Secure Two-Party Computation Based on Blind Quantum Computation

Two-party quantum computation (2PQC) allows two participants Alice and Bob to securely compute a given unitary function on their quantum inputs without leaking privacy. Existing 2PQC protocols require participants to have strong quantum capability, such as preparing qubits and performing measurements. Recently, Kashefi et al. proposed a 2PQC protocol named QYao protocol, where Alice only has to prepare qubits and perform Pauli operations, but Bob needs to have a powerful quantum computer. In this paper, we simplify the QYao protocol and reduce Bob’s quantum capability by applying blind quantum computing (BQC) in 2PQC. Two improved 2PQC protocols are proposed. The first protocol allows Bob to generate his encrypted input by making measurements and thus removes encryption at the input stage. The second protocol improves the verification capability of Bob based on the method of stabilizer testing and further reduces Bob’s ability to make measurements only. Besides, Alice can be more flexible since it is enough for her to produce an appropriate graph state instead of a fixed dotted triple-graph resource state DT(G). After the computation, two parties’ inputs also can be kept secret in both presented protocols.

[1]  Elham Kashefi,et al.  Garbled Quantum Computation , 2017, Cryptogr..

[2]  Shengyu Zhang,et al.  Blind quantum computation with identity authentication , 2018 .

[3]  Elham Kashefi,et al.  A simple protocol for fault tolerant verification of quantum computation , 2018, Quantum Science and Technology.

[4]  Elham Kashefi,et al.  Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[5]  Masahito Hayashi,et al.  Verifiable Measurement-Only Blind Quantum Computing with Stabilizer Testing. , 2015, Physical review letters.

[6]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[7]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[8]  Louis Salvail,et al.  Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries , 2010, CRYPTO.

[9]  Urmila Mahadev,et al.  Classical Verification of Quantum Computations , 2018, 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS).

[10]  Qin Li,et al.  Triple-server blind quantum computation using entanglement swapping , 2014 .

[11]  Wenjie Liu,et al.  Privacy-Preserving Quantum Two-Party Geometric Intersection , 2019 .

[12]  Tomoyuki Morimae,et al.  Resource-efficient verification of quantum computing using Serfling’s bound , 2018, npj Quantum Information.

[13]  Tomoyuki Morimae,et al.  Quantum proofs can be verified using only single qubit measurements , 2015, ArXiv.

[14]  Andrew M. Childs Secure assisted quantum computation , 2001, Quantum Inf. Comput..

[15]  T. Morimae,et al.  Blind quantum computation protocol in which Alice only makes measurements , 2012, 1201.3966.

[16]  Andrew Chi-Chih Yao,et al.  Security of quantum protocols against coherent measurements , 1995, STOC '95.

[17]  Tomoyuki Morimae,et al.  Verification of Many-Qubit States , 2017, Physical Review X.

[18]  Anne Broadbent,et al.  How to Verify a Quantum Computation , 2015, Theory Comput..

[19]  E. Kashefi,et al.  Unconditionally verifiable blind quantum computation , 2012, 1203.5217.

[20]  Lan Zhou,et al.  Blind quantum computation with a noise channel , 2016, Physical Review A.

[21]  T. Morimae Verification for measurement-only blind quantum computing , 2012, 1208.1495.

[22]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[23]  Lan Zhou,et al.  Deterministic entanglement distillation for secure double-server blind quantum computation , 2013, Scientific Reports.

[24]  Fang Yu,et al.  Application of Blind Quantum Computation to Two-Party Quantum Computation , 2018 .