# Self-Testing of a Single Quantum Device Under Computational Assumptions

@inproceedings{Metger2021SelfTestingOA, title={Self-Testing of a Single Quantum Device Under Computational Assumptions}, author={Tony Metger and Thomas Vidick}, booktitle={ITCS}, year={2021} }

Self-testing is a method to characterise an arbitrary quantum system based only on its classical input-output correlations, and plays an important role in device-independent quantum information processing as well as quantum complexity theory. Prior works on self-testing require the assumption that the system's state is shared among multiple parties that only perform local measurements and cannot communicate. Here, we replace the setting of multiple non-communicating parties, which is difficult…

## 5 Citations

Device-independent quantum key distribution from computational assumptions

- Computer Science, MathematicsNew Journal of Physics
- 2021

This work shows how to replace the no-communication assumption in DIQKD by a standard computational assumption from post-quantum cryptography, and gives a protocol that produces secure keys even when the components of an adversarial device can exchange arbitrary quantum communication, assuming the device is computationally bounded.

Closing the Locality and Detection Loopholes in Multiparticle Entanglement Self-Testing

- PhysicsPhysical Review Letters
- 2022

First proposed by Mayers and Yao, self-testing provides a certification method to infer the underlying physics of quantum experiments in a black-box scenario. Numerous demonstrations have been…

Quantum Oblivious Transfer: A Short Review

- Computer Science, MathematicsEntropy
- 2022

This review article surveys the work developed around the concept of oblivious transfer within theoretical quantum cryptography and focuses on some proposed protocols and their security requirements.

Optimal verification of the Bell state and Greenberger–Horne–Zeilinger states in untrusted quantum networks

- Computer Sciencenpj Quantum Information
- 2021

A simple approach for verifying the Bell state in an untrusted network in which one party is not honest is proposed and it is shown that the verification protocols can achieve almost the same sample efficiencies as protocols tailored to standard quantum state verification.

Computational self-testing for entangled magic states

- PhysicsIACR Cryptol. ePrint Arch.
- 2021

It is shown that a magic state for the CCZ gate can be self-tested while that for the T gate cannot, which is applicable to a proof of quantumness, where it can classically verify whether a quantum device generates a quantum state having non-zero magic.

## References

SHOWING 1-10 OF 54 REFERENCES

Computationally-Secure and Composable Remote State Preparation

- Mathematics, Computer Science2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)
- 2019

The implementation of "random remote state preparation with verification", a functionality first defined in (Dunjko and Kashefi 2014), is expected to be useful for removing the need for quantum communication in such protocols while keeping functionality.

QMA-hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-Knowledge

- Mathematics, Computer Science2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)
- 2020

A longstanding conjecture that the Consistency of Local Density Matrices problem is QMA-hard under Karp reductions is proved, and a Proof of Quantum Knowledge is defined, which guarantees that a prover is effectively in possession of a quantum witness in an interactive proof, and the zero-knowledge proof system satisfies this definition.

Device-independent quantum key distribution from computational assumptions

- Computer Science, MathematicsNew Journal of Physics
- 2021

This work shows how to replace the no-communication assumption in DIQKD by a standard computational assumption from post-quantum cryptography, and gives a protocol that produces secure keys even when the components of an adversarial device can exchange arbitrary quantum communication, assuming the device is computationally bounded.

Simpler Proofs of Quantumness

- Computer Science, MathematicsTQC
- 2020

A two-message (challenge-response) proof of quantumness based on any trapdoor claw-free function is given, which allows the use of smaller security parameters and more diverse computational assumptions, significantly reducing the quantum computational effort required for a successful demonstration.

Classical Proofs of Quantum Knowledge

- Computer Science, MathematicsEUROCRYPT
- 2021

This work defines the notion of a proof of knowledge in the setting where the verifier is classical, but the prover is quantum, and provides two examples of protocols which can be shown to be proofs of quantum knowledge under this definition.

MIP* = RE

- Computer ScienceCommun. ACM
- 2021

It is proved that every problem that is recursively enumerable, including the Halting problem, can be efficiently verified by a classical probabilistic polynomial-time verifier interacting with two all-powerful but noncommunicating provers sharing entanglement.

Classical Verification of Quantum Computations with Efficient Verifier

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020

The protocol of classical verification of quantum computations (CVQC) recently proposed by Mahadev is extended to make the verification efficient and the first constant round CVQC protocol with negligible soundness error is shown.

Local certification of programmable quantum devices of arbitrary high dimensionality

- Computer Science, PhysicsArXiv
- 2019

This work shows that the quantum self-testing paradigm can be employed to an individual quantum computer that is modelled as a programmable black box by introducing a noise-tolerant certification scheme and substantiates the applicability of the scheme by providing a family of outcome statistics whose observation certifies that the computer is producing specific high-dimensional quantum states and implementing specific measurements.

Non-interactive classical verification of quantum computation

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020

This work shows that the interactive protocol Mahadev constructed can in fact be performed non-interactively and in zero-knowledge, and establishes the security of the protocols under standard assumptions in quantum-secure cryptography.

Zero-Knowledge for QMA from Locally Simulatable Proofs

- Computer Science, MathematicsArXiv
- 2019

The main technique consists in developing locally simulatable proofs for all of QMA, an encoding of a QMA witness such that it can be efficiently verified by probing only five qubits and the reduced density matrix can be computed in polynomial time and is independent of the witness.