Skip to main content

Showing 1–8 of 8 results for author: Vinayagamurthy, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.00004  [pdf, other

    quant-ph cs.CR cs.LG

    Classical ensemble of Quantum-classical ML algorithms for Phishing detection in Ethereum transaction networks

    Authors: Anupama Ray, Sai Sakunthala Guddanti, Vishnu Ajith, Dhinakaran Vinayagamurthy

    Abstract: Ethereum is one of the most valuable blockchain networks in terms of the total monetary value locked in it, and arguably been the most active network where new blockchain innovations in research and applications are demonstrated. But, this also leads to Ethereum network being susceptible to a wide variety of threats and attacks in an attempt to gain unreasonable advantage or to undermine the value… ▽ More

    Submitted 30 October, 2022; originally announced November 2022.

  2. arXiv:2210.09730  [pdf, other

    cs.IT quant-ph

    Efficient Syndrome Decoder for Heavy Hexagonal QECC via Machine Learning

    Authors: Debasmita Bhoumik, Ritajit Majumdar, Dhiraj Madan, Dhinakaran Vinayagamurthy, Shesha Raghunathan, Susmita Sur-Kolay

    Abstract: Error syndromes for heavy hexagonal code and other topological codes such as surface code have typically been decoded by using Minimum Weight Perfect Matching (MWPM) based methods. Recent advances have shown that topological codes can be efficiently decoded by deploying machine learning (ML) techniques, in particular with neural networks. In this work, we first propose an ML based decoder for heav… ▽ More

    Submitted 2 April, 2024; v1 submitted 18 October, 2022; originally announced October 2022.

    Comments: This paper is published in ACM Transactions on Quantum Computing. Link https://dl.acm.org/doi/abs/10.1145/3636516

    Journal ref: ACM Transactions on Quantum Computing 5, 1, Article 5 (March 2024), 27 pages

  3. Atomic cross-chain exchanges of shared assets

    Authors: Krishnasuri Narayanam, Venkatraman Ramakrishna, Dhinakaran Vinayagamurthy, Sandeep Nishad

    Abstract: A core enabler for blockchain or DLT interoperability is the ability to atomically exchange assets held by mutually untrusting owners on different ledgers. This atomic swap problem has been well-studied, with the Hash Time Locked Contract (HTLC) emerging as a canonical solution. HTLC ensures atomicity of exchange, albeit with caveats for node failure and timeliness of claims. But a bigger limitati… ▽ More

    Submitted 10 September, 2022; v1 submitted 25 February, 2022; originally announced February 2022.

  4. arXiv:2111.15259  [pdf, other

    cs.CR cs.DC

    Privacy-Preserving Decentralized Exchange Marketplaces

    Authors: Kavya Govindarajan, Dhinakaran Vinayagamurthy, Praveen Jayachandran, Chester Rebeiro

    Abstract: Decentralized exchange markets leveraging blockchain have been proposed recently to provide open and equal access to traders, improve transparency and reduce systemic risk of centralized exchanges. However, they compromise on the privacy of traders with respect to their asset ownership, account balance, order details and their identity. In this paper, we present Rialto, a fully decentralized priva… ▽ More

    Submitted 20 December, 2021; v1 submitted 30 November, 2021; originally announced November 2021.

    Comments: 17 pages, 7 figures

  5. arXiv:2110.04637  [pdf, other

    quant-ph cs.DS

    Depth Optimized Ansatz Circuit in QAOA for Max-Cut

    Authors: Ritajit Majumdar, Debasmita Bhoumik, Dhiraj Madan, Dhinakaran Vinayagamurthy, Shesha Raghunathan, Susmita Sur-Kolay

    Abstract: While a Quantum Approximate Optimization Algorithm (QAOA) is intended to provide a quantum advantage in finding approximate solutions to combinatorial optimization problems, noise in the system is a hurdle in exploiting its full potential. Several error mitigation techniques have been studied to lessen the effect of noise on this algorithm. Recently, Majumdar et al. proposed a Depth First Search (… ▽ More

    Submitted 9 October, 2021; originally announced October 2021.

    Comments: 12 pages, single column

  6. arXiv:2106.02812  [pdf, other

    quant-ph cs.DS

    Optimizing Ansatz Design in QAOA for Max-cut

    Authors: Ritajit Majumdar, Dhiraj Madan, Debasmita Bhoumik, Dhinakaran Vinayagamurthy, Shesha Raghunathan, Susmita Sur-Kolay

    Abstract: Quantum Approximate Optimization Algorithm (QAOA) is studied primarily to find approximate solutions to combinatorial optimization problems. For a graph with $n$ vertices and $m$ edges, a depth $p$ QAOA for the Max-cut problem requires $2\cdot m \cdot p$ CNOT gates. CNOT is one of the primary sources of error in modern quantum computers. In this paper, we propose two hardware independent methods t… ▽ More

    Submitted 28 June, 2021; v1 submitted 5 June, 2021; originally announced June 2021.

    Comments: 13 pages; double column

  7. Trusted Data Notifications from Private Blockchains

    Authors: Dushyant Behl, Palanivel Kodeswaran, Venkatraman Ramakrishna, Sayandeep Sen, Dhinakaran Vinayagamurthy

    Abstract: Private blockchain networks are used by enterprises to manage decentralized processes without trusted mediators and without exposing their assets publicly on an open network like Ethereum. Yet external parties that cannot join such networks may have a compelling need to be informed about certain data items on their shared ledgers along with certifications of data authenticity; e.g., a mortgage ban… ▽ More

    Submitted 23 January, 2021; originally announced January 2021.

    Comments: 9 pages

    Journal ref: IEEE International Conference on Blockchain, Blockchain 2020, Rhodes Island, Greece, November 2-6, 2020, pages {53--61}

  8. arXiv:1711.02279  [pdf, other

    cs.CR

    StealthDB: a Scalable Encrypted Database with Full SQL Query Support

    Authors: Alexey Gribov, Dhinakaran Vinayagamurthy, Sergey Gorbunov

    Abstract: Encrypted database systems provide a great method for protecting sensitive data in untrusted infrastructures. These systems are built using either special-purpose cryptographic algorithms that support operations over encrypted data, or by leveraging trusted computing co-processors. Strong cryptographic algorithms (e.g., public-key encryptions, garbled circuits) usually result in high performance o… ▽ More

    Submitted 21 April, 2019; v1 submitted 6 November, 2017; originally announced November 2017.