Filters








599 Hits in 3.9 sec

On the Connection Between Quantum Pseudorandomness and Quantum Hardware Assumptions [article]

Mina Doosti, Niraj Kumar, Elham Kashefi, Kaushik Chakraborty
2022 arXiv   pre-print
This paper, for the first time, addresses the questions related to the connections between the quantum pseudorandomness and quantum hardware assumptions, specifically quantum physical unclonable functions  ...  We also show that both the qPUFs and the quantum pseudorandom unitaries (PRUs) can be constructed from each other, providing new ways to obtain PRS from the hardware assumptions.  ...  Acknowledgement We acknowledge the UK Engineering and Physical Sciences Research Council grant EP/N003829/1 and as well as Innovate UK funded project called AirQKD : product of a UK industry pipeline,  ... 
arXiv:2110.11724v2 fatcat:gltbdnfkjfh63ao6eiedf2gtmm

The ghost in the radiation: robust encodings of the black hole interior

Isaac Kim, Eugene Tang, John Preskill
2020 Journal of High Energy Physics  
We reconsider the black hole firewall puzzle, emphasizing that quantum errorcorrection, computational complexity, and pseudorandomness are crucial concepts for understanding the black hole interior.  ...  On the other hand, if the radiation is not pseudorandom, an exterior observer may be able to create a firewall by applying a polynomial-time quantum computation to the radiation.  ...  Acknowledgments We thank Adam Bouland, Raphael Bousso, Anne Broadbent, Juan Maldacena, and Geoff Penington for valuable discussions. IK's work was supported by the Simons Foundation It  ... 
doi:10.1007/jhep06(2020)031 fatcat:6ajgmtd6sndo3izfbkxwxfwiaa

The ghost in the radiation: Robust encodings of the black hole interior [article]

Isaac H. Kim, Eugene Tang, John Preskill
2020 arXiv   pre-print
We reconsider the black hole firewall puzzle, emphasizing that quantum error-correction, computational complexity, and pseudorandomness are crucial concepts for understanding the black hole interior.  ...  On the other hand, if the radiation is not pseudorandom, an exterior observer may be able to create a firewall by applying a polynomial-time quantum computation to the radiation.  ...  Acknowledgments We thank Adam Bouland, Raphael Bousso, Anne Broadbent, Juan Maldacena, and Geoff Penington for valuable discussions. IK's work was supported by the Simons Foundation It  ... 
arXiv:2003.05451v1 fatcat:eyo3tto7y5cgxharaofzvpc62q

Generating randomness: making the most out of disordering a false order into a real one

Yaron Ilan
2019 Journal of Translational Medicine  
Rather, it underlies many processes and functions. Randomness can be used to improve the efficacy of development and of systems under certain conditions.  ...  Moreover, valid unpredictable random-number generators are needed for secure communication, rendering predictable pseudorandom strings unsuitable.  ...  However, the generation of pseudorandomness is much harder in the quantum case. Random quantum unitary time evolutions, or circuits, are a potent source of quantum pseudorandomness.  ... 
doi:10.1186/s12967-019-1798-2 pmid:30777074 pmcid:PMC6379992 fatcat:dpuzwnl3yvfoddgsxz36ljlshq

Using Hash-Based Signatures to Bootstrap Quantum Key Distribution [article]

Sébastien Kunz-Jacques, Paul Jouguet
2013 arXiv   pre-print
This association, while relying on short-term computational hardness assumptions, results in an increase of the practical security of QKD and eases its deployment.  ...  We show that provided one-way functions exist, the Lamport algorithm or its variants can be instantiated in a secure way in the Universally Composable sense, and can therefore be plugged into any QKD protocol  ...  hardness assumptions are required to ensure the confidentiality and integrity of the user traffic, and therefore it makes sense to investigate the relationship between these assumptions and the ones backing  ... 
arXiv:1109.2844v3 fatcat:rbxcwfmka5ghfno7t6h6coblri

On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions [article]

Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong
2020 arXiv   pre-print
In this paper, we investigate applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era.  ...  Nevertheless, reliance on the security of de-facto cryptographic primitives is at risk of being broken by the impending quantum computers.  ...  Such co-design principles based on hardware and software provide a trade-off between area overhead and hardware penalizing.  ... 
arXiv:2004.10435v1 fatcat:bx6g5lidlbatpdgd3omwfk22i4

True Random Number Generators [chapter]

Mario Stipčević, Çetin Kaya Koç
2014 Open Problems in Mathematics and Computational Science  
The FRO approach is currently used in 3rd and 4th generation FPGA and ASIC hardware, unsuitable for realization of quantum RNGs.  ...  On the other hand, current industry standards dictate the use of RNGs based on free running oscillators (FRO) whose randomness is derived from electronic noise present in logic circuits and which cannot  ...  A physical RNG is a piece of hardware separate from the computer, usually connected to it via USB or PCI bus.  ... 
doi:10.1007/978-3-319-10683-0_12 fatcat:5aexv7mcizea7nq33xcga5ezsu

Observability of fidelity decay at the Lyapunov rate in few-qubit quantum simulations [article]

Max D. Porter, Ilon Joseph
2021 arXiv   pre-print
This prediction is achieved through close study of the quantum sawtooth map (QSM), which is the most efficiently simulated quantum system with a provably chaotic classical counterpart and rich dynamics  ...  We predict that at least six qubits and 2.5-13x less error per CNOT gate on IBM-Q or 0.87-9.6x less error per Molmer-Sorensen gate on IonQ are needed for the Lyapunov exponent to become experimentally  ...  DuBois, and Yaniv J. Rosen of the Quantum Coherent Device Physics group at LLNL and Robert Tyler Sutherland at UT San Antonio for their insights into quantum hardware and noise processes.  ... 
arXiv:2110.07767v1 fatcat:d6tub6tgvjdldpwl47pim6i6ea

Applying Quantum Hardware to non-Scientific Problems: Grover's Algorithm and Rule-based Algorithmic Music Composition [article]

Alexis Kirke
2019 arXiv   pre-print
The paper concludes with discussion on how such an approach can grow with the improvement of quantum computer hardware and software.  ...  The system introduced - qgMuse - is simple but scalable. Example melodies are composed using qgMuse using the ibmqx4 quantum hardware.  ...  One of the I-R "rules", and one of its assumptions will be interpreted into soft Boolean rules.  ... 
arXiv:1902.04237v3 fatcat:tadphym4gncrhirzobcqgvdiyu

Impact of dynamics, entanglement, and Markovian noise on the fidelity of few-qubit digital quantum simulation [article]

Max D. Porter, Ilon Joseph
2022 arXiv   pre-print
Simulations of the gate-efficient quantum sawtooth map support these predictions, and experiments performed on three qubits on the IBM-Q quantum hardware platform at fixed gate count qualitatively confirm  ...  For quantum computations without error correction, the dynamics of a simulation can strongly influence the overall fidelity decay rate as well as the relative impact of different noise processes on the  ...  Wendt of the Nuclear Data and Theory group at LLNL, and Robert Tyler Sutherland at UT San Antonio for their insights into quantum hardware and noise processes.  ... 
arXiv:2206.04829v1 fatcat:6o4badof3zhohmdowmnj3jf3sq

Frodo

Joppe Bos, Craig Costello, Leo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
Thus, a question of significant interest to cryptographers, and especially to those currently placing bets on primitives that will withstand quantum adversaries, is how much of an advantage the additional  ...  based on hard problems in ideal lattices, mainly based on the Ring Learning With Errors (R-LWE) problem.  ...  We use a common hardware platform for all measurements. Standalone cryptographic operations were measured on the same computer, which acted as the server for measuring speed of TLS connections.  ... 
doi:10.1145/2976749.2978425 dblp:conf/ccs/BosCDMNNRS16 fatcat:lgev5d3lkjctjh37m2t5dtnxgm

Ising machines as hardware solvers of combinatorial optimization problems [article]

Naeimeh Mohseni, Peter L. McMahon, Tim Byrnes
2022 arXiv   pre-print
The types of Ising machines considered here include classical thermal annealers based on technologies such as spintronics, optics, memristors, and digital hardware accelerators; dynamical-systems solvers  ...  implemented with optics and electronics; and superconducting-circuit quantum annealers.  ...  on the manuscript.  ... 
arXiv:2204.00276v1 fatcat:prxw7pmuqnhndhdfkzbq4jvcwa

Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms

Rameez Asif
2021 IoT  
The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture  ...  , security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography.  ...  Acknowledgments: The author would like to thank Prof. Alan Woodward from University of Surrey, UK for the valuable discussions and lectures on post-quantum cryptography.  ... 
doi:10.3390/iot2010005 fatcat:ja6nldq4mjafhb2bcyzhxa7efu

Stream privacy amplification for quantum cryptography [article]

Yizhi Huang, Xingjian Zhang, Xiongfeng Ma
2021 arXiv   pre-print
Inspired by the connection between stream ciphers and quantum error correction in our security analysis, we further develop a generic information-theoretic tool to study the security of classical encryption  ...  By modifying the security proof based on quantum error correction, we develop a stream privacy amplification scheme, which resembles the classical stream cipher.  ...  ACKNOWLEDGMENTS We thank Guang Yang, Guoding Liu, Pei Zeng, and Hongyi Zhou for the helpful discussions.  ... 
arXiv:2111.14108v1 fatcat:5vp4swyrxvenplezaz4sur42fy

Building a Modern TRNG: An Entropy Source Interface for RISC-V [article]

Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall
2020 IACR Cryptology ePrint Archive  
The modular approach is suitable for the RISC-V hardware IP ecosystem, allows a significantly smaller implementation footprint on platforms that need it, while directly supporting current standards compliance  ...  needs such as post-quantum cryptography, and the goal of supporting a wide variety of RISC-V implementations and applications.  ...  We further thank BSI, CMVP/NIST, and CMUF members for their input on various drafts.  ... 
dblp:journals/iacr/SaarinenNM20 fatcat:4zisg3larrhwlfkql6q4pgf73q
« Previous Showing results 1 — 15 out of 599 results