Counterfactual Concealed Telecomputation
- URL: http://arxiv.org/abs/2012.04948v4
- Date: Wed, 17 Mar 2021 05:21:13 GMT
- Title: Counterfactual Concealed Telecomputation
- Authors: Fakhar Zaman, Hyundong Shin, and Moe Z. Win
- Abstract summary: We devise a distributed blind quantum computation protocol to perform a universal two-qubit controlled unitary operation.
It is shown that the protocol is valid for general input states and that single-qubit unitary teleportation is a special case of CCT.
The protocol becomes deterministic with simplified circuit implementation if the initial composite state of Alice and Bob is a Bell-type state.
- Score: 22.577469136318836
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Distributed computing is a fastest growing field -- enabling virtual
computing, parallel computing, and distributed storage. By exploiting the
counterfactual techniques, we devise a distributed blind quantum computation
protocol to perform a universal two-qubit controlled unitary operation for any
input state without using preshared entanglement and without exchanging
physical particles between remote parties. This distributed protocol allows Bob
to counterfactully apply an arbitrary unitary operator to Alice's qubit in
probabilistic fashion, without revealing the operator to her, using a control
qubit -- called the counterfactual concealed telecomputation (CCT). It is shown
that the protocol is valid for general input states and that single-qubit
unitary teleportation is a special case of CCT. The quantum circuit for CCT can
be implemented using the (chained) quantum Zeno gates and the protocol becomes
deterministic with simplified circuit implementation if the initial composite
state of Alice and Bob is a Bell-type state.
Related papers
- Pulse-controlled qubit in semiconductor double quantum dots [57.916342809977785]
We present a numerically-optimized multipulse framework for the quantum control of a single-electron charge qubit.
A novel control scheme manipulates the qubit adiabatically, while also retaining high speed and ability to perform a general single-qubit rotation.
arXiv Detail & Related papers (2023-03-08T19:00:02Z) - Transversal Injection: A method for direct encoding of ancilla states
for non-Clifford gates using stabiliser codes [55.90903601048249]
We introduce a protocol to potentially reduce this overhead for non-Clifford gates.
Preliminary results hint at high quality fidelities at larger distances.
arXiv Detail & Related papers (2022-11-18T06:03:10Z) - Reversing Unknown Qubit-Unitary Operation, Deterministically and Exactly [0.9208007322096532]
We consider the most general class of protocols transforming unknown unitary operations within the quantum circuit model.
In the proposed protocol, the input qubit-unitary operation is called 4 times to achieve the inverse operation.
We show a method to reduce the large search space representing all possible protocols.
arXiv Detail & Related papers (2022-09-07T03:33:09Z) - Quantum cryptography with classical communication: parallel remote state
preparation for copy-protection, verification, and more [125.99533416395765]
Many cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob.
We show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem.
This means that all communication between (classical) Alice and (quantum) Bob is classical, yet they can still make use of cryptographic primitives that would be impossible if both parties were classical.
arXiv Detail & Related papers (2022-01-31T18:56:31Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Quantum communication complexity beyond Bell nonlocality [87.70068711362255]
Efficient distributed computing offers a scalable strategy for solving resource-demanding tasks.
Quantum resources are well-suited to this task, offering clear strategies that can outperform classical counterparts.
We prove that a new class of communication complexity tasks can be associated to Bell-like inequalities.
arXiv Detail & Related papers (2021-06-11T18:00:09Z) - Delegating Multi-Party Quantum Computations vs. Dishonest Majority in
Two Quantum Rounds [0.0]
Multi-Party Quantum Computation (MPQC) has attracted a lot of attention as a potential killer-app for quantum networks.
We present a composable protocol achieving blindness and verifiability even in the case of a single honest client.
arXiv Detail & Related papers (2021-02-25T15:58:09Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Trusted center verification model and classical channel remote state
preparation [0.0]
The classical channel remote state preparation (ccRSP) is an important two-party primitive in quantum cryptography.
We consider a general verification protocol where the verifier or the trusted center first sends quantum states to the prover, and then the prover and the verifier exchange a constant round of classical messages.
We show that the first quantum message transmission cannot be replaced with an (even approximate) ccRSP protocol while keeping the information-theoretical soundness unless BQP is contained in AM.
arXiv Detail & Related papers (2020-08-11T23:16:04Z) - Exchange-Free Computation on an Unknown Qubit at a Distance [0.0]
We present a way of directly manipulating an arbitrary qubit, without the exchange of any particles.
This includes as an application the exchange-free preparation of an arbitrary quantum state at Alice by a remote classical Bob.
We show how to use this for the exchange-free control of a universal two-qubit gate.
arXiv Detail & Related papers (2020-08-03T12:42:00Z) - Gaussian conversion protocols for cubic phase state generation [104.23865519192793]
Universal quantum computing with continuous variables requires non-Gaussian resources.
The cubic phase state is a non-Gaussian state whose experimental implementation has so far remained elusive.
We introduce two protocols that allow for the conversion of a non-Gaussian state to a cubic phase state.
arXiv Detail & Related papers (2020-07-07T09:19:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.