# Classical verification of quantum circuits containing few basis changes

@article{Demarie2016ClassicalVO, title={Classical verification of quantum circuits containing few basis changes}, author={Tommaso F. Demarie and Yingkai Ouyang and Joseph Fitzsimons}, journal={ArXiv}, year={2016}, volume={abs/1612.04914} }

We consider the task of verifying the correctness of quantum computation for a restricted class of circuits which contain at most two basis changes. This contains circuits giving rise to the second level of the Fourier Hierarchy, the lowest level for which there is an established quantum advantage. We show that, when the circuit has an outcome with probability at least the inverse of some polynomial in the circuit size, the outcome can be checked in polynomial time with bounded error by a…

## 9 Citations

Interactive Proofs with Polynomial-Time Quantum Prover for Computing the Order of Solvable Groups

- Computer Science, MathematicsMFCS
- 2018

The result shows that computing the order of a solvable group, which is one of the most general problems for which quantum computing exhibits an exponential speed-up with respect to classical computing, can be realized in this model.

Merlin-Arthur with efficient quantum Merlin and quantum supremacy for the second level of the Fourier hierarchy

- Computer ScienceQuantum
- 2018

A promise problem to decide whether output probability distributions of two quantum circuits are far apart or close is defined, and it is shown that PDD-Max is BQP-complete, but if the two circuits are restricted to some types in the second level of the Fourier hierarchy, such as the HC1Q model or the IQP model, PDd-Max has a Merlin-Arthur system with quantum polynomial-time Merlin and classical probabilistic polyn coefficients.

A quantum homomorphic encryption scheme for polynomial-sized circuits

- Computer Science, MathematicsArXiv
- 2018

This paper proposes an information-theoretically-secure QHE scheme suitable for quantum circuits of size polynomial in the number of data qubits, which keeps the data perfectly secure, and the circuit quite secure with the help of a polynometric amount of entanglement and classical communication.

Rational proofs for quantum computing

- Computer ScienceQuantum Inf. Comput.
- 2020

This paper shows that the client can be completely classical if the server is rational (i.e., economically motivated), following the ``rational proofs" framework of Azar and Micali.

Information-theoretically-sound non-interactive classical verification of quantum computing with trusted center

- Computer ScienceArXiv
- 2020

This paper constructs an information-theoretically-sound non-interactive classical verification protocol for quantum computing with a trusted center, and builds a non-Interactive statistical zero-knowledge proof system for QMA with the trusted center.

J ul 2 01 9 A quantum homomorphic encryption scheme for polynomial-sized circuits

- Computer Science, Mathematics
- 2019

A QHE scheme for a type of circuits of polynomial depth, based on the rebit quantum computation formalism is proposed, which keeps the restricted type of data perfectly secure and the circuit privacy is not good, but can be caught by the opposite party in an interactive scheme with embedded verifications.

Supervised learning with quantum-enhanced feature spaces

- Computer Science, PhysicsNature
- 2019

Two classification algorithms that use the quantum state space to produce feature maps are demonstrated on a superconducting processor, enabling the solution of problems when the feature space is large and the kernel functions are computationally expensive to estimate.

Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection

- Computer Science2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)
- 2020

This work presents the first approach for applying unsupervised Quantum Machine Learning (QML) in the context of network intrusion detection from the perspective of quantum information, based on the concept of quantum-assisted ML.

Sumcheck-based delegation of quantum computing to rational server

- Computer ScienceTAMC
- 2020

Novel one-round rational delegated quantum computing protocols are proposed by generalizing the classical rational sumcheck protocol and it is shown that a constant reward gap can be achieved if two non-communicating but entangled rational servers are allowed.

## References

SHOWING 1-10 OF 63 REFERENCES

Post hoc verification of quantum computation

- Computer SciencePhysical review letters
- 2018

It is demonstrated that the verification can be achieved independently from the blindness, and it is shown that a constant round protocol with a single prover and a completely classical verifier is not possible, unless bounded error quantum polynomial time (BQP) is contained in the third level of thePolynomial hierarchy.

Classical simulation of commuting quantum computations implies collapse of the polynomial hierarchy

- Computer Science, MathematicsProceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences
- 2010

The class post-IQP of languages decided with bounded error by uniform families of IQP circuits with post-selection is introduced, and it is proved first that post- IQP equals the classical class PP, and that if the output distributions of uniform IQP circuit families could be classically efficiently sampled, then the infinite tower of classical complexity classes known as the polynomial hierarchy would collapse to its third level.

Unconditionally verifiable blind quantum computation

- Computer Science, Mathematics
- 2017

It is rigorously proved that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter, which allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead.

Simulating quantum computers with probabilistic methods

- Computer Science
- 2009

It is shown that the exponential speed-ups of Simon's and Shor's algorithms crucially depend on the very last stage in these algorithms, dealing with the classical postprocessing of the measurement outcomes, and it is proved that both algorithms would be classically simulatable if the function classically computed in this step had a sufficiently peaked Fourier spectrum.

Interactive Proofs for BQP via Self-Tested Graph States

- Computer Science, MathematicsTheory Comput.
- 2016

Using the measurement-based quantum computation model, this work constructs interactive proofs with non-communicating quantum provers and a classical verifier and extends the self-testing error bounds on measurements to a very general set which includes the adaptive measurements used for measurement- based quantum computation as a special case.

Measurement-based quantum computation on cluster states

- Physics, Computer Science
- 2003

We give a detailed account of the one-way quantum computer, a scheme of quantum computation that consists entirely of one-qubit measurements on a particular class of entangled states, the cluster…

Verification for measurement-only blind quantum computing

- Computer Science
- 2012

This paper proposes a protocol of verification for the measurement-only blind quantum computing, a new secure quantum computing protocol where a client who does not have any sophisticated quantum technlogy can delegate her quantum computing to a server without leaking any privacy.

Classical command of quantum systems

- Physics, Computer ScienceNature
- 2013

A scheme is described that can be used to determine the initial state and to classically command the system to evolve according to desired dynamics, and makes it possible to test whether a claimed quantum computer is truly quantum.

Robustness and device independence of verifiable blind quantum computing

- Computer Science
- 2015

The robustness of the single server verifiable universal blind quantum computing protocol of Fitzsimons and Kashefi is proved in the most general scenario and the composition of this protocol with a device-independent state tomography protocol that is based on the rigidity of CHSH games as proposed by Reichardt et al.