Next Article in Journal
Modeling, Simulation, and Reconstruction of 2-Reservoir Heat-to-Power Processes in Finite-Time Thermodynamics
Next Article in Special Issue
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
Previous Article in Journal
A Novel Method Based on Multi-Island Genetic Algorithm Improved Variational Mode Decomposition and Multi-Features for Fault Diagnosis of Rolling Bearing
Previous Article in Special Issue
Understanding of Collective Atom Phase Control in Modified Photon Echoes for a Near-Perfect Storage Time-Extended Quantum Memory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improved Resource State for Verifiable Blind Quantum Computation

College of Information Science and Technology, Jinan University, Guangzhou 510632, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(9), 996; https://doi.org/10.3390/e22090996
Submission received: 22 June 2020 / Revised: 26 August 2020 / Accepted: 3 September 2020 / Published: 7 September 2020
(This article belongs to the Special Issue Quantum Information Processing)

Abstract

:
Recent advances in theoretical and experimental quantum computing raise the problem of verifying the outcome of these quantum computations. The recent verification protocols using blind quantum computing are fruitful for addressing this problem. Unfortunately, all known schemes have relatively high overhead. Here we present a novel construction for the resource state of verifiable blind quantum computation. This approach achieves a better verifiability of 0.866 in the case of classical output. In addition, the number of required qubits is 2 N + 4 c N , where N and c are the number of vertices and the maximal degree in the original computation graph, respectively. In other words, our overhead is less linear in the size of the computational scale. Finally, we utilize the method of repetition and fault-tolerant code to optimise the verifiability.

1. Introduction

Scalable quantum computing still has a long way to go, while quantum computing in cloud mode is relatively reasonable. The scenario is that a client who only has access to classical computation and a limited quantum device used for preparing or measuring single qubits delegates a computation task to an untrusted server with a full-fledged quantum computer. In addition, the client’s input, output, and computation remain private to the server. Such secure quantum computing protocols are called blind quantum computing (BQC) [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16]. However, how can a client verify the outcome of the computation sent by a server when a quantum experiment solves a problem which is proven to be intractable for classical computers? Fortunately, there has been a lot of progress in the development of verification protocols [17,18,19,20,21,22,23,24,25,26,27,28,29]. The goal of verifiable universal blind quantum computation (VUBQC) is to detect deviation with high probability when the server behave dishonestly and reject his output. Here, the VUBQC scheme we consider is based on constructing the delegated computation to include certain traps in such a way that the computation is not affected, while revealing no information to the device [17]. Then one can verify that the computation has been performed correctly, with exponentially small probability of error.
There are two important properties in the verification protocols [28]. The first one is verifiability, which means the maximal probability for the output of the protocol to be incorrect and the client accepting. The other one is correctness, which means the minimal probability for the client obtaining the correct outcome when the server behaves honestly. Especially, we characterize the client as a verifier and the server as a prover. The term “verifiable” for VUBQC is related to notions of completeness and soundness in the context of interactive-proof system. Given a problem that is classically intractable, the verifier can accept a correct solution with high probability and reject a invalid solution with high probability at the end of the interaction with the prover. Note that even if the verifier accept the outcome sent by the prover, the outcome may be still incorrect. However, the probability that the verifier accepting a wrong outcome can be reduced to a value approaching 0 through some improvements for VUBQC.
In reality, exploring a verification protocol with arbitrarily small verifiability while keeping the cost of resource optimal is still an opening problem. Some progress has been made in this regard. In [17], dotted-complete graph was used for resource construction in verification protocol. It can achieve verifiability ϵ = 5 / 6 2 d / 5 , where d is the distance of error correcting code used in the protocol. However, the overhead of verification protocol is quadratic in the size of the computation. In [25], a optimised resource construction using dotted-triple graph was proposed, where the number of traps can be a constant fraction of the total number of qubits. It can obtain verifiability ϵ = 8 / 9 d / 18 . More importantly, it only requires a linear overhead in the size of the computation.
The verification scheme we present here makes use of similar elements as suggested in [17], trap computations are used to detect errors and a fault-tolerant encoding of the computation is used to amplify the detection rate. Compared with [17], we construct a sandglass-like resource state such that the overhead is linearly related to the size of the computation. In addition, compared with [25], not only do we just need fewer qubits, but also achieve a better verifiability.
The remainder of the paper is organized as follows. In Section 2 we give some basic notions about verifiable universal blind quantum computation. Next, in Section 3 we give the process of our sandglass-like resource state construction. Then in Section 4 we propose a verifiable blind quantum computation protocol with sandglass-like resource state and analyse the correctness and verifiability of the protocol. For classical output case and quantum output case, in Section 5 we propose an improved scheme to improve verifiability. We finally conclude, in Section 6, with some discussions and open problems.

2. Preliminaries

We briefly present the relevant concepts used in describing VUBQC protocols. The first one is the model of measurement-based quantum computation (MBQC) [30,31,32]. Different from the traditional quantum circuit model, in MBQC a given computation is performed by measuring qubits from a large entangled state. This special entangled state consists of qubits prepared in the state | + = ( | 0 + | 1 ) / 2 , entangled using CZ = I 0 0 + Z 1 1 operations. The entangled state is also known as graph state, which can be determined by a given graph. In other words, given an undirected graph G with n vertices i V and edges i , j E , the graph state G that corresponds to G is defined by G = i , j E C Z i j + n , where C Z i j is the CZ operation acting on vertices sharing the edge i , j . Then they are measured in the basis + ϕ = 0 + e i ϕ 1 / 2 , ϕ = 0 e i ϕ 1 / 2 , where the measurement angle is ϕ 0 , π / 4 , , 7 π / 4 depending on outcomes of previous measurements.
The second part is blind quantum computing [2], which is based on the MBQC model. The protocol runs as follows: (1) Randomly rotated single-qubit states + θ j = 0 + e i θ j 1 / 2 j = 1 N are prepared by Alice, where θ j 0 , π / 4 , , 7 π / 4 is a random angle, and then Alice sends them to Bob. (2) Bob creates a certain graph state called the brickwork state [2] by entangling obtained states with CZ operations. (3) Alice calculates the measurement angle depending on outcomes of previous measurements and sends it to Bob. (4) Bob performs the measurement in the angle sent by Alice, and returns the measurement result to Alice. (5) Alice and Bob repeat (3) and (4) until all qubits of the brickwork state are measured. If Bob behaves honestly, Alice obtains the correct outcome of desired quantum computation. Furthermore, whatever malicious Bob does, Bob learns nothing about computation’s input, output, and algorithm.
The last one is the VUBQC protocol [17], which augments BQC with the ability to detect malicious behaviour of server (Bob). Because no entanglement is created when CZ operation acts on state | 0 or | 1 . One can randomly choose a | + θ qubit (trap qubit) whose neighbours are computational basis states (dummy qubits) such that this qubit is disentangled from the rest qubits in the graph state. Then measuring this trap qubit in θ angle will obtain the deterministic outcome. In [17], the cylinder brickwork state was used such that there are only disentangled trap qubits in a product state with a brickwork state left after entanglement operations are applied by the Bob. Due to the the positions of the traps and dummies are unknown to Bob, the blindness of the protocol is guaranteed. The verifier (Alice) uses trap qubits as traps to test that the prover (Bob) performs desired quantum operations.

3. Sandglass-Like Resource State Construction

We now proceed to construct sandglass-like resource state in a manner similar to the construction of the dotted-triple graph state of [25]. As mentioned in MBQC, given a graph G we can obtain a corresponding graph state | G , which is used to perform a universal quantum computation. We call G a base graph. Then we use the base graph G to construct a sandglass-like graph S ( G ) whose corresponding graph state | S ( G ) achieves verifiable quantum computation. Furthermore, some operations will be performed on a coloured version of the sandglass-like graph S ( G ) in order to obtain a subgraph used for computation and a subgraph used for traps. Because the selection of computation subgraph and trap subgraph is unknown to the prover, security of the scheme is protected. The same as [25], our construction of subgraphs is local. However, our method requires less qubits and obtains a better verifiability.
We then give specific definitions and related properties of the sandglass-like resource state. Since the construction of resource state depends completely on the sandglass-like graph (each vertex represents a qubit and each edge represents a CZ entanglement operation), we only need to consider the construction of the sandglass-like graph.
According to reference [17], the dotting operator on graph G is defined to be the operator that transforms a graph G to a new graph denoted by D ( G ) by replacing every edge in G with a new vertex connected to the two vertices originally joined by that edge. Given an arbitrary base graph G, the construction procedure of the sandglass-like graph S ( G ) is described as follows.
(1)
A base graph G consists of vertices v V ( G ) and edges e E ( G ) .
(2)
For each vertex v i V ( G ) , we define a set of two new vertices P v i = p 1 v i , p 2 v i , where p k v i represents the kth vertex of the set P v i .
(3)
For each edge e i j E ( G ) , which connects the vertices v i and v j , we define a set of four edges E i j that connect vertices in the set P v i with the vertices in the set P v j . More concretely, the set E i j consists of four edges e i j 11 , e i j 12 , e i j 21 , and e i j 22 , where e i j m n represents an edge connecting the vertex p m v i and the vertex p n v j .
(4)
We define an intermediate graph I ( G ) to be a graph consisting of vertices v i V G P v i and edges e i j E G E i j described in steps (2) and (3). We perform the dotting operator on the intermediate graph I ( G ) resulting in a sandglass-like graph denoted by S ( G ) .
Note that the sandglass-like graph S ( G ) is actually equal to D ( I ( G ) ) . An example of the construction of sandglass-like graph S ( G ) is illustrated in Figure 1. The base graph G considered in this example consists of four vertices and three edges, as shown in the Figure 1a. The corresponding intermediate graph I ( G ) is shown in the Figure 1b. Furthermore, Figure 1c gives the sandglass-like graph S ( G ) corresponding to the base graph G. According to the construction method, total number of vertices in the sandglass-like graph is V ( S ( G ) ) = 2 V ( G ) + 4 E ( G ) . We therefore only need ( 2 N + 4 c N ) qubits for our verifiable quantum computation, where N is the number of qubits for universal quantum computation and c is the maximum degree of the base graph. Our construction can apply to other graph states. Since the basic unit of any graph state is two qubits entangled by a CZ gate, the construction procedure of our sandglass-like graph is exactly aimed at a transformation to each basic unit.
Once we have the sandglass-like graph S ( G ) we can color it for subsequent break operations and bridge operations. We call the set of vertices P v i a primary set. In addition, we say that the vertices in each primary set are primary vertices. Similarly, we denote the set of four vertices related to each edge e i j as an added set A e v i , v j , and say that the vertices in each added set are added vertices. Similar to the trap-coloring in [25], our definition about trap-coloring of the sandglass-like graph S ( G ) satisfies the following conditions.
(1)
Primary vertices are coloured in one of the three colours of white, red or green.
(2)
Added vertices are coloured in one of the three colours of white, red or green.
(3)
One of vertices in each primary set P v i is uniformly at random chosen to be colored in green. The remaining one vertex of P v i has probability α to be colored in red and probability 1 α to be colored in white, where α is an appropriate constant and 0 < α < 1 .
(4)
The colours of the primary vertices determine the colours of the added vertices. These added vertices connecting primary vertices of different colours are white. These added vertices connecting both green primary vertices are green. Moreover, these added vertices connecting both white primary vertices are red.
Since the color of the added vertices depends on the color of the primary vertices, one may have no red vertex in each primary set P v i or added set A e v i , v j . A specific example of trap-coloring is given in Figure 2a.
While the construction and the coloring principle of the sandglass-like graph is public, the specific coloring scheme is completely decided by Alice (the client) so that Bob (the server) can not know which vertex is green or red or white. Every vertex has the possibility to be coloured in red (trap qubit). In addition, the coloring of every primary set is independent from the coloring of other primary sets, and the coloring of every added set depends on the coloring of two adjacent primary sets. These features make the security proof of [25] still applicable for our analysis.
Our inspiration comes from that we keep the computation qubits (green vertices) hidden to an untrusted client while increasing the probability that the qubit (vertex) that any attack acts on is a trap qubit (red vertex) such that any attack has a higher probability to be detected. Specifically, compared with [25] whose such a detection probability is 1/3 for each primary set and 1/9 for each added set, our detection probability is α / 4 for each primary set and 1 α 2 / 4 for each added set. The lower detection probability obtained when α is 2 3 crucially leads to our better verifiability for the case of classical output (see Theorem 2 in Section 4). Note that we actually trade certain symmetry (an arbitrary qubit is uniformly and randomly coloured in any one of the three colours of white, red or green) to obtain less resource overhead. However, as we will see later, this asymmetry just cause slightly inferior verifiability for the case of quantum output.
In what follows we show how to get computation subgraph and trap subgraph from the colored sandglass-like graph. To do this, we need to introduce the break and bridge operations in [17].
The bridge operator on a vertex v of degree 2 on graph G is defined to be the operator which connects the two neighbors of v and then removes vertex v and both adjacent edges from G. The break operator on a vertex v of graph G is defined to be the operator that removes vertex v and all adjacent edges from G.
As shown in Figure 3, the break and bridge operators are demonstrated, respectively. In Figure 3a the break operator acting on vertex v 2 removes vertex v 2 and edges e 12 , e 23 resulting in isolated two vertices v 1 , v 3 . In Figure 3b the bridge operator acting on vertex v 2 connects vertices v 1 , v 3 with a new edge e 13 and removes vertex v 2 and edges e 12 , e 23 resulting in two direct connected vertices.
Note that both break and bridge operations on a graph have corresponding implementations of quantum form [17]. To clarify this, if we measure any qubit in a graph state in Pauli Z basis, we will get a state obtained from the graph, in which the measured vertex and its adjacent edges are removed, up to local Pauli Z corrections. It is equivalent to the break operation. However, what we use more frequently is another equivalent method. In other words, we set the qubit that the break operator acts on to be a dummy qubit, where the dummy qubit is in the state | 0 or | 1 . Depending on the specific value of the dummy qubit, a Pauli Z rotation on all the neighboring qubits in the graph will be introduced after the entanglement operation is performed. As for the bridge operation, if we measure any qubit in Pauli Y basis, we will obtain the graph state corresponding to the graph, in which the measured vertex and its adjacent edges are removed and a new edge connecting the adjacent vertices is created, up to local Z rotations by π / 2 or π / 2 .
Now we move on the generation process of the computation subgraph and trap subgraph. Given a colored sandglass-like graph S ( G ) , we perform break operations on the white vertices and bridge operations on the green added vertices (green square vertices) such that we can obtain a computation subgraph and a trap subgraph, as illustrated by Figure 2b. Further more, the red vertices and green vertices are actually trap qubits and computation qubits, respectively. Note that in Figure 2b we preserve the green square vertices for matching computation qubits with trap qubits (dashed circle).
It is noteworthy that our sandglass-like graph draws the same conclusion as Theorem 1 in [25], which will be used in Section 5. To interpret this, we introduce relevant concepts in [25]. We define the base-location of a vertex f of the sandglass-like graph S ( G ) to be the set P v or A e that contains f in S ( G ) . Given a sandglass-like graph S ( G ) and a collection of n base-locations E , we call the set E independently colourable locations (ICL) if the choice of colours within any set corresponding to a base-location in E is independent from the choice of colours in sets corresponding to other base-locations in E .
Lemma 1.
Given a set S consisting of n base-locations in the sandglass-like graph S ( G ) and assume that the base graph G has maximum degree c. Then there exist a subset S S such that S is independently colourable locations and contains at least S = n 2 c + 1 base-locations.
Proof. 
From the graph S with n locations, an ICL subset S can be found as follows. From our construction of the sandglass-like graph, a local-colouring of an added base location corresponds to a local-colouring of both adjacent primary base-locations. Then the necessary and sufficient condition of ICL is obtained. In other words, a set of n base-locations E is ICL if and only if for all pairs i , j E the sets ϵ i ϵ j = (Lemma 3 of [25]), where ϵ i = i if the base-location i is primary and ϵ i = N S G i if the base-location i is added.
One the one hand, if S contains a primary base-location v i , then all its adjacent added base-locations (the maximal number is c) a i j , a i k will be excluded, as shown in Figure 4a. On the other hand, if S contains an added base-location a i j , then all its adjacent primary base-locations v i , v j and the adjacent added base-locations a i k , a i m , a j n of the primary base-locations v i , v j will be excluded, as shown in Figure 4b. The number of excluded base-locations is at most 2 c .
As a result, in the worst case there exists an ICL subset S with at least n 2 c + 1 base-locations. □

4. Verifiable Blind Quantum Computation with the Sandglass-Like Resource State

In this section, similar to [17,25], we present our verifiable blind quantum computation protocol. However, we use our sandglass-like graph state as the resource state of verifiable blind quantum computation. In addition, compared with [17,25], the verifiability and overhead of our protocol are optimised.
The essential idea of verification protocol is that the trap-colouring chosen by Alice (verifier) is unknown to Bob (prover) so that malicious Bob is difficult to deviate the computation while keeping the trap qubit untouched.
Recall the main procedures for VUBQC [17]. Alice converts a computation task to a graph G , where corresponding graph state G consists of computation qubits, dummy qubits and trap qubits. In addition, each qubit of G has a measurement angle ϕ i called computation angle, where ϕ i A = 0 , π / 4 , , 7 π / 4 for all computation qubits and dummy qubits and ϕ i = 0 for all trap qubits. Alice then prepares states + θ i for all computation qubits and trap qubits and computational basis states | 0 and | 1 for all dummy qubits. Alice sends all these qubits to Bob, who then entangles them to obtain the graph state G . Alice sends the practical measurement angle δ i = ϕ i + θ i + r i in the measurement order to Bob, where ϕ i is the updated computation angle depending on ϕ i and outcomes of Bob’s previous measurements s , θ i A is used to encrypt measurement angle ϕ i and r i 0 , 1 is used to encrypt the outcome of measurement. Especially, δ i = θ i + r i for all trap qubits and δ i A for all dummy qubits. When Bob’s each trap measurement outcome b t is equal to expected value r t , the outcomes of measurements are accepted and corrected by Alice to obtain real results of the computation task.
Here, in our scheme the graph G is replaced by sandglass-like graph S ( G ) , ϕ i is equal to π / 2 for all the added green vertices required to be measured in Pauli Y basis for performing the bridge operators and the function of calculation δ i is set as C i , ϕ i , θ i , r i , x i , s . We therefore give our verification protocol as shown in Protocol 1.
Protocol 1 Verifiable blind quantum computation with sandglass-like resource state.
Alice’s resources:
(1) A graph G with N vertices for performing the desired computation task in MBQC mode. The coloured sandglass-like graph S ( G ) with at most 2 N + 4 c N vertices, where c is the maximal degree of the base graph G and labeling of vertices is known to Alice and Bob.
(2) The positions of dummy qubits for the break operations, set D, chosen to be positions of all white vertices. The positions of trap qubits chosen to be all red vertices. The positions of computation qubits chosen to be all green vertices, where green square vertices are used to perform bridge operations.
(3) An l-qubit input state | I .
(4) A sequence of measurement angles ϕ = ϕ i 1 i 4 N + 6 c N with ϕ i A = 0 , π / 4 , , 7 π / 4 . 2 N + 4 c N random variables θ i with values taken uniformly at random from A. l random variables x i , 2 N + 4 c N random variables r i , and D random variables d i with values taken uniformly at random from 0 , 1 . A binary string s of length at most 2 N + 4 c N for recording true measurement outcomes related to Bob’s measurement outcomes, where s is initially set to be vector 0 .
(5) A fixed function C i , ϕ i , θ i , r i , x i , s that for each non-output qubit i computes the angle of the measurement of qubit i to be sent to the Bob.
Initial step:
(1) Alice’s move: Alice sets all the values in s to be 0 and encodes the l-qubit input state as e = X x 1 Z θ 1 X x l Z θ l I . She then prepares the remaining qubits in the following form: If i D , then qubit i is set to be | d i ; otherwise qubit i is set to be j N S G i D Z d j + θ i = + θ i + j N S G i D d j π , where N S G i represents the neighborhood of vertex i in S ( G ) . Then Alice sends Bob all qubits in the order of the labeling of the vertices of the graph S ( G ) .
(2) Bob’s move: Bob receives 2 N + 4 c N single qubits and entangles them according to S ( G ) .
Step i: 1 i 2 N + 4 c N
(1) Alice’s move: Alice computes the angle δ i equal to C i , ϕ i , θ i , r i , x i , s and sends it to Bob. If qubit i is the trap qubit, then the angle δ i is set to be θ i + r i π .
(2) Bob’s move: Bob measures qubit i with angle δ i and sends Alice result b i .
(3) Alice’s move: Alice sets the value of s i in s to be b i r i .
Verification:
(1) After obtaining all the output qubits from Bob, if the trap qubit t is an output qubit, Alice measures it with angle δ t = θ t + r t π to obtain b t .
(2) Alice accepts if b i = r i for all the trap qubits i.
(3) Alice applies corrections according to measurement outcomes b i and secret parameters θ i , r i at the output layer green qubits in order to obtain the final output.
Theorem 1
(Correctness). If Alice and Bob follow the steps of Protocol 1 honestly, then Alice accepts the correct outcome.
Proof. 
Proof follows along similar lines of Theorem 2 in [25]. In Protocol 1 the dummy qubits are placed at white vertices of the coloured sandglass-like graph S ( G ) . Note that the effect of dummy qubits is the break operation on the graph S ( G ) . As a result, a green computation subgraph and a red trap subgraph are obtained. Since both subgraphs have no effect to each other, we consider the measurements on the computation subgraph and the trap subgraph separately.
The correctness on the computation subgraph stems from the correctness of universal blind quantum computation [2]. To clarify, if each qubit in computation subgraph is rotated qubit + θ i and measured in angle δ i = C i , ϕ i , θ i , r i , x i , s , then all the deviations from the actual implementation of the measurement pattern are corrected. Therefore Alice will get desired computation output.
As for the trap subgraph, trap qubits are isolated. Every trap qubit + θ i will obtain deterministic measurement outcome b i = r i after it is measured in angle δ i equal to θ i + r i π . Alice will accepts the output, as honest Bob will always return b i = r i for all trap qubits. □
Theorem 2
(Verifiability). Protocol 1 is 0.905 verifiable in the case of quantum output and 0.866 verifiable in the case of classical output.
The proof of above Theorem 2 can be found in Appendix A. According to the process of proof, the verifiability of Protocol 1 is equivalent to solving the following optimization problems.
min α ( 0 , 1 ) max 1 1 4 α , 1 1 2 α , 1 4 α 2 + 1 2 α + 3 4 ,
min α ( 0 , 1 ) max 1 1 2 α , 1 4 α 2 + 1 2 α + 3 4 ,
where Equations (1) and (2) respectively correspond to the case of quantum output and the case of classical output. Theorem 2 shows that the probability of accepting an incorrect outcome is constant.

5. Optimization of Verifiability

While we achieve the verification of blind quantum computing with the sandglass-like resource state, our protocol’s verifiability is too high to be applied in practice. In this section, similar to [25], we will utilize one method respectively to reduce verifiability ϵ to arbitrarily small number in both cases of classical output and quantum output.
In the case of classical output we repeat Protocol 1 a certain number of times. Since all repetitions obtain the same correct output when Bob is honest, the verifiability can be decreased by adding an additional verification condition that Alice accepts final output if all of repetitions get the same output. From this result we can construct a new verification protocol based on repetitions, as given in Protocol 2. In the case of quantum output we use the technology of fault-tolerant code [33,34], which is often used in topological fault-tolerant blind quantum computation [4]. The main idea is that malicious Bob needs to make more attacks on computation qubits because of the existence of fault-tolerant code, which will increase the possibility of being caught by Alice. We therefore have Protocol 3.
Protocol 2 Optimised VUBQC with sandglass-like resource state for classical output.
Alice’s resources:
(1) The number of repetitions R = log ϵ log 0.866 , where ϵ is the desired security level.
(2) The rest of the resources are the same as Protocol 1.
Step i: 1 i R
(1) Follow the steps of Protocol 1, where each repetition of Protocol 1 corresponds to identical computation task.
(2) If Alice accepts the output, she records the classical output as O i .
Verification:
(1) If any single repetition of Protocol 1 is rejected, the overall computation will be rejected. Otherwise, Alice compares all O i . If all O i are identical, Alice accepts this output as the output of computation.
Theorem 3.
Protocol 2 is 0.866 R verifiable for classical output, where R is the number of repetitions.
Proof. 
Recall that the verifiability represents maximal probability that Alice accepts an incorrect outcome. Because the condition that Alice accepts final output is that all repetitions of Protocol 1 are accepted and all of them return the same output. The event that Alice accepts an incorrect output means that all repetitions of Protocol 1 are accepted and return the same incorrect output. Since the verifiability of Protocol 1 is 0.866, the verifiability of Protocol 2 is 0.866 R . □
Protocol 3 Optimised VUBQC with sandglass-like resource state for quantum output.
Alice’s resources:
(1) A base graph G encoded in a fault-tolerant way for correcting errors less than δ .
(2) The rest of the resources are the same as Protocol 1.
Same steps as in Protocol 1.
Theorem 4.
Protocol 3 is 0.905 δ 2 2 c + 1 verifiable for quantum output, where δ is the number of tolerated errors on the base graph G and c is the maximal degree of G.
The proof of the above Theorem 4 can be found in Appendix B. From Theorem 3 and Theorem 4 we can see that the verifiability of verification protocol is exponentially small.

6. Conclusions

Inspired by the dotted triple-graph by Kashefi and Wallden [25], we have introduced the concept of sandglass-like graph whose corresponding graph state can be used to be the resource state of verifiable blind quantum computing. We then proposed a verifiable blind quantum computation protocol with sandglass-like resource state. Based on this protocol, we proposed one new scheme in the case of classical and the case of quantum output to improve the verifiability of the original protocol.
Our main contribution can be described as follows. We have broken the symmetry of the trap-coloring in [25]. In other words, the possibility to be colored in green, the possibility to be colored in white, and the possibility to be colored in red are set to be not equal for each primary vertex. This essential point allows us to design a better resource state, which only requires a less linear overhead in the size of the computation. In addition, we achieves a better verifiability for the case of classical output, i.e., a lower probability that the client accepts a wrong outcome from the server, by optimizing the setting of the probability in the trap-coloring.
In [17], Joseph F. Fitzsimons et al proposed a VUBQC protocol using a dotted-complete graph state. Their verifiability is 5 / 6 2 d / 5 , where d is the defect thickness under RHG fault-tolerance scheme [35,36,37]. Here, RHG fault-tolerance scheme is a fault-tolerant version of the one-way quantum computer using a cluster state in three spatial dimensions, which was proposed by Raussendorf, Harrington and Goyal [36]. However, the overhead of their protocol is quadratic. In other words, the number of qubits required for the protocol is O ( N 2 ) , where N is the number of qubits used to implement desired computation. The protocol of Elham Kashefi et al [25] considered a dotted triple-graph state. Their verifiability is 8 / 9 R in the case of classical output and 8 9 δ 2 2 c + 1 in the case of quantum output, where R denotes the number of repetitions, δ is the number of errors that can be detected or corrected, and c is the maximal degree of the base graph G implementing desired computation. In addition, their overall cost is 3 N + 9 c N . In contrast to these schemes, our protocols’ verifiability is 0.866 R in the case of classical output and 0.905 δ 2 2 c + 1 in the case of quantum output. It means that our verifiability is better in the former case and slightly worse in the later case. More importantly, our overhead is 2 N + 4 c N .
For future studies, our construction can be applied to device-independent VUBQC [20,21,24] and other specific fault-tolerance codes. It is still an open problem to further reduce overhead of VUBQC.

Author Contributions

Conceptualization, Q.X.; methodology, Q.X.; formal analysis, Q.X.; investigation, Q.X., X.T. and R.H.; writing—original draft preparation, Q.X.; writing—review and editing, Q.X., X.T. and R.H.; supervision, X.T. and R.H.; project administration, X.T.; funding acquisition, X.T. All authors have read and agreed to the published version of the manuscript.

Funding

The research is partly supported by National Natural Science Foundation of China (Grant No. 61672014), National Cryptography Development Fund of China (Grant No. MMJJ20180109), Natural Science Foundation of Guangdong Province of China (Grant No. 2019A1515011069).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Theorem 2

Our proof makes full use of results from the proof of Theorem 3 of [25]. We represent the probability for Alice accepting an incorrect outcome in Protocol 1 by p e r r o r . According to (C.12) of [25], we have the following bound for p e r r o r .
p e r r o r max i E i T p T t T θ t , r t p θ t p r t η t v T σ i t η t v T 2 ,
where σ i is a tensor product of Pauli operators related to Bob’s deviation and σ i t I , X , Y , Z represents the action of σ i on the qubit t. Here, i E i means all i satisfying condition B i + C i + D i O 1 , where the sets are defined as follows.
A i = γ : σ i γ = I , 1 γ 4 N + 6 c N , B i = γ : σ i γ = X , 1 γ 4 N + 6 c N , C i = γ : σ i γ = Y , 1 γ 4 N + 6 c N , D i = γ : σ i γ = Z , 1 γ 4 N + 6 c N .
Moreover, D i O denotes subset of D i subject to the constraint that γ is an output qubit. Then we explain the meaning of η t v T . v T = t , r t , θ t represents the fixed choice of Alice’s random variables about trap qubits. In addition, η t v T = + θ t when trap qubit t belongs to output qubits and η t v T = + r t otherwise. Note that η t v T is actually the ideal state of trap qubit after all the entanglements done by Bob. In addition, T denotes positions of trap qubits, whose corresponding probability is p T . θ t or r t represents the value of trap qubit t corresponding to whether the trap qubit belongs to the output qubit or not. In the same way, p θ t and p r t denote probability of choosing θ t and r t , respectively.
To further bound p e r r o r , we use the conclusion [25] that an attack σ i having the fewest non-trivial terms (i.e., σ i γ X , Y , Z if γ is an output qubit, or σ i γ X , Y if γ is not an output qubit) corresponds to the maximal p e r r o r . Moreover, there is at least one non-trivial Pauli attack in the set E i . Combining both points, we can achieve the maximal p e r r o r when there is exactly one non-trivial Pauli attack. Assume that the position of the single non-trivial attack Bob does is β . β belongs to either P v β or A e β . For convenience, we use F β to denote P v β or A e β uniformly, where F β = P v β if β belongs to a primary location P v β and F β = A e β if β belongs to a primary location A e β . Then according to (C.14) of [25], the maximal p e r r o r becomes
p e r r o r max i E i t β F β θ t β , r t β p t β p θ t β p r t β η t β v T σ i t β η t β v T 2 .
Now we divide F β into three cases to analyse the upper bound of p e r r o r . The first case is that the non-trivial attack acts on the output primary location P v β O , i.e., F β = P v β O .
p e r r o r max i E i t β P v β O θ t β , r t β p t β p θ t β p r t β η t β v T σ i t β η t β v T 2 = max i E i 1 16 t β P v β O θ t β , r t β p t β + θ t β σ i | t β + θ t β 2 = max i E i 1 16 θ t β , r t β 1 α 2 · 1 + α 2 · η t β v T σ i t β η t β v T 2 max i E i 1 16 ( 16 · 1 α 2 + 4 α ) = 1 α 4 .
In the equality of the second line, we used θ t β 0 , π / 4 , , 7 π / 4 and r t β 0 , 1 . In the equality of the third line, we used that the probability that any qubit of primary set is a trap qubit is α / 2 , and σ i t β is non-trivial if and only if β = t β . In the last inequality, θ t β + θ t β σ i t β + θ t β 2 4 for any non-trivial σ i t β X , Y , Z is used.
The second case is that the non-trivial attack acts on the added location A e β . In the similar way, we can obtain
p e r r o r max i E i t β A e β θ t β , r t β p t β p θ t β p r t β η t β v T σ i t β η t β v T 2 = max i E i 1 16 t β A e β θ t β , r t β p t β + r t β σ i t β + r t β 2 = max i E i 1 16 θ t β , r t β 1 ( 1 α ) 2 4 · 1 + ( 1 α ) 2 4 · + r t β σ i t β + r t β 2 = 1 4 α 2 + 1 2 α + 3 4 .
In the equality of the third line, we considered that the probability that any qubit of added set is a trap qubit is ( 1 α ) 2 / 4 . In the equation of the fourth line, r t β + r t β σ i t β + r t β 2 = 0 for any non-trivial σ i t β X , Y .
The last case is that the non-trivial attack acts on the non-output primary location P v β N O , i.e., F β = P v β N O . Similarly, we can get the upper bound of p e r r o r , which is 1 α / 2 .
The overall bound of p e r r o r for the case of quantum output is the maximal value of all above situations. As for the case of classical output, the overall bound of p e r r o r is the maximal value of above situations excluding the output primary location. We aim to determine the value of α to minimize the overall bound of p e r r o r . The concrete optimal functions corresponding to quantum output and classical output are described in the Equations (1) and (2), respectively. From solving problems, we obtain the minimum 0.905 for the case of quantum output iff α is ( 3 5 ) / 2 , and we get the minimum 0.866 for the case of quantum output iff α is 2 3 .

Appendix B. Proof of Theorem 4

Our proof follows results from the proof of Theorem 4 of [25]. In our sandglass-like graph S ( G ) , any non-trivial error (X or Y) on an added qubit is equivalent to a local error on each of two adjacent primary qubits. So one needs at least δ / 2 errors on the qubits of S ( G ) to corrupt a computation. Then the set E i of attacks in the proof of Theorem 2 becomes E i = i : B i + C i + D i O δ / 2 . Since every location ( P v or A e ) contains exactly a qubit for computation subgraph, at least δ / 2 non-trivial attacks should be performed on different locations to disturb computation. We denote the set of locations having at least one non-trivial attack by S i , where S i δ / 2 . According to the expression of p e r r o r , the fewer non-trivial attacks result in the greater value of bound. An upper bound of p e r r o r is obtained when there are exactly δ / 2 different locations with exactly a single non-trivial attack in each location, i.e., S i = δ / 2 . Utilizing Lemma 1, there is a subset S i S i that is independently colourable locations and it contains at least S i = δ / 2 2 c + 1 locations. Here we set attacks in locations of S i S i to be trivial ( σ i γ = I or Z ) and attacks in locations of S i to be non-trivial for gaining an upper bound of p e r r o r . According to the inequality (A1), we have the same expression as (E.1) of [25].
p e r r o r max i E i β = 1 S i t β F β p t β θ t β , r t β p θ t β p r t β η t β v T σ i t β η t β v T 2
The right side of above expression consists of the product of S i items, while the upper bound of each item is 0.905 . So we have p e r r o r 0.905 δ 2 2 c + 1 .

References

  1. Childs, A. Secure assisted quantum computation. Quantum Info. Comput. 2005, 5, 456. [Google Scholar]
  2. Broadbent, A.; Fitzsimons, J.F.; Kashefi, E. Universal blind quantum computation. In Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, Atlanta, GA, USA, 25–27 October 2009; p. 517. [Google Scholar]
  3. Barz, S.; Kashefi, E.; Broadbent, A.; Fitzsimons, J.F.; Zeilinger, A.; Walther, P. Demonstration of blind quantum computing. Science 2012, 335, 303. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Morimae, T.; Fujii, K. Blind topological measurement-based quantum computation. Nat. Commun. 2012, 3, 1036. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Morimae, T. Continuous-variable blind quantum computation. Phys. Rev. Lett. 2012, 109, 230502. [Google Scholar] [CrossRef] [Green Version]
  6. Morimae, T.; Fujii, K. Blind quantum computation protocol in which Alice only makesmeasurements. Phys. Rev. A 2013, 87, 050301. [Google Scholar] [CrossRef] [Green Version]
  7. Morimae, T.; Fujii, K. Secure entanglement distillation for double-server blind quantum computation. Phys. Rev. Lett. 2013, 111, 020502. [Google Scholar] [CrossRef] [Green Version]
  8. Mantri, A.; Pérez-Delgado, C.A.; Fitzsimons, J.F. Optimal blind quantum computation. Phys. Rev. Lett. 2013, 111, 230502. [Google Scholar] [CrossRef] [Green Version]
  9. Giovannetti, V.; Maccone, L.; Morimae, T.; Rudolph, T.G. Efficient universal blind quantum computation. Phys. Rev. Lett. 2013, 111, 230501. [Google Scholar] [CrossRef] [Green Version]
  10. Sueki, T.; Koshiba, T.; Morimae, T. Ancilla-driven universal blind quantum computation. Phys. Rev. A 2013, 87, 060301. [Google Scholar] [CrossRef] [Green Version]
  11. Morimae, T.; Dunjko, V.; Kashefi, E. Ground state blind quantum computation on AKLT state. Quantum Inf. Comput. 2015, 15, 200. [Google Scholar]
  12. P´rez-Delgado, C.A.; Fitzsimons, J.F. Iterated gate teleportation and blind quantum computation. Phys. Rev. Lett. 2015, 114, 220502. [Google Scholar]
  13. Takeuchi, Y.; Fujii, K.; Ikuta, R.; Yamamoto, T.; Imoto, N. Blind quantum computation over a collective-noise channel. Phys. Rev. A 2016, 93, 052307. [Google Scholar] [CrossRef] [Green Version]
  14. Fitzsimons, J.F. Private quantum computation: An introduction to blind quantum computing and related protocols. NPJ Quantum Inf. 2017, 3, 23. [Google Scholar] [CrossRef]
  15. Zhang, X.; Weng, J.; Tan, X.; Song, T.; Luo, W. Measurement-based universal blind quantum computation with minor resources. arXiv 2018, arXiv:1801.03090. [Google Scholar]
  16. Zhang, X.; Weng, J.; Li, X.; Luo, W.; Tan, X.; Song, T. Single-server blind quantum computation with quantum circuit model. Quantum Inf. Process. 2018, 17, 134. [Google Scholar] [CrossRef]
  17. Fitzsimons, J.F.; Kashefi, E. Unconditionally verifiable blind quantum computation. Phys. Rev. A 2017, 96, 012303. [Google Scholar] [CrossRef] [Green Version]
  18. Barz, S.; Fitzsimons, J.F.; Kashefi, E.; Walther, P. Experimental verification of quantum computation. Nat. Phys. 2013, 9, 727. [Google Scholar] [CrossRef] [Green Version]
  19. Hayashi, M.; Morimae, T. Verifiable measurement-only blind quantum computing with stabilizer testing. Phys. Rev. Lett. 2015, 115, 220502. [Google Scholar] [CrossRef] [Green Version]
  20. Gheorghiu, A.; Kashefi, E.; Wallden, P. Robustness and device independence of verifiable blind quantum computing. New J. Phys. 2015, 17, 083040. [Google Scholar] [CrossRef] [Green Version]
  21. Hajdušek, M.; Pérez-Delgado, C.A.; Fitzsimons, J.F. Device-independent verifiable blind quantum computation. arXiv 2015, arXiv:1502.02563. [Google Scholar]
  22. McKague, M. Interactive proofs for BQP via self-tested graph states. Theor. Comput. 2016, 12, 1. [Google Scholar] [CrossRef]
  23. Greganti, C.; Roehsner, M.-C.; Barz, S.; Morimae, T.; Walther, P. Demonstration of measurement-only blind quantum computing. New J. Phys. 2016, 18, 013020. [Google Scholar] [CrossRef]
  24. Gheorghiu, A.; Wallden, P.; Kashefi, E. Rigidity of quantum steering and one-sided device-independent verifiable quantum computation. New J. Phys. 2017, 19, 023043. [Google Scholar] [CrossRef]
  25. Kashefi, E.; Wallden, P. Optimised resource construction for verifiable quantum computation. J. Phys. A Math. Theor. 2017, 50, 145306. [Google Scholar] [CrossRef]
  26. Hayashi, M.; Hajdušek, M. Self-guaranteed measurement-based quantum computation. Phys. Rev. A 2018, 97, 052308. [Google Scholar] [CrossRef] [Green Version]
  27. Fitzsimons, J.F.; Hajdušek, M.; Morimae, T. Post hoc Verification of Quantum Computation. Phys. Rev. Lett. 2018, 120, 040501. [Google Scholar] [CrossRef] [Green Version]
  28. Gheorghiu, A.; Kapourniotis, T.; Kashefi, E. Verification of quantum computation: An overview of existing approaches. Theory Comput. Syst. 2019, 63, 715. [Google Scholar] [CrossRef] [Green Version]
  29. Takeuchi, Y.; Morimae, T.; Mizutani, A.; Fitzsimons, J.F. Resource-efficient verification of quantum computing using Serfling’s bound. NPJ Quantum Inf. 2019, 5, 27. [Google Scholar] [CrossRef] [Green Version]
  30. Raussendorf, R.; Browne, D.E.; Briegel, H.J. Measurement-based quantum computation on cluster states. Phys. Rev. A 2003, 68, 022312. [Google Scholar] [CrossRef] [Green Version]
  31. Briegel, H.J.; Browne, D.E.; Dür, W.; Raussendorf, R.; Van den Nest, M. Measurement-based quantum computation. Nat. Phys. 2009, 5, 19. [Google Scholar] [CrossRef] [Green Version]
  32. Raussendorf, R.; Briegel, H.J. A one-way quantum computer. Phys. Rev. Lett. 2001, 86, 5188. [Google Scholar] [CrossRef] [PubMed]
  33. DiVincenzo, D.P.; Shor, P.W. Fault-tolerant error correction with efficient quantum codes. Phys. Rev. Lett. 1996, 77, 3260. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  34. Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information: 10th Anniversary Edition; Cambridge University Press: Cambridge, UK, 2010; pp. 425–493. [Google Scholar]
  35. Raussendorf, R.; Harrington, J.; Goyal, K. A fault-tolerant one-way quantum computer. Ann. Phys. 2006, 321, 2242. [Google Scholar] [CrossRef] [Green Version]
  36. Raussendorf, R.; Harrington, J.; Goyal, K. Topological fault-tolerance in cluster state quantum computation. New J. Phys. 2007, 9, 199. [Google Scholar] [CrossRef]
  37. Raussendorf, R.; Harrington, J. Fault-tolerant quantum computation with high threshold in two dimensions. Phys. Rev. Lett. 2007, 98, 190504. [Google Scholar] [CrossRef] [Green Version]
Figure 1. (a) A base graph G consisting of four vertices and three edges. (b) The intermediate graph I(G) corresponding to the base graph G. (c) The sandglass-like graph S ( G ) corresponding to the base graph G. The circle represents a primary vertex and the square represents an added vertex.
Figure 1. (a) A base graph G consisting of four vertices and three edges. (b) The intermediate graph I(G) corresponding to the base graph G. (c) The sandglass-like graph S ( G ) corresponding to the base graph G. The circle represents a primary vertex and the square represents an added vertex.
Entropy 22 00996 g001
Figure 2. (a) The trap-colouring of the sandglass-like graph S ( G ) . (b) A computation subgraph and a trap subgraph obtained by performing break operations on the white vertices of the coloured S ( G ) . For each green computation vertex, there may be a corresponding red trap vertex.
Figure 2. (a) The trap-colouring of the sandglass-like graph S ( G ) . (b) A computation subgraph and a trap subgraph obtained by performing break operations on the white vertices of the coloured S ( G ) . For each green computation vertex, there may be a corresponding red trap vertex.
Entropy 22 00996 g002
Figure 3. (a) A break operator on the vertex v 2 . (b) A bridge operator on the vertex v 2 .
Figure 3. (a) A break operator on the vertex v 2 . (b) A bridge operator on the vertex v 2 .
Entropy 22 00996 g003
Figure 4. (a) The introduction of a primary base-location v i . (b) The introduction of an added base-location a i j . Black vertices are excluded for satisfying independently colourable locations (ICL). The dash line circles all the influenced vertices.
Figure 4. (a) The introduction of a primary base-location v i . (b) The introduction of an added base-location a i j . Black vertices are excluded for satisfying independently colourable locations (ICL). The dash line circles all the influenced vertices.
Entropy 22 00996 g004

Share and Cite

MDPI and ACS Style

Xu, Q.; Tan, X.; Huang, R. Improved Resource State for Verifiable Blind Quantum Computation. Entropy 2020, 22, 996. https://doi.org/10.3390/e22090996

AMA Style

Xu Q, Tan X, Huang R. Improved Resource State for Verifiable Blind Quantum Computation. Entropy. 2020; 22(9):996. https://doi.org/10.3390/e22090996

Chicago/Turabian Style

Xu, Qingshan, Xiaoqing Tan, and Rui Huang. 2020. "Improved Resource State for Verifiable Blind Quantum Computation" Entropy 22, no. 9: 996. https://doi.org/10.3390/e22090996

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop