The field of quantum technologies has garnered considerable interest and witnessed noteworthy progress in recent years. It is also anticipated that these technologies will continue to flourish and exert a considerable...
详细信息
The field of quantum technologies has garnered considerable interest and witnessed noteworthy progress in recent years. It is also anticipated that these technologies will continue to flourish and exert a considerable influence on society, i.e., a plethora of real-world problems that cannot be solved by classical algorithms are believed to benefit from the implementation of quantum algorithms. Meanwhile, as an alternative to cryptographic methods, physical layer security (PLS) has been extensively studied as a means to realize secure wireless communication that is resistant to attacks by both classical and quantum computers, i.e., quantum-safe. While the prevailing approach to PLS has been based on classical algorithms, this could potentially be accelerated by the application of quantum algorithms. This paper examines the potential applications of various quantum algorithms, including quantum annealing, hybrid quantum-classical algorithms, and Grover-based algorithms, to the the PLS problems. In particular, we begin with a concise overview of their applications to physical layer techniques and then proceed to discuss their use in addressing the challenges of secret message transmission and secret key generation from wireless channels.
The realm of quantum computing is experiencing rapid growth, harnessing the principles of quantum mechanics to exponentially accelerate computations that surpass classical computing capabilities. Such advancements can...
详细信息
The realm of quantum computing is experiencing rapid growth, harnessing the principles of quantum mechanics to exponentially accelerate computations that surpass classical computing capabilities. Such advancements can potentially reshape the landscape of reliable artificial intelligence, particularly in the context of data-intensive, intricate decision-making processes. Diverse trust-oriented AI frameworks have been introduced to address various AI applications. This paper evaluates multiple AI systems focused on trust, compiling observations about their corresponding quantum algorithms. The analysis delves into quantum algorithmic approaches within three key trust-centric AI areas: detecting fraudulent users in social networks, creating diagnostic systems for healthcare, and optimising pathways for trust aggregation in social networks. This study unveils a pivotal observation: quantum algorithms demonstrate diminished time complexity, enhancing trust-based AI applications' expeditiousness.
Recent breakthroughs have provided a sublinear time quantum algorithm for the Longest Common Substring Problem running in (O) over tilde (n(2/3)/d(1/6)) time for two strings of length at most n, where d is the length ...
详细信息
ISBN:
(纸本)9783031721991;9783031722004
Recent breakthroughs have provided a sublinear time quantum algorithm for the Longest Common Substring Problem running in (O) over tilde (n(2/3)/d(1/6)) time for two strings of length at most n, where d is the length of the solution. At the same time, no subquadratic time quantum algorithm for the Longest Common Subsequence Problem is known, implying increasing difficulty as gaps are allowed within the solution. In this work, we consider the problem of finding two ordered matching substrings such that their total length is maximized. We present a strongly sublinear-time quantum algorithm.
quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to ...
详细信息
quantum algorithms are often represented in terms of quantum circuits operating on ideal (logical) qubits. However, the practical implementation of these algorithms poses significant challenges. Many quantum algorithm...
详细信息
quantum algorithms are often represented in terms of quantum circuits operating on ideal (logical) qubits. However, the practical implementation of these algorithms poses significant challenges. Many quantum algorithms require a substantial number of logical qubits, and the inherent susceptibility to errors of quantum computers require quantum error correction. The integration of error correction introduces overhead in terms of both space (physical qubits required) and runtime (how long the algorithm needs to be run for). This paper addresses the complexity of comparing classical and quantum algorithms, primarily stemming from the additional quantum error correction overhead. We propose a comprehensive framework that facilitates a direct and meaningful comparison between classical and quantum algorithms. By acknowledging and addressing the challenges introduced by quantum error correction, our framework aims to provide a clearer understanding of the comparative performance of classical and quantum computing approaches. This work contributes to understanding the practical viability and potential advantages of quantum algorithms in real-world applications. We apply our framework to quantum cryptanalysis, since it is well known that quantum algorithms can break factoring and discrete logarithm based cryptography and weaken symmetric cryptography and hash functions. In order to estimate the real-world impact of these attacks, apart from tracking the development of fault-tolerant quantum computers it is important to have an estimate of the resources needed to implement these quantum attacks. This analysis provides state-of-the art snap-shot estimates of the realistic costs of implementing quantum attacks on these important cryptographic algorithms, assuming quantum fault-tolerance is achieved using surface code methods, and spanning a range of potential error rates. These estimates serve as a guide for gauging the realistic impact of these algorithms and for benchmarking
Photonic platforms occupy a central place in quantum technologies. They appear in quantum networks and communication, in near-term quantum advantage schemes, as well as in fault-tolerant quantum computing proposals. I...
详细信息
Photonic platforms occupy a central place in quantum technologies. They appear in quantum networks and communication, in near-term quantum advantage schemes, as well as in fault-tolerant quantum computing proposals. In this perspective article, we review the advances and challenges of this technology, and we focus on algorithms and protocols that we call photon-native, i.e. which closely follow the specificities of the hardware.
A leading approach to algorithm design aims to minimize the number of operations in an algorithm's compilation. One intuitively expects that reducing the number of operations may decrease the chance of errors. Thi...
详细信息
A leading approach to algorithm design aims to minimize the number of operations in an algorithm's compilation. One intuitively expects that reducing the number of operations may decrease the chance of errors. This paradigm is particularly prevalent in quantum computing, where gates are hard to implement and noise rapidly decreases a quantum computer's potential to outperform classical computers. Here, we find that minimizing the number of operations in a quantum algorithm can be counterproductive, leading to a noise sensitivity that induces errors when running the algorithm in non-ideal conditions. To show this, we develop a framework to characterize the resilience of an algorithm to perturbative noises (including coherent errors, dephasing, and depolarizing noise). Some compilations of an algorithm can be resilient against certain noise sources while being unstable against other noises. We condense these results into a tradeoff relation between an algorithm's number of operations and its noise resilience. We also show how this framework can be leveraged to identify compilations of an algorithm that are better suited to withstand certain noises.
quantum and quantum-inspired algorithms have not yet been systematically classified in the context of potential Operations Research (OR) applications. Our systematic mapping is designed for quick consultation and show...
详细信息
quantum and quantum-inspired algorithms have not yet been systematically classified in the context of potential Operations Research (OR) applications. Our systematic mapping is designed for quick consultation and shows which algorithms have been significantly explored in the context of OR, as well as which algorithms have been vaguely addressed in the same context. The study provides rapid access to OR professionals, both practitioners and researchers, who are interested in applying and/or further developing these algorithms in their respective contexts. We prepared a replicable protocol as a backbone of this systematic mapping study, specifying research questions, establishing effective search and selection methods, defining quality metrics for assessment, and guiding the analysis of the selected studies. A total of more than 2,000 studies were found, of which 149 were analyzed in detail. Readers can have an interactive hands-on experience with the collected
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio...
详细信息
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivation and simulation verification of quantum computation(especially quantum algorithms),experimental verification on real quantum devices has become a new *** this paper,three representative quantum algorithms,namely Deutsch-Jozsa,Grover,and Shor algorithms,are briefly depicted,and then their implementation circuits are presented,*** program these circuits on python with QISKit to connect the remote real quantum devices(i.e.,ibmqx4,ibmqx5)on IBM Q to verify these *** experimental results not only show the feasibility of these algorithms,but also serve to evaluate the functionality of these devices.
In this paper, we consider two versions of the Text Assembling problem. We are given a sequence of strings s1, ... , sn of total length L that is a dictionary, and a string t of length m that is a text. The first vers...
详细信息
In this paper, we consider two versions of the Text Assembling problem. We are given a sequence of strings s1, ... , sn of total length L that is a dictionary, and a string t of length m that is a text. The first version of the problem is assembling t from the dictionary. The second version is the "Shortest Superstring Problem"(SSP) or the "Shortest Common Superstring Problem"(SCS). In this case, t is not given, and we should construct the shortest string (we call it superstring) that contains each string from the given sequence as a substring. These problems are connected with the sequence assembly method for reconstructing a long DNA sequence from small fragments. For both problems, we suggest new quantum algorithms that work better than their classical counterparts. In the first case, we present a quantum algorithm with O(m+log m nL) query complexity. In the case of SSP, we present a quantum algorithm with O-similar to(n(3)1.728(n) + L + n(1.5)root L) query complexity. Here O-similar to hides not only constants but logarithms of L and n also.
暂无评论