Abstract
The Universal Blind Quantum Computation (UBQC) protocol allows a client to perform quantum computation on a remote server. In the UBQC with Weak Coherent Pulses (WCP), the Remote Blind qubit State Preparation (RBSP) protocol requires larger scale number of pulses for preparing one single qubit, especially the long-distance communication. In the paper, we present a modified RBSP protocol with two decoy states to reduce the required number of pulses for the client. Both theoretical analysis and simulation results demonstrate that decoy state can improve the qubit preparation efficiency of UBQC protocol greatly and two decoy states perform even better than one decoy state. What is more, the advantage of two decoy states become more highlighted with the increasing of distance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Feigenbaum, “Encrypting problem instances,” in Advances in Cryptology-CRYPTO’85 Proceedings. Springer, 1985, pp. 477–488.
M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an oracle,” in Proceedings of the nineteenth annual ACM symposium on Theory of computing. ACM, 1987, pp. 195–203.
C. Gentry et al., “Fully homomorphic encryption using ideal lattices.” in STOC, vol. 9, 2009, pp. 169–178.
A. Broadbent, J. Fitzsimons, and E. Kashefi, “Universal blind quantum computation,” in Foundations of Computer Science, 2009. FOCS’09. 50th Annual IEEE Symposium on. IEEE, Conference Proceedings, pp. 517–526.
P. Arrighi and L. Salvail, “Blind quantum computation,” International Journal of Quantum Information, vol. 4, no. 05, pp. 883–898, 2006.
V. Dunjko, E. Kashefi, and A. Leverrier, “Blind quantum computing with weak coherent pulses,” Physical review letters, vol. 108, no. 20, 2012.
W.-Y. Hwang, “Quantum key distribution with high loss: toward global secure communication,” Physical Review Letters, vol. 91, no. 5, 2003.
D. Gottesman, H.-K. Lo, N. L¨utkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,” in Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on, 2004, p. 136.
H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Physical review letters, vol. 94, no. 23, 2005.
X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Physical review letters, vol. 94, no. 23, 2005.
X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Physical Review A, vol. 72, no. 1, 2005.
Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, “Experimental quantum key distribution with decoy states,” Physical review letters, vol. 96, no. 7, 2006.
T. Schmitt-Manderbach, H.Weier, M. F¨urst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J. G. Rarity et al., “Experimental demonstration of free-space decoy-state quantum key distribution over 144 km,” Physical Review Letters, vol. 98, no. 1, 2007.
Y. Liu, T.-Y. Chen, J. Wang, W.-Q. Cai, X. Wan, L.-K. Chen, J.-H. Wang, S.-B. Liu, H. Liang, L. Yang et al., “Decoy-state quantum key distribution with polarized photons over 200 km,” Optics Express, vol. 18, no. 8, pp. 8587–8594, 2010.
K. Xu and H.-k. Lo, “Blind quantum computing with decoy states,” arXiv preprint arXiv:1508.07910, 2015.
R. Raussendorf and H. J. Briegel, “A one-way quantum computer,” Physical Re-view Letters, vol. 86, no. 22, 2001.
R. Raussendorf, D. E. Browne, and H. J. Briegel, “Measurement-based quantum computation on cluster states,” Physical review A, vol. 68, no. 2, 2003.
R. Jozsa, “An introduction to measurement based quantum computation, 2005,” arXiv preprint quant-ph/0508124.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhao, Q., Li, Q. (2017). Blind Quantum Computation with Two Decoy States. In: Pan, JS., Tsai, PW., Huang, HC. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 64. Springer, Cham. https://doi.org/10.1007/978-3-319-50212-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-50212-0_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50211-3
Online ISBN: 978-3-319-50212-0
eBook Packages: EngineeringEngineering (R0)