Plugging Leaks in Fault-Tolerant Quantum Computation and Verification
- URL: http://arxiv.org/abs/2510.03227v1
- Date: Fri, 03 Oct 2025 17:57:59 GMT
- Title: Plugging Leaks in Fault-Tolerant Quantum Computation and Verification
- Authors: Theodoros Kapourniotis, Dominik Leichtle, Luka Music, Harold Ollivier,
- Abstract summary: We present the first fault-tolerant blind verification scheme for universal quantum computations able to handle secret-dependent noise on the verifier's quantum device.<n>Our main tools are two novel distillation protocols that turn secret-dependent noise into secret-independent noise.<n>We use these protocols to prepare states in the X-Y-plane whose noise is overwhelmingly secret-independent, which then allows us to verify with exponential confidence arbitrary fault-tolerant BQP computations.
- Score: 0.03499870393443268
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the advent of quantum cloud computing, the security of delegated quantum computation has become of utmost importance. While multiple statistically secure blind verification schemes in the prepare-and-send model have been proposed, none of them achieves full quantum fault-tolerance, a prerequisite for useful verification on scalable quantum computers. In this paper, we present the first fault-tolerant blind verification scheme for universal quantum computations able to handle secret-dependent noise on the verifier's quantum device. Composable security of the proposed protocol is proven in the Abstract Cryptography framework. Our main tools are two novel distillation protocols that turn secret-dependent noise into secret-independent noise. The first one is run by the verifier and acts on its noisy gates, while the second and more complex one is run entirely on the prover's device and acts on states provided by the verifier. Both are required to overcome the leakage induced by secret-dependent noise. We use these protocols to prepare states in the X-Y-plane whose noise is overwhelmingly secret-independent, which then allows us to verify with exponential confidence arbitrary fault-tolerant BQP computations.
Related papers
- Pseudorandom quantum authentication [0.8204952610951527]
We introduce the pseudorandom quantum authentication scheme (PQAS)<n>It is an efficient method for quantum states that relies solely on the existence of pseudorandom unitaries (PRUs)
arXiv Detail & Related papers (2025-01-01T20:46:37Z) - Measuring Quantum Information Leakage Under Detection Threat [7.82527155589504]
Gentle quantum leakage is proposed as a measure of information leakage to arbitrary eavesdroppers.
Measures are used to encode the desire of the eavesdropper to evade detection.
Global depolarizing noise is shown to reduce gentle quantum leakage.
arXiv Detail & Related papers (2024-03-18T03:07:09Z) - A Provably Secure Framework for Noise-Aware Delegated Quantum Computation and Storage [0.0]
This paper presents a complete end-to-end framework for noise-aware distributed quantum computation.<n>We provide a security analysis to prove that our framework achieves completeness, blindness, and verifiability.
arXiv Detail & Related papers (2024-03-12T12:33:54Z) - Experimental Implementation of A Quantum Zero-Knowledge Proof for User
Authentication [0.39845810840390733]
A new interactive quantum zero-knowledge protocol for identity authentication is proposed and demonstrated.
The protocol design involves a verifier and a prover knowing a pre-shared secret, and the acceptance or rejection of the proof is determined by the quantum bit error rate.
arXiv Detail & Related papers (2024-01-17T19:00:00Z) - The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication [7.318072482453136]
Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography.
This paper proposes a novel method that allows users to communicate while generating the secure keys and securing the transmission without any leakage of the data.
arXiv Detail & Related papers (2024-01-17T05:41:17Z) - Certified Robustness of Quantum Classifiers against Adversarial Examples
through Quantum Noise [68.1992787416233]
We show that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks.
We derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples.
arXiv Detail & Related papers (2022-11-02T05:17:04Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Experimental quantum key distribution certified by Bell's theorem [0.0]
cryptographic key exchange protocols traditionally rely on computational conjectures to provide security against eavesdropping attacks.
quantum key distribution protocols provide information-theoretic security against such attacks.
However, quantum protocols are subject to a new class of attacks exploiting implementation defects in the physical devices involved.
We present here the experimental realisation of a complete quantum key distribution protocol immune to these vulnerabilities.
arXiv Detail & Related papers (2021-09-29T17:52:48Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.