-
Quantum Kolmogorov complexity and quantum correlations in deterministic-control quantum Turing machines
Authors:
Mariano Lemus,
Ricardo Faleiro,
Paulo Mateus,
Nikola Paunković,
André Souto
Abstract:
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it…
▽ More
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it to study three particular aspects of the algorithmic information contained in a quantum state: a comparison of the information in a quantum state with that of its classical representation as an array of real numbers, an exploration of the limits of quantum state copying in the context of algorithmic complexity, and study of the complexity of correlations in quantum systems, resulting in a correlation-aware definition for algorithmic mutual information that satisfies symmetry of information property.
△ Less
Submitted 15 January, 2024; v1 submitted 23 May, 2023;
originally announced May 2023.
-
On the minmax regret for statistical manifolds: the role of curvature
Authors:
Bruno Mera,
Paulo Mateus,
Alexandra M. Carvalho
Abstract:
Model complexity plays an essential role in its selection, namely, by choosing a model that fits the data and is also succinct. Two-part codes and the minimum description length have been successful in delivering procedures to single out the best models, avoiding overfitting. In this work, we pursue this approach and complement it by performing further assumptions in the parameter space. Concretel…
▽ More
Model complexity plays an essential role in its selection, namely, by choosing a model that fits the data and is also succinct. Two-part codes and the minimum description length have been successful in delivering procedures to single out the best models, avoiding overfitting. In this work, we pursue this approach and complement it by performing further assumptions in the parameter space. Concretely, we assume that the parameter space is a smooth manifold, and by using tools of Riemannian geometry, we derive a sharper expression than the standard one given by the stochastic complexity, where the scalar curvature of the Fisher information metric plays a dominant role. Furthermore, we derive the minmax regret for general statistical manifolds and apply our results to derive optimal dimensional reduction in the context of principal component analysis.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
A Private Quantum Bit String Commitment
Authors:
Mariana Gama,
Paulo Mateus,
André Souto
Abstract:
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticat…
▽ More
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticated channel. The protocol remains secure (but not private) if we realize the random oracles as physical unclonable functions in the so-called bad PUF model with access before the opening phase.
△ Less
Submitted 31 January, 2020;
originally announced January 2020.
-
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
Authors:
Mariano Lemus,
Mariana F. Ramos,
Preeti Yadav,
Nuno A. Silva,
Nelson J. Muga,
Andre Souto,
Nikola Paunkovic,
Paulo Mateus,
Armando N. Pinto
Abstract:
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments us…
▽ More
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach, quantum and classical, we obtain a practical and high-speed oblivious transfer protocol, secure even against quantum computer attacks. The oblivious distributed keys allow implementing a fast and secure oblivious transfer protocol, which can pave the way for the widespread of applications based on secure multiparty computation.
△ Less
Submitted 17 June, 2020; v1 submitted 25 September, 2019;
originally announced September 2019.
-
Time Series Imputation
Authors:
Samuel Arcadinho,
Paulo Mateus
Abstract:
Multivariate time series is a very active topic in the research community and many machine learning tasks are being used in order to extract information from this type of data. However, in real-world problems data has missing values, which may difficult the application of machine learning techniques to extract information. In this paper we focus on the task of imputation of time series. Many imput…
▽ More
Multivariate time series is a very active topic in the research community and many machine learning tasks are being used in order to extract information from this type of data. However, in real-world problems data has missing values, which may difficult the application of machine learning techniques to extract information. In this paper we focus on the task of imputation of time series. Many imputation methods for time series are based on regression methods. Unfortunately, these methods perform poorly when the variables are categorical. To address this case, we propose a new imputation method based on Expectation Maximization over dynamic Bayesian networks. The approach is assessed with synthetic and real data, and it outperforms several state-of-the art methods.
△ Less
Submitted 22 March, 2019;
originally announced March 2019.
-
Quantum machines with classical control
Authors:
Paulo Mateus,
Daowen Qiu,
Andre Souto
Abstract:
Herein we survey the main results concerning quantum automata and machines with classical control. These machines were originally proposed by Sernadas et al in [37], during the FCT QuantLog project. First, we focus on the expressivity of quantum automata with both quantum and classical states. We revise the result obtained in [32] where it was proved that such automata are able to recognise, with…
▽ More
Herein we survey the main results concerning quantum automata and machines with classical control. These machines were originally proposed by Sernadas et al in [37], during the FCT QuantLog project. First, we focus on the expressivity of quantum automata with both quantum and classical states. We revise the result obtained in [32] where it was proved that such automata are able to recognise, with exponentially less states than deterministic finite automata, a family of regular languages that cannot be recognised by other types of quantum automata. Finally, we revise the concept of quantum Turing machine with classical control introduced in [25]. The novelty of these machines consists in the fact that their termination problem is completely deterministic, in opposition to other notions in the literature. Concretely, we revisit the result that such machines fulfil the s-m-n property, while kee** the expressivity of a quantum model for computation.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Decision and optimization problems in the Unreliable-Circuit Logic
Authors:
J. Rasga,
C. Sernadas,
P. Mateus,
A. Sernadas
Abstract:
The ambition constrained validity and the model witness problems in the logic UCL, for reasoning about circuits with unreliable gates, are analyzed. Moreover, two additional problems, motivated by the applications, are studied. One consists of finding bounds on the reliability rate of the gates that ensure that a given circuit has an intended success rate. The other consists of finding a reliabili…
▽ More
The ambition constrained validity and the model witness problems in the logic UCL, for reasoning about circuits with unreliable gates, are analyzed. Moreover, two additional problems, motivated by the applications, are studied. One consists of finding bounds on the reliability rate of the gates that ensure that a given circuit has an intended success rate. The other consists of finding a reliability rate of the gates that maximizes the success rate of a given circuit. Sound and complete algorithms are developed for these problems and their computational complexity is studied.
△ Less
Submitted 28 July, 2016;
originally announced August 2016.
-
Quantum walks public key cryptographic system
Authors:
C. Vlachou,
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
Quantum Cryptography is a rapidly develo** field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol t…
▽ More
Quantum Cryptography is a rapidly develo** field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public-key generation and encryption/decryption procedures.
△ Less
Submitted 3 February, 2016;
originally announced February 2016.
-
Oblivious transfer based on single-qubit rotations
Authors:
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing o…
▽ More
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing only "few-qubit" coherent measurements. We also present a single-bit oblivious transfer based on the proposed bit-string protocol. The protocol can be implemented with current technology based on optics.
△ Less
Submitted 4 September, 2017; v1 submitted 30 July, 2014;
originally announced July 2014.
-
Oblivious transfer based on quantum state computational distinguishability
Authors:
A. Souto,
P. Mateus,
P. Adão,
N. Paunković
Abstract:
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that fa…
▽ More
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that factoring is unfeasible. To overcome this, quantum mechanics has been used intensively in the past decades, and alternatives resistant to quantum attacks have been developed in order to fulfill the (potential) lack of security of a significant number of classical schemes.
In this paper, we present a quantum computationally secure protocol for oblivious transfer between two parties, under the assumption of quantum hardness of state distinguishability. The protocol is feasible, in the sense that it is implementable in polynomial time.
△ Less
Submitted 24 March, 2014;
originally announced March 2014.
-
State succinctness of two-way finite automata with quantum and classical states
Authors:
Shenggen Zheng,
Daowen Qiu,
Jozef Gruska,
Lvzhou Li,
Paulo Mateus
Abstract:
{\it Two-way quantum automata with quantum and classical states} (2QCFA) were introduced by Ambainis and Watrous in 2002. In this paper we study state succinctness of 2QCFA.
For any $m\in {\mathbb{Z}}^+$ and any $ε<1/2$, we show that: {enumerate} there is a promise problem $A^{eq}(m)$ which can be solved by a 2QCFA with one-sided error $ε$ in a polynomial expected running time with a constant nu…
▽ More
{\it Two-way quantum automata with quantum and classical states} (2QCFA) were introduced by Ambainis and Watrous in 2002. In this paper we study state succinctness of 2QCFA.
For any $m\in {\mathbb{Z}}^+$ and any $ε<1/2$, we show that: {enumerate} there is a promise problem $A^{eq}(m)$ which can be solved by a 2QCFA with one-sided error $ε$ in a polynomial expected running time with a constant number (that depends neither on $m$ nor on $\varepsilon$) of quantum states and $\mathbf{O}(\log{\frac{1}ε)}$ classical states, whereas the sizes of the corresponding {\it deterministic finite automata} (DFA), {\it two-way nondeterministic finite automata} (2NFA) and polynomial expected running time {\it two-way probabilistic finite automata} (2PFA) are at least $2m+2$, $\sqrt{\log{m}}$, and $\sqrt[3]{(\log m)/b}$, respectively; there exists a language $L^{twin}(m)=\{wcw| w\in\{a,b\}^*\}$ over the alphabet $Σ=\{a,b,c\}$ which can be recognized by a 2QCFA with one-sided error $ε$ in an exponential expected running time with a constant number of quantum states and $\mathbf{O}(\log{\frac{1}ε)}$ classical states, whereas the sizes of the corresponding DFA, 2NFA and polynomial expected running time 2PFA are at least $2^m$, $\sqrt{m}$, and $\sqrt[3]{m/b}$, respectively; {enumerate} where $b$ is a constant.
△ Less
Submitted 23 May, 2012; v1 submitted 13 February, 2012;
originally announced February 2012.
-
Exponentially more concise quantum recognition of non-RMM regular languages
Authors:
Daowen Qiu,
Lvzhou Li,
Paulo Mateus,
Amilcar Sernadas
Abstract:
We show that there are quantum devices that accept all regular languages and that are exponentially more concise than deterministic finite automata (DFA). For this purpose, we introduce a new computing model of {\it one-way quantum finite automata} (1QFA), namely, {\it one-way quantum finite automata together with classical states} (1QFAC), which extends naturally both measure-only 1QFA and DFA an…
▽ More
We show that there are quantum devices that accept all regular languages and that are exponentially more concise than deterministic finite automata (DFA). For this purpose, we introduce a new computing model of {\it one-way quantum finite automata} (1QFA), namely, {\it one-way quantum finite automata together with classical states} (1QFAC), which extends naturally both measure-only 1QFA and DFA and whose state complexity is upper-bounded by both. The original contributions of the paper are the following. First, we show that the set of languages accepted by 1QFAC with bounded error consists precisely of all regular languages. Second, we prove that 1QFAC are at most exponentially more concise than DFA. Third, we show that the previous bound is tight for families of regular languages that are not recognized by measure-once (RMO), measure-many (RMM) and multi-letter 1QFA. % More concretely we exhibit regular languages $L^0(m)$ for $m$ prime such that: (i) $L^0(m)$ cannot be recognized by measure-once, measure-many and multi-letter 1QFA; (ii) the minimal DFA that accepts $L^0(m)$ has $O(m)$ states; (iii) there is a 1QFAC with constant classical states and $O(\log(m))$ quantum basis that accepts $L^0(m)$. Fourth, we give a polynomial-time algorithm for determining whether any two 1QFAC are equivalent. Finally, we show that state minimization of 1QFAC is decidable within EXPSPACE. We conclude the paper by posing some open problems.
△ Less
Submitted 18 May, 2013; v1 submitted 8 September, 2009;
originally announced September 2009.
-
Decidability of the Equivalence of Multi-Letter Quantum Finite Automata
Authors:
Daowen Qiu,
Xiangfu Zou,
Lvzhou Li,
Paulo Mateus
Abstract:
Multi-letter {\it quantum finite automata} (QFAs) were a quantum variant of classical {\it one-way multi-head finite automata} (J. Hromkovič, Acta Informatica 19 (1983) 377-384), and it has been shown that this new one-way QFAs (multi-letter QFAs) can accept with no error some regular languages $(a+b)^{*}b$ that are unacceptable by the previous one-way QFAs. In this paper, we study the decidabilit…
▽ More
Multi-letter {\it quantum finite automata} (QFAs) were a quantum variant of classical {\it one-way multi-head finite automata} (J. Hromkovič, Acta Informatica 19 (1983) 377-384), and it has been shown that this new one-way QFAs (multi-letter QFAs) can accept with no error some regular languages $(a+b)^{*}b$ that are unacceptable by the previous one-way QFAs. In this paper, we study the decidability of the equivalence of multi-letter QFAs, and the main technical contributions are as follows: (1) We show that any two automata, a $k_{1}$-letter QFA ${\cal A}_1$ and a $k_{2}$-letter QFA ${\cal A}_2$, over the same input alphabet $Σ$ are equivalent if and only if they are $(n^2m^{k-1}-m^{k-1}+k)$-equivalent, where $m=|Σ|$ is the cardinality of $Σ$, $k=\max(k_{1},k_{2})$, and $n=n_{1}+n_{2}$, with $n_{1}$ and $n_{2}$ being the numbers of states of ${\cal A}_{1}$ and ${\cal A}_{2}$, respectively. When $k=1$, we obtain the decidability of equivalence of measure-once QFAs in the literature. It is worth mentioning that our technical method is essentially different from that for the decidability of the case of single input alphabet (i.e., $m=1$). (2) However, if we determine the equivalence of multi-letter QFAs by checking all strings of length not more than $ n^2m^{k-1}-m^{k-1}+k$, then the worst time complexity is exponential, i.e., $O(n^6m^{n^2m^{k-1}-m^{k-1}+2k-1})$. Therefore, we design a polynomial-time $O(m^{2k-1}n^{8}+km^kn^{6})$ algorithm for determining the equivalence of any two multi-letter QFAs. Here, the time complexity is concerning the number of states in the multi-letter QFAs, and $k$ is thought of as a constant.
△ Less
Submitted 24 October, 2010; v1 submitted 4 December, 2008;
originally announced December 2008.
-
Improving Classical Authentication with Quantum Communication
Authors:
F. M. Assis,
P. Mateus,
Y. Omar
Abstract:
We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security t…
▽ More
We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security than the classical XOR function introduced by Brassard. Furthermore, we establish the relationship between the bias of a PRG and the amount of information about the key that the attacker can retrieve from a block of authenticated messages. Finally, we prove that quantum resources can improve both the secrecy of the key generated by the PRG and the secrecy of the tag obtained with a hidden hash function.
△ Less
Submitted 11 February, 2010; v1 submitted 6 June, 2008;
originally announced June 2008.
-
Weakly complete axiomatization of exogenous quantum propositional logic
Authors:
P. Mateus,
A. Sernadas
Abstract:
A weakly complete finitary axiomatization for EQPL (exogenous quantum propositional logic) is presented. The proof is carried out using a non trivial extension of the Fagin-Halpern-Megiddo technique together with three Henkin style completions.
A weakly complete finitary axiomatization for EQPL (exogenous quantum propositional logic) is presented. The proof is carried out using a non trivial extension of the Fagin-Halpern-Megiddo technique together with three Henkin style completions.
△ Less
Submitted 22 March, 2005;
originally announced March 2005.