Michele Mosca

ORCID: 0000-0001-7076-3095
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Quantum-Dot Cellular Automata
  • Quantum Mechanics and Applications
  • Computability, Logic, AI Algorithms
  • Cryptography and Data Security
  • Low-power high-performance VLSI design
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Complexity and Algorithms in Graphs
  • Labor market dynamics and wage inequality
  • Parallel Computing and Optimization Techniques
  • Cryptographic Implementations and Security
  • Management, Economics, and Public Policy
  • Retirement, Disability, and Employment
  • Quantum and electron transport phenomena
  • Quantum many-body systems
  • Crime, Illicit Activities, and Governance
  • Employment and Welfare Studies
  • Blockchain Technology Applications and Security
  • Matrix Theory and Algorithms
  • Machine Learning and Algorithms
  • Italian Social Issues and Migration
  • Computational Physics and Python Applications
  • Italy: Economic History and Contemporary Issues

Perimeter Institute
2016-2025

University of Waterloo
2016-2025

University of Oxford
1998-2023

Hong Kong University of Science and Technology
2023

University of Hong Kong
2023

Canadian Institute for Advanced Research
2015-2020

University of Turin
2017-2019

University of Naples Federico II
2003-2018

Institute of Electrical and Electronics Engineers
2018

Regional Municipality of Niagara
2018

Quantum computers use the quantum interference of different computational paths to enhance correct outcomes and suppress erroneous computations. A common pattern underpinning algorithms can be identified when computation is viewed as multi-particle interference. We this approach review (and improve) some existing show how they are related instances phase estimation. provide an explicit algorithm for generating any prescribed with arbitrary precision.

10.1098/rspa.1998.0164 article EN Proceedings of the Royal Society A Mathematical Physical and Engineering Sciences 1998-01-08

We examine the number of queries to input variables that a quantum algorithm requires compute Boolean functions on {0,1} N in black-box model. show exponential speed-up obtained for partial (i.e., problems involving promise input) by Deutsch and Jozsa, Simon, Shor cannot be any total function: if computes some function f with small error probability using T queries, then there is classical deterministic exactly O ( Ts 6 ) queries. also give asymptotically tight characterizations all...

10.1145/502090.502097 article EN Journal of the ACM 2001-07-01

We present an algorithm for computing depth-optimal decompositions of logical operations, leveraging a meet-in-the-middle technique to provide significant speed-up over simple brute force algorithms. As illustration our method we implemented this and found factorizations the commonly used quantum operations into elementary gates in Clifford+T set. In particular, report decomposition Toffoli gate set Clifford T gates. Our achieves total T-depth 3, thereby providing 40% reduction previously...

10.1109/tcad.2013.2244643 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2013-05-15

Most work in quantum circuit optimization has been performed isolation from the results of fault-tolerance. Here we present a polynomial-time algorithm for optimizing circuits that takes actual implementation fault-tolerant logical gates into consideration. Our re-synthesizes composed Clifford group and T gates, latter being typically most costly gate models, e.g., those based on Steane or surface codes, with purpose minimizing both T-count T-depth. A major feature is ability to...

10.1109/tcad.2014.2341953 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2014-09-17

Organizations must understand their specific risks and plan for systems to be resilient quantum attacks. Assessment is based on three quantities: the security shelf life of information assets, migration time designed resist attacks, remaining before computers break security.

10.1109/msp.2018.3761723 article EN IEEE Security & Privacy 2018-09-01

Quantum computing shows great promise for the solution of many difficult problems, such as simulation quantum systems and factorization large numbers. While theory is fairly well understood, it has proved to implement computers in real physical systems. It recently been shown that nuclear magnetic resonance (NMR) can be used small using spin states nuclei carefully chosen molecules. Here we demonstrate use a NMR computer based on pyrimidine base cytosine, implementation algorithm solve...

10.1063/1.476739 article EN The Journal of Chemical Physics 1998-08-01

The authors analyze the computational power and limitations of recently proposed 'quantum adiabatic evolution algorithm'. Adiabatic quantum computation is a novel paradigm for design algorithms; it truly in sense that can be used to speed up searching by quadratic factor over any classical algorithm. On question whether this new may efficiently solve NP-complete problems on computer, we show usual query complexity arguments cannot rule out polynomial time solution. other hand, argue approach...

10.1109/sfcs.2001.959902 preprint EN 2001-01-01

We investigate how a classical private key can be used by two players, connected an insecure one-way quantum channel, to perform communication of information. In particular, we show that in order transmit n qubits privately, 2n bits shared are necessary and sufficient. This result may viewed as the analogue one-time pad encryption scheme.

10.1109/sfcs.2000.892142 article EN 2002-11-07

We examine the number T of queries that a quantum network requires to compute several Boolean functions on {0,1}^N in black-box model. show that, model, exponential speed-up obtained for partial (i.e. problems involving promise input) by Deutsch and Jozsa Simon cannot be any total function: if algorithm computes some function f with bounded-error using then there is classical deterministic exactly O(T^6) queries. also give asymptotically tight characterizations all symmetric exact,...

10.48550/arxiv.quant-ph/9802049 preprint EN other-oa arXiv (Cornell University) 1998-01-01

In this paper, we show the equivalence of set unitaries computable by circuits over Clifford and T library ring $\mathbb{Z}[\frac{1}{\sqrt{2}},i]$, in single-qubit case. We report an efficient synthesis algorithm, with exact optimality guarantee on number Hadamard gates used. conjecture that sets implementable $\mathbb{Z}[\frac{1}{\sqrt{2}},i]$ holds $n$-qubit

10.26421/qic13.7-8-4 article EN Quantum Information and Computation 2013-05-01

Decomposing unitaries into a sequence of elementary operations is at the core quantum computing. Information theoretic arguments show that approximating random unitary with precision $\ensuremath{\epsilon}$ requires $\ensuremath{\Omega}\mathbf{(}\mathrm{log}(1/\ensuremath{\epsilon})\mathbf{)}$ gates. Prior to our work, state art in single qubit included Solovay-Kitaev algorithm $O\mathbf{(}{log}^{3+\ensuremath{\delta}}(1/\ensuremath{\epsilon})\mathbf{)}$ gates and does not use ancillae phase...

10.1103/physrevlett.110.190502 article EN publisher-specific-oa Physical Review Letters 2013-05-08

We study the robustness of bucket brigade quantum random access memory model introduced by Giovannetti et al (2008 Phys. Rev. Lett.100 160501). Due to a result Regev and Schiff (ICALP '08 733), we show that for class error models rate per gate in has be order (where is size memory) whenever used as an oracle searching problem. conjecture this case any realistic will encountered practice, algorithms with super-polynomially many queries must small, which further motivates need correction. By...

10.1088/1367-2630/17/12/123010 article EN cc-by New Journal of Physics 2015-12-07

Currently available quantum computing hardware platforms have limited 2-qubit connectivity among their addressable qubits. In order to run a generic algorithm on such platform, one has transform the initial logical circuit describing into an equivalent that obeys restrictions. this work we construct synthesis scheme takes as input qubit graph and over gate set generated by outputs respects of device. As concrete application, apply our techniques Google's Bristlecone 72-qubit chip...

10.1088/2058-9565/ab79b1 article EN Quantum Science and Technology 2020-02-25

Quantum random-access look-up of a string classical bits is necessary ingredient in several important quantum algorithms. In some cases, the cost such memory (qRAM) limiting factor implementation algorithm. this paper we study fault-tolerantly implementing qRAM. We construct and analyze generic families circuits that function as qRAM, discuss opportunities for qubit-time tradeoffs, estimate their resource costs when embedded surface code.

10.1109/tqe.2020.2965803 article EN cc-by IEEE Transactions on Quantum Engineering 2020-01-01

We examine the number T of queries that a quantum network requires to compute several Boolean functions on {0,1}/sup N/ in black-box model. show that, model, exponential speed-up obtained for partial (i.e. problems involving promise input) by Deutsch and Jozsa Simon cannot be any total function: if algorithm computes some function f with bounded-error using then there is classical deterministic exactly O(T/sup 6/) queries. also give asymptotically tight characterizations all symmetric exact,...

10.1109/sfcs.1998.743485 article EN 2002-11-27

We study the problem of practical realization an abstract quantum circuit when executed on hardware. By practical, we mean adapting to particulars physical environment which restricts/complicates establishment certain direct interactions between qubits. This is a version classical placement problem. theoretical aspects and also present empirical results that match best known solutions have been developed by experimentalists. Finally, discuss efficiency approach scalability its implementation...

10.1109/tcad.2008.917562 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2008-03-27

By applying a quantum search algorithm to various heuristic and provable sieve algorithms from the literature, we obtain improved asymptotic results for solving shortest vector problem on lattices. With computers can provably find in time 21.799n+o(n) , improving upon classical complexities of 22.465n+o(n) Pujol Stehlé 22n+o(n) Micciancio Voulgaris, while heuristically expect 20.268n+o(n) complexity 20.298n+o(n) Laarhoven De Weger. These will be an important guide selection parameters...

10.1007/s10623-015-0067-5 article EN cc-by Designs Codes and Cryptography 2015-04-13

We consider quantum circuits composed of Clifford and $T$ gates. In this context the gate has a special status since it confers universal computation when added to (classically simulable) However can be very expensive implement fault-tolerantly. therefore view as resource which should used only necessary. Given an $n$-qubit unitary $U$ we are interested in computing circuit that implements using minimum possible number gates (called $T$-count $U$). A related task is decide if less than or...

10.26421/qic14.15-16-1 article EN Quantum Information and Computation 2014-11-01
Coming Soon ...