ORIGINAL RESEARCH article

Front. Comput. Sci., 16 May 2025

Sec. Theoretical Computer Science

Volume 7 - 2025 | https://doi.org/10.3389/fcomp.2025.1519212

Shallow implementation of quantum fingerprinting with application to quantum finite automata

  • 1. Institute of Computational Mathematics and Information Technologies, Kazan Federal University, Kazan, Russia

  • 2. Faculty of Computing, University of Latvia, Riga, Latvia

  • 3. Zavoisky Physical-Technical Institute, FRC Kazan Scientific Center of RAS, Kazan, Russia

Article metrics

View details

5

Citations

1,9k

Views

381

Downloads

Abstract

Quantum fingerprinting is a technique that maps a classical input word to a quantum state. The obtained quantum state is much shorter than the original word, and its processing uses fewer resources, making it useful in quantum algorithms, communication, and cryptography. One of the examples of quantum fingerprinting is the quantum automata algorithm for languages, where p is a prime number. However, implementing such an automaton on current quantum hardware is not efficient. Quantum fingerprinting maps a word x∈{0, 1}n of length n to a state |ψ(x)〉 of O(logn) qubits, and uses O(n) unitary operations. Computing quantum fingerprint using all available qubits of the current quantum computers is infeasible due to many quantum operations. To make quantum fingerprinting practical, we should optimize the circuit for depth instead of width, in contrast to the previous works. We propose explicit methods of quantum fingerprinting based on tools from additive combinatorics, such as generalized arithmetic progressions (GAPs), and prove that these methods provide circuit depth comparable to a probabilistic method. We also compare our method to prior work on explicit quantum fingerprinting methods. We provide a series of numerical experiments with implementation of the quantum automata for MOD17 language on noisy simulators of IBMQ quantum devices. We show that shallow implementation based on GAPs produces results with much smaller computational error compared to standard deep circuit implementation. Despite the fact that on the ideal quantum computational device, the opposite situation arises. We show that the shallow circuit for the quantum automaton is better for near-future quantum computational devices.

1 Introduction

A quantum finite state automaton (QFA) is a generalization of a classical finite automaton (Say and Yakaryılmaz, 2014; Ambainis and Yakaryılmaz, 2021). Here we use the simplest QFA model (Moore and Crutchfield, 2000). Formally, a QFA is 5-tuple , where Q = {q1, …, qD} is a finite set of states, A is the finite input alphabet, ¢, $ are the left and right end-markers, respectively. The state of M is represented as a vector , where is the D-dimensional Hilbert space spanned by {|q1〉, …, |qD〉} (here |qj〉 is a zero column vector except its j-th entry that is 1). The automaton M starts in the initial , and makes transitions according to the operators of unitary matrices. After reading the whole input word, the final state is observed with respect to the accepting subspace .

Quantum fingerprinting provides a method of constructing automata for certain problems. It maps an input word w∈{0, 1}n to much shorter quantum state, its fingerprint , where Uw is the single transition matrix representing the multiplication of all transition matrices while reading w and . The number of qubits in a fingerprint m can be exponentially less than the length of the word n. An example of such an automaton was first presented in the study by Ambainis and Freivalds (1998) and then improved as provided in the study by Ambainis and Nahimovs (2009). This result is discussed in this section. Quantum fingerprint captures essential properties of the input word that can be useful for computation.

One example of quantum fingerprinting applications is the QFA algorithms for the MODp language (Ambainis and Nahimovs, 2009). For a given prime number p, the language MODp is defined as . Let us briefly describe the construction of the QFA algorithms for MODp.

We start with a 2-state QFA Mk, where k∈{1, …, p−1}. The automaton Mk has two base states Q = {q0, q1}, it starts in the state |ψ0〉 = |q0〉, and it has the accepting subspace spanned by |q0〉. At each step (for each letter), we perform the rotation

If wMODp, then the rotation Ua is applied i = r·p times, for some integer r. In that case, i is a multiple of p. Therefore, the total rotation angle is , which is a multiple of 2π for any k. It means, the automaton is in the state |q0〉 for any k, and it accepts the word with probability 1. It is the correct answer.

However, if wMODp, the probability of correct answer can be close to 0 rather than 1 (i.e., bounded below by 1 − cos2(π/p)). To boost the success probability we use d copies of this automaton, namely, Mk1, …, Mkd, as described below.

The QFA M for MODp has 2d states: Q = {q1, 0, q1, 1, …, qd, 0, dd, 1}, and it starts in the state . In each step, it applies the transformation defined as follows:

Indeed, M enters into equal superposition of d sub-QFAs, and each sub-QFA applies its rotation. Thus, quantum fingerprinting technique associates the input word w = aj with its fingerprint

Ambainis and Nahimovs (2009) proved that this QFA accepts the language MODp with error probability that depends on the choice of the coefficients ki's. They also showed that for d = 2log(2p)/ε there is at least one choice of coefficients ki's such that the error probability is less than ε. The proof uses a probabilistic method, so these coefficients are not explicit. They also suggest two explicit sequences of coefficients: cyclic sequence for primitive root g modulo p and more complex AIKPS (Ajtai, Iwaniec, Komlós, Pintz, Szemerédi) sequences based on the results presented in the study by Ajtai et al. (1990).

Quantum fingerprinting is versatile and has several applications. Buhrman et al. (2001) in their study provided an explicit definition of quantum fingerprinting for constructing an efficient quantum communication protocol for equality checking. The technique was applied to branching programs in the studies by Ablayev and Vasiliev (2009, 2011, 2013b); this computational model can be considered as a non-uniform automata. They show examples of Boolean functions that can be computed by a quantum branching program with exponentially smaller complexity (width or states in terms of automata) than the deterministic ones. Based on this research, they developed the concept of cryptographic quantum hashing (Ablayev and Vasiliev, 2013a, 2014; Ablayev et al., 2014; Ablayev and Ablayev, 2015). Later, they generalized the technique and suggested a family of quantum hashes that allow us to see a trade-off between one-way resistance and collision resistance of the hash function (Ablayev et al., 2016a; Vasiliev, 2016a; Vasiliev et al., 2017; Ablayev et al., 2020). The question of computing cryptographic quantum hashes with a restricted size of memory was discussed in the study by Ablayev et al. (2018b). Connection of the approach with Quantum Fourier transom where presented in the study by Ablayev and Vasiliev (2020); Khadieva (2024). A survey on cryptographic quantum hashes can be found in the study by Ablayev et al. (2016b, 2018a). The experimental implementation on real devices was considered in the study by Vasiliev et al. (2019); Turaykhanov et al. (2021), and optimization for emulators of quantum computers was explored in the study by Zinnatullin et al. (2023). Different versions of hash functions were applied that are hash functions in the case of finite Abelian groups (Vasiliev, 2016c) and arbitrary groups (Ziatdinov, 2016b); functions based on graphs (Ziatdinov, 2016a; Zinnatullin, 2023). The technique was extended to qudits (Ablayev and Vasiliev, 2022; Vasiliev, 2023). This approach has been widely used in various areas such as

  • stream processing algorithms (Le Gall, 2009, 2006). Here, the technique allows authors to obtain an advantage in memory size for a quantum version of the model.

  • Query model algorithms (Ablayev et al., 2022, 2024). Here, the quantum fingerprinting algorithm is applied as a base for the quantum algorithm for the string-matching problem. The algorithm uses less memory compared to existing quantum algorithms (Ramesh and Vinay, 2003; Montanaro, 2017; Khadiev and Serov, 2025).

  • Online algorithms (Khadiev and Khadieva, 2021, 2022). Here, authors present a problem that can be solved by quantum online algorithms with restricted memory size (Khadiev et al., 2018, 2022b, 2023), but cannot be solved by randomized or deterministic counterparts in the case of logarithmic memory size.

  • branching programs (Khadiev and Khadieva, 2017; Khadiev et al., 2022a; Ablayev et al., 2016c, 2018a). In these studies, authors present a specially constructed Boolean function that allows them to show a hierarchy of complexity classes for quantum read-k-times branching programs. The upper bound was proven using the quantum fingerprinting technique. For read-1-times branching programs, researchers (Gainutdinova, 2002; Ablayev et al., 2005; Ablayev and Vasiliev, 2009, 2013b) presented a Boolean function that can be computed by a quantum model with smaller complexity than by classical models.

  • Development of quantum devices (Vasiliev, 2016b).

  • Automata. The technique was introduced for automata model (Ambainis and Freivalds, 1998) and later improved in a study by Ambainis and Nahimovs (2009). At the same time, the same technique for the constant number of qubits was used for two-way automata with classical and quantum states (Ambainis et al., 2002; Ambainis and Watrous, 2002; Yakaryilmaz, 2013; Yakaryılmaz and Say, 2009). It allows authors to show a language that can be recognized by the model but cannot be recognized by the probabilistic two-way automata.

    Later, the same idea was used for one-way automata and promise problems (Ambainis and Yakaryılmaz, 2021; Gainutdinova and Yakaryılmaz, 2017; Yakaryılmaz and Say, 2010; Gainutdinova and Yakaryılmaz, 2018, 2015; Hu et al., 2020; Nakanishi and Yakaryılmaz, 2015).

At the same time, the technique is not practical for the currently available real quantum computers. The main obstacle is that quantum fingerprinting uses an exponential (in the number m of qubits) circuit depth (e.g., see Khadieva and Ziatdinov, 2023; Birkan et al., 2021; Salehi and Yakaryılmaz, 2021; Zinnatullin et al., 2023 for some implementations of the aforementioned automaton M). Therefore, the required quantum volume1VQ is roughly 2|w2m. For example, IBM reports (IBM, 2022) that its Falcon r5 quantum computer has 27 qubits with a quantum volume of 128. It means that we can use only 7 of the 27 qubits for the fingerprint technique.

This study investigates how to obtain better circuit depth by optimizing the coefficients used by M: k1, …, kd. We use generalized arithmetic progressions to generate a set of coefficients and show that such sets have a circuit depth comparable to the set obtained by the probabilistic method.

Additionally, we implement the circuit for the noisy emulator of the IBMQ quantum machine (IBM, 2025). The emulator emulates the behavior of real IBMQ quantum machines and allows us to see the results closely compared to the results we can obtain on real machines. Note that IBMQ is a device that allows to invoke of a quantum circuit with universal basic gates. Therefore, we can implement any unitary transformation on this machine that gives us universality (Möttönen et al., 2004). At the same time, the current quantum devices are in the Noisy Intermediate-Scale Quantum (NISQ) era (Preskill, 2018), which is why the noise and other effects do not allow for the implementation of any quantum algorithm. Our shallow circuit will enable us to obtain useful results for the quantum fingerprinting algorithm for MOD17 language on 4 qubits. At the same time, it is known that we cannot recognize this language using classical automata with 4 qubits of memory (Ambainis and Freivalds, 1998). Moreover, the standard circuit for the quantum fingerprinting algorithm (not the shallow one) does not give us any useful results, even if it gives a smaller error probability in “ideal” (not noisy) devices.

We summarize the previous and our results in the following list.

  • The cyclic method, for some constant c>0:

  • - the width is pc/loglogp

  • - the depth is pc/loglogp

  • - explored in the study by Ambainis and Nahimovs (2009).

  • The AIKPS method:

  • - the width is log2+3ϵp

  • - the depth is (1+2ϵ)log1+ϵploglogp

  • - explored in the study by Razborov et al. (1993).

  • The probabilistic method:

  • - the width is 4log(2p)/ε

  • - the depth is 2log(2p)/ε

  • - explored in Ambainis and Nahimovs (2009).

  • The GAPs method (this study):

  • - the width is p2

  • - the depth is ⌈logp−2logε⌉+2

  • - developed in this study.

Note that p is exponential in the number of qubits m. The depth of the circuits is discussed in Section 3.

The study is an extended version of the Ziiatdinov et al. (2023) conference paper presented at the AFL2023 conference.

In addition, we perform computational experiments for computing parameters K that minimize the error probability for our circuit and the standard circuit. We show that in the case of an “ideal” non-noisy quantum device, the error probability for the proposed circuit is at most twice as large as that of the standard circuit. At the same time, in the case of noisy quantum devices (current and near-future ones), the error probability is much less than that of the standard circuit, and allows us to implement QFA for MOD17 language using 4 qubits.

The rest of the article is organized as follows. In Section 2, we give the necessary definitions and results on quantum computation and additive combinatorics to follow the rest of the article. Section 3 contains the construction of the shallow fingerprinting function and the proof of its correctness. Then, we present several numerical simulations in Section 4. We conclude the article with Section 5 by presenting some open questions and discussions for further research.

2 Preliminaries

Let us denote by two-dimensional Hilbert space, and by 2m-dimensional Hilbert space (i.e., the space of m qubits). We use bra- and ket-notations for vectors in Hilbert space. For any natural number N, we use ℤN to denote the cyclic group of order N.

Let us describe in detail how the automaton M works. As we outlined in the introduction, the automaton M has 2d states: Q = {q1, 0, q1, 1, …, qd, 0, dd, 1}, and it starts in the state . After reading a symbol a, it applies the transformation Ua defined by Equations 1, 2:

After reading the right endmarker $, it applies the transformation U$ defined in such way that U$0〉 = |q1, 0〉. The automaton measures the final state and accepts the word if the result is q1, 0.

So, the quantum state after reading the input word w = aj is

If j≡0 (mod p), then |ψ〉 = |ψ0〉, and U$ transforms it into accepting state |q1, 0〉, therefore, in this case, the automaton always accepts. If the input word wMODp, then the quantum state after reading the right endmarker $ is

and the error probability is

In simpler terms, the automaton maintains d angles in different subspaces. After encountering the symbol a, the automaton performs d rotations: it rotates by 2πki/p in the i-th subspace. Since rotating p times would have the same result as not rotating at all, the automaton counts the number of a symbols modulo p. The coefficients ki ensure that the small error probability: even if some of angles are close to 0, other subspaces are far from 0, so the whole state is far from the state q1, 0.

In the rest of the article, we denote by m the number of qubits in the quantum fingerprint, by d = 2m the number of parameters in the set K, by p the size of domain of the quantum fingerprinting function, and by Ua(K) the transformation defined above, which depends on the set K.

Let us also define a function as follows:

Note that Pe ≤ ε(K).

We also use some tools from additive combinatorics. We refer the reader to the textbook by Tao and Vu (2006) for a deeper introduction to additive combinatorics.

An additive set AZ is a finite non-empty subset of Z, an abelian group with group operation +. We refer to Z as the ambient group.

If A, B are additive sets in Z, we define the sum set A+B = {a+baA, bB}. We define additive energy E(A, B) between A, B to be

Let us denote by e(θ) = e, and by ξ·x = ξx/p bilinear form from ℤp×ℤp into ℝ/ℤ. Fourier transform of f:ℤp → ℤp is .

We also denote the characteristic function of the set A as 1A, and we define .

Definition 1 (Tao and Vu, 2006). Let Z be a finite additive group. If AZ, we define Fourier bias of the set A to be

Basically, the additive energy E(A, A) and the Fourier bias tell how “structured” the set A is with respect to addition. The additive energy E(A, A) measures how many pairwise sums a+a′ of elements a, a′∈A coincide; for a random set we expect many different pairwise sums, and for an arithmetic progression the pairwise sums mostly coincide.

There is a connection between the Fourier bias and the additive energy.

Theorem 1 (Tao and Vu, 2006). Let A be an additive set in a finite additive group Z. Then

Definition 2 (Tao and Vu, 2006). A generalized arithmetic progression (GAP) of dimension d is a set

where x0, x1, …, xd, N1, …, NdZ. The size of GAP is a product N1Nd. If the size of set A, |A|, equals to N1Nd, we say that GAP is proper.

The GAPs generalize the usual notion of arithmetic progressions by allowing multiple differences x1, …, xd instead of just one x1. The proper GAP has differences such that its elements are all distinct, i.e., its elements cannot be represented as a sum of differences in two ways.

3 Shallow fingerprinting

Quantum fingerprint can be computed using the quantum circuit shown in Figure 1. The last qubit is rotated by a different angle 2πkjx/q in different subspaces enumerated by |j〉. The circuit rotates the qubit for all possible angles. The j-th rotation is controlled by first m qubits and applied if the values of these qubits are j. Therefore, the circuit depth is |K| = t = 2m. As the set K is random, the depth is unlikely to be less than |K|.

Figure 1

Figure 1

Deep fingerprinting circuit example. Gate Uj is a rotation Ry(4πkjx/p) for j∈{0, …2m−1}. Here, we have m control qubits. All possible values from 0 to 2m−1 are encoded by all binary strings of length m. These values are presented as control values for control rotation gates Uj such that Uj is applied if the value of control qubits is j.

Let us note that fingerprinting is similar to the quantum Fourier transform. Quantum Fourier transform computes the following transformation:

where ωN = e(1/N). Here is the quantum fingerprinting transform:

The depth of the circuit that computes quantum Fourier transform is O((logN)2), and it heavily relies on the fact that in Equation 3 the sum runs over all k = 0, …, N−1. Therefore, to construct a shallow fingerprinting circuit, we desire to find a set K with a special structure.

Suppose that we construct a coefficient set K⊂ℤp in the following way. We start with a set T = {t1, …, tm} and construct the set of coefficients as a set of sums of all possible subsets:

where we sum modulo p.

The quantum fingerprinting function with these coefficients can be computed by a circuit of depth O(m) (Kālis, 2018) (see Figure 2).

Figure 2

Figure 2

Shallow fingerprinting circuit example. Gate Rj is a rotation Ry(4πtjx/p) for j∈{0, …m}. Here, we have m control qubits.

Finally, let us prove why the construction of the set K⊂ℤp works.

Theorem 2. Let ε>0, let m = ⌈logp−2logε⌉ and d = 2m.

Suppose that the number t0∈ℤp and the set T = {t1, …, tm}⊂ℤp are such that

is a proper GAP.

Then the set A defined as

has ε(A) ≤ ε.

Let us outline the proof of this theorem. First, we estimate the number of solutions to a+b = n. Second, we use it to bound the additive energy E(A, A) of the set A. Third, we bound the Fourier bias . Finally, we get a bound on ε(A) in terms of p and m.

Proof. Let us denote a set Rn(A) of solutions to a+b = n, where a, bA and n∈ℤp:

Note that we have .

Suppose that n is represented as , γi∈{0, 1, 2}. It is unique if such a representation exists because B is a proper GAP. Let us denote c0: = {i∣γi = 0}, c1: = {i∣γi = 1}, c2: = {i∣γi = 2}. It is clear that c0c1c2 = [m].

Suppose that n = a+b for some a, bA. But and , αi, βi∈{0, 1}. We get that if ic0 or ic2 then the corresponding coefficients αi and βi are uniquely determined. Consider ic1. Then we have two choices: either αi = 1;βi = 0, or αi = 0;βi = 1. Therefore, we have .

We have that

Using the fact that |c0(n, A)|+|c1(n, A)|+|c2(n, A)| = m, we see that

We can bound the Fourier bias by Theorem 1:

Finally, we have

We prove the theorem by substituting the definitions of d and m.                     ⎕

Corollary 1. The depth of the circuit that computes Ua(A) is ⌈logp−2logϵ⌉.

Theorem 3 (Circuit depth for AIKPS sequences). For given ε>0, let

where r−1 is the inverse of r modulo p.

Then the depth of the circuit that computes Ua(T) is less than (1+2ϵ)log1+ϵploglogp.

Proof. Let us denote the elements of R by r1, r2, …. Let S·{r−1} be a set {s·r−1sS}.

Consider the following circuit (see Figure 3) with w = ⌈(1+2ε)loglogp⌉+1 wires.

Figure 3

Figure 3

Circuit for AIKPS subsequence. Gate Rj is a rotation . Gate Rj, k is a rotation .

The circuit has depth ⌈(1+2ε)loglogp⌉+1 and computes the transformation . By repeating the same circuit for all rjR we get the required circuit for Ua(T) (see Figure 4).

Figure 4

Figure 4

Circuit for Ua(T). Gate Rj is a rotation . Gate Rj, k is a rotation .

Since |R| < (logp)1+ε, we obtain that the depth of the circuit Ua(T) is less than

                             ⎕

4 Numerical experiments

We conduct the following numerical experiments. We compute sets of coefficients K for the automaton for the language MODp with minimal computational error.

Finding an optimal set of coefficients is an optimization problem with many parameters, and the running time of a brute force algorithm is large, especially with an increasing number m of control qubits and large values of parameter p. Then, the original automaton has 2d states, where d = 2m. We observe circuits for several m values and use a heuristic method for finding the optimal sets K with respect to an error minimization. For this purpose, the coordinate descent method (Wright, 2015) is used.

We find an optimal set of coefficients for different values of p and m and compare computational errors of original and shallow fingerprinting algorithms for the automaton (see Figure 5). Namely, we set m = 3, 4, 5 and find sets using the coordinate descent method for each case that minimizes ε(K). Even heuristic computing, for s>5, takes exponentially more computational time andis hard to implement on our devices.

Figure 5

Figure 5

Computational errors for m = 3, 4, 5 of original and shallow automata.

One can note that the difference between errors increases with increasing m, especially for higher values of p. The program code and numerical data are presented in a git repository (Khadieva, 2023).

The graphics in Figure 6 show a proportion of the errors of the original automaton over the errors of the shallow automaton for m = 3, 4, 5 and the prime numbers until 1013.

Figure 6

Figure 6

Proportions of the shallow automaton errors over the original automaton errors for m = 3, 4, 5 and different values of p.

As we see, for a number of control qubits m = 3, the difference between the original and shallow automata errors is approximately constant. The ratio of values fluctuates between 1 and 1.2. In the case m = 4, this ratio is approximately 1.5 for almost all observed values p. The ratio of errors is nearly between 1.5 and 3, for m = 5.

According to the results of our experiments, the circuit depth m+1 is enough for valid computations, while the original circuit uses O(2m) gates. Since the shallow circuit is much simpler than the original one, its implementation on real quantum machines is much easier. For instance, in such machines as IBMQ Manila or Baidu quantum computer, a “quantum computer” is represented by a linearly connected sequence of qubits. CX-gates can be applied only to the neighbor qubits. For such a linear structure of qubits, the shallow circuit can be implemented using 3m+3 CX-gates. Whereas a nearest-neighbor decomposition (Bergholm et al., 2005) of the original circuit requires O(dlogd) = O(m2m) CX-gates.

4.1 Numerical experiments for a noisy device

The numerical experiments presented above were performed on an abstract machine with no noise, that is, all operators and measurements are always correct. In contrast, current real quantum devices are the NISQ era machines (Preskill, 2018), which means that each operator is noisy. Therefore, we invoke a new series of computational experiments to find a set of coefficients K for the automaton that recognizes the language MODp, so that we can separate members and non-members of the language when implementing the automaton on a noisy simulator of the IBMQ quantum machine. As an example, we set the p = 17 and m = 3 control qubits. So, our device uses 4 qubits. At the same time, it is known that any deterministic device needs at least 5 classical bits to recognize the MOD17 language (Ambainis and Freivalds, 1998).

For these parameters, we invoke a brute-force algorithm to find the set K that satisfies two conditions:

  • The probability of accepting member words should be as high as possible.

  • The probability of accepting non-member words should be as small as possible.

For this reason, we minimize a value diff = P(6·p)−max{P(r):r mod p≠0, 1 ≤ r ≤ 6·p+9}, where P(i) is the acceptance probability for a word of length i. The resulting set is K = {4, 8, 12, 6}. After that, we execute the circuit for this automaton on input words of length at most 7·p+9 = 128. We use an optimization of the circuit from a study by Khadieva et al. (2024) that allows us to use the Rz operator instead of the Ry operator. It is presented in Figure 7.

Figure 7

Figure 7

Shallow circuit that uses Rz operators.

It is important to use this optimization because the emulator of a real IBMQ device allows us to use only a limited set of possible gates. For instance, we cannot use the Ry operator, although the Rz gate is available.

We run the program 10,000 times and calculate the number of shots that return the state |0〉 (accepting state). We use the notation for this number, where i is the length of the word. These numbers for each length i for 1 ≤ i ≤ 129 are presented in Section 6 and Figure 8. We can say that it is a statistical representation of probability P(i).

Figure 8

Figure 8

Computational errors for m = 3 of shallow automata for noisy device.

Normally, for the bounded error QFA (Say and Yakaryılmaz, 2014), an input of length i is accepted if the probability of observing an accepting state is P(i)>0.5+ε for some ε>0 and is rejected if P(i) < 0.5−ε. In terms of the number of shots that return the accepting state in our experiment, we can say that the word is accepted if , and rejected if . In that case, we can execute an algorithm once, return its answer, and the result will be correct with probability more than one half. In that case, we can recognize only the word of length i = p because only , and for any ip due to the results of our numerical experiments. So, the automaton rejects all other words, including members and non-members.

Another type of QFA in terms of acceptance criteria is a QFA with an isolated cut-point (Chadha et al., 2013; Bertoni, 1975; Bertoni et al., 1977; Gimbert and Oualhadj, 2010; Rabin, 1963). In that case, we choose two constants 0 < λ < 1 and 0 < ε < min{λ, 1−λ}. A word of length i is accepted if P(i)>λ+ε, and rejected if P(i) < λ−ε. For our numerical experiments, we can set a threshold (or a cut-point) and accept a word of length i if ; and reject a word of length i if .

Analyzing the results of the experiments, we can say that each member i of MODp has . At the same time, each non-member i has .

So, we can choose any threshold . Here we choose the middle of the interval for more statistical safety. Finally, we can say that our algorithm accepts a word of length i if , and rejects it if .

The criteria based on isolated cut-point are not as good as in the bounded error automata, but are also useful. For practical implementation, we should invoke our algorithm at least O(1/λ) times to have a reasonable statistic that approximates P(i).

We perform similar experiments for the standard circuit for the automaton for the MODp language. Since m = 3, we need to calculate 2m = 8 integer parameters as coefficients for the rotation angles. For this case, using the brute force algorithm for parameter finding is unrealistic because the standard circuit execution on the IBMQ simulator takes much more time than in the case of the shallow circuit execution. We use three approaches:

  • The coordinate descent method (Wright, 2015) for finding the first six parameters and the brute force approach for calculating the last two parameters.

  • Simulated annealing algorithm (Press, 1992) for finding all parameters.

  • Genetic algorithm (Mitchell, 1998) for finding all parameters.

The objective function for minimization is mod p≠0, 1 ≤ r ≤ 2·p+10}. We compute , which is the number of shots that return the state |0〉 (accepting state).

We use these three algorithms, obtain the results, and choose the best result among them. The target parameters are K = {14, 9, 6, 7, 10, 4, 2, 16}.

Then we invoke the circuit for the automaton using these parameters on input words of length at most 7·p+9 = 128. The program is executed 10,000 times, and we calculate . These numbers are presented in Section 6 and Figure 9.

Figure 9

Figure 9

Computational errors for m = 3 of original automata with deep circuit for noisy device.

When analyzing the data, we can see that no member word i has , which means that the probability P(i) < 0.5 for any input i. Therefore, if the automaton is the QFA with bounded error, we cannot separate members from non-members using this acceptance criterion.

However, if the automaton is the QFA with an isolated cut-point, then we can see that several members of the language, for instance, i = p, i = 2p, i = 4p, and i = 7p, can be separated from non-members. Nevertheless, other members of MODp are not separable from non-members, for example, i = 3p, i = 5p, and i = 6p. In addition, we can note that the number . Our algorithm cannot find a set K that violates this condition. At the same time, we can ignore the case i = 1 because it can be processed separately. Even if we fix the issue with i = 1, the algorithm still detects only some members. For the members i = p, i = 2p, i = 4p, and i = 7p, the minimal value of is 828. For the non-members except i = 1, the maximum value of is 823. As a threshold , we can choose 824 or 825. Nevertheless, we cannot separate the members i = 3p, i = 5p, and i = 6p from non-members for any threshold.

Note that in the case of the shallow circuit, is much higher than in the case of the standard circuit. For instance, for the shallow circuit, which corresponds to P(p)>0.51; while for the standard circuit, the corresponding probability would be much smaller than 0.5 (approximately 0.1).

Finally, we can see that the shallow circuit is more efficient on noisy devices (emulators) than the standard circuit. However, in the case of an “ideal” noise-free device, we have an opposite situation.

5 Conclusion

We show that generalized arithmetic progressions generate some sets of coefficients ki for the quantum fingerprinting technique with provable properties. These sets have large sizes, but their depth is small and comparable to that of the sets obtained by the probabilistic method. These sets can be used to implement quantum finite automata on current quantum hardware.

We perform numerical simulations. In the case of “ideal” (noise-free) devices, the experiments show that the error probability for the shallow circuit is close to the error probability for the standard circuit. At the same time, we show that the shallow circuit is much more efficient than the standard circuit when implemented on IBMQ noisy device simulators.

The depth optimization of quantum finite automata is also an open question. The lower bound on the size of K with respect to p and ε is already known (Ablayev et al., 2016b). Therefore, for given p and ε, quantum finite automata cannot have less than O(logp/ε) states. However, to our knowledge, a lower bound on the circuit depth of the transition function implementation is unknown. Thus, we pose an open question: Is it possible to implement a transition function with a depth less than O(logp)? What is the lower bound?

6 Numerical experiments for noisy devices

The data for the shallow circuit for fingerprinting are tabulated in Table 1.

Table 1

The length of a word 1 2 3 4 5 6 7 8 9 10
The number of accepted shorts 122 925 61 92 187 539 184 91 77 237
The length of a word 11 12 13 14 15 16 17 18 19 20
The number of accepted shorts 514 273 142 149 737 571 6,439 570 875 312
The length of a word 21 22 23 24 25 26 27 28 29 30
The number of accepted shorts 240 293 586 348 231 235 271 604 348 181
The length of a word 31 32 33 34 35 36 37 38 39 40
The number of accepted shorts 268 626 793 3,870 691 701 462 377 432 557
The length of a word 41 42 43 44 45 46 47 48 49 50
The number of accepted shorts 471 354 358 365 603 402 412 360 737 845
The length of a word 51 52 53 54 55 56 57 58 59 60
The number of accepted shorts 2,608 756 613 453 427 564 665 466 440 396
The length of a word 61 62 63 64 65 66 67 68 69 70
The number of accepted shorts 497 560 494 463 523 671 701 1,981 758 754
The length of a word 71 72 73 74 75 76 77 78 79 80
The number of accepted shorts 529 468 595 594 600 385 473 570 567 579
The length of a word 81 82 83 84 85 86 87 88 89 90
The number of accepted shorts 501 435 667 717 2,011 775 679 544 532 512
The length of a word 91 92 93 94 95 96 97 98 99 100
The number of accepted shorts 626 586 495 552 541 631 472 524 448 641
The length of a word 101 102 103 104 105 106 107 108 109 110
The number of accepted shorts 678 1,527 702 688 495 498 561 621 587 527
The length of a word 111 112 113 114 115 116 117 118 119 120
The number of accepted shorts 521 457 632 556 518 546 692 697 1,021 694
The length of a word 121 122 123 124 125 126 127 128
The number of accepted shorts 608 558 631 546 568 560 421 582

The number of shots that return accepting state for different lengths of the word for the shallow automaton of MOD17 on a noisy device.

The total number of shorts is 10000. The length of word that is multiple of p is marked with bold font.

The data for the standard circuit for fingerprinting are tabulated in Table 2.

Table 2

The length of a word 1 2 3 4 5 6 7 8 9 10
The number of accepted shorts 4,042 82 654 388 217 463 280 210 364 318
The length of a word 11 12 13 14 15 16 17 18 19 20
The number of accepted shorts 596 459 311 419 465 558 1,005 589 324 547
The length of a word 21 22 23 24 25 26 27 28 29 30
The number of accepted shorts 561 366 467 446 528 649 823 459 622 659
The length of a word 31 32 33 34 35 36 37 38 39 40
The number of accepted shorts 372 441 735 1,053 662 410 450 637 618 507
The length of a word 41 42 43 44 45 46 47 48 49 50
The number of accepted shorts 614 623 524 517 545 534 608 626 476 634
The length of a word 51 52 53 54 55 56 57 58 59 60
The number of accepted shorts 746 712 604 500 531 513 624 571 602 571
The length of a word 61 62 63 64 65 66 67 68 69 70
The number of accepted shorts 475 635 558 569 654 549 767 1,160 727 603
The length of a word 71 72 73 74 75 76 77 78 79 80
The number of accepted shorts 631 607 565 617 576 564 542 609 625 620
The length of a word 81 82 83 84 85 86 87 88 89 90
The number of accepted shorts 573 610 622 617 712 630 629 591 628 566
The length of a word 91 92 93 94 95 96 97 98 99 100
The number of accepted shorts 647 623 579 608 654 649 629 611 625 593
The length of a word 101 102 103 104 105 106 107 108 109 110
The number of accepted shorts 654 682 628 592 604 628 639 589 614 652
The length of a word 111 112 113 114 115 116 117 118 119 120
The number of accepted shorts 625 637 599 606 612 684 648 627 828 655
The length of a word 121 122 123 124 125 126 127 128
The number of accepted shorts 603 662 635 637 591 651 613 624

The number of shots that return accepting state for different lengths of the word for the original automaton of MOD17 on a noisy device.

The total number of shorts is 10000. The length of word that is multiple of p is marked with bold font.

Statements

Data availability statement

The datasets presented in this study can be found in online repositories. The names of the repository/repositories and accession number(s) can be found in the article/supplementary material.

Author contributions

MZ: Conceptualization, Formal analysis, Investigation, Methodology, Project administration, Writing – original draft. AK: Data curation, Formal analysis, Investigation, Methodology, Validation, Writing – original draft. KK: Data curation, Formal analysis, Investigation, Methodology, Visualization, Writing – review & editing.

Funding

The author(s) declare that financial support was received for the research and/or publication of this article. The study was funded by the subsidy allocated to Kazan Federal University for the state assignment in the sphere of scientific activities (Project No. FZSM-2024-0013). The research in Section 4.1 is supported by Russian Science Foundation Grant 24-21-00406, https://rscf.ru/en/project/24-21-00406/. MZ acknowledges financial support under the National Recovery and Resilience Plan (PNRR), Mission 4, Component 2, Investment 1.4, Call for tender No. 1031 published on 17/06/2022 by the Italian Ministry of University and Research (MUR), funded by the European Union-NextGenerationEU, Project Title “National Centre for HPC, Big Data and Quantum Computing (HPC)”-Code National Center CN00000013-CUP D43C22001240001.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Generative AI statement

The author(s) declare that no Gen AI was used in the creation of this manuscript.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Footnotes

1.^ Quantum volume is an exponent of the maximal square circuit size that can be implemented on the quantum computer (Cross et al., 2019; Wack et al., 2021).

References

  • 1

    Ablayev F. Ablayev M. (2015). On the concept of cryptographic quantum hashing. Laser Phys. Lett. 12:125204. 10.1088/1612-2011/12/12/125204

  • 2

    Ablayev F. Ablayev M. Khadiev K. Salihova N. Vasiliev A. (2022). “Quantum algorithms for string processing,” in Mesh Methods for Boundary-Value Problems and Applications, Vol. 141 (Lecture Notes in Computational Science and Engineering), 114. 10.1007/978-3-030-87809-2_1

  • 3

    Ablayev F. Ablayev M. Khadiev K. Vasiliev A. (2018a). Classical and quantum computations with restricted memory. LNCS11011, 129155. 10.1007/978-3-319-98355-4_9

  • 4

    Ablayev F. Ablayev M. Vasiliev A. (2016a). On the balanced quantum hashing,” in J. Physics: Conference Series (IOP Publishing), 012019. 10.1088/1742-6596/681/1/012019

  • 5

    Ablayev F. Ablayev M. Vasiliev A. (2018b). “Computing quantum hashing in the model of quantum branching programs,” in AIP Conference Proceedings (AIP Publishing LLC), 020020. 10.1063/1.5025458

  • 6

    Ablayev F. Ablayev M. Vasiliev A. (2020). “Quantum hashing and fingerprinting for quantum cryptography and computations,” in International Computer Science Symposium in Russia (Springer), 115. 10.1007/978-3-030-50026-9_1

  • 7

    Ablayev F. Ablayev M. Vasiliev A. Ziatdinov M. (2016b). Quantum fingerprinting and quantum hashing. Computational and cryptographical aspects. Baltic J. Modern Comput. 4, 860875. 10.22364/bjmc.2016.4.4.17

  • 8

    Ablayev F. Gainutdinova A. Karpinski M. Moore C. Pollett C. (2005). On the computational power of probabilistic and quantum branching program. Inf. Comput. 203, 145162. 10.1016/j.ic.2005.04.003

  • 9

    Ablayev F. Gainutdinova A. Khadiev K. Yakaryılmaz A. (2016c). Very narrow quantum OBDDs and width hierarchies for classical OBDDs. Lobachevskii J. Mathem. 37, 670682. 10.1134/S199508021606007X

  • 10

    Ablayev F. Salikhova N. Ablayev M. (2024). Hybrid classical-quantum text search based on hashing. Mathematics12:1858. 10.3390/math12121858

  • 11

    Ablayev F. Vasiliev A. (2009). On quantum realisation of boolean functions by the fingerprinting technique. Discrete Mathem. Applic. 19, 555572. 10.1515/DMA.2009.037

  • 12

    Ablayev F. Vasiliev A. (2011). “Classical and quantum parallelism in the quantum fingerprinting method,” in International Conference on Parallel Computing Technologies (Springer), 112. 10.1007/978-3-642-23178-0_1

  • 13

    Ablayev F. Vasiliev A. (2013a). Cryptographic quantum hashing. Laser Phys. Lett. 11:025202. 10.1088/1612-2011/11/2/025202

  • 14

    Ablayev F. Vasiliev A. (2014). “Computing boolean functions via quantum hashing,” in Computing with New Resources: Essays Dedicated to Jozef Gruska on the Occasion of His 80th Birthday, 149–160. 10.1007/978-3-319-13350-8_11

  • 15

    Ablayev F. Vasiliev A. (2020). “Quantum hashing and fourier transform,” in Journal of Physics: Conference Series (IOP Publishing), 012001. 10.1088/1742-6596/1680/1/012001

  • 16

    Ablayev F. Vasiliev A. (2022). “Quantum hashing on the high-dimensional states,” in International Conference on Micro-and Nano-Electronics 2021 (SPIE), 565570. 10.1117/12.2624628

  • 17

    Ablayev F. M. Ablayev M. F. Vasilev A. V. (2014). Universal quantum hashing. Uchenye Zapiski Kazanskogo Universiteta. Seriya Fiziko-Matematicheskie Nauki156, 718. Available online at: https://www.mathnet.ru/eng/uzku1261

  • 18

    Ablayev F. M. Vasiliev A. (2013b). Algorithms for quantum branching programs based on fingerprinting. Int. J. Softw. Inform. 7, 485500. Available online at: https://openurl.ebsco.com/EPDB%3Agcd%3A12%3A22738220/detailv2?sid=ebsco%3Aplink%3Ascholar&id=ebsco%3Agcd%3A95709941&crl=c&link_origin=scholar.google.com

  • 19

    Ajtai M. Iwaniec H. Komlós J. Pintz J. Szemerédi E. (1990). Construction of a thin set with small fourier coefficients. Bull. London Mathem. Soc. 22, 583590. 10.1112/blms/22.6.583

  • 20

    Ambainis A. Freivalds R. (1998). “1-way quantum finite automata: strengths, weaknesses and generalizations,” in FOCS'98 (IEEE), 332341. 10.1109/SFCS.1998.743469

  • 21

    Ambainis A. Nahimovs N. (2009). Improved constructions of quantum automata. Theor. Comput. Sci. 410, 19161922. 10.1016/j.tcs.2009.01.027

  • 22

    Ambainis A. Nayak A. Ta-Shma A. Vazirani U. (2002). Dense quantum coding and quantum finite automata. J. ACM49, 496511. 10.1145/581771.581773

  • 23

    Ambainis A. Watrous J. (2002). Two-way finite automata with quantum and classical states. Theor. Comput. Sci. 287, 299311. 10.1016/S0304-3975(02)00138-X

  • 24

    Ambainis A. Yakaryılmaz A. (2021). “Automata and quantum computing,” in Handbook of Automata Theory, ed. J. Éric Pin (European Mathematical Society Publishing House), 14571493. 10.4171/automata-2/17

  • 25

    Bergholm V. Vartiainen J. J. Möttönen M. Salomaa M. M. (2005). Quantum circuits with uniformly controlled one-qubit gates. Phys. Rev. A71:052330. 10.1103/PhysRevA.71.052330

  • 26

    Bertoni A. (1975). The Solution of Problems Relative to Probabilistic Automata in the Frame of the Formal Languages Theory. GI-4. Jahrestagung: Berlin, 107112. 10.1007/978-3-662-40087-6_6

  • 27

    Bertoni A. Mauri G. Torelli M. (1977). “Some recursively unsolvable problems relating to isolated cutpoints in probabilistic automata,” in Automata, Languages and Programming: Fourth Colloquium, University of Turku, Finland (Springer), 8794. 10.1007/3-540-08342-1_7

  • 28

    Birkan U. Salehi Ö. Olejar V. Nurlu C. Yakaryılmaz A. (2021). “Implementing quantum finite automata algorithms on noisy devices,” in International Conference on Computational Science (Springer), 316. 10.1007/978-3-030-77980-1_1

  • 29

    Buhrman H. Cleve R. Watrous J. de Wolf R. (2001). Quantum fingerprinting. Phys. Rev. Lett. 87:167902. 10.1103/PhysRevLett.87.167902

  • 30

    Chadha R. Sistla A. P. Viswanathan M. (2013). “Probabilistic automata with isolated cut-points,” in International Symposium on Mathematical Foundations of Computer Science (Springer), 254265. 10.1007/978-3-642-40313-2_24

  • 31

    Cross A. W. Bishop L. S. Sheldon S. Nation P. D. Gambetta J. M. (2019). Validating quantum computers using randomized model circuits. Phys. Rev. A100:032328. 10.1103/PhysRevA.100.032328

  • 32

    Gainutdinova A. (2002). On relative complexity of quantum and classical branching programs. Discrete Mathem. Applic. 12, 515526. 10.1515/dma-2002-0510

  • 33

    Gainutdinova A. Yakaryılmaz A. (2015). “Unary probabilistic and quantum automata on promise problems,” in Developments in Language Theory (Springer), 252263. 10.1007/978-3-319-21500-6_20

  • 34

    Gainutdinova A. Yakaryılmaz A. (2017). “Nondeterministic unitary obdds,” in Computer Science - Theory and Applications- 12th International Computer Science Symposium in Russia, CSR 2017, Kazan, Russia, June 8–12, 2017, Proceedings, volume 10304 of Lecture Notes in Computer Science (Springer), 126140. 10.1007/978-3-319-58747-9_13

  • 35

    Gainutdinova A. Yakaryılmaz A. (2018). Unary probabilistic and quantum automata on promise problems. Quant. Inf. Proc. 17:28. 10.1007/s11128-017-1799-0

  • 36

    Gimbert H. Oualhadj Y. (2010). “Probabilistic automata on finite words: decidable and undecidable problems,” in Automata, Languages and Programming: 37th International Colloquium, ICALP 2010, Bordeaux, France, July 6–10, 2010, Proceedings, Part II 37 (Springer), 527538. 10.1007/978-3-642-14162-1_44

  • 37

    Hu Y. Melnyk D. Wang Y. Wattenhofer R. (2020). “Space complexity of streaming algorithms on universal quantum computers,” in Theory and Applications of Models of Computation: 16th International Conference, TAMC 2020, Changsha, China, October 18–20, 2020, Proceedings 16 (Springer), 275286. 10.1007/978-3-030-59267-7_24

  • 38

    IBM (2022). Eagle's quantum performance progress. Available online at: https://www.ibm.com/quantum/blog/eagle-quantum-processor-performance (accessed April 30, 2024).

  • 39

    IBM (2025). Qiskit SDK v2.0.0. GenericBackendV2. https://docs.quantum.ibm.com/api/qiskit/qiskit.providers.fake_provider.GenericBackendV2 (accessed March 23, 2025).

  • 40

    Kālis M. (2018). Kvantu algoritmu realizācija fiziskā kvantu datorā (quantum algorithm implementation on a physical quantum computer). Master's thesis, University of Latvia.

  • 41

    Khadiev K. Khadieva A. (2017). “Reordering method and hierarchies for quantum and classical ordered binary decision diagrams,” in CSR 2017 (Springer), 162175. 10.1007/978-3-319-58747-9_16

  • 42

    Khadiev K. Khadieva A. (2021). Quantum online streaming algorithms with logarithmic memory. Int. J. Theor. Phys. 60, 608616. 10.1007/s10773-019-04209-1

  • 43

    Khadiev K. Khadieva A. (2022). Quantum and classical log-bounded automata for the online disjointness problem. Mathematics10:143. 10.3390/math10010143

  • 44

    Khadiev K. Khadieva A. Knop A. (2022a). Exponential separation between quantum and classical ordered binary decision diagrams, reordering method and hierarchies. Nat. Comput. 22, 723736. 10.1007/s11047-022-09904-3

  • 45

    Khadiev K. Khadieva A. Mannapov I. (2018). Quantum online algorithms with respect to space and advice complexity. Lobachevskii J. Mathem. 39, 12101220. 10.1134/S1995080218090421

  • 46

    Khadiev K. Khadieva A. Ziatdinov M. Mannapov I. Kravchenko D. Rivosh A. et al . (2022b). Two-way and one-way quantum and classical automata with advice for online minimization problems. Theor. Comput. Sci. 920, 7694. 10.1016/j.tcs.2022.02.026

  • 47

    Khadiev K. Serov D. (2025). “Quantum algorithm for the multiple string matching problem,” in International Conference on Current Trends in Theory and Practice of Computer Science (Springer), 5869. 10.1007/978-3-031-82697-9_5

  • 48

    Khadiev K. and Khadieva A. Kravchenko D. Mannapov I. Rivosh A. Yamilov R. (2023). Quantum versus classical online streaming algorithms with logarithmic size of memory. Lobachevskii J. Mathem. 44, 687698. 10.1134/S1995080223020208

  • 49

    Khadieva A. (2023). Optimal parameters computing code. Available online at: https://github.com/aliyakhadi/Parameters_counting (accessed April 30, 2025).

  • 50

    Khadieva A. (2024). Quantum hashing algorithm implementation. Technical report. arXiv:quant-ph/2024.

  • 51

    Khadieva A. Salehi O. Yakaryılmaz A. (2024). “A representative framework for implementing quantum finite automata on real devices,” in Proceedings of UCNC 2024. 10.1007/978-3-031-63742-1_12

  • 52

    Khadieva A. Ziatdinov M. (2023). Deterministic construction of qfas based on the quantum fingerprinting technique. Lobachevskii J. Mathem. 44, 713723. 10.1134/S199508022302021X

  • 53

    Le Gall F. (2006). “Exponential separation of quantum and classical online space complexity,” in SPAA '06: Proceedings of the Eighteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures (ACM), 6773. 10.1145/1148109.1148119

  • 54

    Le Gall F. (2009). Exponential separation of quantum and classical online space complexity. Theory Comput. Syst. 45, 188202. 10.1007/s00224-007-9097-3

  • 55

    Mitchell M. (1998). An Introduction to Genetic Algorithms. London: MIT press.

  • 56

    Montanaro A. (2017). Quantum pattern matching fast on average. Algorithmica77, 1639. 10.1007/s00453-015-0060-4

  • 57

    Moore C. Crutchfield J. P. (2000). Quantum automata and quantum grammars. Theor. Comput. Sci. 237, 275306. 10.1016/S0304-3975(98)00191-1

  • 58

    Möttönen M. Vartiainen J. J. Bergholm V. Salomaa M. M. (2004). Quantum circuits for general multiqubit gates. Phys. Rev. Lett. 93:130502. 10.1103/PhysRevLett.93.130502

  • 59

    Nakanishi M. Yakaryılmaz A. (2015). “Classical and quantum counter automata on promise problems,” in International Conference on Implementation and Application of Automata (Springer), 224237. 10.1007/978-3-319-22360-5_19

  • 60

    Preskill J. (2018). Quantum computing in the nisq era and beyond. Quantum2:79. 10.22331/q-2018-08-06-79

  • 61

    Press W. H.. (1992). The Art of Scientific Computing. Cambridge: Cambridge University Press.

  • 62

    Rabin M. O. (1963). Probabilistic automata. Inf. Control6, 230245. 10.1016/S0019-9958(63)90290-0

  • 63

    Ramesh H. Vinay V. (2003). String matching in quantum time. J. Discr. Algor. 1, 103110. 10.1016/S1570-8667(03)00010-8

  • 64

    Razborov A. Szemerédi E. Wigderson A. (1993). Constructing small sets that are uniform in arithmetic progressions. Combinat. Probab. Comput. 2, 513518. 10.1017/S0963548300000870

  • 65

    Salehi Ö. Yakaryılmaz A. (2021). Cost-efficient QFA algorithm for quantum computers. arXiv:2107.02262.

  • 66

    Say A. C. C. Yakaryılmaz A. (2014). “Quantum finite automata: a modern introduction,” in Computing with New Resources (Springer), 208222. 10.1007/978-3-319-13350-8_16

  • 67

    Tao T. Vu V. (2006). Additive Combinatorics, volume 105 of Cambridge Studies in Advanced Mathematics. Cambridge: Cambridge University Press. 10.1017/CBO9780511755149

  • 68

    Turaykhanov D. Akat'ev D. Vasiliev A. Ablayev F. Kalachev A. (2021). Quantum hashing via single-photon states with orbital angular momentum. Phys. Rev. A104:052606. 10.1103/PhysRevA.104.052606

  • 69

    Vasiliev A. (2016a). Binary quantum hashing. Russian Mathem. 60, 6165. 10.3103/S1066369X16090073

  • 70

    Vasiliev A. (2016b). “A model of quantum communication device for quantum hashing,” in Journal of Physics: Conference Series (IOP Publishing), 012020. 10.1088/1742-6596/681/1/012020

  • 71

    Vasiliev A. (2016c). Quantum hashing for finite abelian groups. Lobachevskii J. Mathem. 37, 753757. 10.1134/S1995080216060184

  • 72

    Vasiliev A. (2023). Constant-depth algorithm for quantum hashing. Russian Microelectr. 52, S399S402. 10.1134/S106373972360067X

  • 73

    Vasiliev A. Latypov M. Ziatdinov M. (2017). Minimizing collisions for quantum hashing. J. Eng. Appl. Sci. 12, 877880. 10.3923/jeasci.2017.877.880

  • 74

    Vasiliev A. Vasilov A. Latypov M. (2019). Analysis of properties of quantum hashing. J. Mathem. Sci. 241, 117124. 10.1007/s10958-019-04412-9

  • 75

    Wack A. Paik H. Javadi-Abhari A. Jurcevic P. Faro I. Gambetta J. M. et al . (2021). Quality, speed, and scale: three key attributes to measure the performance of near-term quantum computers. arXiv:2110.14108.

  • 76

    Wright S. J. (2015). Coordinate descent algorithms. Mathem. Program. 151, 334. 10.1007/s10107-015-0892-3

  • 77

    Yakaryılmaz A. (2013). Log-space counter is useful for unary languages by help of a constant-size quantum register. arXiv preprint arXiv:1309.4767.

  • 78

    Yakaryılmaz A. Say A. C. (2009). Efficient probability amplification in two-way quantum finite automata. Theor. Comput. Sci. 410, 19321941. 10.1016/j.tcs.2009.01.029

  • 79

    Yakaryılmaz A. Say A. C. C. (2010). Languages recognized by nondeterministic quantum finite automata. Quantum Inf. Comput. 10, 747770. 10.26421/QIC10.9-10-3

  • 80

    Ziatdinov M. (2016a). From graphs to keyed quantum hash functions. Lobachevskii J. Mathem. 37, 705712. 10.1134/S1995080216060202

  • 81

    Ziatdinov M. (2016b). Quantum hashing group approach. Lobachevskii J. Mathem. 37, 222226. 10.1134/S1995080216020165

  • 82

    Ziiatdinov M. Khadieva A. Yakaryılmaz A. (2023). “Gaps for shallow implementation of quantum finite automata,” in Proceedings of the 16th International Conference on Automata and Formal Languages (AFL 2023), Eger, Hungary, eds. S. I. Zsolt Gazdag and G. Kovasznai (Open Publishing Association), 269280. 10.4204/EPTCS.386.21

  • 83

    Zinnatullin I. (2023). Cryptographic properties of the quantum hashing based on expander graphs. Lobachevskii J. Mathem. 44, 776787. 10.1134/S1995080223020397

  • 84

    Zinnatullin I. Khadiev K. Khadieva A. (2023). Efficient implementation of amplitude form of quantum hashing using state-of-the-art quantum processors. Russian Microelectr. 52, S390S394. 10.1134/S1063739723600620

Summary

Keywords

quantum finite automata, quantum fingerprinting, quantum circuit, shallow quantum circuit, quantum hash

Citation

Ziiatdinov M, Khadieva A and Khadiev K (2025) Shallow implementation of quantum fingerprinting with application to quantum finite automata. Front. Comput. Sci. 7:1519212. doi: 10.3389/fcomp.2025.1519212

Received

29 October 2024

Accepted

17 April 2025

Published

16 May 2025

Volume

7 - 2025

Edited by

Daowen Qiu, Sun Yat-sen University, China

Reviewed by

Heng Fan, Chinese Academy of Sciences (CAS), China

Suryansh Upadhyay, The Pennsylvania State University (PSU), United States

Updates

Copyright

*Correspondence: Mansur Ziiatdinov Kamil Khadiev

†Present address: Mansur Ziiatdinov, MIFT Department, University of Messina, Messina, Italy

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Figures

Cite article

Copy to clipboard


Export citation file


Share article

Article metrics