Verifying BQP Computations on Noisy Devices with Minimal Overhead
- URL: http://arxiv.org/abs/2109.04042v1
- Date: Thu, 9 Sep 2021 05:20:56 GMT
- Title: Verifying BQP Computations on Noisy Devices with Minimal Overhead
- Authors: Dominik Leichtle, Luka Music, Elham Kashefi, Harold Ollivier
- Abstract summary: We introduce the first blind and verifiable protocol for delegating BQP computations to a powerful server with repetition as the only overhead.
It is composable and statistically secure with exponentially-low bounds and can tolerate a constant amount of global noise.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the development of delegated quantum computation, clients will want to
ensure confidentiality of their data and algorithms, and the integrity of their
computations. While protocols for blind and verifiable quantum computation
exist, they suffer from high overheads and from over-sensitivity: When running
on noisy devices, imperfections trigger the same detection mechanisms as
malicious attacks, resulting in perpetually aborted computations.
We introduce the first blind and verifiable protocol for delegating BQP
computations to a powerful server with repetition as the only overhead. It is
composable and statistically secure with exponentially-low bounds and can
tolerate a constant amount of global noise.
Related papers
- Efficient Post-Quantum Secured Blind Computation [0.0]
In the medium term, quantum computing must tackle two key challenges: fault tolerance and security.
Here we detail a verifiable circuit-based model that only requires classical communication between parties.
The server is blind to the details of the computation, which is computationally secure.
arXiv Detail & Related papers (2024-04-10T14:42:40Z) - Verification of Quantum Computations without Trusted Preparations or Measurements [0.6249768559720122]
We present a modular, composable, and efficient way to turn known verification schemes into protocols that rely only on trusted gates.
Our first contribution is an extremely lightweight reduction of the problem of quantum verification for BQP to the trusted application of single-qubit rotations around the Z axis and bit flips.
The second construction shows that it is generally possible to information-theoretically verify arbitrary quantum computations with quantum output without trusted preparations or measurements.
arXiv Detail & Related papers (2024-03-15T16:54:28Z) - Probabilistic Sampling of Balanced K-Means using Adiabatic Quantum Computing [93.83016310295804]
AQCs allow to implement problems of research interest, which has sparked the development of quantum representations for computer vision tasks.
In this work, we explore the potential of using this information for probabilistic balanced k-means clustering.
Instead of discarding non-optimal solutions, we propose to use them to compute calibrated posterior probabilities with little additional compute cost.
This allows us to identify ambiguous solutions and data points, which we demonstrate on a D-Wave AQC on synthetic tasks and real visual data.
arXiv Detail & Related papers (2023-10-18T17:59:45Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Deep Quantum Error Correction [73.54643419792453]
Quantum error correction codes (QECC) are a key component for realizing the potential of quantum computing.
In this work, we efficiently train novel emphend-to-end deep quantum error decoders.
The proposed method demonstrates the power of neural decoders for QECC by achieving state-of-the-art accuracy.
arXiv Detail & Related papers (2023-01-27T08:16:26Z) - Delegated variational quantum algorithms based on quantum homomorphic
encryption [69.50567607858659]
Variational quantum algorithms (VQAs) are one of the most promising candidates for achieving quantum advantages on quantum devices.
The private data of clients may be leaked to quantum servers in such a quantum cloud model.
A novel quantum homomorphic encryption (QHE) scheme is constructed for quantum servers to calculate encrypted data.
arXiv Detail & Related papers (2023-01-25T07:00:13Z) - Iterative Qubits Management for Quantum Index Searching in a Hybrid
System [56.39703478198019]
IQuCS aims at index searching and counting in a quantum-classical hybrid system.
We implement IQuCS with Qiskit and conduct intensive experiments.
Results demonstrate that it reduces qubits consumption by up to 66.2%.
arXiv Detail & Related papers (2022-09-22T21:54:28Z) - Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations [0.5825410941577593]
Cloud-based quantum computing has become vital to provide strong guarantees that computations delegated by clients to quantum service providers have been executed faithfully.
Current protocols lack at least one of the following three ingredients: composability, noise-robustness and modularity.
This paper lays out the fundamental structure of SDQC protocols, namely mixing two components: the Cryptography which the client would like the server to perform and tests that are designed to detect a server's malicious behaviour.
Changing the types of tests and how they are mixed with the client's computation automatically yields new SDQC protocols with different security and noise-
arXiv Detail & Related papers (2022-06-01T17:03:07Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Delegating Multi-Party Quantum Computations vs. Dishonest Majority in
Two Quantum Rounds [0.0]
Multi-Party Quantum Computation (MPQC) has attracted a lot of attention as a potential killer-app for quantum networks.
We present a composable protocol achieving blindness and verifiability even in the case of a single honest client.
arXiv Detail & Related papers (2021-02-25T15:58:09Z) - Securing Quantum Computations in the NISQ Era [0.0]
In light of ongoing privacy scandals, the future availability of quantum computing through remotely accessible servers pose peculiar challenges.
Clients with quantum-leaved capabilities want their data and algorithms to remain hidden, while being able to verify that their computations are performed correctly.
Research in blind and verifiable delegation of quantum computing attempts to address this question.
arXiv Detail & Related papers (2020-11-19T18:03:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.