Cyber security in the quantum era
Cyber security in the quantum era Page 1 120 COMMUNICATIONS OF THE ACM | APRIL 2019
| VOL. 62 | NO. 4 review articles CYBER SECURITY DEALS with the protection of computer …
| VOL. 62 | NO. 4 review articles CYBER SECURITY DEALS with the protection of computer …
A cryptographic test of quantumness and certifiable randomness from a single quantum device
We consider a new model for the testing of untrusted quantum devices, consisting of a single
polynomial time bounded quantum device interacting with a classical polynomial time …
polynomial time bounded quantum device interacting with a classical polynomial time …
Classical homomorphic encryption for quantum circuits
U Mahadev - SIAM Journal on Computing, 2020 - SIAM
We present the first leveled fully homomorphic encryption scheme for quantum circuits with
classical keys. The scheme allows a classical client to blindly delegate a quantum …
classical keys. The scheme allows a classical client to blindly delegate a quantum …
Computationally-secure and composable remote state preparation
We introduce a protocol between a classical polynomial-time verifier and a quantum
polynomial-time prover that allows the verifier to securely delegate to the prover the …
polynomial-time prover that allows the verifier to securely delegate to the prover the …
Verifiable blind quantum computing with trapped ions and single photons
We report the first hybrid matter-photon implementation of verifiable blind quantum
computing. We use a trapped-ion quantum server and a client-side photonic detection …
computing. We use a trapped-ion quantum server and a client-side photonic detection …
Qfactory: Classically-instructed remote secret qubits preparation
The functionality of classically-instructed remotely prepared random secret qubits was
introduced in (Cojocaru et al. 2018) as a way to enable classical parties to participate in …
introduced in (Cojocaru et al. 2018) as a way to enable classical parties to participate in …
Security limitations of classical-client delegated quantum computing
Secure delegated quantum computing allows a computationally weak client to outsource an
arbitrary quantum computation to an untrusted quantum server in a privacy-preserving …
arbitrary quantum computation to an untrusted quantum server in a privacy-preserving …
Lattice-based quantum advantage from rotated measurements
Trapdoor claw-free functions (TCFs) are immensely valuable in cryptographic interactions
between a classical client and a quantum server. Typically, a protocol has the quantum …
between a classical client and a quantum server. Typically, a protocol has the quantum …
A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox
The security of digital information is one of the most unavoidable issue in current digital
world. The existing world facing number of digital information breaches due to weak …
world. The existing world facing number of digital information breaches due to weak …
An efficient public key cryptosystem based on dihedral group and quantum spin states
The enciphering schemes based on medium transformations by following the strict
guidelines are almost used everywhere. We have developed the structure to simulate the …
guidelines are almost used everywhere. We have developed the structure to simulate the …