2021
DOI: 10.48550/arxiv.2112.05156
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Interactive Protocols for Classically-Verifiable Quantum Advantage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 49 publications
0
12
1
Order By: Relevance
“…This reveals some information about x and x that is not accessible to a classical device. Such protocols were recently improved to much simpler functions (Kahanamoku-Meyer et al, 2021) and low-depth implementations (Hirahara and Gall, 2021;Liu and Gheorghiu, 2021), bringing their experimental demonstration within closer reach (Zhu et al, 2021).…”
Section: Cryptographic Testsmentioning
confidence: 99%
See 1 more Smart Citation
“…This reveals some information about x and x that is not accessible to a classical device. Such protocols were recently improved to much simpler functions (Kahanamoku-Meyer et al, 2021) and low-depth implementations (Hirahara and Gall, 2021;Liu and Gheorghiu, 2021), bringing their experimental demonstration within closer reach (Zhu et al, 2021).…”
Section: Cryptographic Testsmentioning
confidence: 99%
“…What we do not discuss in this review are ways to demonstrate a quantum advantage by other means. Particularly prominent examples are the discovery of verifiable proofs of quantumness (Brakerski et al, 2018(Brakerski et al, , 2020Kahanamoku-Meyer et al, 2021) for which there are recent proof-ofprinciple demonstrations (Zhu et al, 2021). These schemes demonstrate access and control over a single qubit via a cryptographic encoding.…”
Section: Introductionmentioning
confidence: 99%
“…It is desirable to Ruge Lin: ruge.lin@tii.ae Weiqiang Wen: weiqiang.wen@telecom-paris.fr have a performance test on quantum hardware, proving to a verifier and unable to falsify. Recent works [5,6,7,8] demands a classical verifier. In particular, they rely on the hardness of the learning with errors problem and needs thousands of qubits, which is not applicable to present quantum hardware.…”
Section: Introductionmentioning
confidence: 99%
“…Existing techniques for verifying the output of quantum computers [15][16][17][18][19][20][21][22][23] have complementary properties to ours. These methods can be divided into those that, like ours, quantify the accuracy with which a quantum circuit can be executed on a quantum computer that is noisy and error-prone but otherwise trusted, and methods for verifying the correct operation of a potentially malicious quantum computing server.…”
mentioning
confidence: 99%
“…In particular, direct fidelity estimation [18] is a technique for measuring the execution fidelity of any circuit, but it is only efficient for circuits that can be efficiently simulated classically [24]. The existing techniques for verifying the output of a potentially malicious quantum computer-using interactive proofs, blind quantum computing, and cryptographic methods-require resource-intensive implementations of algorithms that are experimentally challenging [20][21][22][23]25]. It is unlikely that they can be used to establish trust in the first practically important quantum com-…”
mentioning
confidence: 99%