How to Verify a Quantum Computation

被引:33
|
作者
Broadbent, Anne [1 ]
机构
[1] Univ Ottawa, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
complexity theory; cryptography; interactive proofs; quantum computing; quantum interactive proofs; quantum cryptography; UNIVERSAL;
D O I
10.4086/toc.2018.v014a011
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We give a new theoretical solution to a leading-edge experimental challenge, namely to the verification of quantum computations in the regime of high computational complexity. Our results are given in the language of quantum interactive proof systems. Specifically, we show that any language in BQP has a quantum interactive proof system with a polynomial-time classical verifier (who can also prepare random single-qubit pure states), and a quantum polynomial-time prover. Here, soundness is unconditional-i. e., it holds even for computationally unbounded provers. Compared to prior work achieving similar results, our technique does not require the encoding of the input or of the computation; instead, we rely on encryption of the input (together with a method to perform computations on encrypted inputs), and show that the random choice between three types of input (defining a computational run, versus two types of test runs) suffices. Because the overhead is very low for each run (it is linear in the size of the circuit), this shows that verification could be achieved at minimal cost compared to performing the computation. As a proof technique, we use a reduction to an entanglement-based protocol; to the best of our knowledge, this is the first time this technique has been used in the context of verification of quantum computations, and it enables a relatively straightforward analysis.
引用
收藏
页数:37
相关论文
共 50 条
  • [1] How to verify identity in the continuous variable quantum system?
    Xing-Qiang Zhao
    Hai Wan
    Lv-Zhou Li
    Quantum Information Processing, 22
  • [2] How to verify identity in the continuous variable quantum system?
    Zhao, Xing-Qiang
    Wan, Hai
    Li, Lv-Zhou
    QUANTUM INFORMATION PROCESSING, 2023, 22 (05)
  • [3] Verify a Computation by Checking the Result
    Parnas, David Lorge
    COMMUNICATIONS OF THE ACM, 2015, 58 (05) : 8 - 8
  • [4] HOW TO VERIFY
    KELLY, M
    NATURE, 1986, 323 (6088) : 484 - 484
  • [5] How powerful is adiabatic quantum computation?
    van Dam, W
    Mosca, M
    Vazirani, U
    42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 279 - 287
  • [6] How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
    Parno, Bryan
    Raykova, Mariana
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 422 - 439
  • [7] Distributed quantum computation - how does it scale?
    Nemoto, Kae
    Hanks, Michael
    Lo Piparo, Nicolo
    Munro, William J.
    2020 IEEE PHOTONICS CONFERENCE (IPC), 2020,
  • [8] Simulating Quantum Computation: How Many "Bits" for "It"?
    Zurel, Michael
    Okay, Cihan
    Raussendorf, Robert
    PRX QUANTUM, 2024, 5 (03):
  • [9] How Does Adiabatic Quantum Computation Fit into Quantum Automata Theory?
    Yamakami, Tomoyuki
    DESCRIPTIONAL COMPLEXITY OF FORMAL SYSTEMS, DCFS 2019, 2019, 11612 : 285 - 297
  • [10] How does adiabatic quantum computation fit into quantum automata theory?
    Yamakami, Tomoyuki
    INFORMATION AND COMPUTATION, 2022, 284