Universal Blind Quantum Computation Joe Fitzsimons

Based on joint work with Elham Kashefi and Anne Broadbent

Alice

Bob

Alice • Limited computational power • Wants to be able to use a QC

Bob

Alice • Limited computational power • Wants to be able to use a QC

Bob • Has a universal QC • Willing to help Alice

Alice

Bob

• Limited computational power • Wants to be able to use a QC

• Has a universal QC • Willing to help Alice

• Doesn’t trust Bob

• Won’t give Alice his QC

Blind Quantum Computation For a computation to be considered “blind” we require that Bob cannot determine: • Alice’s input • The output of Alice’s chosen computation • The computation Alice chose to perform

Alice must encrypt the computation

What is known?

Our approach: MBQC

• Raussendorf and Briegel (2001)

Our approach: MBQC

Construction

Construction

Construction

Construction

Construction

Construction

2-Qubit Teleportation

θ 'i = θ i + riπ

Z Measurements

Brickwork States •The topology of the resource state must not leak information about the computation

Brickwork States •The topology of the resource state must not leak information about the computation

A Universal Gate Set

A Universal Gate Set

Protocol

Protocol

=e

iθ x , y Z

+

Protocol

=e

iθ x , y Z

+

Protocol

=e

iθ x , y Z

+

For every qubit x in column y:

δ x , y = (− 1)s φ x , y − θ x , y + (sZ + rx , y )π X

Protocol

=e

iθ x , y Z

+

For every qubit x in column y:

δ x , y = (− 1)s φ x , y − θ x , y + (sZ + rx , y )π X

Basis: δ x, y Effect: φ x , y + rx , yπ

Protocol

=e

iθ x , y Z

+

For every qubit x in column y:

δ x , y = (− 1)s φ x , y − θ x , y + (sZ + rx , y )π X

mx , y

Basis: δ x, y Effect: φ x , y + rx , yπ

Blindness Protocol P on input X leaks at most L(X) if the distribution of information obtained by Bob depends only on L(X).

Blindness Protocol P on input X leaks at most L(X) if the distribution of information obtained by Bob depends only on L(X). We wish to prove that the protocol leaks at most the circuit dimensions. Bob receives 3 pieces of information: 1) The parameters specifying the brickwork state 2) The qubits prepared by Alice 3) The classical measurement angles

Blindness 1) The parameters specifying the brickwork state •

These depend only on the circuit dimensions

Blindness 2) The qubits prepared by Alice •

Only qubit (i) depends on ri:



Tracing over secret ri: 1

iθ 'i

ρ i =  0 + e 4 

i (θ ' + r ) 1   0 + e i i 1 2

  

iθ '  −iθ 'i  I −iθ 'i  1   1  = 1  0 + e 1  +  0 − e i 1  0 − e  2   4 

Z-measured qubits: •

ψi =

ρi =

1 1 I 0 0 + 1 1= 2 2 2

Thus the qubit is always in the maximally mixed state, and hence independent of θ'i .

Blindness 3) The classical measurement angles

δ i = φ 'i +θ 'i depends on θ'i .



Only



Tracing over secret θ'i leaves δ i uniformly randomly distributed, and hence in a constant distribution.



Protocol leaks at most the circuit dimensions

Authentication Main idea: iθ Z • Create trap qubits in known states e i + which are unentangled and spread randomly through the resource state.

• Alice then knows what to expect for mi . • If Alice detects an incorrect measurement, then she knows Bob has cheated. • Use error correction to ensure that the computation yields the correct result unless errors occur on at least S sites.

Graph Transformations

A New Resource State Instead of brickwork states we introduce a new resource state:

A New Resource State Instead of brickwork states we introduce a new resource state:

By applying Y (edge) and Z (no edge) measurements to the red qubits we can obtain any graph state on the remaining black qubits.

Authentication

Authentication

Alice prepares Yellow qubits in random Z eigenstates.

Authentication

This splits the graph into 3 randomly chosen subgraphs.

Authentication

Black Traps

Red Traps

Computation This splits the graph into 3 randomly chosen subgraphs.

Authentication

Black Traps

Red Traps

Computation Alice prepares the yellow qubits in Z-eigenstates to create traps.

Authentication Alice runs computation on whole graph, checking the traps. Black Traps

Red Traps

Computation Computation is encoded using Rausendorf-Harrington-Goyal topological fault-tolerance scheme, which distance 2S-1.

Authentication Proof Sketch: • All errors of weight S-1 or less are corrected in RHG scheme.

Authentication Proof Sketch: • All errors of weight S-1 or less are corrected in RHG scheme. • Final RHG state is composed of black qubits only.

Authentication Proof Sketch: • All errors of weight S-1 or less are corrected in RHG scheme. • Final RHG state is composed of black qubits only. • Errors on red qubits correlated and count double!

Authentication Proof Sketch: • All errors of weight S-1 or less are corrected in RHG scheme. • Final RHG state is composed of black qubits only. • Errors on red qubits correlated and count double! • Only errors of weigh S/5 or more can lead to an incorrect outcome

Authentication Proof Sketch: • All errors of weight S-1 or less are corrected in RHG scheme. • Final RHG state is composed of black qubits only. • Errors on red qubits correlated and count double! • Only errors of weigh S/5 or more can lead to an incorrect outcome • Errors occur on traps with effective probability1/3, and is detected with probability at least ½. Total probability of detection: 1/6.

Authentication Proof Sketch: • All errors of weight S-1 or less are corrected in RHG scheme. • Final RHG state is composed of black qubits only. • Errors on red qubits correlated and count double! • Only errors of weigh S/5 or more can lead to an incorrect outcome • Errors occur on traps with effective probability1/3, and is detected with probability at least ½. Total probability of detection: 1/6. • Probability of Bob cheating and going undetected: (5/6)S/5

Experiments

Experiments Setup: • 4 photonic qubits • Produces linear cluster state • Allows arbitrary rotation of qubit 2 and 3 on Alice’s side • Different ordering of qubits allows for several different circuits to be implemented.

Experiments: Building blocks

Results: Algorithms

Results: Accuracy

up to 85%

constant oracle: 90%

average 72%

balanced oracle 89.5%

Results: Information leakage Model: Assume no side channels: Bob only receives quantum states prepared by Alice, graph + classical measurement angles.

We can use the Holevo bound to bound the information leakage: 



χ = −Tr  ∑ pi ρ i log 2 ∑ pi ρ i  − ∑ pi (− Tr (ρ i log 2 ρ i )) 

i

i



i

From tomography results for the single qubit rotation (3 bits): • Maximum of 0.169 ± 0.074 bits leaked perfect RNG. • Maximum of 0.185 ± 0.087 bits leaked by qubits if Bob has arbitrary additional information.

Thanks for listening! For more see: A. Broadbent, J. Fitzsimons and E. Kashefi, Universal Blind Quantum Computation, FOCS 2009 517, arXiv:0807.4154 J. Fitzsimons and E. Kashefi, Unconditionally Verifiable Blind Computation, arXiv:1203.5217 S. Barz, A. Broadbent, E. Kashefi, J. Fitzsimons, A. Zeilinger and P. Walther Demonstration of Blind Quantum Computing, Science 335 303, arXiv:1110.1381

Universal Blind Quantum Computation

Blind Quantum Computation. For a computation to be considered “blind” we require that Bob cannot determine: • Alice's input. • The output of Alice's chosen computation. • The computation Alice chose to perform. Alice must encrypt the computation ...

2MB Sizes 0 Downloads 207 Views

Recommend Documents

Quantum Computation
Quantum Computation. Mohan Raj Gupta , Anusheel Bhushan∗. Supervisor: Prof. Sandeep Sen. Department of Computer Science and Engineering,. IIT Delhi.

Nielsen, Chuang, Quantum Computation and Quantum Information ...
Nielsen, Chuang, Quantum Computation and Quantum Information Solutions (20p).pdf. Nielsen, Chuang, Quantum Computation and Quantum Information ...

Nielsen, Chuang, Quantum Computation and Quantum Information ...
Nielsen, Chuang, Quantum Computation and Quantum Information Solutions (20p).pdf. Nielsen, Chuang, Quantum Computation and Quantum Information ...

Topological quantum computation
Oct 10, 2002 - information is stored and manipulated in “topological degrees of freedom” rather ... The gates are taken from a fixed finite library of unitary 2 × 2 .... collective electronic systems, e.g. the fractional quantum Hall effect [13]

Overview of adiabatic quantum computation
•Design a Hamiltonian whose ground state encodes the solution of an optimization problem. •Prepare the known ground state of a simple Hamiltonian.

Nielsen, Chuang, Errata List for Quantum Computation and Quantum ...
Nielsen, Chuang, Errata List for Quantum Computation and Quantum Information.pdf. Nielsen, Chuang, Errata List for Quantum Computation and Quantum ...

Exploiting Locality in Quantum Computation for Quantum Chemistry
Nov 25, 2014 - where rA is the vector from a point A that defines the center of ...... approach, which we will call Hamiltonian averaging, and bound its costs in .... exponential decline in the quality of trial wave functions, as measured by overlap 

Implementation of holonomic quantum computation ...
Dec 18, 2007 - This subspace is called decoherence-free space DFS. To perform quantum computation in a DFS, one has to de- sign the specific Hamiltonian ...

Topological quantum computation - American Mathematical Society
Oct 10, 2002 - searching a data base [15], abelian groups (factoring and discrete .... fold hard-core interaction between electrons in a fixed Laudau level ... In the case when T is a disk D with punctures—physically anyonic excitations—.

The-Complete-Universal-Orlando-The-Definitive-Universal ...
Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. The-Complete-Universal-Orlando-The-Definitive-Universal-Handbook.pdf. The-Complete-Unive

Blind Men's Bluff
6 days ago - the man's sightless existence as he lived in total darkness. Imagine ... the mud from his eyes, to his amazement, the veil of darkness dissolved.

Blind Men's Bluff
May 14, 2018 - Copyright © 1975, 1987, 2000, 2018 by Charles R. Swindoll, Inc. All rights ... because they had clung to their idea of religion instead of to God's.

Blind Faith.pdf
Page 3 of 3. 3. Blind Faith. A History of Port Hope, Ontario. by Penny Sanger. McGraw-Hill Ryerson (1981). http://www.porthopehistory.com/blindfaith/blindfaith.htm. Page 3 of 3. Blind Faith.pdf. Blind Faith.pdf. Open. Extract. Open with. Sign In. Mai

Quantum teleportation between remote atomic-ensemble quantum ...
Nov 13, 2012 - University of Science and Technology of China, Hefei, Anhui 230026, China ... Single photons are so far the best messengers for quantum networks as they ... of distant matter qubit nodes and transfer of quantum information between the

Physics and Computation - Math
is called the 'partition function' of the ensemble and X is the domain of some universal Turing machine U. ..... a universal prefix-free Turing machine U. They look at the smallest program p that outputs a ..... 000 001 010 011 100 101 110 111.

Adiabatic Quantum Simulation of Quantum ... - Semantic Scholar
Oct 13, 2014 - quantum adiabatic algorithm to combinatorial optimization problems. ... applied to structured and unstructured search20,21, search engine ...... License. The images or other third party material in this article are included in the.

Imperative Self-Adjusting Computation
Jan 7, 2008 - Permission to make digital or hard copies of all or part of this work for personal or classroom use .... Figure 1 shows the signature of our library.

deer-blind-i.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. deer-blind-i.pdf.

Universal Access and Universal Service Regulations 2007.pdf ...
Universal Access and Universal Service Regulations 2007.pdf. Universal Access and Universal Service Regulations 2007.pdf. Open. Extract. Open with. Sign In.

Computation of Time
May 1, 2017 - a Saturday, a Sunday, or a legal holiday as defined in T.C.A. § 15-1-101, or, when the act to be done is the filing of a paper, a day on which the ...