Vol.19
No.15&16,
December 1, 2019
Research Articles:
Learning DNFs under product distributions via
mu--biased
quantum Fourier sampling
(pp1261-1278)
Varun Kanade, Andrea Rocchetto, and Simone Severini
We show that DNF formulae can be
quantum PAC-learned in polynomial time under product distributions using
a quantum example oracle. The current best classical algorithm runs in
superpolynomial time. Our result extends the work by Bshouty and Jackson
(1998) that proved that DNF formulae are efficiently learnable
under the uniform distribution using a quantum example oracle. Our proof
is based on a new quantum algorithm that efficiently samples the
coefficients of a $\mu$--biased
Fourier transform.
State-independent quantum key distribution with two-way classical
communication
(pp1279-1293)
Radha Pyari Sandhir
A quantum key distribution
protocol is proposed that is a variation of BB84 that provides raw key
generation from correlations that violate a Bell-type inequality for
single qubit systems and not entangled pairs. Additionally, it 1) is
state-independent, 2) involves two-way classical communication, and 3)
does not require basis matching between the two parties. The
Brukner-Taylor-Cheung-Vedral (BTCV) time-like form of the Bell-CHSH
inequality \cite{Bruk04,Tayl04}
is employed as an eavesdropping check; sequential measurements lead to
an inequality identical in form to the Bell-CHSH inequality, which
relies only on the measurements performed with no regard for the qubit
states. We show that this form manifests naturally from the non-commutativity
of observables.
Variance of the sum of independent quantum computing errors
(pp1294-1312)
Jesus Lacalle and Luis
Miguel Pozo Coronado
The sum of quantum computing
errors is the key element both for the estimation and control of errors
in quantum computing and for its statistical study. In this article we
analyze the sum of two independent quantum computing errors,
$X_1$
and $X_2$,
and we obtain the formula of the variance of the sum of these errors:
$$V(X_1+X_2)=V(X_1)+V(X_2)-\frac{V(X_1)V(X_2)}{2}.$$
We conjecture that this result holds true
for general quantum computing errors and we prove the formula for
independent isotropic quantum computing errors.
Exploiting Faraday rotation to jam quantum key distribution via
polarized photons
(pp1313-1324)
Maximilian Daschner, David I. Kaiser, and Joseph A.
Formaggio
Quantum key distribution (QKD)
involving polarized photons could be vulnerable to a jamming (or
denial-of-service) attack, in which a third party applies an external
magnetic field to rotate the plane of polarization of photons headed
toward one of the two intended recipients. Sufficiently large Faraday
rotation of one of the polarized beams would prevent Alice and Bob from
establishing a secure quantum channel. We investigate requirements to
induce such rotation both for free-space transmission and for
transmission via optical fiber, and find reasonable ranges of parameters
in which a jamming attack could be successful against fiber-based QKD,
even for systems that implement automated recalibration for
polarization-frame alignment. The jamming attack could be applied
selectively and indefinitely by an adversary without revealing her
presence, and could be further combined with various eavesdropping
attacks to yield unauthorized information.
Quantum and classical algorithms for
approximate submodular function minimization
(pp1325-1349)
Yassine Hamoudi, Patrick Rebentrost, Ansis Rosmanis, and
Miklos Santha
Submodular functions are set
functions mapping every subset of some ground set of size
$n$
into the real numbers and satisfying the diminishing returns property.
Submodular minimization is an
important field in discrete optimization theory due to its relevance for
various branches of mathematics, computer science and economics. The
currently fastest strongly polynomial algorithm for exact minimization~\cite{LSW15}
runs in time $\so{n^3 \cdot \eo +
n^4}$ where
$\eo$
denotes the cost to evaluate the function on any set. For functions with
range $[-1,1]$,
the best $\eps$-additive
approximation algorithm~\cite{CLSW17}
runs in time $\so{n^{5/3}/\eps^{2} \cdot
\eo}$.In this paper we present a
classical and a quantum algorithm for approximate
submodular
minimization. Our classical result improves on the algorithm of
\cite{CLSW17}
and runs in time $\so{n^{3/2}/\eps^2
\cdot \eo}$. Our quantum algorithm
is, up to our knowledge, the first attempt to use quantum computing for
submodular optimization. The
algorithm runs in time $\so{n^{5/4}/\eps^{5/2}
\cdot \log(1/\eps) \cdot \eo}$. The
main ingredient of the quantum result is a new method for sampling with
high probability $T$
independent elements from any discrete probability distribution of
support size $n$
in time $\bo{\sqrt{Tn}}$.
Previous quantum algorithms for this problem were of complexity
$\bo{T\sqrt{n}}$.
back to QIC online Front page
|