Composably secure delegated Quantum Computation with weak coherent pulses

Maxime Garnier, Dominik Leichtle, Luka Music, Harold Ollivier

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Secure Delegated Quantum Computation (SDQC) protocols allow a client to delegate a quantum computation to a powerful remote server while ensuring the privacy and the integrity of its computation. Recent resource-efficient and noise-robust protocols led to experimental proofs of concept. Yet, their physical requirements are still too stringent to be added directly to the roadmap of quantum hardware vendors. To address part of this issue, this paper shows how to alleviate the necessity for the client to have a single-photon source. We describe an SDQC protocol, similar in spirit to the decoy state method used in QKD, which requires only a source of weak coherent pulses. It is noise-robust, composable, and has negligible correctness and security errors. The simplest instantiation of our protocol with only 2 intensities shows improved scaling at low transmittance and adds verifiability to previous proposals.
Original languageEnglish
Title of host publication2024 International Conference on Quantum Communications, Networking, and Computing
PublisherInstitute of Electrical and Electronics Engineers
Pages221-225
Number of pages5
ISBN (Electronic)9798350366778
ISBN (Print)9798350366785
DOIs
Publication statusPublished - 22 Aug 2024
Event2024 International Conference on Quantum Communications, Networking, and Computing - Kanazawa, Japan
Duration: 1 Jul 20243 Jul 2024

Conference

Conference2024 International Conference on Quantum Communications, Networking, and Computing
Abbreviated titleQCNC 2024
Country/TerritoryJapan
CityKanazawa
Period1/07/243/07/24

Keywords / Materials (for Non-textual outputs)

  • privacy
  • quantum computing
  • protocols
  • hardware
  • noise robustness
  • servers
  • proposals

Fingerprint

Dive into the research topics of 'Composably secure delegated Quantum Computation with weak coherent pulses'. Together they form a unique fingerprint.

Cite this