Secure Quantum Computation with Classical Communication

被引:7
|
作者
Bartusek, James [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
关键词
D O I
10.1007/978-3-030-90459-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The study of securemulti-party computation (MPC) has thus far been limited to the following two settings: every party is fully classical, or every party has quantum capabilities. This paper studies a notion of MPC that allows some classical and some quantum parties to securely compute a quantum functionality over their joint private inputs. In particular, we construct constant-round composable protocols for blind and verifiable classical delegation of quantum computation, and give applications to secure quantum computation with classical communication. Assuming QLWE (the quantum hardness of learning with errors), we obtain the following (maliciously-secure) protocols for computing any BQP (bounded-error quantum polynomial-time) functionality. - A six-round protocol between one quantum server and multiple classical clients in the CRS (common random string) model. - A three-round protocol between one quantum server and multiple classical clients in the PKI (public-key infrastructure) + QRO (quantum random oracle) model. - A two-message protocol between quantum sender and classical receiver (a quantum non-interactive secure computation protocol), in the QRO model. To enable composability of classical verification of quantum computation, we require the notion of malicious blindness, which stipulates that the prover does not learn anything about the verifier's delegated computation, even if it is able to observe whether or not the verifier accepted the proof. To construct a protocol with malicious blindness, we use a classical verification protocol for sampBQP computation (Chung et al., Arxiv 2020), which in general has inverse polynomial soundness error, to prove honest evaluation of QFHE (quantum fully-homomorphic encryption) ciphertexts with negligible soundness error. Obtaining a constant-round protocol requires a strong parallel repetition theorem for classical verification of quantum computation, which we show following the "nearly orthogonal projector" proof strategy (Alagic et al., TCC 2020).
引用
收藏
页码:1 / 30
页数:30
相关论文
共 50 条
  • [1] Classical noise, quantum noise and secure communication
    Tannous, C.
    Langlois, J.
    [J]. EUROPEAN JOURNAL OF PHYSICS, 2016, 37 (01)
  • [2] Secure quantum communication using classical correlated channel
    D. Costa
    N. G. de Almeida
    C. J. Villas-Boas
    [J]. Quantum Information Processing, 2016, 15 : 4303 - 4311
  • [3] Secure Quantum Network Code without Classical Communication
    Song, Seunghoan
    Hayashi, Masahito
    [J]. 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 126 - 130
  • [4] Secure quantum communication using classical correlated channel
    Costa, D.
    de Almeida, N. G.
    Villas-Boas, C. J.
    [J]. QUANTUM INFORMATION PROCESSING, 2016, 15 (10) : 4303 - 4311
  • [5] From Classical to Semi-Quantum Secure Communication
    Gagliano, Allison
    Krawec, Walter O.
    Iqbal, Hasan
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1707 - 1711
  • [6] Secure Quantum Network Code Without Classical Communication
    Song, Seunghoan
    Hayashi, Masahito
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (02) : 1178 - 1192
  • [7] Classical-Operation-Based Deterministic Secure Quantum Communication
    Liu, Zhi-Hao
    Chen, Han-Wu
    Wang, Dong
    Xue, Xi-Ling
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (06) : 2118 - 2129
  • [8] Classical-Operation-Based Deterministic Secure Quantum Communication
    Zhi-Hao Liu
    Han-Wu Chen
    Dong Wang
    Xi-Ling Xue
    [J]. International Journal of Theoretical Physics, 2014, 53 : 2118 - 2129
  • [9] Quantum secure direct communication and deterministic secure quantum communication
    Long G.-L.
    Deng F.-G.
    Wang C.
    Li X.-H.
    Wen K.
    Wang W.-Y.
    [J]. Frontiers of Physics in China, 2007, 2 (3): : 251 - 272
  • [10] On the Communication Complexity of Secure Computation
    Data, Deepesh
    Prabhakaran, Manoj M.
    Prabhakaran, Vinod M.
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 199 - 216