2018
DOI: 10.1007/s00224-018-9872-3
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Quantum Computation: An Overview of Existing Approaches

Abstract: Quantum computers promise to efficiently solve not only problems believed to be intractable for classical computers, but also problems for which verifying the solution is also considered intractable. This raises the question of how one can check whether quantum computers are indeed producing correct results. This task, known as quantum verification, has been highlighted as a significant challenge on the road to scalable quantum computing technology. We review the most significant approaches to quantum verifica… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
107
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 141 publications
(107 citation statements)
references
References 127 publications
(309 reference statements)
0
107
0
Order By: Relevance
“…At this point, the protocol no longer satisfies the correctness nor the soundness criteria. In fact, this is common to all other verification protocols in the single-prover setting [3]. To address this issue we now give a fault tolerant version of the post hoc protocol that works in the presence of quantum devices subject to local noise having a constant error-rate.…”
Section: Fault Tolerant Verification Of Quantum Computationmentioning
confidence: 99%
“…At this point, the protocol no longer satisfies the correctness nor the soundness criteria. In fact, this is common to all other verification protocols in the single-prover setting [3]. To address this issue we now give a fault tolerant version of the post hoc protocol that works in the presence of quantum devices subject to local noise having a constant error-rate.…”
Section: Fault Tolerant Verification Of Quantum Computationmentioning
confidence: 99%
“…This calls for protocols able to test circuits as a whole rather than individual gates. Such protocols have been devised inspired by Interactive proof Systems [25]. In these protocols (which we call 'cryptographic protocols') the outputs of the target circuit are verified through an interaction between a trusted verifier and an untrusted prover ( figure 1(a)).…”
Section: Introductionmentioning
confidence: 99%
“…To compute soundness, we denote as out We conclude this appendix by showing how our protocol can be made blind. Blindness is a property exhibited by many cryptographic protocols [25] defined as follows:…”
mentioning
confidence: 99%
“…Leakage is of particular concern for quantum computer engineers, due to its impact on fault-tolerance thresholds [11]. For remote users, it may undermine the assumption of trusted operations -preparation, memory or measurement -that quantum verification [12] or quantum key distribution protocols [13] rely on to guarantee their security. Leakage has been studied in some detail in specific quantum computing platforms [14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%