• Editors' Suggestion
  • Open Access

Verifying BQP Computations on Noisy Devices with Minimal Overhead

Dominik Leichtle, Luka Music, Elham Kashefi, and Harold Ollivier
PRX Quantum 2, 040302 – Published 4 October 2021

Abstract

With the development of delegated quantum computation, clients will want to ensure confidentiality of their data and algorithms and the integrity of their computations. While protocols for blind and verifiable quantum computation exist, they suffer from high overheads and from oversensitivity: when running on noisy devices, imperfections trigger the same detection mechanisms as malicious attacks, resulting in perpetually aborted computations. We introduce the first blind and verifiable protocol for delegating bounded-error quantum polynomial (BQP) computations to a powerful server, with repetition as the only overhead. It is composable and statistically secure with exponentially low bounds and can tolerate a constant amount of global noise.

  • Figure
  • Figure
  • Received 14 January 2021
  • Revised 31 May 2021
  • Accepted 8 July 2021

DOI:https://doi.org/10.1103/PRXQuantum.2.040302

Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.

Published by the American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & Technology

Authors & Affiliations

Dominik Leichtle1, Luka Music1, Elham Kashefi2,1, and Harold Ollivier3,1,*

  • 1Laboratoire d’Informatique de Paris 6, CNRS, Sorbonne Université, 4 Place Jussieu, Paris 75005, France
  • 2School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, United Kingdom
  • 3INRIA, 2 rue Simone Iff, Paris 75012, France

  • *harold.ollivier@inria.fr

Popular Summary

Recent advances in quantum computing suggest that most machines will be accessed remotely and computations will be delegated to service providers. In such a setting, the confidentiality of the data and the code, as well as the integrity of the computation cannot be guaranteed a priori. Schemes for blind and verified computations have been proposed in the past, but are far from being practical as they induce large overheads. We report the first verification scheme where each round can tolerate a constant amount of noise without compromising security.

In previous schemes, the overheads are due to fault-tolerant encoding used for boosting their attack detection capability. For limited resource devices, requiring high security would be impractical as no more qubits would be left for the computation itself. We removed this burden for all BQP computations by devising a new amplification scheme for attack detection. It is based on the repetition of several rounds of computation interleaved by testing rounds aimed at guaranteeing that the service provider is behaving honestly. The advantage of this scheme is twofold. First, exponential information-theoretic security is obtained with the only overhead being a polynomial number of repetitions. This means that all available qubits can be devoted to computation. Second, the scheme is robust in the sense that it can cope with noise and return the correct result with probability exponentially close to 1 as long as the probability to fail a single test run is less than 25%.

We believe this scheme will be a motivation for hardware providers to integrate verifiability as a capability of their future quantum architecture as well as a feature that will be demanded by end users to protect their intellectual property.

Key Image

Article Text

Click to Expand

References

Click to Expand
Issue

Vol. 2, Iss. 4 — October - December 2021

Reuse & Permissions
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from PRX Quantum

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 4.0 International license. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

×

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×