Distributed quantum computing is a promising computational paradigm for performing computations that are beyond the reach of individual quantum devices. Privacy in distributed quantum computing is critical for maintaining confidentiality and protecting the data in the presence of untrusted computing nodes. In this work, we introduce novel blind quantum machine learning protocols based on the quantum bipartite correlator algorithm. Our protocols have reduced communication overhead while preserving the privacy of data from untrusted parties. We introduce robust algorithm-specific privacy-preserving mechanisms with low computational overhead that do not require complex cryptographic techniques. We then validate the effectiveness of the propose...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for t...
Quantum machine learning promises to efficiently solve important problems. There are two persistent ...
The eligibility of various advanced quantum algorithms will be questioned if they can not guarantee ...
With careful manipulation, malicious agents can reverse engineer private information encoded in pre-...
We introduce a device-independent two-prover scheme in which a classical verifier is able to use a s...
Blind quantum computation (BQC) protocols enable quantum algorithms to be executed on third-party qu...
Copyright © 2018 Tech Science Press. The delegating private quantum computation (DQC) protocol with ...
With the recent availability of cloud quantum computing services, the question of verifying quantum ...
International audienceBlind quantum computing (BQC) allows a client to have a server carry out a qua...
Blind delegation protocols allow a client to delegate a computation to a server so that the server l...
Recent years have seen much excitement for application of quantum computing, triggered by substantia...
Because quantum computers are expensive, it is envisaged that individuals who want to utilize them w...
Data mining is a key technology in big data analytics and it can discover understandable knowledge (...
The term "machine learning" especially refers to algorithms that derive mappings, i.e. intput/output...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for t...
Quantum machine learning promises to efficiently solve important problems. There are two persistent ...
The eligibility of various advanced quantum algorithms will be questioned if they can not guarantee ...
With careful manipulation, malicious agents can reverse engineer private information encoded in pre-...
We introduce a device-independent two-prover scheme in which a classical verifier is able to use a s...
Blind quantum computation (BQC) protocols enable quantum algorithms to be executed on third-party qu...
Copyright © 2018 Tech Science Press. The delegating private quantum computation (DQC) protocol with ...
With the recent availability of cloud quantum computing services, the question of verifying quantum ...
International audienceBlind quantum computing (BQC) allows a client to have a server carry out a qua...
Blind delegation protocols allow a client to delegate a computation to a server so that the server l...
Recent years have seen much excitement for application of quantum computing, triggered by substantia...
Because quantum computers are expensive, it is envisaged that individuals who want to utilize them w...
Data mining is a key technology in big data analytics and it can discover understandable knowledge (...
The term "machine learning" especially refers to algorithms that derive mappings, i.e. intput/output...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for t...
Quantum machine learning promises to efficiently solve important problems. There are two persistent ...