2021
DOI: 10.1002/que2.58
|View full text |Cite
|
Sign up to set email alerts
|

A simplified verifiable blind quantum computing protocol with quantum input verification

Abstract: Blind quantum computing (BQC) enables a client with limited quantum capability to delegate her quantum computation to a remote quantum server and still keeps the client's input, output, and the algorithm private. One important property of BQC is verifiability, which means the client can verify the correctness of the computation or unknown quantum inputs. Recently, Morimae proposed a verifiable blind quantum computing protocol where the client can verify both the correctness of computing and the quantum input. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Blind quantum computing (BQC) was first proposed by Childs [103], his demand was that a user (client) with limited amount of quantum resources may delegate a task to another user or quantum server having full quantum capability or more quantum power, with the condition that input and output of the client and the computational task performed are kept in private, i.e., the server or the user with higher quantum power remains blind about these information. Several schemes of BQC with identity authentication have been proposed [104][105][106], but the capability for BQC in designing schemes of QIA is not yet fully utilized. However, in Ref.…”
Section: Protocols Based On Blind Quantum Computingmentioning
confidence: 99%
“…Blind quantum computing (BQC) was first proposed by Childs [103], his demand was that a user (client) with limited amount of quantum resources may delegate a task to another user or quantum server having full quantum capability or more quantum power, with the condition that input and output of the client and the computational task performed are kept in private, i.e., the server or the user with higher quantum power remains blind about these information. Several schemes of BQC with identity authentication have been proposed [104][105][106], but the capability for BQC in designing schemes of QIA is not yet fully utilized. However, in Ref.…”
Section: Protocols Based On Blind Quantum Computingmentioning
confidence: 99%
“…After then, it has been also experimentally demonstrated. Based on UBQC [17], some other measurement-based BQC protocols [7], [18], [19], [20], [21], [22] have been devised to be as practical as possible in recent years. To verify the blindness and correctness of practical BQC, some protocols [18], [19] were also proposed in noisy channels or existing any malicious attacker.…”
Section: Introductionmentioning
confidence: 99%
“…Based on UBQC [17], some other measurement-based BQC protocols [7], [18], [19], [20], [21], [22] have been devised to be as practical as possible in recent years. To verify the blindness and correctness of practical BQC, some protocols [18], [19] were also proposed in noisy channels or existing any malicious attacker. In order to make Alice as classical as possible, multiple-server BQC protocols [20], [21] were proposed based on the shared entanglement states between servers.…”
Section: Introductionmentioning
confidence: 99%
“…However, the client cannot check correctness of the results in these BQC protocols. Terefore, various verifable BQC protocols have been proposed [19][20][21][22][23][24][25][26]. For example, Fitzsimons and Kashef proposed a universal verifable BQC protocol, called the FK protocol, where the client can detect any malicious behavior of the server with high probability by using trap qubits [19].…”
Section: Introductionmentioning
confidence: 99%