• Open Access

Flow Ambiguity: A Path Towards Classically Driven Blind Quantum Computation

Atul Mantri, Tommaso F. Demarie, Nicolas C. Menicucci, and Joseph F. Fitzsimons
Phys. Rev. X 7, 031004 – Published 11 July 2017

Abstract

Blind quantum computation protocols allow a user to delegate a computation to a remote quantum computer in such a way that the privacy of their computation is preserved, even from the device implementing the computation. To date, such protocols are only known for settings involving at least two quantum devices: either a user with some quantum capabilities and a remote quantum server or two or more entangled but noncommunicating servers. In this work, we take the first step towards the construction of a blind quantum computing protocol with a completely classical client and single quantum server. Specifically, we show how a classical client can exploit the ambiguity in the flow of information in measurement-based quantum computing to construct a protocol for hiding critical aspects of a computation delegated to a remote quantum computer. This ambiguity arises due to the fact that, for a fixed graph, there exist multiple choices of the input and output vertex sets that result in deterministic measurement patterns consistent with the same fixed total ordering of vertices. This allows a classical user, computing only measurement angles, to drive a measurement-based computation performed on a remote device while hiding critical aspects of the computation.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Received 1 September 2016

DOI:https://doi.org/10.1103/PhysRevX.7.031004

Published by the American Physical Society under the terms of the Creative Commons Attribution 3.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.

Published by the American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & Technology

Authors & Affiliations

Atul Mantri1,2, Tommaso F. Demarie1,2,†, Nicolas C. Menicucci3,4,*, and Joseph F. Fitzsimons1,2,‡

  • 1Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372
  • 2Centre for Quantum Technologies, National University of Singapore, Block S15, 3 Science Drive 2, Singapore 117543
  • 3Centre for Quantum Computation and Communication Technology, School of Science, RMIT University, Melbourne, Victoria 3001, Australia
  • 4School of Physics, The University of Sydney, Sydney, New South Wales 2006, Australia

  • *ncmenicucci@gmail.com
  • tommaso_demarie@sutd.edu.sg
  • joseph_fitzsimons@sutd.edu.sg

Popular Summary

As with the first conventional computers, the first quantum computers will likely be hosted only by major institutions. A client wishing to use one may have to rely on “cloud-based” quantum computing, where data are stored and manipulated at a remote site. In such a setting, privacy becomes an important concern. A protocol is needed for delegating quantum computation in a way that hides the work from the server performing it. All current protocols require the client to possess quantum capabilities, such as the ability to prepare or measure quantum states, or they require multiple noncommunicating servers. This limits the feasibility of secure cloud-based quantum computing to locations with extensive quantum networks. We show how an ordinary user without access to special quantum technology can hide critical aspects of a computation delegated to a remote quantum computer.

Our protocol exploits the ambiguity in the flow of information in a measurement-based quantum computer. The uncertainty arises because there are multiple ways to interpret a sequence of measurements on a cluster state as a quantum computation, if the logic for deciding dependencies between measurement settings is not known. During a run of this protocol, there are exponentially many choices of computation for the client, and the quantum server never receives enough information to unambiguously identify the client’s choice from her communication, even if the server actively deviates from the protocol.

Our intent is to demonstrate that it is possible for a client equipped only with a classical computer to obfuscate her choice of quantum computation from a malicious quantum server. While we do not offer a full solution, the results support the possibility of making secure cloud quantum computing accessible to a wider population using existing communications infrastructure.

Key Image

Article Text

Click to Expand

References

Click to Expand
Issue

Vol. 7, Iss. 3 — July - September 2017

Subject Areas
Reuse & Permissions
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review X

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 3.0 License. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

×

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×