Actively Secure Two-Party Evaluation of Any Quantum Operation

* Final gross prices may vary according to local VAT.

Get Access


We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map , given as a quantum circuit, upon their joint quantum input state . Our protocol leaks no more to any active adversary than an ideal functionality for provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4].

The first author was supported by Canada’s NSERC Postdoctoral Fellowship Program and by the Swiss National Science Foundation via the National Center of Competence QSIT.
The second author was partially supported by an European Research Council, Starting Grant, number 279447 and the Danish National Research Foundation and the National Science Foundation of China (under the grant 61061130540) for the Sino-Danish Center for the Theory of Interactive Computation.
The third author was supported by Canada’s NSERC discovery grant, FREQUENCY(NSERC), the QuantumWorks networks(NSERC), and INTRIQ(FQRNT).