-
Qplacer: Frequency-Aware Component Placement for Superconducting Quantum Computers
Authors:
Junyao Zhang,
Hanrui Wang,
Qi Ding,
Jiaqi Gu,
Reouven Assouly,
William D. Oliver,
Song Han,
Kenneth R. Brown,
Hai "Helen" Li,
Yiran Chen
Abstract:
Noisy Intermediate-Scale Quantum (NISQ) computers face a critical limitation in qubit numbers, hindering their progression towards large-scale and fault-tolerant quantum computing. A significant challenge impeding scaling is crosstalk, characterized by unwanted interactions among neighboring components on quantum chips, including qubits, resonators, and substrate. We motivate a general approach to…
▽ More
Noisy Intermediate-Scale Quantum (NISQ) computers face a critical limitation in qubit numbers, hindering their progression towards large-scale and fault-tolerant quantum computing. A significant challenge impeding scaling is crosstalk, characterized by unwanted interactions among neighboring components on quantum chips, including qubits, resonators, and substrate. We motivate a general approach to systematically resolving multifaceted crosstalks in a limited substrate area. We propose Qplacer, a frequency-aware electrostatic-based placement framework tailored for superconducting quantum computers, to alleviate crosstalk by isolating these components in spatial and frequency domains alongside compact substrate design. Qplacer commences with a frequency assigner that ensures frequency domain isolation for qubits and resonators. It then incorporates a padding strategy and resonator partitioning for layout flexibility. Central to our approach is the conceptualization of quantum components as charged particles, enabling strategic spatial isolation through a 'frequency repulsive force' concept. Our results demonstrate that Qplacer carefully crafts the physical component layout in mitigating various crosstalk impacts while maintaining a compact substrate size. On various device topologies and NISQ benchmarks, Qplacer improves fidelity by an average of 36.7x and reduces spatial violations (susceptible to crosstalk) by an average of 12.76x, compared to classical placement engines. Regarding area optimization, compared to manual designs, Qplacer can reduce the required layout area by 2.14x on average
△ Less
Submitted 8 May, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum Circuits
Authors:
Tianlong Chen,
Zhenyu Zhang,
Hanrui Wang,
Jiaqi Gu,
Zirui Li,
David Z. Pan,
Frederic T. Chong,
Song Han,
Zhangyang Wang
Abstract:
Parameterized Quantum Circuits (PQC) have obtained increasing popularity thanks to their great potential for near-term Noisy Intermediate-Scale Quantum (NISQ) computers. Achieving quantum advantages usually requires a large number of qubits and quantum circuits with enough capacity. However, limited coherence time and massive quantum noises severely constrain the size of quantum circuits that can…
▽ More
Parameterized Quantum Circuits (PQC) have obtained increasing popularity thanks to their great potential for near-term Noisy Intermediate-Scale Quantum (NISQ) computers. Achieving quantum advantages usually requires a large number of qubits and quantum circuits with enough capacity. However, limited coherence time and massive quantum noises severely constrain the size of quantum circuits that can be executed reliably on real machines. To address these two pain points, we propose QuantumSEA, an in-time sparse exploration for noise-adaptive quantum circuits, aiming to achieve two key objectives: (1) implicit circuits capacity during training - by dynamically exploring the circuit's sparse connectivity and sticking a fixed small number of quantum gates throughout the training which satisfies the coherence time and enjoy light noises, enabling feasible executions on real quantum devices; (2) noise robustness - by jointly optimizing the topology and parameters of quantum circuits under real device noise models. In each update step of sparsity, we leverage the moving average of historical gradients to grow necessary gates and utilize salience-based pruning to eliminate insignificant gates. Extensive experiments are conducted with 7 Quantum Machine Learning (QML) and Variational Quantum Eigensolver (VQE) benchmarks on 6 simulated or real quantum computers, where QuantumSEA consistently surpasses noise-aware search, human-designed, and randomly generated quantum circuit baselines by a clear performance margin. For example, even in the most challenging on-chip training regime, our method establishes state-of-the-art results with only half the number of quantum gates and ~2x time saving of circuit executions. Codes are available at https://github.com/VITA-Group/QuantumSEA.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
DGR: Tackling Drifted and Correlated Noise in Quantum Error Correction via Decoding Graph Re-weighting
Authors:
Hanrui Wang,
Pengyu Liu,
Yilian Liu,
Jiaqi Gu,
Jonathan Baker,
Frederic T. Chong,
Song Han
Abstract:
Quantum hardware suffers from high error rates and noise, which makes directly running applications on them ineffective. Quantum Error Correction (QEC) is a critical technique towards fault tolerance which encodes the quantum information distributively in multiple data qubits and uses syndrome qubits to check parity. Minimum-Weight-Perfect-Matching (MWPM) is a popular QEC decoder that takes the sy…
▽ More
Quantum hardware suffers from high error rates and noise, which makes directly running applications on them ineffective. Quantum Error Correction (QEC) is a critical technique towards fault tolerance which encodes the quantum information distributively in multiple data qubits and uses syndrome qubits to check parity. Minimum-Weight-Perfect-Matching (MWPM) is a popular QEC decoder that takes the syndromes as input and finds the matchings between syndromes that infer the errors. However, there are two paramount challenges for MWPM decoders. First, as noise in real quantum systems can drift over time, there is a potential misalignment with the decoding graph's initial weights, leading to a severe performance degradation in the logical error rates. Second, while the MWPM decoder addresses independent errors, it falls short when encountering correlated errors typical on real hardware, such as those in the 2Q depolarizing channel.
We propose DGR, an efficient decoding graph edge re-weighting strategy with no quantum overhead. It leverages the insight that the statistics of matchings across decoding iterations offer rich information about errors on real quantum hardware. By counting the occurrences of edges and edge pairs in decoded matchings, we can statistically estimate the up-to-date probabilities of each edge and the correlations between them. The reweighting process includes two vital steps: alignment re-weighting and correlation re-weighting. The former updates the MWPM weights based on statistics to align with actual noise, and the latter adjusts the weight considering edge correlations.
Extensive evaluations on surface code and honeycomb code under various settings show that DGR reduces the logical error rate by 3.6x on average-case noise mismatch with exceeding 5000x improvement under worst-case mismatch.
△ Less
Submitted 22 April, 2024; v1 submitted 27 November, 2023;
originally announced November 2023.
-
Q-Pilot: Field Programmable Qubit Array Compilation with Flying Ancillas
Authors:
Hanrui Wang,
Daniel Bochen Tan,
Pengyu Liu,
Yilian Liu,
Jiaqi Gu,
Jason Cong,
Song Han
Abstract:
Neutral atom arrays have become a promising platform for quantum computing, especially the field programmable qubit array (FPQA) endowed with the unique capability of atom movement. This feature allows dynamic alterations in qubit connectivity during runtime, which can reduce the cost of executing long-range gates and improve parallelism. However, this added flexibility introduces new challenges i…
▽ More
Neutral atom arrays have become a promising platform for quantum computing, especially the field programmable qubit array (FPQA) endowed with the unique capability of atom movement. This feature allows dynamic alterations in qubit connectivity during runtime, which can reduce the cost of executing long-range gates and improve parallelism. However, this added flexibility introduces new challenges in circuit compilation. Inspired by the placement and routing strategies for FPGAs, we propose to map all data qubits to fixed atoms while utilizing movable atoms to route for 2-qubit gates between data qubits. Coined flying ancillas, these mobile atoms function as ancilla qubits, dynamically generated and recycled during execution. We present Q-Pilot, a scalable compiler for FPQA employing flying ancillas to maximize circuit parallelism. For two important quantum applications, quantum simulation and the Quantum Approximate Optimization Algorithm (QAOA), we devise domain-specific routing strategies. In comparison to alternative technologies such as superconducting devices or fixed atom arrays, Q-Pilot effectively harnesses the flexibility of FPQA, achieving reductions of 1.4x, 27.7x, and 6.3x in circuit depth for 100-qubit random, quantum simulation, and QAOA circuits, respectively.
△ Less
Submitted 6 May, 2024; v1 submitted 25 November, 2023;
originally announced November 2023.
-
Transformer-QEC: Quantum Error Correction Code Decoding with Transferable Transformers
Authors:
Hanrui Wang,
Pengyu Liu,
Kevin Shao,
Dantong Li,
Jiaqi Gu,
David Z. Pan,
Yongshan Ding,
Song Han
Abstract:
Quantum computing has the potential to solve problems that are intractable for classical systems, yet the high error rates in contemporary quantum devices often exceed tolerable limits for useful algorithm execution. Quantum Error Correction (QEC) mitigates this by employing redundancy, distributing quantum information across multiple data qubits and utilizing syndrome qubits to monitor their stat…
▽ More
Quantum computing has the potential to solve problems that are intractable for classical systems, yet the high error rates in contemporary quantum devices often exceed tolerable limits for useful algorithm execution. Quantum Error Correction (QEC) mitigates this by employing redundancy, distributing quantum information across multiple data qubits and utilizing syndrome qubits to monitor their states for errors. The syndromes are subsequently interpreted by a decoding algorithm to identify and correct errors in the data qubits. This task is complex due to the multiplicity of error sources affecting both data and syndrome qubits as well as syndrome extraction operations. Additionally, identical syndromes can emanate from different error sources, necessitating a decoding algorithm that evaluates syndromes collectively. Although machine learning (ML) decoders such as multi-layer perceptrons (MLPs) and convolutional neural networks (CNNs) have been proposed, they often focus on local syndrome regions and require retraining when adjusting for different code distances. We introduce a transformer-based QEC decoder which employs self-attention to achieve a global receptive field across all input syndromes. It incorporates a mixed loss training approach, combining both local physical error and global parity label losses. Moreover, the transformer architecture's inherent adaptability to variable-length inputs allows for efficient transfer learning, enabling the decoder to adapt to varying code distances without retraining.
Evaluation on six code distances and ten different error configurations demonstrates that our model consistently outperforms non-ML decoders, such as Union Find (UF) and Minimum Weight Perfect Matching (MWPM), and other ML decoders, thereby achieving best logical error rates. Moreover, the transfer learning can save over 10x of training cost.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
RobustState: Boosting Fidelity of Quantum State Preparation via Noise-Aware Variational Training
Authors:
Hanrui Wang,
Yilian Liu,
Pengyu Liu,
Jiaqi Gu,
Zirui Li,
Zhiding Liang,
Jinglei Cheng,
Yongshan Ding,
Xuehai Qian,
Yiyu Shi,
David Z. Pan,
Frederic T. Chong,
Song Han
Abstract:
Quantum state preparation, a crucial subroutine in quantum computing, involves generating a target quantum state from initialized qubits. Arbitrary state preparation algorithms can be broadly categorized into arithmetic decomposition (AD) and variational quantum state preparation (VQSP). AD employs a predefined procedure to decompose the target state into a series of gates, whereas VQSP iterativel…
▽ More
Quantum state preparation, a crucial subroutine in quantum computing, involves generating a target quantum state from initialized qubits. Arbitrary state preparation algorithms can be broadly categorized into arithmetic decomposition (AD) and variational quantum state preparation (VQSP). AD employs a predefined procedure to decompose the target state into a series of gates, whereas VQSP iteratively tunes ansatz parameters to approximate target state. VQSP is particularly apt for Noisy-Intermediate Scale Quantum (NISQ) machines due to its shorter circuits. However, achieving noise-robust parameter optimization still remains challenging.
We present RobustState, a novel VQSP training methodology that combines high robustness with high training efficiency. The core idea involves utilizing measurement outcomes from real machines to perform back-propagation through classical simulators, thus incorporating real quantum noise into gradient calculations. RobustState serves as a versatile, plug-and-play technique applicable for training parameters from scratch or fine-tuning existing parameters to enhance fidelity on target machines. It is adaptable to various ansatzes at both gate and pulse levels and can even benefit other variational algorithms, such as variational unitary synthesis.
Comprehensive evaluation of RobustState on state preparation tasks for 4 distinct quantum algorithms using 10 real quantum machines demonstrates a coherent error reduction of up to 7.1 $\times$ and state fidelity improvement of up to 96\% and 81\% for 4-Q and 5-Q states, respectively. On average, RobustState improves fidelity by 50\% and 72\% for 4-Q and 5-Q states compared to baseline approaches.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
Atomique: A Quantum Compiler for Reconfigurable Neutral Atom Arrays
Authors:
Hanrui Wang,
Pengyu Liu,
Daniel Bochen Tan,
Yilian Liu,
Jiaqi Gu,
David Z. Pan,
Jason Cong,
Umut A. Acar,
Song Han
Abstract:
The neutral atom array has gained prominence in quantum computing for its scalability and operation fidelity. Previous works focus on fixed atom arrays (FAAs) that require extensive SWAP operations for long-range interactions. This work explores a novel architecture reconfigurable atom arrays (RAAs), also known as field programmable qubit arrays (FPQAs), which allows for coherent atom movements du…
▽ More
The neutral atom array has gained prominence in quantum computing for its scalability and operation fidelity. Previous works focus on fixed atom arrays (FAAs) that require extensive SWAP operations for long-range interactions. This work explores a novel architecture reconfigurable atom arrays (RAAs), also known as field programmable qubit arrays (FPQAs), which allows for coherent atom movements during circuit execution under some constraints. Such atom movements, which are unique to this architecture, could reduce the cost of long-range interactions significantly if the atom movements could be scheduled strategically.
In this work, we introduce Atomique, a compilation framework designed for qubit mapping, atom movement, and gate scheduling for RAA. Atomique contains a qubit-array mapper to decide the coarse-grained mapping of the qubits to arrays, leveraging MAX k-Cut on a constructed gate frequency graph to minimize SWAP overhead. Subsequently, a qubit-atom mapper determines the fine-grained mapping of qubits to specific atoms in the array and considers load balance to prevent hardware constraint violations. We further propose a router that identifies parallel gates, schedules them simultaneously, and reduces depth. We evaluate Atomique across 20+ diverse benchmarks, including generic circuits (arbitrary, QASMBench, SupermarQ), quantum simulation, and QAOA circuits. Atomique consistently outperforms IBM Superconducting, FAA with long-range gates, and FAA with rectangular and triangular topologies, achieving significant reductions in depth and the number of two-qubit gates.
△ Less
Submitted 2 May, 2024; v1 submitted 25 November, 2023;
originally announced November 2023.
-
Speed limit, dissipation bound and dissipation-time trade-off in thermal relaxation processes
Authors:
Jie Gu
Abstract:
We investigate bounds on speed, non-adiabatic entropy production and trade-off relation between them for classical stochastic processes with time-independent transition rates. Our results show that the time required to evolve from an initial to a desired target state is bounded from below by the informational-theoretic $\infty$-Rényi divergence between these states, divided by the total rate. Furt…
▽ More
We investigate bounds on speed, non-adiabatic entropy production and trade-off relation between them for classical stochastic processes with time-independent transition rates. Our results show that the time required to evolve from an initial to a desired target state is bounded from below by the informational-theoretic $\infty$-Rényi divergence between these states, divided by the total rate. Furthermore, we conjecture and provide extensive numerical evidence for an information-theoretical bound on the non-adiabatic entropy production and a novel dissipation-time trade-off relation that outperforms previous bounds in some cases.
△ Less
Submitted 31 October, 2023; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Experimental quantum secret sharing based on phase encoding of coherent states
Authors:
Ao Shen,
Xiao-Yu Cao,
Yang Wang,
Yao Fu,
Jie Gu,
Wen-Bo Liu,
Chen-Xun Weng,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum secret sharing (QSS) is one of the basic communication primitives in future quantum networks which addresses part of the basic cryptographic tasks of multiparty communication and computation. Nevertheless, it is a challenge to provide a practical QSS protocol with security against general attacks. A QSS protocol that balances security and practicality is still lacking. Here, we propose a Q…
▽ More
Quantum secret sharing (QSS) is one of the basic communication primitives in future quantum networks which addresses part of the basic cryptographic tasks of multiparty communication and computation. Nevertheless, it is a challenge to provide a practical QSS protocol with security against general attacks. A QSS protocol that balances security and practicality is still lacking. Here, we propose a QSS protocol with simple phase encoding of coherent states among three parties. Removing the requirement of impractical entangled resources and the need for phase randomization, our protocol can be implemented with accessible technology. We provide the finite-key analysis against coherent attacks and implement a proof-of-principle experiment to demonstrate our scheme's feasibility. Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss. Combined with security against general attacks and accessible technology, our protocol is a promising candidate for practical multiparty quantum communication networks.
△ Less
Submitted 27 March, 2023; v1 submitted 26 March, 2023;
originally announced March 2023.
-
Phase-Matching Quantum Key Distribution without Intensity Modulation
Authors:
Shan-Feng Shao,
Xiao-Yu Cao,
Yuan-Mei Xie,
Jie Gu,
Wen-Bo Liu,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum key distribution provides a promising solution for sharing secure keys between two distant parties with unconditional security. Nevertheless, quantum key distribution is still severely threatened by the imperfections of devices. In particular, the classical pulse correlation threatens security when sending decoy states. To address this problem and simplify experimental requirements, we pro…
▽ More
Quantum key distribution provides a promising solution for sharing secure keys between two distant parties with unconditional security. Nevertheless, quantum key distribution is still severely threatened by the imperfections of devices. In particular, the classical pulse correlation threatens security when sending decoy states. To address this problem and simplify experimental requirements, we propose a phase-matching quantum key distribution protocol without intensity modulation. Instead of using decoy states, we propose a novel method to estimate the theoretical upper bound on the phase error rate contributed by even-photon-number components. Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber. Furthermore, we perform a proof-of-principle experiment to demonstrate the feasibility of our protocol, and the key rate reaches 22.5 bps under a 45 dB channel loss. Addressing the security loophole of pulse intensity correlation and replacing continuous random phase with 6 or 8 slices random phase, our protocol provides a promising solution for constructing quantum networks.
△ Less
Submitted 19 August, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Floquet Condition for Quantum Adiabaticity
Authors:
Jie Gu,
X. -G. Zhang
Abstract:
Quantum adiabaticity is defined as the evolution of a quantum system close to an instantaneous eigenstate of a time-dependent Hamiltonian without transition. Using Floquet formalism, we prove a rigorous sufficient condition for quantum adiabaticity in periodically driven systems, valid for arbitrarily long period. Unlike traditional conditions, the Floquet condition is tight, does not require addi…
▽ More
Quantum adiabaticity is defined as the evolution of a quantum system close to an instantaneous eigenstate of a time-dependent Hamiltonian without transition. Using Floquet formalism, we prove a rigorous sufficient condition for quantum adiabaticity in periodically driven systems, valid for arbitrarily long period. Unlike traditional conditions, the Floquet condition is tight, does not require additional constraints, and predicts that adiabaticity may exist at high frequencies. Three examples are given to illustrate and contrast the Floquet condition against traditional conditions.
△ Less
Submitted 8 February, 2023;
originally announced February 2023.
-
QuEst: Graph Transformer for Quantum Circuit Reliability Estimation
Authors:
Hanrui Wang,
Pengyu Liu,
Jinglei Cheng,
Zhiding Liang,
Jiaqi Gu,
Zirui Li,
Yongshan Ding,
Weiwen Jiang,
Yiyu Shi,
Xuehai Qian,
David Z. Pan,
Frederic T. Chong,
Song Han
Abstract:
Among different quantum algorithms, PQC for QML show promises on near-term devices. To facilitate the QML and PQC research, a recent python library called TorchQuantum has been released. It can construct, simulate, and train PQC for machine learning tasks with high speed and convenient debugging supports. Besides quantum for ML, we want to raise the community's attention on the reversed direction:…
▽ More
Among different quantum algorithms, PQC for QML show promises on near-term devices. To facilitate the QML and PQC research, a recent python library called TorchQuantum has been released. It can construct, simulate, and train PQC for machine learning tasks with high speed and convenient debugging supports. Besides quantum for ML, we want to raise the community's attention on the reversed direction: ML for quantum. Specifically, the TorchQuantum library also supports using data-driven ML models to solve problems in quantum system research, such as predicting the impact of quantum noise on circuit fidelity and improving the quantum circuit compilation efficiency.
This paper presents a case study of the ML for quantum part. Since estimating the noise impact on circuit reliability is an essential step toward understanding and mitigating noise, we propose to leverage classical ML to predict noise impact on circuit fidelity. Inspired by the natural graph representation of quantum circuits, we propose to leverage a graph transformer model to predict the noisy circuit fidelity. We firstly collect a large dataset with a variety of quantum circuits and obtain their fidelity on noisy simulators and real machines. Then we embed each circuit into a graph with gate and noise properties as node features, and adopt a graph transformer to predict the fidelity.
Evaluated on 5 thousand random and algorithm circuits, the graph transformer predictor can provide accurate fidelity estimation with RMSE error 0.04 and outperform a simple neural network-based model by 0.02 on average. It can achieve 0.99 and 0.95 R$^2$ scores for random and algorithm circuits, respectively. Compared with circuit simulators, the predictor has over 200X speedup for estimating the fidelity.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources
Authors:
Jie Gu,
Xiao-Yu Cao,
Yao Fu,
Zong-Wu He,
Ze-Jie Yin,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse atttacks an…
▽ More
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse atttacks and pulse correlations. Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. We present a characterization of source flaws and connect them to experiments, together with a finite-key analysis against coherent attacks. In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss. Compared with previous QKD protocols with imperfect devices, our study considerably improves both the secure key rate and the transmission distance, and shows application potential in the practical deployment of secure QKD with device imperfections.
△ Less
Submitted 27 October, 2022; v1 submitted 18 April, 2022;
originally announced April 2022.
-
Comment on "Universal Bound on Energy Cost of Bit Reset in Finite Time"
Authors:
Jie Gu,
X. G. Zhang
Abstract:
We present a quantum-mechanical generalization of the work penalty equation (Eq. (6) in Phys. Rev. Lett., 127, 190602 (2021)) with an alternative derivation.
We present a quantum-mechanical generalization of the work penalty equation (Eq. (6) in Phys. Rev. Lett., 127, 190602 (2021)) with an alternative derivation.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
QOC: Quantum On-Chip Training with Parameter Shift and Gradient Pruning
Authors:
Hanrui Wang,
Zirui Li,
Jiaqi Gu,
Yongshan Ding,
David Z. Pan,
Song Han
Abstract:
Parameterized Quantum Circuits (PQC) are drawing increasing research interest thanks to its potential to achieve quantum advantages on near-term Noisy Intermediate Scale Quantum (NISQ) hardware. In order to achieve scalable PQC learning, the training process needs to be offloaded to real quantum machines instead of using exponential-cost classical simulators. One common approach to obtain PQC grad…
▽ More
Parameterized Quantum Circuits (PQC) are drawing increasing research interest thanks to its potential to achieve quantum advantages on near-term Noisy Intermediate Scale Quantum (NISQ) hardware. In order to achieve scalable PQC learning, the training process needs to be offloaded to real quantum machines instead of using exponential-cost classical simulators. One common approach to obtain PQC gradients is parameter shift whose cost scales linearly with the number of qubits. We present QOC, the first experimental demonstration of practical on-chip PQC training with parameter shift. Nevertheless, we find that due to the significant quantum errors (noises) on real machines, gradients obtained from naive parameter shift have low fidelity and thus degrading the training accuracy. To this end, we further propose probabilistic gradient pruning to firstly identify gradients with potentially large errors and then remove them. Specifically, small gradients have larger relative errors than large ones, thus having a higher probability to be pruned. We perform extensive experiments with the Quantum Neural Network (QNN) benchmarks on 5 classification tasks using 5 real quantum machines. The results demonstrate that our on-chip training achieves over 90% and 60% accuracy for 2-class and 4-class image classification tasks. The probabilistic gradient pruning brings up to 7% PQC accuracy improvements over no pruning. Overall, we successfully obtain similar on-chip training accuracy compared with noise-free simulation but have much better training scalability. The QOC code is available in the TorchQuantum library.
△ Less
Submitted 22 April, 2022; v1 submitted 26 February, 2022;
originally announced February 2022.
-
Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution
Authors:
Zhi-Ping Liu,
Min-Gang Zhou,
Wen-Bo Liu,
Chen-Long Li,
Jie Gu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Continuous-variable quantum key distribution (CV QKD) with discrete modulation has attracted increasing attention due to its experimental simplicity, lower-cost implementation and compatibility with classical optical communication. Correspondingly, some novel numerical methods have been proposed to analyze the security of these protocols against collective attacks, which promotes key rates over on…
▽ More
Continuous-variable quantum key distribution (CV QKD) with discrete modulation has attracted increasing attention due to its experimental simplicity, lower-cost implementation and compatibility with classical optical communication. Correspondingly, some novel numerical methods have been proposed to analyze the security of these protocols against collective attacks, which promotes key rates over one hundred kilometers of fiber distance. However, numerical methods are limited by their calculation time and resource consumption, for which they cannot play more roles on mobile platforms in quantum networks. To improve this issue, a neural network model predicting key rates in nearly real time has been proposed previously. Here, we go further and show a neural network model combined with Bayesian optimization. This model automatically designs the best architecture of neural network computing key rates in real time. We demonstrate our model with two variants of CV QKD protocols with quaternary modulation. The results show high reliability with secure probability as high as $99.15\%-99.59\%$, considerable tightness and high efficiency with speedup of approximately $10^7$ in both cases. This inspiring model enables the real-time computation of unstructured quantum key distribution protocols' key rate more automatically and efficiently, which has met the growing needs of implementing QKD protocols on moving platforms.
△ Less
Submitted 26 April, 2022; v1 submitted 23 January, 2022;
originally announced January 2022.
-
QuantumNAT: Quantum Noise-Aware Training with Noise Injection, Quantization and Normalization
Authors:
Hanrui Wang,
Jiaqi Gu,
Yongshan Ding,
Zirui Li,
Frederic T. Chong,
David Z. Pan,
Song Han
Abstract:
Parameterized Quantum Circuits (PQC) are promising towards quantum advantage on near-term quantum hardware. However, due to the large quantum noises (errors), the performance of PQC models has a severe degradation on real quantum devices. Take Quantum Neural Network (QNN) as an example, the accuracy gap between noise-free simulation and noisy results on IBMQ-Yorktown for MNIST-4 classification is…
▽ More
Parameterized Quantum Circuits (PQC) are promising towards quantum advantage on near-term quantum hardware. However, due to the large quantum noises (errors), the performance of PQC models has a severe degradation on real quantum devices. Take Quantum Neural Network (QNN) as an example, the accuracy gap between noise-free simulation and noisy results on IBMQ-Yorktown for MNIST-4 classification is over 60%. Existing noise mitigation methods are general ones without leveraging unique characteristics of PQC; on the other hand, existing PQC work does not consider noise effect. To this end, we present QuantumNAT, a PQC-specific framework to perform noise-aware optimizations in both training and inference stages to improve robustness. We experimentally observe that the effect of quantum noise to PQC measurement outcome is a linear map from noise-free outcome with a scaling and a shift factor. Motivated by that, we propose post-measurement normalization to mitigate the feature distribution differences between noise-free and noisy scenarios. Furthermore, to improve the robustness against noise, we propose noise injection to the training process by inserting quantum error gates to PQC according to realistic noise models of quantum hardware. Finally, post-measurement quantization is introduced to quantize the measurement outcomes to discrete values, achieving the denoising effect. Extensive experiments on 8 classification tasks using 6 quantum devices demonstrate that QuantumNAT improves accuracy by up to 43%, and achieves over 94% 2-class, 80% 4-class, and 34% 10-class classification accuracy measured on real quantum computers. The code for construction and noise-aware training of PQC is available in the TorchQuantum library.
△ Less
Submitted 13 June, 2023; v1 submitted 21 October, 2021;
originally announced October 2021.
-
Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric Channels
Authors:
Zhao Li,
Xiao-Yu Cao,
Chen-Long Li,
Chen-Xun Weng,
Jie Gu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
As an essential ingredient of quantum networks, quantum conference key agreement (QCKA) provides unconditional secret keys among multiple parties, which enables only legitimate users to decrypt the encrypted message. Recently, some QCKA protocols employing twin-field was proposed to promote transmission distance. These protocols, however, suffer from relatively low conference key rate and short tr…
▽ More
As an essential ingredient of quantum networks, quantum conference key agreement (QCKA) provides unconditional secret keys among multiple parties, which enables only legitimate users to decrypt the encrypted message. Recently, some QCKA protocols employing twin-field was proposed to promote transmission distance. These protocols, however, suffer from relatively low conference key rate and short transmission distance over asymmetric channels, which demands a prompt solution in practice. Here, we consider a tripartite QCKA protocol utilizing the idea of sending-or-not-sending twin-field scheme and propose a high-efficiency QCKA over asymmetric channels by removing the symmetry parameters condition. Besides, we provide a composable finite-key analysis with rigorous security proof against general attacks by exploiting the entropic uncertainty relation for multiparty system. Our protocol greatly improves the feasibility to establish conference keys over asymmetric channels.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Coherent one-way quantum conference key agreement based on twin field
Authors:
Xiao-Yu Cao,
Jie Gu,
Yu-Shuo Lu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement (CKA) enables key sharing among multiple trusted users with information-theoretic security. Currently, the key rates of most quantum CKA protocols suffer from the limit of the total efficiency among quantum channels. Inspired by the coherent one-way and twin-field quantum key distribution (QKD) protocols, we propose a quantum CKA protocol of three users. Exploiting…
▽ More
Quantum conference key agreement (CKA) enables key sharing among multiple trusted users with information-theoretic security. Currently, the key rates of most quantum CKA protocols suffer from the limit of the total efficiency among quantum channels. Inspired by the coherent one-way and twin-field quantum key distribution (QKD) protocols, we propose a quantum CKA protocol of three users. Exploiting coherent states with intensity 0 and $μ$ to encode logic bits, our protocol can break the limit. Additionally, the requirements of phase randomization and multiple intensity modulation are removed in our protocol, making its experimental demonstration simple.
△ Less
Submitted 5 September, 2021;
originally announced September 2021.
-
Experimental quantum secure network with digital signatures and encryption
Authors:
Hua-Lei Yin,
Yao Fu,
Chen-Long Li,
Chen-Xun Weng,
Bing-Hong Li,
Jie Gu,
Yu-Shuo Lu,
Shan Huang,
Zeng-Bing Chen
Abstract:
Cryptography promises four information security objectives, namely, confidentiality, integrity, authenticity, and non-repudiation, to support trillions of transactions annually in the digital economy. Efficient digital signatures, ensuring the integrity, authenticity, and non-repudiation of data with information-theoretical security are highly urgent and intractable open problems in cryptography.…
▽ More
Cryptography promises four information security objectives, namely, confidentiality, integrity, authenticity, and non-repudiation, to support trillions of transactions annually in the digital economy. Efficient digital signatures, ensuring the integrity, authenticity, and non-repudiation of data with information-theoretical security are highly urgent and intractable open problems in cryptography. Here, we propose a protocol of high-efficiency quantum digital signatures using secret sharing, one-time universal$_2$ hashing, and the one-time pad. We just need to use a 384-bit key to sign documents of up to $2^{64}$ lengths with a security bound of $10^{-19}$. If one-megabit document is signed, the signature efficiency is improved by more than $10^8$ times compared with previous quantum digital signature protocols. Furthermore, we build the first all-in-one quantum secure network integrating information-theoretically secure communication, digital signatures, secret sharing, and conference key agreement and experimentally demonstrate this signature efficiency advantage. Our work completes the cryptography toolbox of the four information security objectives.
△ Less
Submitted 9 June, 2022; v1 submitted 29 July, 2021;
originally announced July 2021.
-
QuantumNAS: Noise-Adaptive Search for Robust Quantum Circuits
Authors:
Hanrui Wang,
Yongshan Ding,
Jiaqi Gu,
Zirui Li,
Yujun Lin,
David Z. Pan,
Frederic T. Chong,
Song Han
Abstract:
Quantum noise is the key challenge in Noisy Intermediate-Scale Quantum (NISQ) computers. Previous work for mitigating noise has primarily focused on gate-level or pulse-level noise-adaptive compilation. However, limited research efforts have explored a higher level of optimization by making the quantum circuits themselves resilient to noise.
We propose QuantumNAS, a comprehensive framework for n…
▽ More
Quantum noise is the key challenge in Noisy Intermediate-Scale Quantum (NISQ) computers. Previous work for mitigating noise has primarily focused on gate-level or pulse-level noise-adaptive compilation. However, limited research efforts have explored a higher level of optimization by making the quantum circuits themselves resilient to noise.
We propose QuantumNAS, a comprehensive framework for noise-adaptive co-search of the variational circuit and qubit mapping. Variational quantum circuits are a promising approach for constructing QML and quantum simulation. However, finding the best variational circuit and its optimal parameters is challenging due to the large design space and parameter training cost. We propose to decouple the circuit search and parameter training by introducing a novel SuperCircuit. The SuperCircuit is constructed with multiple layers of pre-defined parameterized gates and trained by iteratively sampling and updating the parameter subsets (SubCircuits) of it. It provides an accurate estimation of SubCircuits performance trained from scratch. Then we perform an evolutionary co-search of SubCircuit and its qubit mapping. The SubCircuit performance is estimated with parameters inherited from SuperCircuit and simulated with real device noise models. Finally, we perform iterative gate pruning and finetuning to remove redundant gates.
Extensively evaluated with 12 QML and VQE benchmarks on 14 quantum computers, QuantumNAS significantly outperforms baselines. For QML, QuantumNAS is the first to demonstrate over 95% 2-class, 85% 4-class, and 32% 10-class classification accuracy on real QC. It also achieves the lowest eigenvalue for VQE tasks on H2, H2O, LiH, CH4, BeH2 compared with UCCSD. We also open-source TorchQuantum (https://github.com/mit-han-lab/torchquantum) for fast training of parameterized quantum circuits to facilitate future research.
△ Less
Submitted 6 January, 2022; v1 submitted 22 July, 2021;
originally announced July 2021.
-
Differential Phase Shift Quantum Secret Sharing Using a Twin Field with Asymmetric Source Intensities
Authors:
Zhao-Ying Jia,
Jie Gu,
Bing-Hong Li,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been proposed to break the linear rate-distance boundary. However, this original protocol has a poor performance over channels with asymmetric transmi…
▽ More
As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been proposed to break the linear rate-distance boundary. However, this original protocol has a poor performance over channels with asymmetric transmittances. To make it more practical, we present a differential phase shift quantum secret sharing protocol with asymmetric source intensities and give the security proof of our protocol against individual attacks. Taking finite-key effects into account, our asymmetric protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol when the difference in length between Alice's channel and Bob's is fixed at 14 km. Moreover, our protocol can provide a high key rate even when the difference is quite large and has great robustness against finite-key effects. Therefore, our work is meaningful for the real-life applications of quantum secret sharing.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
Simple security proof of coherent-one-way quantum key distribution
Authors:
Rui-Qi Gao,
Yuan-Mei Xie,
Jie Gu,
Wen-Bo Liu,
Chen-Xun Weng,
Bing-Hong Li,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Coherent-one-way quantum key distribution (COW-QKD), which requires a simple experimental setup and has the ability to withstand photon-number-splitting attacks, has been not only experimentally implemented but also commercially applied. However, recent studies have shown that the current COW-QKD system is insecure and can only distribute secret keys safely within 20 km of the optical fiber length…
▽ More
Coherent-one-way quantum key distribution (COW-QKD), which requires a simple experimental setup and has the ability to withstand photon-number-splitting attacks, has been not only experimentally implemented but also commercially applied. However, recent studies have shown that the current COW-QKD system is insecure and can only distribute secret keys safely within 20 km of the optical fiber length. In this study, we propose a practical implementation of COW-QKD by adding a two-pulse vacuum state as a new decoy sequence. This proposal maintains the original experimental setup as well as the simplicity of its implementation. Utilizing detailed observations on the monitoring line to provide an analytical upper bound on the phase error rate, we provide a high-performance COW-QKD asymptotically secure against coherent attacks. This ensures the availability of COW-QKD within 100 km and establishes theoretical foundations for further applications.
△ Less
Submitted 1 June, 2023; v1 submitted 20 July, 2021;
originally announced July 2021.
-
Secure and practical multiparty quantum digital signatures
Authors:
Chen-Xun Weng,
Yu-Shuo Lu,
Rui-Qi Gao,
Yuan-Mei Xie,
Jie Gu,
Chen-Long Li,
Bing-Hong Li,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum digital signatures (QDSs) promise information-theoretic security against repudiation and forgery of messages. Compared with currently existing three-party QDS protocols, multiparty protocols have unique advantages in the practical case of more than two receivers when sending a mass message. However, complex security analysis, numerous quantum channels and low data utilization efficiency ma…
▽ More
Quantum digital signatures (QDSs) promise information-theoretic security against repudiation and forgery of messages. Compared with currently existing three-party QDS protocols, multiparty protocols have unique advantages in the practical case of more than two receivers when sending a mass message. However, complex security analysis, numerous quantum channels and low data utilization efficiency make it intractable to expand three-party to multiparty scenario. Here, based on six-state non-orthogonal encoding protocol, we propose an effective multiparty QDS framework to overcome these difficulties. The number of quantum channels in our protocol only linearly depends on the number of users. The post-matching method is introduced to enhance data utilization efficiency and make it linearly scale with the probability of detection events even for five-party scenario. Our work compensates for the absence of practical multiparty protocols, which paves the way for future QDS networks.
△ Less
Submitted 13 August, 2021; v1 submitted 25 April, 2021;
originally announced April 2021.
-
Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable Quantum Key Distribution with High Excess Noise Tolerance
Authors:
Wen-Bo Liu,
Chen-Long Li,
Yuan-Mei Xie,
Chen-Xun Weng,
Jie Gu,
Xiao-Yu Cao,
Yu-Shuo Lu,
Bing-Hong Li,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Discrete-modulated continuous-variable quantum key distribution with homodyne detection is widely recognized for its ease of implementation, efficiency with respect to error correction, and its compatibility with modern optical communication devices. However, recent studies report that the application of homodyne detection obtains poor tolerance to excess noise and insufficient transmission distan…
▽ More
Discrete-modulated continuous-variable quantum key distribution with homodyne detection is widely recognized for its ease of implementation, efficiency with respect to error correction, and its compatibility with modern optical communication devices. However, recent studies report that the application of homodyne detection obtains poor tolerance to excess noise and insufficient transmission distance, hence seriously restricting the large-scale deployment of quantum secure communication networks. In this paper, we propose a homodyne detection protocol using the quadrature phase shift keying technique. By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level. Furthermore, we demonstrate that homodyne detection performs better than heterodyne detection in quaternary-modulated continuous-variable quantum key distribution under the untrusted detector noise scenario. The security is analyzed using the tight numerical method against collective attacks in the asymptotic regime. Our results imply that the current protocol is able to distribute keys in nearly intercity area and thus paves the way for constructing low-cost quantum secure communication networks.
△ Less
Submitted 13 November, 2021; v1 submitted 22 April, 2021;
originally announced April 2021.
-
Secure Quantum Secret Sharing without Signal Disturbance Monitoring
Authors:
Hua-Lei Yin,
Jie Gu,
Yuan-Mei Xie,
Wen-Bo Liu,
Yao Fu,
Zeng-Bing Chen
Abstract:
Quantum secret sharing (QSS) is an essential primitive for the future quantum internet, which promises secure multiparty communication. However, developing a large-scale QSS network is a huge challenge due to the channel loss and the requirement of multiphoton interference or high-fidelity multipartite entanglement distribution. Here, we propose a three-user QSS protocol without monitoring signal…
▽ More
Quantum secret sharing (QSS) is an essential primitive for the future quantum internet, which promises secure multiparty communication. However, developing a large-scale QSS network is a huge challenge due to the channel loss and the requirement of multiphoton interference or high-fidelity multipartite entanglement distribution. Here, we propose a three-user QSS protocol without monitoring signal disturbance, which is capable of ensuring the unconditional security. The final key rate of our protocol can be demonstrated to break the Pirandola-Laurenza-Ottaviani-Banchi bound of quantum channel and its simulated transmission distance can approach over 600 km using current techniques. Our results pave the way to realizing high-rate and large-scale QSS networks.
△ Less
Submitted 23 September, 2021; v1 submitted 20 April, 2021;
originally announced April 2021.
-
Efficient Quantum Digital Signatures without Symmetrization Step
Authors:
Yu-Shuo Lu,
Xiao-Yu Cao,
Chen-Xun Weng,
Jie Gu,
Yuan-Mei Xie,
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages with information-theoretic security. Current QDS protocols face two major restrictions, including the requirement of the symmetrization step with additional secure classical channels and quadratic scaling of the signature rate with the probability of detection events.…
▽ More
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages with information-theoretic security. Current QDS protocols face two major restrictions, including the requirement of the symmetrization step with additional secure classical channels and quadratic scaling of the signature rate with the probability of detection events. Here, we present an efficient QDS protocol to overcome these issues by utilizing the classical post-processing operation called post-matching method. Our protocol does not need the symmetrization step, and the signature rate scales linearly with the probability of detection events. Simulation results show that the signature rate is three orders of magnitude higher than the original protocol in a 100-km-long fiber. This protocol is compatible with existing quantum communication infrastructure, therefore we anticipate that it will play a significant role in providing digital signatures with unconditional security.
△ Less
Submitted 7 April, 2021;
originally announced April 2021.
-
Differential phase shift quantum secret sharing using twin field
Authors:
Jie Gu,
Xiao-Yu Cao,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum secret sharing (QSS) is essential for multiparty quantum communication, which is one of cornerstones in the future quantum internet. However, a linear rate-distance limitation severely constrains the secure key rate and transmission distance of QSS. Here, we present a practical QSS protocol among three participants based on the differential phase shift scheme and twin field ideas for the s…
▽ More
Quantum secret sharing (QSS) is essential for multiparty quantum communication, which is one of cornerstones in the future quantum internet. However, a linear rate-distance limitation severely constrains the secure key rate and transmission distance of QSS. Here, we present a practical QSS protocol among three participants based on the differential phase shift scheme and twin field ideas for the solution of high-efficiency multiparty communication task. In contrast to formerly proposed differential phase shift QSS protocol, our protocol can break the linear rate-distance bound, theoretically improving the secret key rate by three orders of magnitude in a 300-km-long fiber. Furthermore, the new protocol is secure against Trojan horse attacks that cannot be resisted by previous differential phase shift QSS.
△ Less
Submitted 10 April, 2021; v1 submitted 7 April, 2021;
originally announced April 2021.
-
Lightweight authenticated quantum key distribution protocols with key recycling
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Quantum key distribution (QKD) has been developed for decades and several different QKD protocols have been proposed. But two difficulties limit the implementation of most QKD protocols. First, the involved participants are required to have heavy quantum capabilities, such as quantum joint operation, quantum register, and so on. Second, a hypothetical authenticated classical channel is used in mos…
▽ More
Quantum key distribution (QKD) has been developed for decades and several different QKD protocols have been proposed. But two difficulties limit the implementation of most QKD protocols. First, the involved participants are required to have heavy quantum capabilities, such as quantum joint operation, quantum register, and so on. Second, a hypothetical authenticated classical channel is used in most of the existing QKD protocols and this assumed channel does not exist in reality. To solve both the above limitations at the same time, this study proposes three lightweight authenticated QKD protocols with key recycling and shows these proposed protocols are robust under the collective attack.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a lightweight authenticated semi-quantum key distribution protocol for a quantum participant to share a secret key with a classical participant. However, this study points out that an attacker can use a modification attack to make both participants share a wrong key without being detected. To avoid this problem, an improvement is…
▽ More
Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a lightweight authenticated semi-quantum key distribution protocol for a quantum participant to share a secret key with a classical participant. However, this study points out that an attacker can use a modification attack to make both participants share a wrong key without being detected. To avoid this problem, an improvement is proposed here.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Recently, Li et al. (Int J Theor Phys: DOI: 10.1007/s10773-020-04588-w, 2020) proposed a multiparty quantum key agreement protocol via non-maximally entangled cluster states. They claimed that the proposed protocol can help all the involved participants have equal influence on the final shared key. However, this study points out a loophole that makes Li et al.'s protocol suffer from a collusion at…
▽ More
Recently, Li et al. (Int J Theor Phys: DOI: 10.1007/s10773-020-04588-w, 2020) proposed a multiparty quantum key agreement protocol via non-maximally entangled cluster states. They claimed that the proposed protocol can help all the involved participants have equal influence on the final shared key. However, this study points out a loophole that makes Li et al.'s protocol suffer from a collusion attack, i.e. several dishonest participants can conspire to manipulate the final shared key without being detected by others. To avoid this loophole, an improvement is proposed here.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
Two attacks and counterattacks on the mutual semi-quantum key agreement protocol using Bell states
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Recently, a mutual semi-quantum key agreement protocol using Bell states is proposed by Yan et al. (Mod. Phys. Lett. A, 34, 1950294, 2019). The proposed protocol tries to help a quantum participant share a key with a classical participant who just has limited quantum capacities. Yan et al. claimed that both the participants have the same influence on the final shared key. However, this study point…
▽ More
Recently, a mutual semi-quantum key agreement protocol using Bell states is proposed by Yan et al. (Mod. Phys. Lett. A, 34, 1950294, 2019). The proposed protocol tries to help a quantum participant share a key with a classical participant who just has limited quantum capacities. Yan et al. claimed that both the participants have the same influence on the final shared key. However, this study points out that the classical participant can manipulate the final shared key by himself/herself without being detected. To solve this problem, an improved method is proposed here.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Double C-NOT attack on a single-state semi-quantum key distribution protocol and its improvement
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol (Int. J. Quantum Inf, 18, 4, 2020) to help a quantum participant to share a secret key with a classical participant. However, this study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants. To avoid this problem, a modificatio…
▽ More
Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol (Int. J. Quantum Inf, 18, 4, 2020) to help a quantum participant to share a secret key with a classical participant. However, this study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants. To avoid this problem, a modification is proposed here.
△ Less
Submitted 26 September, 2020;
originally announced September 2020.
-
Permutation attack and counterattack on the two-party quantum key agreement over a collective noisy channel
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Recently, Yang et al. (Quantum Inf Process 18, 74, 2019) proposed a two-party quantum key agreement protocol over a collective noisy channel. They claimed that their quantum key agreement protocol can ensure both of the participants have equal influence on the final shared key. However, this study shows that the participant who announces the permutation operation can manipulate the final shared ke…
▽ More
Recently, Yang et al. (Quantum Inf Process 18, 74, 2019) proposed a two-party quantum key agreement protocol over a collective noisy channel. They claimed that their quantum key agreement protocol can ensure both of the participants have equal influence on the final shared key. However, this study shows that the participant who announces the permutation operation can manipulate the final shared key by himself/herself without being detected by the other. To avoid this loophole, an improvement is proposed here.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
High key rate quantum conference key agreement with unconditional security
Authors:
Xiao-Yu Cao,
Yu-shuo Lu,
Zhao Li,
Jie Gu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the conference key among multiple users simultaneously. However, quantum CKA is currently far from practical application due to the low conference key rate.…
▽ More
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the conference key among multiple users simultaneously. However, quantum CKA is currently far from practical application due to the low conference key rate. Here, we propose a quantum CKA protocol of three users with information-theoretic security. Our protocol only requires phase-randomized weak coherent sources and threshold single-photon detectors, and is anticipated to be experimentally demonstrated over 600 km under current technology. Our scheme can be widely implemented in the approaching large-scale quantum network.
△ Less
Submitted 22 September, 2021; v1 submitted 17 June, 2020;
originally announced June 2020.
-
Experimental composable security decoy-state quantum key distribution using time-phase encoding
Authors:
Hua-Lei Yin,
Peng Liu,
Wei-Wei Dai,
Zhao-Hui Ci,
Jie Gu,
Tian Gao,
Qiang-Wei Wang,
Zi-Yao Shen
Abstract:
Quantum key distribution (QKD) promises provably secure communications. In order to improve the secret key rate, combining a biased basis choice with the decoy-state method is proposed. Concomitantly, there is a basis-independent detection efficiency condition, which usually cannot be satisfied in a practical system, such as the time-phase encoding. Fortunately, this flaw has been recently removed…
▽ More
Quantum key distribution (QKD) promises provably secure communications. In order to improve the secret key rate, combining a biased basis choice with the decoy-state method is proposed. Concomitantly, there is a basis-independent detection efficiency condition, which usually cannot be satisfied in a practical system, such as the time-phase encoding. Fortunately, this flaw has been recently removed theoretically and experimentally using the fact that the expected yields of single-photon states prepared in two bases stay the same for a given measurement basis. However, the security proofs do not fully consider the finite-key effects for general attacks. In this work, we provide the rigorous finite-key security bounds for four-intensity decoy-state BB84 QKD against coherent attacks in the universally composable framework. Furthermore, we build a time-phase encoding system with 200 MHz clocked to implement this protocol, in which the real-time secret key rate is more than 60 kbps over 50 km single-mode fiber.
△ Less
Submitted 24 February, 2020;
originally announced February 2020.
-
Tight security bounds for decoy-state quantum key distribution
Authors:
Hua-Lei Yin,
Min-Gang Zhou,
Jie Gu,
Yuan-Mei Xie,
Yu-Shuo Lu,
Zeng-Bing Chen
Abstract:
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and even the most important sec…
▽ More
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and even the most important security. There are two tasks of statistical fluctuation in decoy-state BB84 QKD. One is the deviation between expected value and observed value for a given expected value or observed value. The other is the deviation between phase error rate of computational basis and bit error rate of dual basis. Here, we provide the rigorous and optimal analytic formula to solve the above tasks, resulting higher secret key rate and longer secure transmission distance. Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
△ Less
Submitted 16 February, 2020;
originally announced February 2020.
-
Improvement on "Secure multi-party quantum summation based on quantum Fourier transform"
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Recently, Yang et al. (Quantum Inf Process:17:129, 2018) proposed a secure multi-party quantum summation protocol allowing the involved participants to sum their secrets privately. They claimed that the proposed protocol can prevent each participant's secret from being known by others. However, this study shows that the participant who prepares the initial quantum states can obtain other participa…
▽ More
Recently, Yang et al. (Quantum Inf Process:17:129, 2018) proposed a secure multi-party quantum summation protocol allowing the involved participants to sum their secrets privately. They claimed that the proposed protocol can prevent each participant's secret from being known by others. However, this study shows that the participant who prepares the initial quantum states can obtain other participants' secrets with an inverse quantum Fourier transform attack. A modification is then proposed here to solve this problem.
△ Less
Submitted 4 July, 2019;
originally announced July 2019.
-
Interpolation of quasi noncommutative $L_p$-spaces
Authors:
Juan Gu,
Zhi Yin,
Haonan Zhang
Abstract:
Let $\mathcal{M}$ be a ($σ$-finite) von Neumann algebra associated with a normal faithful state $φ.$ We prove a complex interpolation result for a couple of two (quasi) Haagerup noncommutative $L_p$-spaces $L_{p_0} (\mathcal{M}, φ)$ and $L_{p_1} (\mathcal{M}, φ), 0< p_0 < p_1\leq \infty,$ which has further applications to the sandwiched $p$-Rényi divergence.
Let $\mathcal{M}$ be a ($σ$-finite) von Neumann algebra associated with a normal faithful state $φ.$ We prove a complex interpolation result for a couple of two (quasi) Haagerup noncommutative $L_p$-spaces $L_{p_0} (\mathcal{M}, φ)$ and $L_{p_1} (\mathcal{M}, φ), 0< p_0 < p_1\leq \infty,$ which has further applications to the sandwiched $p$-Rényi divergence.
△ Less
Submitted 21 May, 2019;
originally announced May 2019.
-
High order perturbation theory for difference equations and Borel summability of quantum mirror curves
Authors:
Jie Gu,
Tin Sulejmanpasic
Abstract:
We adapt the Bender-Wu algorithm to solve perturbatively but very efficiently the eigenvalue problem of "relativistic" quantum mechanical problems whose Hamiltonians are difference operators of the exponential-polynomial type. We implement the algorithm in the function BWDifference in the updated Mathematica package BenderWu. With the help of BWDifference, we survey quantum mirror curves of toric…
▽ More
We adapt the Bender-Wu algorithm to solve perturbatively but very efficiently the eigenvalue problem of "relativistic" quantum mechanical problems whose Hamiltonians are difference operators of the exponential-polynomial type. We implement the algorithm in the function BWDifference in the updated Mathematica package BenderWu. With the help of BWDifference, we survey quantum mirror curves of toric fano Calabi-Yau threefolds, and find strong evidence that not only are the perturbative eigenenergies of the associated 1d quantum mechanical problems Borel summable, but also that the Borel sums are exact.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Semi-quantum private comparison protocol under an almost-dishonest third party
Authors:
Wen-Han Chou,
Tzonelih Hwang,
Jun Gu
Abstract:
This study presents the first semi-quantum private comparison protocol under an almost-dishonest third party. The proposed protocol allows two classical participants to compare their secret information without compromising it's privacy. The security analyses indicate that the protocol is free from several well-known attacks.
This study presents the first semi-quantum private comparison protocol under an almost-dishonest third party. The proposed protocol allows two classical participants to compare their secret information without compromising it's privacy. The security analyses indicate that the protocol is free from several well-known attacks.
△ Less
Submitted 23 August, 2016; v1 submitted 27 July, 2016;
originally announced July 2016.
-
Comment on 'Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement'
Authors:
Jun Gu,
Tzonelih Hwang
Abstract:
Designing a quantum key agreement (QKA) protocol is always a challenging task, because both the security and the fairness properties have to be considered simultaneously. Recently, Zhu et al. (Quantum Inf Process 14(11): 4245-4254) pointed out that Shukla et al.'s QKA protocol (Quantum Inf Process 13(11): 2391-2405) has some security flaws (which lead to the Participant Attack). Moreover, they pro…
▽ More
Designing a quantum key agreement (QKA) protocol is always a challenging task, because both the security and the fairness properties have to be considered simultaneously. Recently, Zhu et al. (Quantum Inf Process 14(11): 4245-4254) pointed out that Shukla et al.'s QKA protocol (Quantum Inf Process 13(11): 2391-2405) has some security flaws (which lead to the Participant Attack). Moreover, they proposed an improvement to avoid these weaknesses. However this study points out that the improved protocol also suffers from a colluding attack, i.e., two dishonest participants in the protocol can collaborate to manipulate the final secret key without being detected.
△ Less
Submitted 28 October, 2015;
originally announced October 2015.
-
Design of Quantum Key Agreement Protocols with Strong Fairness Property
Authors:
Kun-Fei Yu,
Chun-Wei Yang,
Tzonelih Hwang,
Chuan-Ming Li,
Jun Gu
Abstract:
This study distinguishes the weak fairness property from the strong fairness property which is necessary in the quantum key agreement (QKA) and shows that most of the existing QKAs cannot achieve the strong fairness property with a key manipulation problem.To solve this problem, a model which describes the way to design a QKA with the strong fairness property is proposed. Based on the model, an ex…
▽ More
This study distinguishes the weak fairness property from the strong fairness property which is necessary in the quantum key agreement (QKA) and shows that most of the existing QKAs cannot achieve the strong fairness property with a key manipulation problem.To solve this problem, a model which describes the way to design a QKA with the strong fairness property is proposed. Based on the model, an example QKA is presented. Security analyses show that the proposed QKA is effective to resist not only outsider's eavesdropping attack but also insider's key manipulation.
△ Less
Submitted 9 March, 2017; v1 submitted 8 October, 2015;
originally announced October 2015.