Application of Blind Quantum Computation to Two-Party Quantum Computation

被引:7
|
作者
Sun, Zhiyuan [1 ]
Li, Qin [1 ]
Yu, Fang [2 ]
Chan, Wai Hong [3 ]
机构
[1] Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Peoples R China
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[3] Educ Univ Hong Kong, Dept Math & Informat Technol, Tai Po, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Blind quantum computation; Two-party quantum computation;
D O I
10.1007/s10773-018-3711-9
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Blind quantum computation (BQC) allows a client who has only limited quantum power to achieve quantum computation with the help of a remote quantum server and still keep the client's input, output, and algorithm private. Recently, Kashefi and Wallden extended BQC to achieve two-party quantum computation which allows two parties Alice and Bob to perform a joint unitary transform upon their inputs. However, in their protocol Alice has to prepare rotated single qubits and perform Pauli operations, and Bob needs to have a powerful quantum computer. In this work, we also utilize the idea of BQC to put forward an improved two-party quantum computation protocol in which the operations of both Alice and Bob are simplified since Alice only needs to apply Pauli operations and Bob is just required to prepare and encrypt his input qubits.
引用
收藏
页码:1864 / 1871
页数:8
相关论文
共 50 条
  • [21] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [22] On Statistical Security in Two-Party Computation
    Khurana, Dakshita
    Mughees, Muhammad Haris
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 532 - 561
  • [23] Secrecy of two-party secure computation
    Chiang, YT
    Wang, DW
    Liau, CJ
    Hsu, TS
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
  • [24] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
  • [25] LEGO for Two-Party Secure Computation
    Nielsen, Jesper Buus
    Orlandi, Claudio
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 368 - 386
  • [26] Efficient Covert Two-Party Computation
    Jarecki, Stanislaw
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 644 - 674
  • [27] On the Power of Secure Two-Party Computation
    Carmit Hazay
    Muthuramakrishnan Venkitasubramaniam
    Journal of Cryptology, 2020, 33 : 271 - 318
  • [28] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    JOURNAL OF CRYPTOLOGY, 2020, 33 (01) : 271 - 318
  • [29] Blind quantum computation
    Arrighi, Pablo
    Salvail, Louis
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2006, 4 (05) : 883 - 898
  • [30] Blind Quantum Signature with Blind Quantum Computation
    Li, Wei
    Shi, Ronghua
    Guo, Ying
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (04) : 1108 - 1115