2009 50th Annual IEEE Symposium on Foundations of Computer Science 2009
DOI: 10.1109/focs.2009.36
|View full text |Cite
|
Sign up to set email alerts
|

Universal Blind Quantum Computation

Abstract: We present a protocol which allows a client to have a server carry out a quantum computation for her such that the client's inputs, outputs and computation remain perfectly private, and where she does not require any quantum computational power or memory. The client only needs to be able to prepare single qubits randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. Our protocol is interactive: after the initial preparation of quantum… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

3
874
0
6

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 560 publications
(883 citation statements)
references
References 35 publications
3
874
0
6
Order By: Relevance
“…While some of these schemes, in principle, can be used to accomplish similar outcomes as our protocol, they can lead to very different client-server relationships in practice. For example, a recent experiment used the measurement-based model of quantum computing to demonstrate the complementary problem of hiding from a server the circuit that is to be performed 7,8 . This method, known as blind quantum computing, can be extended to compute on encrypted data, but would require more than eight times as many auxiliary qubits and significantly more rounds of classical communication.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…While some of these schemes, in principle, can be used to accomplish similar outcomes as our protocol, they can lead to very different client-server relationships in practice. For example, a recent experiment used the measurement-based model of quantum computing to demonstrate the complementary problem of hiding from a server the circuit that is to be performed 7,8 . This method, known as blind quantum computing, can be extended to compute on encrypted data, but would require more than eight times as many auxiliary qubits and significantly more rounds of classical communication.…”
Section: Resultsmentioning
confidence: 99%
“…There have been several novel approaches to this problem, including hiding a circuit from the remote quantum server 7,8 , computing on encrypted quantum data using multiple rounds and bits of quantum communication [9][10][11][12] and sophisticated methods that provide an additional verification mechanism [10][11][12] (see Table 1). While some of these schemes, in principle, can be used to accomplish similar outcomes as our protocol, they can lead to very different client-server relationships in practice.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Universal classical homomorphic encryption was only first discovered in 2009 [6] and subsequently simplified [7]. Closely related is blind computing, where Alice possesses both the data and the algorithm, and Bob owns the computer [8][9][10], as is the quantum private queries protocol [11], which is used to query a database while keeping the query secret.In this paper we describe a technique for solving the above problem, and hence achieving a limited quantum homomorphic encryption using the Boson sampling and multi-walker quantum walk models for quantum computation.The Boson sampling model -A first protocol for universal LOQC was introduced by Knill, Laflamme & Milburn (KLM) [4]. While universal for quantum computation, their protocol is extremely demanding, requiring fast-feedforward and quantum memory, which are technologically challenging and well beyond the capabilities of present-day experiments.…”
mentioning
confidence: 99%
“…Universal classical homomorphic encryption was only first discovered in 2009 [6] and subsequently simplified [7]. Closely related is blind computing, where Alice possesses both the data and the algorithm, and Bob owns the computer [8][9][10], as is the quantum private queries protocol [11], which is used to query a database while keeping the query secret.…”
mentioning
confidence: 99%