2014
DOI: 10.1007/978-3-662-45608-8_22
|View full text |Cite
|
Sign up to set email alerts
|

Composable Security of Delegated Quantum Computation

Abstract: Delegating difficult computations to remote large computation facilities, with appropriate security guarantees, is a possible solution for the ever-growing needs of personal computing power. For delegated computation protocols to be usable in a larger context -or simply to securely run two protocols in parallel -the security definitions need to be composable. Here, we define composable security for delegated quantum computation. We distinguish between protocols which provide only blindness -the computation is … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
135
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 68 publications
(138 citation statements)
references
References 48 publications
3
135
0
Order By: Relevance
“…0-blindness) and ϵ-blind-verifiability discussed in Section II for exponentially small ϵ. 17 The UBQC protocol can also be used as a method to remotely prepare the states used in the ABE protocol, resulting in a hybrid protocol which requires only single qubit state preparations. 38 …”
Section: Bqc With Semi-classical Clientsmentioning
confidence: 99%
See 3 more Smart Citations
“…0-blindness) and ϵ-blind-verifiability discussed in Section II for exponentially small ϵ. 17 The UBQC protocol can also be used as a method to remotely prepare the states used in the ABE protocol, resulting in a hybrid protocol which requires only single qubit state preparations. 38 …”
Section: Bqc With Semi-classical Clientsmentioning
confidence: 99%
“…10 while security under the stronger composable definition proved in ref. 19. It is worth noting that while the resource state requires NM qubits, due to the commutation of operations involving non-neighbouring qubits, not every qubit needs to be present in the initial state.…”
Section: Bqc With Semi-classical Clientsmentioning
confidence: 99%
See 2 more Smart Citations
“…This enables one to use relatively basic obfuscation techniques in order to prevent an untrusted operator (that implements an MBQC computation) from obtaining access to the true flow of information. This key observation has led to an entirely new approach to quantum verification that exploits cryptographic techniques [4,5,[10][11][12][13][14][15][16][17]. The core idea is to encode simple trap computations within a target computation that is run on a remote device.…”
Section: Introductionmentioning
confidence: 99%