2019
DOI: 10.1007/978-3-030-17659-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources

Abstract: The problem of reliably certifying the outcome of a computation performed by a quantum device is rapidly gaining relevance. We present two protocols for a classical verifier to verifiably delegate a quantum computation to two non-communicating but entangled quantum provers. Our protocols have near-optimal complexity in terms of the total resources employed by the verifier and the honest provers, with the total number of operations of each party, including the number of entangled pairs of qubits required of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
48
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(50 citation statements)
references
References 38 publications
(50 reference statements)
2
48
0
Order By: Relevance
“…Eqs. (38) and (39) means that when the state ρ of the remaining N total − nN test (≡ N rest ) registers is expanded by these basis states:…”
Section: A Proof Of Theoremmentioning
confidence: 99%
See 2 more Smart Citations
“…Eqs. (38) and (39) means that when the state ρ of the remaining N total − nN test (≡ N rest ) registers is expanded by these basis states:…”
Section: A Proof Of Theoremmentioning
confidence: 99%
“…In their protocols, a client is required to prepare single-qubit states whereas single-qubit measurements are required in our setup. In order to make the client classical, several multi-server protocols have been proposed [35][36][37][38][39].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In Appendix D we list three simpler scenarios (of increasing complication) that lead to the most general case given here, following similar steps with the extension of simple i.i.d. self-testing to fully robust and rigid self-testing in existing literature [MMMO06,MHYS12,HYN12,RUV13,CGJV17].…”
Section: Blind Self-testingmentioning
confidence: 99%
“…Such games are a resource not only for cryptography, but also for quantum computation: these games can be manipulated to force untrusted devices to perform measurements on copies of the Bell state which carry out complex circuits. This idea originated in [32] and has seen variants and improvements since then [21,26,11]. For such applications, it is important that the result include an error term which is (at most) bounded by some polynomial function of the number of copies of the state.…”
Section: Introductionmentioning
confidence: 99%