Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power
- URL: http://arxiv.org/abs/2005.01510v2
- Date: Fri, 18 Feb 2022 03:25:43 GMT
- Title: Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power
- Authors: Man-Hong Yung and Bin Cheng
- Abstract summary: Quantum cloud computing is emerging as a popular model for users to experience the power of quantum computing through the internet.
How can users be sure that the output strings sent by the server are really from a quantum hardware?
- Score: 1.9737117321211988
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum cloud computing is emerging as a popular model for users to
experience the power of quantum computing through the internet, enabling
quantum computing as a service. The question is, when the scale of the
computational problems becomes out of reach of classical computers, how can
users be sure that the output strings sent by the server are really from a
quantum hardware? In 2008, Shepherd and Bremner proposed a cryptographic
verification protocol based on a simplified circuit model called IQP
(instantaneous quantum polynomial-time), which can potentially be applied to
most existing quantum cloud platforms. However, the Shepherd-Bremner protocol
has recently been shown to be insecure by Kahanamoku-Meyer. Here we present an
extended model of IQP-based cryptographic verification protocol, where the
Shepherd-Bremner construction can be regarded as a special case. This protocol
not only can avoid the attack by Kahanamoku-Meyer but also provide several
additional security measures for anti-forging quantum data. In particular, our
protocol admits a simultaneous encoding of multiple secret strings,
strengthening significantly the hardness for classical hacking. Furthermore, we
provide methods for estimating the correlation functions associated with the
secret strings, which are the key elements in our verification protocol.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform [0.0]
We present two quantum cryptographic protocols leveraging the quantum Fourier transform (QFT)
The foremost of these protocols is a novel QKD method that leverages this effectiveness of the QFT.
We additionally show how existing quantum encryption methods can be augmented with a QFT-based approach to improve eavesdropping detection.
arXiv Detail & Related papers (2024-04-18T21:04:03Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - Delegated variational quantum algorithms based on quantum homomorphic
encryption [69.50567607858659]
Variational quantum algorithms (VQAs) are one of the most promising candidates for achieving quantum advantages on quantum devices.
The private data of clients may be leaked to quantum servers in such a quantum cloud model.
A novel quantum homomorphic encryption (QHE) scheme is constructed for quantum servers to calculate encrypted data.
arXiv Detail & Related papers (2023-01-25T07:00:13Z) - Simulation of Networked Quantum Computing on Encrypted Data [0.0]
cryptographic techniques must be developed for secure remote use of quantum computing power.
I present a simulation of such a protocol, tested classically on the simulation platform LIQ$Ui|rangle.
arXiv Detail & Related papers (2022-12-25T20:02:53Z) - Quantum oblivious transfer: a short review [0.06554326244334865]
We study the concept of oblivious transfer in the area of theoretical quantum cryptography.
We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
arXiv Detail & Related papers (2022-06-06T15:19:26Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Delegating Multi-Party Quantum Computations vs. Dishonest Majority in
Two Quantum Rounds [0.0]
Multi-Party Quantum Computation (MPQC) has attracted a lot of attention as a potential killer-app for quantum networks.
We present a composable protocol achieving blindness and verifiability even in the case of a single honest client.
arXiv Detail & Related papers (2021-02-25T15:58:09Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z) - Forging quantum data: classically defeating an IQP-based quantum test [0.0]
We describe a classical algorithm that can convince the verifier that the (classical) prover is quantum.
We show that the key extraction algorithm is efficient in practice for problem sizes of hundreds of qubits.
arXiv Detail & Related papers (2019-12-11T19:00:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.