Quantum Logspace Computations are Verifiable

07/20/2023
by   Uma Girish, et al.
0

In this note, we observe that quantum logspace computations are verifiable by classical logspace algorithms, with unconditional security. More precisely, every language in BQL has an (information-theoretically secure) streaming proof with a quantum logspace prover and a classical logspace verifier. The prover provides a polynomial-length proof that is streamed to the verifier. The verifier has a read-once one-way access to that proof and is able to verify that the computation was performed correctly. That is, if the input is in the language and the prover is honest, the verifier accepts with high probability, and, if the input is not in the language, the verifier rejects with high probability even if the prover is adversarial. Moreover, the verifier uses only O(log n) random bits.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/30/2020

Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication

It is natural in a quantum network system that multiple users intend to ...
research
10/21/2021

Quantum Teleportation with One Classical Bit

Quantum teleportation allows one to transmit an arbitrary qubit from poi...
research
10/15/2022

a quantum secure multiparty computation protocol for least common multiple

In this paper, we present a secure multiparty computation (SMC) protocol...
research
09/21/2022

Creating quantum-resistant classical-classical OWFs from quantum-classical OWFs

One-way functions (OWF) are one of the most essential cryptographic prim...
research
09/13/2016

Analysis of Kelner and Levin graph sparsification algorithm for a streaming setting

We derive a new proof to show that the incremental resparsification algo...
research
04/03/2019

On the classical complexity of quantum interference of indistinguishable bosons

The classical complexity of sampling from the probability distribution o...
research
05/16/2022

Semantic Security with Infinite Dimensional Quantum Eavesdropping Channel

We propose a new proof method for direct coding theorems for wiretap cha...

Please sign up or login with your details

Forgot password? Click here to reset