2019
DOI: 10.22331/q-2019-07-12-164
|View full text |Cite
|
Sign up to set email alerts
|

Nonadaptive fault-tolerant verification of quantum supremacy with noise

Abstract: Quantum samplers are believed capable of sampling efficiently from distributions that are classically hard to sample from. We consider a sampler inspired by the classical Ising model. It is nonadaptive and therefore experimentally amenable. Under a plausible conjecture, classical sampling upto additive errors from this model is known to be hard. We present a trap-based verification scheme for quantum supremacy that only requires the verifier to prepare single-qubit states. The verification is done on the same … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

5
62
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 21 publications
(67 citation statements)
references
References 70 publications
(125 reference statements)
5
62
0
Order By: Relevance
“…In the first two theorems the number ε is replaced by the soundness cr e (see definition 4 in appendix D.2), namely the probability that Alice accepts a wrong output for the target when Bob is cheating. Our mesothetic verification protocol is different from prepare-and-send [26][27][28][29][30][31][32][33] or receive-and-measure [34][35][36][37][38] cryptographic protocols in that Alice encrypts the computation through the QOTP during the actual implementation of the circuits, and not before or after the implementation. To do this, she must possess an nqubit quantum memory and be able to execute single-qubit gates.…”
Section: Mesothetic Verification Protocolmentioning
confidence: 99%
See 4 more Smart Citations
“…In the first two theorems the number ε is replaced by the soundness cr e (see definition 4 in appendix D.2), namely the probability that Alice accepts a wrong output for the target when Bob is cheating. Our mesothetic verification protocol is different from prepare-and-send [26][27][28][29][30][31][32][33] or receive-and-measure [34][35][36][37][38] cryptographic protocols in that Alice encrypts the computation through the QOTP during the actual implementation of the circuits, and not before or after the implementation. To do this, she must possess an nqubit quantum memory and be able to execute single-qubit gates.…”
Section: Mesothetic Verification Protocolmentioning
confidence: 99%
“…In these protocols (which we call 'cryptographic protocols') the outputs of the target circuit are verified through an interaction between a trusted verifier and an untrusted prover ( figure 1(a)). The verifier is typically allowed to possess a noiseless quantum device able to prepare [26][27][28][29][30][31][32][33]…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations