We introduce a protocol between a classical polynomial-time verifier and a quantum polynomial-time prover that allows the verifier to securely delegate to the prover the preparation of certain single-qubit quantum states The prover is unaware of which state he received and moreover, the verifier can check with high confidence whether the preparation was successful. The delegated preparation of single-qubit states is an elementary building block in many quantum cryptographic protocols. We expect our implementation of "random remote state preparation with verification", a functionality first defined in (Dunjko and Kashefi 2014), to be useful for removing the need for quantum communication in such protocols while keeping functionality. The mai...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
We give a new interactive protocol for the verification of quantum computations in the regime of hig...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
In remote state preparation with verifiability (RSPV), a client would like to prepare a quantum stat...
We introduce a device-independent two-prover scheme in which a classical verifier is able to use a s...
We introduce a secure hardware device named a QEnclave that can secure the remote execution of quant...
The rapid evolution of quantum technologies is likely to cause major shifts in the mainstream compu...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Remote state preparation is the variant of quantum state teleportation in which the sender knows the...
We give a protocol for producing certifiable randomness from a single untrusted quantum device that ...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Assume that Alice can do only classical probabilistic polynomial-time computing while Bob can do qua...
Secure delegated quantum computing is a two-party cryptographic primitive, where a computationally w...
The importance of being able to verify quantum computation delegated to remote servers increases wit...
The importance of being able to verify quantum computation delegated to remote servers increases wit...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
We give a new interactive protocol for the verification of quantum computations in the regime of hig...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
In remote state preparation with verifiability (RSPV), a client would like to prepare a quantum stat...
We introduce a device-independent two-prover scheme in which a classical verifier is able to use a s...
We introduce a secure hardware device named a QEnclave that can secure the remote execution of quant...
The rapid evolution of quantum technologies is likely to cause major shifts in the mainstream compu...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Remote state preparation is the variant of quantum state teleportation in which the sender knows the...
We give a protocol for producing certifiable randomness from a single untrusted quantum device that ...
The problem of reliably certifying the outcome of a computation performed by a quantum device is rap...
Assume that Alice can do only classical probabilistic polynomial-time computing while Bob can do qua...
Secure delegated quantum computing is a two-party cryptographic primitive, where a computationally w...
The importance of being able to verify quantum computation delegated to remote servers increases wit...
The importance of being able to verify quantum computation delegated to remote servers increases wit...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
We give a new interactive protocol for the verification of quantum computations in the regime of hig...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...