Skip to main content

Blind Quantum Computation with Two Decoy States

  • Conference paper
  • First Online:
Advances in Intelligent Information Hiding and Multimedia Signal Processing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 64))

Abstract

The Universal Blind Quantum Computation (UBQC) protocol allows a client to perform quantum computation on a remote server. In the UBQC with Weak Coherent Pulses (WCP), the Remote Blind qubit State Preparation (RBSP) protocol requires larger scale number of pulses for preparing one single qubit, especially the long-distance communication. In the paper, we present a modified RBSP protocol with two decoy states to reduce the required number of pulses for the client. Both theoretical analysis and simulation results demonstrate that decoy state can improve the qubit preparation efficiency of UBQC protocol greatly and two decoy states perform even better than one decoy state. What is more, the advantage of two decoy states become more highlighted with the increasing of distance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Feigenbaum, “Encrypting problem instances,” in Advances in Cryptology-CRYPTO’85 Proceedings. Springer, 1985, pp. 477–488.

    Google Scholar 

  2. M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an oracle,” in Proceedings of the nineteenth annual ACM symposium on Theory of computing. ACM, 1987, pp. 195–203.

    Google Scholar 

  3. C. Gentry et al., “Fully homomorphic encryption using ideal lattices.” in STOC, vol. 9, 2009, pp. 169–178.

    Google Scholar 

  4. A. Broadbent, J. Fitzsimons, and E. Kashefi, “Universal blind quantum computation,” in Foundations of Computer Science, 2009. FOCS’09. 50th Annual IEEE Symposium on. IEEE, Conference Proceedings, pp. 517–526.

    Google Scholar 

  5. P. Arrighi and L. Salvail, “Blind quantum computation,” International Journal of Quantum Information, vol. 4, no. 05, pp. 883–898, 2006.

    Google Scholar 

  6. V. Dunjko, E. Kashefi, and A. Leverrier, “Blind quantum computing with weak coherent pulses,” Physical review letters, vol. 108, no. 20, 2012.

    Google Scholar 

  7. W.-Y. Hwang, “Quantum key distribution with high loss: toward global secure communication,” Physical Review Letters, vol. 91, no. 5, 2003.

    Google Scholar 

  8. D. Gottesman, H.-K. Lo, N. L¨utkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,” in Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on, 2004, p. 136.

    Google Scholar 

  9. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Physical review letters, vol. 94, no. 23, 2005.

    Google Scholar 

  10. X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Physical review letters, vol. 94, no. 23, 2005.

    Google Scholar 

  11. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Physical Review A, vol. 72, no. 1, 2005.

    Google Scholar 

  12. Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, “Experimental quantum key distribution with decoy states,” Physical review letters, vol. 96, no. 7, 2006.

    Google Scholar 

  13. T. Schmitt-Manderbach, H.Weier, M. F¨urst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J. G. Rarity et al., “Experimental demonstration of free-space decoy-state quantum key distribution over 144 km,” Physical Review Letters, vol. 98, no. 1, 2007.

    Google Scholar 

  14. Y. Liu, T.-Y. Chen, J. Wang, W.-Q. Cai, X. Wan, L.-K. Chen, J.-H. Wang, S.-B. Liu, H. Liang, L. Yang et al., “Decoy-state quantum key distribution with polarized photons over 200 km,” Optics Express, vol. 18, no. 8, pp. 8587–8594, 2010.

    Google Scholar 

  15. K. Xu and H.-k. Lo, “Blind quantum computing with decoy states,” arXiv preprint arXiv:1508.07910, 2015.

    Google Scholar 

  16. R. Raussendorf and H. J. Briegel, “A one-way quantum computer,” Physical Re-view Letters, vol. 86, no. 22, 2001.

    Google Scholar 

  17. R. Raussendorf, D. E. Browne, and H. J. Briegel, “Measurement-based quantum computation on cluster states,” Physical review A, vol. 68, no. 2, 2003.

    Google Scholar 

  18. R. Jozsa, “An introduction to measurement based quantum computation, 2005,” arXiv preprint quant-ph/0508124.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiang Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhao, Q., Li, Q. (2017). Blind Quantum Computation with Two Decoy States. In: Pan, JS., Tsai, PW., Huang, HC. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 64. Springer, Cham. https://doi.org/10.1007/978-3-319-50212-0_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50212-0_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50211-3

  • Online ISBN: 978-3-319-50212-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics