Computationally-secure and composable remote state preparation

04/12/2019
by   Alexandru Gheorghiu, et al.
0

We introduce a protocol between a classical polynomial-time verifier and a quantum polynomial-time prover that allows the verifier to securely delegate to the prover the preparation of certain single-qubit quantum states. The protocol realizes the following functionality, with computational security: the verifier chooses one of the observables Z, X, Y, (X+Y)/√(2), (X-Y)/√(2); the prover receives a uniformly random eigenstate of the observable chosen by the verifier; the verifier receives a classical description of that state. The prover is unaware of which state he received and moreover, the verifier can check with high confidence whether the preparation was successful. The delegated preparation of single-qubit states is an elementary building block in many quantum cryptographic protocols. We expect our implementation of "random remote state preparation with verification", a functionality first defined in (Dunjko and Kashefi 2014), to be useful for removing the need for quantum communication in such protocols while keeping functionality. The main application that we detail is to a protocol for blind and verifiable delegated quantum computation (DQC) that builds on the work of (Fitzsimons and Kashefi 2018), who provided such a protocol with quantum communication. Recently, both blind an verifiable DQC were shown to be possible, under computational assumptions, with a classical polynomial-time client (Mahadev 2017, Mahadev 2018). Compared to the work of Mahadev, our protocol is more modular, applies to the measurement-based model of computation (instead of the Hamiltonian model) and is composable. Our proof of security builds on ideas introduced in (Brakerski et al. 2018).

READ FULL TEXT
research
09/07/2021

QEnclave – A practical solution for secure quantum cloud computing

We introduce a secure hardware device named a QEnclave that can secure t...
research
07/03/2020

Security Limitations of Classical-Client Delegated Quantum Computing

Secure delegated quantum computing allows a computationally weak client ...
research
11/27/2017

Relativistic verifiable delegation of quantum computation

The importance of being able to verify quantum computation delegated to ...
research
12/25/2022

Simulation of Networked Quantum Computing on Encrypted Data

Due to the limited availability of quantum computing power in the near f...
research
06/27/2022

Multi-agent blind quantum computation without universal cluster state

Blind quantum computation (BQC) protocols enable quantum algorithms to b...
research
04/12/2019

QFactory: classically-instructed remote secret qubits preparation

The functionality of classically-instructed remotely prepared random sec...
research
10/18/2022

Lattice-Based Quantum Advantage from Rotated Measurements

Trapdoor claw-free functions (TCFs) are immensely valuable in cryptograp...

Please sign up or login with your details

Forgot password? Click here to reset