Application of Blind Quantum Computation to Two-Party Quantum Computation

被引:7
|
作者
Sun, Zhiyuan [1 ]
Li, Qin [1 ]
Yu, Fang [2 ]
Chan, Wai Hong [3 ]
机构
[1] Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Peoples R China
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[3] Educ Univ Hong Kong, Dept Math & Informat Technol, Tai Po, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Blind quantum computation; Two-party quantum computation;
D O I
10.1007/s10773-018-3711-9
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Blind quantum computation (BQC) allows a client who has only limited quantum power to achieve quantum computation with the help of a remote quantum server and still keep the client's input, output, and algorithm private. Recently, Kashefi and Wallden extended BQC to achieve two-party quantum computation which allows two parties Alice and Bob to perform a joint unitary transform upon their inputs. However, in their protocol Alice has to prepare rotated single qubits and perform Pauli operations, and Bob needs to have a powerful quantum computer. In this work, we also utilize the idea of BQC to put forward an improved two-party quantum computation protocol in which the operations of both Alice and Bob are simplified since Alice only needs to apply Pauli operations and Bob is just required to prepare and encrypt his input qubits.
引用
收藏
页码:1864 / 1871
页数:8
相关论文
共 50 条
  • [1] Application of Blind Quantum Computation to Two-Party Quantum Computation
    Zhiyuan Sun
    Qin Li
    Fang Yu
    Wai Hong Chan
    International Journal of Theoretical Physics, 2018, 57 : 1864 - 1871
  • [2] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [3] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [4] Secure Two-Party Computation in a Quantum World
    Buescher, Niklas
    Demmler, Daniel
    Karvelas, Nikolaos P.
    Katzenbeisser, Stefan
    Kraemer, Juliane
    Rathee, Deevashwer
    Schneider, Thomas
    Struck, Patrick
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
  • [5] A novel quantum scheme for secure two-party distance computation
    Zhen-wan Peng
    Run-hua Shi
    Hong Zhong
    Jie Cui
    Shun Zhang
    Quantum Information Processing, 2017, 16
  • [6] A novel quantum solution to secure two-party distance computation
    Peng, Zhen-wan
    Shi, Run-hua
    Wang, Pan-hong
    Zhang, Shun
    QUANTUM INFORMATION PROCESSING, 2018, 17 (06)
  • [7] A novel quantum solution to secure two-party distance computation
    Zhen-wan Peng
    Run-hua Shi
    Pan-hong Wang
    Shun Zhang
    Quantum Information Processing, 2018, 17
  • [8] Complete Insecurity of Quantum Protocols for Classical Two-Party Computation
    Buhrman, Harry
    Christandl, Matthias
    Schaffner, Christian
    PHYSICAL REVIEW LETTERS, 2012, 109 (16)
  • [9] A novel quantum scheme for secure two-party distance computation
    Peng, Zhen-wan
    Shi, Run-hua
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    QUANTUM INFORMATION PROCESSING, 2017, 16 (12)
  • [10] Quantum secure two-party computation for set intersection with rational players
    Arpita Maitra
    Quantum Information Processing, 2018, 17