Efficient Universal Blind Quantum Computation

被引:72
作者
Giovannetti, Vittorio [1 ,2 ]
Maccone, Lorenzo [3 ]
Morimae, Tomoyuki [4 ,5 ]
Rudolph, Terry G. [4 ]
机构
[1] Scuola Normale Super Pisa, NEST, I-56126 Pisa, Italy
[2] CNR, Ist Nanosci, I-56126 Pisa, Italy
[3] Univ Pavia, Ist Nazl Fis Nucl, Sez Pavia, Dipartimento Fis Alessandro Volta, I-27100 Pavia, Italy
[4] Univ London Imperial Coll Sci Technol & Med, Dept Phys, London SW7 2AZ, England
[5] Gunma Univ, ASRLD Unit, Kiryu, Gunma 3760052, Japan
关键词
KEY DISTRIBUTION; SECURITY; INFORMATION; PROOF;
D O I
10.1103/PhysRevLett.111.230501
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We give a cheat sensitive protocol for blind universal quantum computation that is efficient in terms of computational and communication resources: it allows one party to perform an arbitrary computation on a second party's quantum computer without revealing either which computation is performed, or its input and output. The first party's computational capabilities can be extremely limited: she must only be able to create and measure single-qubit superposition states. The second party is not required to use measurement-based quantum computation. The protocol requires the (optimal) exchange of O(Jlog(2)(N)) single-qubit states, where J is the computational depth and N is the number of qubits needed for the computation.
引用
收藏
页数:5
相关论文
共 33 条
[31]   Simple proof of security of the BB84 quantum key distribution protocol [J].
Shor, PW ;
Preskill, J .
PHYSICAL REVIEW LETTERS, 2000, 85 (02) :441-444
[32]   Ancilla-driven universal blind quantum computation [J].
Sueki, Takahiro ;
Koshiba, Takeshi ;
Morimae, Tomoyuki .
PHYSICAL REVIEW A, 2013, 87 (06)
[33]   Beating the photon-number-splitting attack in practical quantum cryptography [J].
Wang, XB .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)