The importance of being able to verify quantum computation delegated to remote servers increases with recent development of quantum technologies. In some of the proposed protocols for this task, a client delegates her quantum computation to non-communicating servers in multiple rounds of communication. In this work, we propose the first protocol where the client delegates her quantum computation to two servers in one-round of communication. Another advantage of our protocol is that it is conceptually simpler than previous protocols. The parameters of our protocol also make it possible to prove security even if the servers are allowed to communicate, but respecting the plausible assumption that information cannot be propagated faster than sp...
The rapid evolution of quantum technologies is likely to cause major shifts in the mainstream compu...
6+9 pages, 2 figures. Extends the results of arxiv:2011.10005 to BQP and refines the discussion on a...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
The importance of being able to verify quantum computation delegated to remote servers increases wit...
Quantum computers can make use of quantum mechanics to achieve surprising speed-ups relative to clas...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
Blind delegation protocols allow a client to delegate a computation to a server so that the server l...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Quantum computers promise surprising powers of computation by exploiting the stunning physical prope...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Quantum computing on encrypted data allows a client who has limited quantum capacity to delegate his...
We give a new interactive protocol for the verification of quantum computations in the regime of hig...
International audienceBlind quantum computing (BQC) allows a client to have a server carry out a qua...
50 pages, 3 figures, function construction in Section 6 corrected and other small changesInternation...
AbstractThis work develops a formal framework for specifying, implementing, and analysing quantum co...
The rapid evolution of quantum technologies is likely to cause major shifts in the mainstream compu...
6+9 pages, 2 figures. Extends the results of arxiv:2011.10005 to BQP and refines the discussion on a...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
The importance of being able to verify quantum computation delegated to remote servers increases wit...
Quantum computers can make use of quantum mechanics to achieve surprising speed-ups relative to clas...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
Blind delegation protocols allow a client to delegate a computation to a server so that the server l...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Quantum computers promise surprising powers of computation by exploiting the stunning physical prope...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Quantum computing on encrypted data allows a client who has limited quantum capacity to delegate his...
We give a new interactive protocol for the verification of quantum computations in the regime of hig...
International audienceBlind quantum computing (BQC) allows a client to have a server carry out a qua...
50 pages, 3 figures, function construction in Section 6 corrected and other small changesInternation...
AbstractThis work develops a formal framework for specifying, implementing, and analysing quantum co...
The rapid evolution of quantum technologies is likely to cause major shifts in the mainstream compu...
6+9 pages, 2 figures. Extends the results of arxiv:2011.10005 to BQP and refines the discussion on a...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...