Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. arXiv preprint arXiv:0810.5375 (2008)
Aaronson, S., Cojocaru, A., Gheorghiu, A., Kashefi, E.: Complexity-theoretic limitations on blind delegated quantum computation. In: 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019) (2019)
Google Scholar
Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 195–203. ACM (1987)
Google Scholar
Badertscher, C., et al.: Security limitations of classical-client delegated quantum computing. Cryptology ePrint Archive, Report 2020/818 (2020). https://eprint.iacr.org/2020/818 (full version)
Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation. In: 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2009, pp. 517–526. IEEE (2009)
Google Scholar
Broadbent, A., Jeffery, S.: Quantum homomorphic encryption for circuits of low T-gate complexity. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 609–629. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48000-7_30
CrossRef
Google Scholar
Ben-Or, M., Mayers, D.: General security definition and composability for quantum & classical protocols. arXiv preprint quant-ph/0409062 (2004)
Google Scholar
Brakerski, Z.: Quantum FHE (almost) as secure as classical. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 67–95. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96878-0_3
CrossRef
Google Scholar
Broadbent, A.: Delegating private quantum computations. Can. J. Phys. 93(9), 941–946 (2015)
CrossRef
Google Scholar
Broadbent, A.: How to verify a quantum computation. arXiv preprint arXiv:1509.09180 (2015)
Cojocaru, A., Colisson, L., Kashefi, E., Wallden, P.: On the possibility of classical client blind quantum computing. arXiv preprint arXiv:1802.08759 (2018)
Cojocaru, A., Colisson, L., Kashefi, E., Wallden, P.: QFactory: classically-instructed remote secret qubits preparation. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 615–645. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34578-5_22
CrossRef
Google Scholar
Childs, A.M.: Secure assisted quantum computation. Quantum Inf. Comput. 5(6), 456–466 (2005)
MathSciNet
MATH
Google Scholar
Dunjko, V., Fitzsimons, J.F., Portmann, C., Renner, R.: Composable security of delegated quantum computation. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 406–425. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45608-8_22
CrossRef
Google Scholar
Danos, V., Kashefi, E.: Determinism in the one-way model. Phys. Rev. A 74(5), 052310 (2006)
CrossRef
Google Scholar
Dunjko, V., Kashefi, E.: Blind quantum computing with two almost identical states. arXiv preprint arXiv:1604.01586 (2016)
Dunjko, V., Kashefi, E., Leverrier, A.: Blind quantum computing with weak coherent pulses. Phys. Rev. Lett. 108(20), 200502 (2012)
CrossRef
Google Scholar
Davies, E.B., Lewis, J.T.: An operational approach to quantum probability. Commun. Math. Phys. 17(3), 239–260 (1970)
MathSciNet
CrossRef
Google Scholar
Dulek, Y., Schaffner, C., Speelman, F.: Quantum homomorphic encryption for polynomial-sized circuits. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9816, pp. 3–32. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53015-3_1
CrossRef
Google Scholar
Fitzsimons, J.F., Hajdušek, M., Morimae, T.: Post hoc verification of quantum computation. Phys. Rev. Lett. 120(4), 040501 (2018)
MathSciNet
CrossRef
Google Scholar
Fitzsimons, J.F.: Private quantum computation: an introduction to blind quantum computing and related protocols. NPJ Quantum Inf. 3(1), 23 (2017)
CrossRef
Google Scholar
Fitzsimons, J.F., Kashefi, E.: Unconditionally verifiable blind quantum computation. Phys. Rev. A 96(1), 012303 (2017)
CrossRef
Google Scholar
Gheorghiu, A., Kapourniotis, T., Kashefi, E.: Verification of quantum computation: an overview of existing approaches. Theory Comput. Syst. 63(4), 715–808 (2019)
MathSciNet
CrossRef
Google Scholar
Goldreich, O.: Foundations of Cryptography. Cambridge University Press, Cambridge (2001)
CrossRef
Google Scholar
Ghirardi, G.C., Rimini, A., Weber, T.: A general argument against superluminal transmission through the quantum mechanical measurement process. Lettere al Nuovo Cimento (1971–1985) 27, 293–298 (1980)
Google Scholar
Gheorghiu, A., Vidick, T.: Computationally-secure and composable remote state preparation. In: 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS), pp. 1024–1033 (2019)
Google Scholar
Hayashi, M., Morimae, T.: Verifiable measurement-only blind quantum computing with stabilizer testing. Phys. Rev. Lett. 115(22), 220502 (2015)
CrossRef
Google Scholar
Jost, D., Maurer, U.: Context-restricted indifferentiability: generalizing UCE and implications on the soundness of hash-function constructions. IACR Cryptology ePrint Archive 2017:461 (2017)
Google Scholar
Kashefi, E., Music, L., Wallden, P.: The quantum cut-and-choose technique and quantum two-party computation. arXiv preprint arXiv:1703.03754 (2017)
Kashefi, E., Pappa, A.: Multiparty delegated quantum computing. Cryptography 1(2), 12 (2017)
CrossRef
Google Scholar
Kashefi, E., Wallden, P.: Garbled quantum computation. Cryptography 1(1), 6 (2017)
CrossRef
Google Scholar
Mahadev, U.: Classical homomorphic encryption for quantum circuits. In: Thorup, M. (ed.) 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, 7–9 October 2018, pp. 332–338. IEEE Computer Society (2018)
Google Scholar
Mahadev, U.: Classical verification of quantum computations. In: Thorup, M. (ed.) 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, 7–9 October 2018, pp. 259–267. IEEE Computer Society (2018)
Google Scholar
Mantri, A.: Secure delegated quantum computing, Ph.d. thesis (2019)
Google Scholar
Maurer, U.: Constructive cryptography – a new paradigm for security definitions and proofs. In: Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol. 6993, pp. 33–56. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27375-9_3
CrossRef
MATH
Google Scholar
Mantri, A., Demarie, T.F., Fitzsimons, J.F.: Universality of quantum computation with cluster states and (X, Y)-plane measurements. Sci. Rep. 7, 42861 (2017)
CrossRef
Google Scholar
Mantri, A., Demarie, T.F., Menicucci, N.C., Fitzsimons, J.F.: Flow ambiguity: a path towards classically driven blind quantum computation. Phys. Rev. X 7(3), 031004 (2017)
Google Scholar
Morimae, T., Fujii, K.: Blind quantum computation protocol in which alice only makes measurements. Phys. Rev. A 87(5), 050301 (2013)
CrossRef
Google Scholar
Morimae, T., Koshiba, T.: Composable security of measuring-alice blind quantum computation. arXiv preprint arXiv:1306.2113 (2013)
Morimae, T., Koshiba, T.: Impossibility of perfectly-secure delegated quantum computing for classical client. arXiv preprint arXiv:1407.1636 (2014)
Maurer, U., Renner, R.: Abstract cryptography. In: Innovations in Computer Science. Citeseer (2011)
Google Scholar
Nielsen, M.A., Chuang, I.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)
MATH
Google Scholar
Nielsen, M.A.: Cluster-state quantum computation. Rep. Math. Phys. 57(1), 147–161 (2006)
MathSciNet
CrossRef
Google Scholar
Raussendorf, R., Briegel, H.J.: A one-way quantum computer. Phys. Rev. Lett. 86(22), 5188 (2001)
CrossRef
Google Scholar
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 34 (2009)
MathSciNet
CrossRef
Google Scholar
Reichardt, B.W., Unger, F., Vazirani, U.: A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games. arXiv preprint arXiv:1209.0448 (2012)
Takeuchi, Y., Mantri, A., Morimae, T., Mizutani, A., Fitzsimons, J.F.: Resource-efficient verification of quantum computing using Serfling’s bound. arXiv preprint arXiv:1806.09138 (2018)
Unruh, D.: Simulatable security for quantum protocols. arXiv preprint quant-ph/0409125 (2004)
Google Scholar
Unruh, D.: Universally composable quantum multi-party computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 486–505. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_25
CrossRef
Google Scholar
Vidick, T.: Verifying quantum computations at scale: a cryptographic leash on quantum devices. Bull. Am. Math. Soc. 57(1), 39–76 (2020)
MathSciNet
CrossRef
Google Scholar
Zhang, J.: Succinct blind quantum computation using a random oracle. arXiv, abs/2004.12621 (2020)
Google Scholar