Verifiable Multiparty Delegated Quantum Computation

نویسندگان

چکیده

Multiparty delegated quantum computation (MDQC) allows multiple clients with limited capability to jointly complete a computational task the aid of an untrusted server. But in existing MDQC protocols, verifiability that should verify whether server executed protocol correctly and gave correct results was not handled. Therefore, this paper, we improve typical enable correctness by inserting trap qubits develop novel method enforce send honestly while avoiding positions being leaked The security improved are also analyzed. In addition, specific example proposed verifiable is given simulated on IBM’s platform.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiparty Delegated Quantum Computing

Quantum computing has seen tremendous progress in the past few years. However, due to limitations in the scalability of quantum technologies, it seems that we are far from constructing universal quantum computers for everyday users. A more feasible solution is the delegation of computation to powerful quantum servers on the network. This solution was proposed in previous studies of blind quantu...

متن کامل

Unconditionally verifiable blind quantum computation

Joseph F. Fitzsimons1,2,* and Elham Kashefi3,4 1Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372 2Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 3School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, United Kingdom 4LIP6, Departement Informatique et Reseaux, UPMC, 4 Place Juss...

متن کامل

Composable Security of Delegated Quantum Computation

Delegating difficult computations to remote large computation facilities, with appropriate security guarantees, is a possible solution for the ever-growing needs of personal computing power. For delegated computation protocols to be usable in a larger context—or simply to securely run two protocols in parallel— the security definitions need to be composable. Here, we define composable security ...

متن کامل

Publicly Verifiable Blind Quantum Computation

Blind quantum computation protocols allow a user with limited quantum technology to delegate an intractable computation to a quantum server while keeping the computation perfectly secret. Whereas in some protocols a user can verify that calculated outcomes are correct, a third party cannot do this, which allows a dishonest user or owner to benefit illegally. I propose a new blind quantum comput...

متن کامل

Verifiable Computation in Multiparty Protocols with Honest Majority

We present a generic method for turning passively secure protocols into protocols secure against covert attacks. The method adds a post-execution verification phase to the protocol that allows a misbehaving party to escape detection only with negligible probability. The execution phase, after which the computed protocol result is already available for parties, has only negligible overhead added...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Intelligent Systems

سال: 2023

ISSN: ['1098-111X', '0884-8173']

DOI: https://doi.org/10.1155/2023/2662685