Efficient Post-Quantum Secured Blind Computation
- URL: http://arxiv.org/abs/2404.07052v1
- Date: Wed, 10 Apr 2024 14:42:40 GMT
- Title: Efficient Post-Quantum Secured Blind Computation
- Authors: Ethan Davies, Alastair Kay,
- Abstract summary: In the medium term, quantum computing must tackle two key challenges: fault tolerance and security.
Here we detail a verifiable circuit-based model that only requires classical communication between parties.
The server is blind to the details of the computation, which is computationally secure.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In the medium term, quantum computing must tackle two key challenges: fault tolerance and security. Fault tolerance will be solved with sufficiently high quality experiments on large numbers of qubits, but the scale and complexity of these devices means that a cloud-based access model is likely to dominate. How can we risk evaluating valuable computations on an untrusted server? Here we detail a verifiable circuit-based model that only requires classical communication between parties. The server is blind to the details of the computation, which is computationally secure.
Related papers
- Quantum-secure multiparty deep learning [0.0]
We introduce a linear algebra engine that leverages the quantum nature of light for information-theoretically secure multiparty computation.
We apply this engine to deep learning and derive rigorous upper bounds on the information leakage of both the deep neural network weights and the client's data.
Our work lays the foundation for practical quantum-secure computation and unlocks secure cloud deep learning as a field.
arXiv Detail & Related papers (2024-08-10T20:48:40Z) - Experimental verifiable multi-client blind quantum computing on a Qline architecture [0.5018974919510384]
We provide the first experimental implementation of a two-client verifiable blind quantum computing protocol in a distributed architecture.
Results represent novel perspectives for the verification of multi-tenant distributed quantum computation in large-scale networks.
arXiv Detail & Related papers (2024-07-12T14:48:58Z) - Oblivious Quantum Computation and Delegated Multiparty Quantum
Computation [61.12008553173672]
We propose a new concept, oblivious computation quantum computation, where secrecy of the input qubits and the program to identify the quantum gates are required.
Exploiting quantum teleportation, we propose a two-server protocol for this task.
Also, we discuss delegated multiparty quantum computation, in which, several users ask multiparty quantum computation to server(s) only using classical communications.
arXiv Detail & Related papers (2022-11-02T09:01:33Z) - Verifying BQP Computations on Noisy Devices with Minimal Overhead [0.0]
We introduce the first blind and verifiable protocol for delegating BQP computations to a powerful server with repetition as the only overhead.
It is composable and statistically secure with exponentially-low bounds and can tolerate a constant amount of global noise.
arXiv Detail & Related papers (2021-09-09T05:20:56Z) - Secure Distributed Training at Scale [65.7538150168154]
Training in presence of peers requires specialized distributed training algorithms with Byzantine tolerance.
We propose a novel protocol for secure (Byzantine-tolerant) decentralized training that emphasizes communication efficiency.
arXiv Detail & Related papers (2021-06-21T17:00:42Z) - Hardware-Efficient, Fault-Tolerant Quantum Computation with Rydberg
Atoms [55.41644538483948]
We provide the first complete characterization of sources of error in a neutral-atom quantum computer.
We develop a novel and distinctly efficient method to address the most important errors associated with the decay of atomic qubits to states outside of the computational subspace.
Our protocols can be implemented in the near-term using state-of-the-art neutral atom platforms with qubits encoded in both alkali and alkaline-earth atoms.
arXiv Detail & Related papers (2021-05-27T23:29:53Z) - Delegating Multi-Party Quantum Computations vs. Dishonest Majority in
Two Quantum Rounds [0.0]
Multi-Party Quantum Computation (MPQC) has attracted a lot of attention as a potential killer-app for quantum networks.
We present a composable protocol achieving blindness and verifiability even in the case of a single honest client.
arXiv Detail & Related papers (2021-02-25T15:58:09Z) - Securing Quantum Computations in the NISQ Era [0.0]
In light of ongoing privacy scandals, the future availability of quantum computing through remotely accessible servers pose peculiar challenges.
Clients with quantum-leaved capabilities want their data and algorithms to remain hidden, while being able to verify that their computations are performed correctly.
Research in blind and verifiable delegation of quantum computing attempts to address this question.
arXiv Detail & Related papers (2020-11-19T18:03:18Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Faster Secure Data Mining via Distributed Homomorphic Encryption [108.77460689459247]
Homomorphic Encryption (HE) is receiving more and more attention recently for its capability to do computations over the encrypted field.
We propose a novel general distributed HE-based data mining framework towards one step of solving the scaling problem.
We verify the efficiency and effectiveness of our new framework by testing over various data mining algorithms and benchmark data-sets.
arXiv Detail & Related papers (2020-06-17T18:14:30Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.