Application of Blind Quantum Computation to Two-Party Quantum Computation
- 42 Downloads
Blind quantum computation (BQC) allows a client who has only limited quantum power to achieve quantum computation with the help of a remote quantum server and still keep the client’s input, output, and algorithm private. Recently, Kashefi and Wallden extended BQC to achieve two-party quantum computation which allows two parties Alice and Bob to perform a joint unitary transform upon their inputs. However, in their protocol Alice has to prepare rotated single qubits and perform Pauli operations, and Bob needs to have a powerful quantum computer. In this work, we also utilize the idea of BQC to put forward an improved two-party quantum computation protocol in which the operations of both Alice and Bob are simplified since Alice only needs to apply Pauli operations and Bob is just required to prepare and encrypt his input qubits.
KeywordsBlind quantum computation Two-party quantum computation
We would like to thank Zhulin Li, Chengdong Liu, and Yu Peng for useful discussion and suggestion. This work was supported by the Joint Funds of the National Natural Science Foundation of China and China General Technology Research Institute (Grant No. U1736113), and the Hunan Provincial Natural Science Foundation of China (Grant No. 2018JJ2403).
- 1.Nielsen, M.A., Chuang, I.L: Quantum Computation and Quantum Information. Cambridge University Press (2010)Google Scholar
- 2.Shor, P.W.: In: Proceedings of the 35th Annual IEEE Symposium on the Foundations of Computer Science, pp. 124–134 (1994)Google Scholar
- 6.Childs, A.M.: Quant. Inf. Comput. 5, 456 (2005)Google Scholar
- 8.Broadbent, A., Fitzsimons, J., Kashefi, E.: In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, pp. 517–526 (2009)Google Scholar
- 14.Sheng, Y.B., Zhou, L.: Available at arXiv:1609.08902 (2016)
- 15.Kashefi, E., Wallden, P.: Available at arXiv:1510.07408 (2015)
- 26.Kashefi, E., Pappa, A.: Available at arXiv:1606.09200 (2016)
- 28.Yao, A.C.: In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)Google Scholar
- 29.Dupuis, F., Nielsen, J.B., Salvail, L.: In: Advances in Cryptology-Crypto 2010, pp. 685–706 (2010)Google Scholar
- 30.Naor, M., Pinkas, B.: In: Proceedings of the 31st Annual ACM Symposium on Theory of Computing, pp. 245–254 (1999)Google Scholar
- 35.Du, F.F., Deng, F.G.: Science china physics. Mech. Astron. 58, 040303 (2015)Google Scholar