On The Round Complexity of Two-Party Quantum Computation

11/23/2020
by   James Bartusek, et al.
0

We investigate the round complexity of maliciously-secure two-party quantum computation (2PQC) with setup, and obtain the following results: - A three-message protocol (two-message if only one party receives output) in the common random string (CRS) model assuming classical two-message oblivious transfer (OT) with post-quantum malicious security. This round complexity is optimal for the sequential communication setting. Under the additional assumption of reusable malicious designated-verifier non-interactive zero-knowledge (MDV-NIZK) arguments for NP, our techniques give an MDV-NIZK for QMA. Each of the assumptions mentioned above is known from the quantum hardness of learning with errors (QLWE). - A protocol with two simultaneous rounds of communication, in a quantum preprocessing model, assuming sub-exponential QLWE. In fact, we construct a three-round protocol in the CRS model with only two rounds of online communication, which implies the above result. Along the way, we develop a new delayed simulation technique that we call "simulation via teleportation," which may be useful in other settings. In addition, we perform a preliminary investigation into barriers and possible approaches for two-round 2PQC in the CRS model, including an impossibility result for a natural class of simulators, and a proof-of-concept construction from a strong form of quantum virtual black-box (VBB) obfuscation. Prior to our work, maliciously-secure 2PQC required round complexity linear in the size of the quantum circuit.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/30/2020

Oblivious Transfer is in MiniQCrypt

MiniQCrypt is a world where quantum-secure one-way functions exist, and ...
research
04/20/2023

Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)

Can a sender non-interactively transmit one of two strings to a receiver...
research
04/19/2023

Zero-Knowledge MIPs using Homomorphic Commitment Schemes

A Zero-Knowledge Protocol (ZKP) allows one party to convince another par...
research
05/21/2020

SafeComp: Protocol For Certifying Cloud Computations Integrity

We define a problem of certifying computation integrity performed by som...
research
09/09/2022

A New Framework for Quantum Oblivious Transfer

We present a new template for building oblivious transfer from quantum i...
research
12/02/2019

Classical Verification of Quantum Computations with Efficient Verifier

In this paper, we extend the protocol of classical verification of quant...

Please sign up or login with your details

Forgot password? Click here to reset