Private quantum computation: an introduction to blind quantum computing and related protocols
JF Fitzsimons - npj Quantum Information, 2017 - nature.com
Quantum technologies hold the promise of not only faster algorithmic processing of data, via
quantum computation, but also of more secure communications, in the form of quantum …
quantum computation, but also of more secure communications, in the form of quantum …
Fully device independent quantum key distribution
U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
Classical command of quantum systems
Quantum computation and cryptography both involve scenarios in which a user interacts
with an imperfectly modelled or 'untrusted'system. It is therefore of fundamental and practical …
with an imperfectly modelled or 'untrusted'system. It is therefore of fundamental and practical …
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
We consider a game in which two separate laboratories collaborate to prepare a quantum
system and are then asked to guess the outcome of a measurement performed by a third …
system and are then asked to guess the outcome of a measurement performed by a third …
Robustness and device independence of verifiable blind quantum computing
Recent advances in theoretical and experimental quantum computing bring us closer to
scalable quantum computing devices. This makes the need for protocols that verify the …
scalable quantum computing devices. This makes the need for protocols that verify the …
Verifier-on-a-leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
The problem of reliably certifying the outcome of a computation performed by a quantum
device is rapidly gaining relevance. We present two protocols for a classical verifier to …
device is rapidly gaining relevance. We present two protocols for a classical verifier to …
Interactive proofs for BQP via self-tested graph states
M McKague - arxiv preprint arxiv:1309.5675, 2013 - arxiv.org
Using the measurement-based quantum computation model, we construct interactive proofs
with non-communicating quantum provers and a classical verifier. Our construction gives …
with non-communicating quantum provers and a classical verifier. Our construction gives …
[BOOK][B] Quantum algorithms for linear algebra and machine learning
A Prakash - 2014 - search.proquest.com
Most quantum algorithms offering speedups over classical algorithms are based on the
three techniques of phase estimation, amplitude estimation and Hamiltonian simulation. In …
three techniques of phase estimation, amplitude estimation and Hamiltonian simulation. In …
Rigidity of quantum steering and one-sided device-independent verifiable quantum computation
The relationship between correlations and entanglement has played a major role in
understanding quantum theory since the work of Einstein et al (1935 Phys. Rev. 47 777–80) …
understanding quantum theory since the work of Einstein et al (1935 Phys. Rev. 47 777–80) …
Direct certification of a class of quantum simulations
One of the main challenges in the field of quantum simulation and computation is to identify
ways to certify the correct functioning of a device when a classical efficient simulation is not …
ways to certify the correct functioning of a device when a classical efficient simulation is not …