2016
DOI: 10.1038/ncomms13795
|View full text |Cite
|
Sign up to set email alerts
|

Continuous-variable quantum computing on encrypted data

Abstract: The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieve… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

1
42
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(45 citation statements)
references
References 31 publications
(38 reference statements)
1
42
0
1
Order By: Relevance
“…All of these developments have taken place in the qubit regime. In contrast, blind quantum computing on continuousvariable (CV) hardware is a much less explored territory * Electronic address: nana.liu@quantumlah.org † Electronic address: tommaso@entropicalabs.com [33,34]. To the best of our knowledge there is a single proposal reported [33] that allows the client to hide her input, output and her computation, whereas the scheme in [34] shows only the encryption of the input.…”
mentioning
confidence: 99%
“…All of these developments have taken place in the qubit regime. In contrast, blind quantum computing on continuousvariable (CV) hardware is a much less explored territory * Electronic address: nana.liu@quantumlah.org † Electronic address: tommaso@entropicalabs.com [33,34]. To the best of our knowledge there is a single proposal reported [33] that allows the client to hide her input, output and her computation, whereas the scheme in [34] shows only the encryption of the input.…”
mentioning
confidence: 99%
“…The possibility of using almost any interferometer gives plenty of room for optimization and implies that potentially any experimental setup producing multi-mode squeezed states can be used for QSS, paving the way to quantum resource sharing across entangled networks with arbitrary topology. In particular, this may have applications for sharing resource states in server-client architectures for optical quantum computing [58,59], which is an increasingly studied paradigm, due to the difficulty of producing genuinely quantum resources for quantum supremacy [60,61]. From the perspective of error correction [21,62],we can affirm that a Haar randomly chosen linear interferometer acts as an optimal erasure code, since any code tolerating the loss of a higher number of modes would violate no-cloning.…”
Section: Discussionmentioning
confidence: 93%
“…Blind quantum computing (BQC) [5][6][7] is an effective method for a common user (namely the Client), who has limited or no quantum computational power, to delegate computation to an untrusted quantum organization (namely the Server), without leaking any information about the user's input and computational task.Various BQC protocols have been proposed in theory [8][9][10][11][12][13]. In addition, several experiments have been reported to demonstrate the feasibility of BQC with photonic qubits [14][15][16][17][18][19]. See Ref.[20] for a review.…”
mentioning
confidence: 99%
“…Various BQC protocols have been proposed in theory [8][9][10][11][12][13]. In addition, several experiments have been reported to demonstrate the feasibility of BQC with photonic qubits [14][15][16][17][18][19]. See Ref.…”
mentioning
confidence: 99%