Blind quantum computation

被引:93
|
作者
Arrighi, Pablo [1 ]
Salvail, Louis [1 ]
机构
[1] IMAG, Lab Leibniz, Inst Informat & Math Appl Grenoble, CNRS,UMR 5522, F-38081 Grenoble, France
基金
英国工程与自然科学研究理事会;
关键词
secure circuit evaluation; secure two-party computation; information hiding; information gain versus disturbance; quantum cryptography;
D O I
10.1142/S0219749906002171
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate the possibility of having someone carry out the work of executing a function for you, but without letting him learn anything about your input. Say Alice wants Bob to compute some known function f upon her input x, but wants to prevent Bob from learning anything about x. The situation arises for instance if client Alice has limited computational resources in comparison with mistrusted server Bob, or if x is an inherently mobile piece of data. Could there be a protocol whereby Bob is forced to compute f (x) blindly, i.e. without observing x? We provide such a blind computation protocol for the class of functions which admit an efficient procedure to generate random input-output pairs, e.g. factorization. The cheat-sensitive security achieved relies only upon quantum theory being true. The security analysis carried out assumes the eavesdropper performs individual attacks.
引用
收藏
页码:883 / 898
页数:16
相关论文
共 50 条
  • [31] Blind Quantum Computation with Two Decoy States
    Zhao, Qiang
    Li, Qiong
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 2, 2017, 64 : 155 - 162
  • [32] Blind quantum computation with fewer quantum and delegated cost of client
    Yan, Yu-Zhan
    Yang, Zhen
    Wu, Guang-Yang
    Luo, Yuan-Mao
    Bai, Ming-Qiang
    Mo, Zhi-Wen
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2025,
  • [33] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [34] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [35] Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation
    Shi, Ronghua
    Ding, Wanting
    Shi, Jinjing
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 57 (07) : 1961 - 1973
  • [36] Private quantum computation: an introduction to blind quantum computing and related protocols
    Joseph F. Fitzsimons
    npj Quantum Information, 3
  • [38] Single-server blind quantum computation with quantum circuit model
    Xiaoqian Zhang
    Jian Weng
    Xiaochun Li
    Weiqi Luo
    Xiaoqing Tan
    Tingting Song
    Quantum Information Processing, 2018, 17
  • [39] Private quantum computation: an introduction to blind quantum computing and related protocols
    Fitzsimons, Joseph F.
    NPJ QUANTUM INFORMATION, 2017, 3
  • [40] Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation
    Ronghua Shi
    Wanting Ding
    Jinjing Shi
    International Journal of Theoretical Physics, 2018, 57 : 1961 - 1973