Blind quantum computation

被引:98
作者
Arrighi, Pablo [1 ]
Salvail, Louis [1 ]
机构
[1] IMAG, Lab Leibniz, Inst Informat & Math Appl Grenoble, CNRS,UMR 5522, F-38081 Grenoble, France
基金
英国工程与自然科学研究理事会;
关键词
secure circuit evaluation; secure two-party computation; information hiding; information gain versus disturbance; quantum cryptography;
D O I
10.1142/S0219749906002171
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate the possibility of having someone carry out the work of executing a function for you, but without letting him learn anything about your input. Say Alice wants Bob to compute some known function f upon her input x, but wants to prevent Bob from learning anything about x. The situation arises for instance if client Alice has limited computational resources in comparison with mistrusted server Bob, or if x is an inherently mobile piece of data. Could there be a protocol whereby Bob is forced to compute f (x) blindly, i.e. without observing x? We provide such a blind computation protocol for the class of functions which admit an efficient procedure to generate random input-output pairs, e.g. factorization. The cheat-sensitive security achieved relies only upon quantum theory being true. The security analysis carried out assumes the eavesdropper performs individual attacks.
引用
收藏
页码:883 / 898
页数:16
相关论文
共 12 条
[1]  
Abadi M., 1990, Journal of Cryptology, V2, P1, DOI 10.1007/BF02252866
[2]   ON HIDING INFORMATION FROM AN ORACLE [J].
ABADI, M ;
FEIGENBAUM, J ;
KILIAN, J .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1989, 39 (01) :21-50
[3]  
[Anonymous], 1998, LNCS
[4]   Quantum decoys [J].
Arrighi, P .
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2004, 2 (03) :341-351
[5]  
CHILDS AM, 3211 MITCTP
[6]  
COLBECK R, QUANTPH0508149
[7]  
FEIGENBAUM J, 1986, P CRYPTO 85, P477
[8]  
FUCHS C, QUANTPH9611010
[9]  
FUCHS C, QUANTPH9512023
[10]   Cheat sensitive quantum bit commitment [J].
Hardy, L ;
Kent, A .
PHYSICAL REVIEW LETTERS, 2004, 92 (15) :157901-1