

    Abstract: The famous no-cloning principle has been shown recently to enable a number of uncloneable functionalities. Here we address for the first time unkeyed quantum uncloneablity, via the study of a complexity-theoretic tool that enables a computation, but that is natively unkeyed: quantum advice. Remarkably, this is an application of the no-cloning principle in a context where the quantum states of inte… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

    Comments: 58 pages, 6 figures

  3. Categorical composable cryptography: extended version

    Authors: Anne Broadbent, Martti Karvonen

    Abstract: We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting s… ▽ More

    Submitted 15 December, 2023; v1 submitted 28 August, 2022; originally announced August 2022.

    Comments: Extended version of arXiv:2105.05949 which appeared in FoSSaCS 2022

    Journal ref: Logical Methods in Computer Science, Volume 19, Issue 4 (December 18, 2023) lmcs:9979

  4. Categorical composable cryptography

    Authors: Anne Broadbent, Martti Karvonen

    Abstract: We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting s… ▽ More

    Submitted 28 August, 2022; v1 submitted 12 May, 2021; originally announced May 2021.

    Comments: Updated to match the proceedings version

    Journal ref: Foundations of Software Science and Computation Structures (FoSSaCS) 2022

  5. arXiv:2104.11241  [pdf, other

    quant-ph cs.LO math.CT

    Closing Bell: Boxing black box simulations in the resource theory of contextuality

    Authors: Rui Soares Barbosa, Martti Karvonen, Shane Mansfield

    Abstract: This chapter contains an exposition of the sheaf-theoretic framework for contextuality emphasising resource-theoretic aspects, as well as some original results on this topic. In particular, we consider functions that transform empirical models on a scenario S to empirical models on another scenario T, and characterise those that are induced by classical procedures between S and T corresponding to… ▽ More

    Submitted 24 January, 2024; v1 submitted 22 April, 2021; originally announced April 2021.

    Comments: Corrected a mistake in Theorem 44 and other fixes stemming from it. This supersedes the published version and should be considered the version of reference

    Journal ref: In: A. Palmigiano, M. Sadrzadeh (eds), Samson Abramsky on Logic and Structure in Computer Science and Beyond. Outstanding Contributions to Logic, vol 25. Springer, Cham (2023)

  6. A comonadic view of simulation and quantum resources

    Authors: Samson Abramsky, Rui Soares Barbosa, Martti Karvonen, Shane Mansfield

    Abstract: We study simulation and quantum resources in the setting of the sheaf-theoretic approach to contextuality and non-locality. Resources are viewed behaviourally, as empirical models. In earlier work, a notion of morphism for these empirical models was proposed and studied. We generalize and simplify the earlier approach, by starting with a very simple notion of morphism, and then extending it to a m… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

    Comments: To appear in Proceedings of LiCS 2019

    Journal ref: 34th Annual ACM/IEEE Symposium on Logic in Computer Science (LiCS 2019)

  7. Reversible effects as inverse arrows

    Authors: Chris Heunen, Robin Kaarsgaard, Martti Karvonen

    Abstract: Reversible computing models settings in which all processes can be reversed. Applications include low-power computing, quantum computing, and robotics. It is unclear how to represent side-effects in this setting, because conventional methods need not respect reversibility. We model reversible effects by adapting Hughes' arrows to dagger arrows and inverse arrows. This captures several fundamental… ▽ More

    Submitted 18 December, 2018; v1 submitted 22 May, 2018; originally announced May 2018.

    Comments: 15 pages; corrected Example 3.6

    Journal ref: Electronic Notes in Theoretical Computer Science 341:179-199, 2018

  8. arXiv:1804.01514  [pdf, ps, other

    quant-ph cs.LO math.CT

    Categories of Empirical Models

    Authors: Martti Karvonen

    Abstract: A notion of morphism that is suitable for the sheaf-theoretic approach to contextuality is developed, resulting in a resource theory for contextuality. The key features involve using an underlying relation rather than a function between measurement scenarios, and allowing for stochastic map**s of outcomes to outcomes. This formalizes an intuitive idea of using one empirical model to simulate ano… ▽ More

    Submitted 29 January, 2019; v1 submitted 4 April, 2018; originally announced April 2018.

    Comments: In Proceedings QPL 2018, arXiv:1901.09476

    Journal ref: EPTCS 287, 2019, pp. 239-252

  9. Reversible monadic computing

    Authors: Chris Heunen, Martti Karvonen

    Abstract: We extend categorical semantics of monadic programming to reversible computing, by considering monoidal closed dagger categories: the dagger gives reversibility, whereas closure gives higher-order expressivity. We demonstrate that Frobenius monads model the appropriate notion of coherence between the dagger and closure by reinforcing Cayley's theorem; by proving that effectful computations (Kleisl… ▽ More

    Submitted 16 May, 2015; originally announced May 2015.

    Comments: 19 pages

    Journal ref: Proceedings MFPS, Electronic Notes in Theoretical Computer Science 319:217--237, 2015