Dissecting "Hidden-State Proofs of Quantumness"

In this session, we will break out into subgroups to work through the mathematics in the paper "Hidden-State Proofs of Quantumness" (https://arxiv.org/abs/2410.06368).

Each group will have at least one person with familiarity in cryptography familiarity to guide the process.

Participants should read the paper before the session, but are not expected to have grasped all of its concepts.

Shor's Algorithm, Part I (of II)

In 1994, the field of quantum computing had a significant breakthrough when Peter Shor introduced a quantum algorithm that factors integers in (probabilistic) polynomial time.  In these talks, I'll explain the mathematical aspects of Shor's algorithm.
Part II will follow on 3/5.

Hidden-State Proofs of Quantumness and the Discrete Fourier Transform

Abstract: A cryptographic proof of quantumness is a hypothetical test that could be used to prove a quantum computational advantage based on hardness assumptions from cryptography.  An experimental realization of such a test would be a major milestone in the development of quantum computation.  However, error tolerance is a persistent challenge for implementing such tests: we need a test that not only can be passed by an efficient quantum prover, but one that can be passed by a prover that exhibits a certain amount of computational error.

Hidden-State Proofs of Quantumness and the Discrete Fourier Transform

A cryptographic proof of quantumness is a hypothetical test that could be used to prove a quantum computational advantage based on hardness assumptions from cryptography.  An experimental realization of such a test would be a major milestone in the development of quantum computation.  However, error tolerance is a persistent challenge for implementing such tests: we need a test that not only can be passed by an efficient quantum prover, but one that can be passed by a prover that exhibits a certain amount of computational error.

Introduction to Quantum Error Correction Part 2: Geometrically Local Quantum Codes

The goal of this talk is to give an overview of the advantages and disadvantages of having geometric locality in quantum error-correcting codes. Starting with an introduction to the surface code, I will highlight the nice features of a geometrically local 2D stabilizer code. However, we will also examine the limitations that arise from imposing geometric locality, and how these limitations come about, particularly with regard to the code parameters and the allowable set of logical gates.

Minimizing Resources for Cryptographic Proofs of Quantumness

How can we reliably test whether a quantum computer has achieved an advantage over existing classical computers?  A promising approach is to base these tests ("proofs of quantumness") on cryptographic hardness assumptions.  Such assumptions are the foundation for encryption and authentication protocols, and as such they are well-studied.  Brakerski et al.

Circuit QED Lattices: From Synthetic Quantum Systems to Spectral Graph Theory

After two decades of development, superconducting circuits have emerged as a rich platform for quantum computation and simulation. When combined with superconducting qubits, lattices of coplanar waveguide (CPW) resonators can be used to realize artificial photonic materials or photon-mediated spin models. Here I will highlight the special properties of this hardware implementation that lead to these lattices naturally being described as line graphs.

Group Theory and the Post-Quantum Security of SHA-3

In this talk, I will describe a significant open problem in post-quantum cryptography: specifically the quantum security of the sponge construction with invertible permutations (which, among other things, underlies the international hash standard SHA-3). I will motivate the query model in which this problem is usually stated, and give intuition for why it is hard. Then we'll explore some recent progress on this question based on applying the theory of Young subgroups, explained in a beginner-friendly way.