Verifying quantum computations at scale: A cryptographic leash on quantum devices
From MaRDI portal
Publication:5204995
DOI10.1090/bull/1678zbMath1429.81024OpenAlexW2979854757WikidataQ127119074 ScholiaQ127119074MaRDI QIDQ5204995
Publication date: 10 December 2019
Published in: Bulletin of the American Mathematical Society (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1090/bull/1678
Quantum computation (81P68) Cryptography (94A60) Quantum measurement theory, state operations, state preparations (81P15) Quantum algorithms and complexity in the theory of computing (68Q12) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Succinct classical verification of quantum computation ⋮ Quantum multicast, multi-output protocols of quantum state sharing and quantum operation sharing via six-particle cluster state ⋮ Security limitations of classical-client delegated quantum computing
Cites Work
- Unnamed Item
- Unnamed Item
- Minimum disclosure proofs of knowledge
- Verification of quantum computation: an overview of existing approaches
- Complexity Classification of Local Hamiltonian Problems
- A Decade of Lattice Cryptography
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Attribute-Based Encryption for Circuits
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- The Knowledge Complexity of Interactive Proof Systems
- Coin flipping by telephone a protocol for solving impossible problems
- Algebraic methods for interactive proof systems
- IP = PSPACE
- Forrelation: A Problem That Optimally Separates Quantum from Classical Computing
- A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device
- Universal Blind Quantum Computation
- Oracle separation of BQP and PH
- Collusion resistant traitor tracing from learning with errors
- Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$
- Computationally Binding Quantum Commitments
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Verifying quantum computations at scale: A cryptographic leash on quantum devices