Computationally-Secure and Composable Remote State Preparation

@article{Gheorghiu2019ComputationallySecureAC,
  title={Computationally-Secure and Composable Remote State Preparation},
  author={Alexandru Gheorghiu and Thomas Vidick},
  journal={2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)},
  year={2019},
  pages={1024-1033}
}
We introduce a protocol between a classical polynomial-time verifier and a quantum polynomial-time prover that allows the verifier to securely delegate to the prover the preparation of certain single-qubit quantum states The prover is unaware of which state he received and moreover, the verifier can check with high confidence whether the preparation was successful. The delegated preparation of single-qubit states is an elementary building block in many quantum cryptographic protocols. We expect… Expand
On the Possibility of Classical Client Blind Quantum Computing
TLDR
Using the functionality of delegated pseudo-secret random qubit generator (PSRQG), a classical client can instruct the preparation of a sequence of random qubits at some distant party, one could achieve a purely classical-client computational secure verifiable delegated universal quantum computing (also referred to as verifiable blind quantum computation). Expand
Secure Quantum Computation with Classical Communication
TLDR
A constant-round composable protocol for blind and verifiable classical delegation of quantum computation is constructed, and applications to secure quantum computation with classical communication are shown. Expand
QFactory: classically-instructed remote secret qubits preparation
TLDR
This contribution defines a simpler (basic) primitive consisting of only BB84 states, and gives a protocol that realizes this primitive and that is secure against the strongest possible adversary (an arbitrarily deviating malicious server). Expand
Trusted center verification model and classical channel remote state preparation
TLDR
It is shown that the first quantum message transmission cannot be replaced with an (even approximate) ccRSP protocol while keeping the information-theoretical soundness unless BQP is contained in AM, which solves the long-standing open problem. Expand
Quantum Shell Games: How to Classically Delegate the Preparation of Authenticated Quantum States
We propose novel protocols for verifiable, classically instructed remote state preparation. Our “Shell Game” protocols require constantly many rounds of communication to prepare an arbitrary numberExpand
Implementing Remote-State Preparation on a Noisy-Intermediate Size Quantum Device
In this research project, we investigate the implementation of a protocol for remotely preparing quantum states, with applications to blind and verifiable delegated quantum computation. TheExpand
QEnclave - A practical solution for secure quantum cloud computing
TLDR
This work introduces a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls, and shows that this same functionality can be achieved with a client that only transforms quantum states without generating or measuring them. Expand
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
TLDR
This work presents two protocols for a classical verifier to verifiably delegate a quantum computation to two non-communicating but entangled quantum provers, and achieves near-optimal complexity in terms of the total resources employed by the verifier and the honest provers. Expand
Information-theoretically-sound non-interactive classical verification of quantum computing with trusted center
TLDR
This paper constructs an information-theoretically-sound non-interactive classical verification protocol for quantum computing with a trusted center, and builds a non-Interactive statistical zero-knowledge proof system for QMA with the trusted center. Expand
Depth-efficient proofs of quantumness
A proof of quantumness is a type of challenge-response protocol in which a classical verifier can efficiently certify the quantum advantage of an untrusted prover. That is, a quantum prover canExpand
...
1
2
3
4
...

References

SHOWING 1-10 OF 45 REFERENCES
Delegated Pseudo-Secret Random Qubit Generator
TLDR
Using the functionality of delegated pseudo-secret random qubit generator (PSRQG), one could achieve for the first time a purely classical-client computational secure verifiable delegated universal quantum computing (also referred to as verifiable blind quantum computation). Expand
Robustness and device independence of verifiable blind quantum computing
TLDR
The robustness of the single server verifiable universal blind quantum computing protocol of Fitzsimons and Kashefi is proved in the most general scenario and the composition of this protocol with a device-independent state tomography protocol that is based on the rigidity of CHSH games as proposed by Reichardt et al. Expand
Unconditionally verifiable blind quantum computation
Blind quantum computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output, and computation remain private. A desirable property forExpand
How to Verify a Quantum Computation
TLDR
This work gives a new theoretical solution to a leading-edge experimental challenge, namely to the verification of quantum computations in the regime of high computational complexity, using a reduction to an entanglement-based protocol and showing that verification could be achieved at minimal cost compared to performing the computation. Expand
Post hoc verification of quantum computation
TLDR
It is demonstrated that the verification can be achieved independently from the blindness, and it is shown that a constant round protocol with a single prover and a completely classical verifier is not possible, unless bounded error quantum polynomial time (BQP) is contained in the third level of thePolynomial hierarchy. Expand
Blind quantum computing with two almost identical states
TLDR
This work identifies sufficient criteria on the powers of the client, which still allow for secure blind quantum computation, in a universally composable framework, and provides a series of protocols, where each step reduces the number of differing states the client needs to be able to prepare. Expand
Universal Blind Quantum Computation
TLDR
The protocol is the first universal scheme which detects a cheating server, as well as the first protocol which does not require any quantum computation whatsoever on the client's side. Expand
A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device
TLDR
The randomness protocol can be used as the basis for an efficiently verifiable "quantum supremacy" proposal, thus answering an outstanding challenge in the field. Expand
Composability in quantum cryptography
TLDR
This article explains the universal composability (UC) framework and state the composition theorem that guarantees that secure protocols can securely be composed to larger applications and shows how to generate a continuous key stream by sequentially composing rounds of a QKD protocol. Expand
Optimised resource construction for verifiable quantum computation
TLDR
A new construction that simplifies the required resources for any such verifiable protocol, and is generic and could be applied to any universal or non-universal scheme with a given underlying graph. Expand
...
1
2
3
4
5
...