Abstract
A quantum metrology scheme can be decomposed into three quantum tasks: state preparation, parameter encoding, and measurements. Consequently, it is imperative to have access to the technologies which can execute the aforementioned tasks to fully implement a quantum metrology scheme. In the absence of one or more of these technologies, one can proceed by delegating the tasks to a third party. However, doing so has security ramifications: the third party can bias the result or leak information. In this paper, we outline different scenarios where one or more tasks are delegated to an untrusted (and possibly malicious) third party. In each scenario, we outline cryptographic protocols which can be used to circumvent malicious activity. Further, we link the effectiveness of the quantum metrology scheme to the soundness of the cryptographic protocols.
- Received 27 July 2022
- Accepted 7 November 2022
DOI:https://doi.org/10.1103/PhysRevA.106.052427
©2022 American Physical Society