作者:
Cholvi, VicentUniv Jaume 1
Dept Llenguatges & Sistemes Informat Campus Rius Sec S-N Castellon de La Plana 12071 Spain
Reaching agreement in the presence of arbitrary faults is a fundamental problem in distributed computation, which has been shown to be unsolvable if one-third of the processes can fail, unless signed messages are used...
详细信息
Reaching agreement in the presence of arbitrary faults is a fundamental problem in distributed computation, which has been shown to be unsolvable if one-third of the processes can fail, unless signed messages are used. In this paper, we propose a solution to a variation of the original BA problem, called Detectable Byzantine Agreement (DBA), that does not need to use signed messages. The proposed algorithm uses what we call Q-correlated lists, which are generated by a quantum source device. Once each process has one of these lists, they use them to reach the agreement in a classical manner. Although, in general, the agreement is reached by using in + 1 rounds (where in is the number of processes that can fail), if less than one-third of the processes fail it only needs one round to reach the agreement.
This work proposes a novel algorithm (Fast-QTrain) that enables fast training of variational classifiers. This training speedup is achieved by processing multiple samples, from a classical data set, in parallel during...
详细信息
This work proposes a novel algorithm (Fast-QTrain) that enables fast training of variational classifiers. This training speedup is achieved by processing multiple samples, from a classical data set, in parallel during the training process. The proposed algorithm utilizes a quantum RAM along with other quantum circuits for implementing the forward pass. Besides, instead of computing the loss classically, which is the usual practice, we calculate the loss here using a swap test circuit. As a result, our algorithm reduces the training cost of a variational classifier trained for in epochs from the usual O(mN) (which is also the case with most classical machine learning algorithms) to O(N + m log N) where the data set contains N samples. Ignoring the one-time overhead of loading the N training samples into the qRAM, the time complexity per epoch of training is O(log N) in our proposed algorithm, as opposed to O(N) (which is the case for other variational algorithms and most classical machine learning algorithms). By performing quantum-circuit simulations on the Pennylane package, we show fairly accurate training using our proposed algorithm on a popular, classical data set: Fisher's Iris data set of flowers. While we restrict ourselves to binary classification (of samples from classical data sets) in this paper, our algorithm can be easily generalized to carry out multi-class classification. Our proposed algorithm (Fast-QTrain) can also be adapted for any classification ansatz used in the variational circuit as long as the encoding of the classical data into qubits is non-parameterized.
QUIC is a new network protocol standardized in 2021. It was designed to replace the TCP/ TLS stack and is based on UDP. The most current web standard HTTP / 3 is specifically designed to use QUIC as transport protocol...
详细信息
ISBN:
(纸本)9798350390605;9783903176638
QUIC is a new network protocol standardized in 2021. It was designed to replace the TCP/ TLS stack and is based on UDP. The most current web standard HTTP / 3 is specifically designed to use QUIC as transport protocol. QUIC claims to provide secure and fast transport with low-latency connection establishment, flow and congestion control, reliable delivery, and stream multiplexing. To achieve the security goals, QUIC enforces the usage of TLS 1.3. It uses authenticated encryption with additional data (AEAD) algorithms to not only protect the payload but also parts of the header. The handshake relies on asymmetric cryptography, which will be broken with the introduction of powerful quantum computers, making the use of post-quantum cryptography inevitable. This paper presents a detailed evaluation of the impact of cryptography on QUIC performance. The high-performance QUIC implementations LSQUIC, quiche, and MsQuic are evaluated under different aspects. We break symmetric cryptography down to the different security features. To be able to isolate the impact of cryptography, we implemented a NOOP AEAD algorithm which leaves plaintext unaltered. We show that QUIC performance increases by 10 to 20% when removing packet protection. The header protection has negligible impact on performance, especially for AES ciphers. We integrate post-quantum cryptographic algorithms into QUIC, demonstrating its feasibility without major changes to the QUIC libraries by using a TLS library that implements post-quantumalgorithms. Kyber, Dilithium, and FALCON are promising candidates for post-quantum secure QUIC, as they have a low impact on the handshake duration. algorithms like SPHINCS+ with larger key sizes or more complex calculations significantly impact the handshake duration and cause additional issues in our measurements.
The quantization reconstruction of classical machine learning algorithms is an important research direction in quantum machine learning. Clustering, a widely applied algorithm in machine learning, also holds high rese...
详细信息
Given a convex function f : R-d -> R, the problem of sampling from a distribution proportional to e(-f(x)) is called log-concave sampling. This task has wide applications in machine learning, physics, statistics, e...
详细信息
ISBN:
(纸本)9781713871088
Given a convex function f : R-d -> R, the problem of sampling from a distribution proportional to e(-f(x)) is called log-concave sampling. This task has wide applications in machine learning, physics, statistics, etc. In this work, we develop quantumalgorithms for sampling log-concave distributions and for estimating their normalizing constants integral(Rd) e(-f(x)) dx. First, we use underdamped Langevin diffusion to develop quantumalgorithms that match the query complexity (in terms of the condition number kappa and dimension d) of analogous classical algorithms that use gradient (first-order) queries, even though the quantumalgorithms use only evaluation (zeroth-order) queries. For estimating normalizing constants, these algorithms also achieve quadratic speedup in the multiplicative error epsilon. Second, we develop quantum Metropolis-adjusted Langevin algorithms with query complexity (O) over tilde(kappa(1/2) d) and (O) over tilde(kappa(1/2) d(3/2) /epsilon) for log-concave sampling and normalizing constant estimation, respectively, achieving polynomial speedups in kappa, d, c over the best known classical algorithms by exploiting quantum analogs of the Monte Carlo method and quantum walks. We also prove a 1/epsilon(1-o(1)) quantum lower bound for estimating normalizing constants, implying near-optimality of our quantumalgorithms in epsilon.
We propose quantum-informed Tensor Adaptation (QuanTA), a novel, easy-to-implement, fine-tuning method with no inference overhead for large-scale pretrained language models. By leveraging quantum-inspired methods deri...
quantum computing is informationprocessing based on the principles of quantum mechanics. Qubits are at the core of quantum computing. A qubit is a quantum state where information can be encoded, processed, and readou...
详细信息
Digital Image processing (DIP) is the ability to manipulate digital photographs via algorithms for pattern detection, segmentation, enhancement, and noise reduction. In addition, the Internet of Things (IoT) acts as t...
详细信息
With the rapid development of the internet and information technology, the traditional encryption methods suffer from drawbacks such as poor processing capacity and low security, making them vulnerable to attacks. Thi...
详细信息
Regev recently introduced a quantum factoring algorithm that may be perceived as a d-dimensional variation of Shor's factoring algorithm. In this work, we extend Regev's factoring algorithm to an algorithm for...
详细信息
ISBN:
(纸本)9783031627453;9783031627460
Regev recently introduced a quantum factoring algorithm that may be perceived as a d-dimensional variation of Shor's factoring algorithm. In this work, we extend Regev's factoring algorithm to an algorithm for computing discrete logarithms in a natural way. Furthermore, we discuss natural extensions of Regev's factoring algorithm to order finding, and to factoring completely via order finding. For all of these algorithms, we discuss various practical implementation considerations, including in particular the robustness of the post-processing.
暂无评论