Quantum walks with encrypted data.

In the setting of networked computation, data security can be a significant concern. Here we consider the problem of allowing a server to remotely manipulate client supplied data, in such a way that both the information obtained by the client about the server's operation and the information obtained by the server about the client's data are significantly limited. We present a protocol for achieving such functionality in two closely related models of restricted quantum computation-the boson sampling and quantum walk models. Because of the limited technological requirements of the boson scattering model, small scale implementations of this technique are feasible with present-day technology.

[1]  A. Politi,et al.  Quantum Walks of Correlated Photons , 2010, Science.

[2]  R Raussendorf,et al.  A one-way quantum computer. , 2001, Physical review letters.

[3]  A. Schreiber,et al.  A 2D Quantum Walk Simulation of Two-Particle Dynamics , 2012, Science.

[4]  H. Briegel,et al.  Measurement-based quantum computation on cluster states , 2003, quant-ph/0301052.

[5]  Elham Kashefi,et al.  Blind quantum computing with weak coherent pulses. , 2011, Physical review letters.

[6]  Louis Salvail,et al.  BLIND QUANTUM COMPUTATION , 2003 .

[7]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[8]  Akira Furusawa,et al.  Introduction to Optical Quantum Information Processing , 2011 .

[9]  A Schreiber,et al.  Decoherence and disorder in quantum walks: from ballistic spread to localization. , 2011, Physical review letters.

[10]  Seth Lloyd,et al.  Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.

[11]  E. Knill,et al.  A scheme for efficient quantum computation with linear optics , 2001, Nature.

[12]  A Aspuru-Guzik,et al.  Discrete single-photon quantum walks with tunable decoherence. , 2010, Physical review letters.

[13]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[14]  M. Nielsen Optical quantum computation using cluster States. , 2004, Physical review letters.

[15]  Aharonov,et al.  Quantum random walks. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[16]  Elham Kashefi,et al.  Demonstration of Blind Quantum Computing , 2011, Science.

[17]  Reck,et al.  Experimental realization of any discrete unitary operator. , 1994, Physical review letters.

[18]  A Schreiber,et al.  Photons walking the line: a quantum walk with adjustable coin operations. , 2009, Physical review letters.

[19]  A. Schreiber,et al.  Multi-walker discrete time quantum walks on arbitrary graphs, their properties and their photonic implementation , 2010, 1006.5556.

[20]  Julia Kempe,et al.  Quantum random walks: An introductory overview , 2003, quant-ph/0303081.

[21]  T. Rudolph,et al.  Degrees of concealment and bindingness in quantum bit commitment protocols , 2001, quant-ph/0106019.