Verification of quantum computation: An overview of existing approaches

A Gheorghiu, T Kapourniotis, E Kashefi - Theory of computing systems, 2019 - Springer
Quantum computers promise to efficiently solve not only problems believed to be intractable
for classical computers, but also problems for which verifying the solution is also considered …

Faster packed homomorphic operations and efficient circuit bootstrap** for TFHE

I Chillotti, N Gama, M Georgieva… - … Conference on the Theory …, 2017 - Springer
In this paper, we present several methods to improve the evaluation of homomorphic
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …

Improved multiparty quantum private comparison based on quantum homomorphic encryption

JW Zhang, G Xu, XB Chen, Y Chang… - Physica A: Statistical …, 2023 - Elsevier
Quantum homomorphic encryption has obvious superiority in privacy protection. In this
paper, we propose an improved multiparty quantum private comparison protocol based on …

Verifier-on-a-leash: new schemes for verifiable delegated quantum computation, with quasilinear resources

A Coladangelo, AB Grilo, S Jeffery, T Vidick - … international conference on …, 2019 - Springer
The problem of reliably certifying the outcome of a computation performed by a quantum
device is rapidly gaining relevance. We present two protocols for a classical verifier to …

[PDF][PDF] How to use quantum indistinguishability obfuscation

A Coladangelo, S Gunn - Proceedings of the 56th Annual ACM …, 2024 - dl.acm.org
Quantum copy protection, introduced by Aaronson, enables giving out a quantum program-
description that cannot be meaningfully duplicated. Despite over a decade of study, copy …

Obfuscation of pseudo-deterministic quantum circuits

J Bartusek, F Kitagawa, R Nishimaki… - Proceedings of the 55th …, 2023 - dl.acm.org
We show how to obfuscate pseudo-deterministic quantum circuits, assuming the quantum
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …

QFactory: classically-instructed remote secret qubits preparation

A Cojocaru, L Colisson, E Kashefi… - Advances in Cryptology …, 2019 - Springer
The functionality of classically-instructed remotely prepared random secret qubits was
introduced in (Cojocaru et al. 2018) as a way to enable classical parties to participate in …

Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing

C Gong, J Du, Z Dong, Z Guo, A Gani, L Zhao… - Quantum Information …, 2020 - Springer
Existing classical ciphertext retrieval schemes are mainly developed according to the
homomorphic encryption that is a cryptographic technique based on computational …

Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation

J Liu, Q Li, J Quan, C Wang, J Shi, H Situ - Designs, Codes and …, 2022 - Springer
Quantum homomorphic encryption (QHE) allows computation on encrypted data by
employing the principles of quantum mechanics. Usually, only one evaluator is chosen to …

Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing

XB Chen, YR Sun, G Xu, YX Yang - Information Sciences, 2019 - Elsevier
Quantum homomorphic encryption provides the ability to perform calculations on encrypted
data without decrypting them. The number of evaluators in most previous schemes is 1, and …