Papers
Topics
Authors
Recent
Search
2000 character limit reached

Classical Verification of Quantum Computations

Published 3 Apr 2018 in quant-ph | (1804.01082v3)

Abstract: We present the first protocol allowing a classical computer to interactively verify the result of an efficient quantum computation. We achieve this by constructing a measurement protocol, which enables a classical verifier to use a quantum prover as a trusted measurement device. The protocol forces the prover to behave as follows: the prover must construct an n qubit state of his choice, measure each qubit in the Hadamard or standard basis as directed by the verifier, and report the measurement results to the verifier. The soundness of this protocol is enforced based on the assumption that the learning with errors problem is computationally intractable for efficient quantum machines.

Authors (1)
Definition Search Book Streamline Icon: https://streamlinehq.com
References (21)
  1. Interactive proofs for quantum computations. In Proc. Innovations in Computer Science (ICS), pages 453–469, 2010.
  2. Interactive proofs for quantum computations. Arxiv preprint 1704.04487, 2017.
  3. Learning with rounding, revisited: New reduction, properties and applications. Cryptology ePrint Archive, Report 2013/098, 2013. https://eprint.iacr.org/2013/098.
  4. Wojciech Banaszczyk. New bounds in some transference theorems in the geometry of numbers. Mathematische Annalen, 296(1):625–635, 1993.
  5. A cryptographic test of quantumness and certifiable randomness from a single quantum device. J. ACM, 68(5), August 2021.
  6. Universal blind quantum computation. In Proceedings of the 2009 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’09, page 517–526, USA, 2009. IEEE Computer Society.
  7. Realizable hamiltonians for universal adiabatic quantum computers. Phys. Rev. A, 78:012352, 07 2008.
  8. Classical hardness of learning with errors. In Symposium on Theory of Computing Conference, STOC’13, Palo Alto, CA, USA, June 1-4, 2013, pages 575–584, 2013.
  9. Exact and approximate unitary 2-designs and their application to fidelity estimation. Phys. Rev. A, 80:012304, 07 2009.
  10. Unconditionally verifiable blind quantum computation. Phys. Rev. A, 96:012303, 07 2017.
  11. Robustness of the learning with errors assumption. ICS, pages 230–240, 2010.
  12. Daniel Gottesman, 2004. As referenced in [http://www.scottaaronson.com/blog/?p=284; accessed 13-Apr-2017].
  13. Classical and Quantum Computation. American Mathematical Society, 2002.
  14. Urmila Mahadev. Classical homomorphic encryption for quantum circuits. SIAM Journal on Computing, 0(0):FOCS18–189–FOCS18–215, 2018.
  15. Post hoc verification with a single prover. Arxiv preprint arXiv:1603.06046, 2016.
  16. Quantum proofs can be verified using only single qubit measurements, 2015.
  17. Trapdoors for lattices: Simpler, tighter, faster, smaller. Cryptology ePrint Archive, Report 2011/501, 2011. http://eprint.iacr.org/2011/501.
  18. Oded Regev. On lattices, learning with errors, random linear codes, and cryptography. In Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, STOC ’05, pages 84–93, New York, NY, USA, 2005. ACM.
  19. A classical leash for a quantum system: Command of quantum systems via rigidity of chsh games. In Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS ’13, page 321–322, New York, NY, USA, 2013. Association for Computing Machinery.
  20. Yaoyun Shi. Both toffoli and controlled-not need little help to do universal quantum computing. Quantum Info. Comput., 3(1):84–92, January 2003.
  21. Wikipedia. Trace distance — Wikipedia, the free encyclopedia, 2018. [https://en.wikipedia.org/wiki/Trace_distance; accessed 7-Jan-2018].
Citations (197)

Summary

  • The paper introduces a protocol enabling classical computers to verify quantum computation outputs by leveraging a quantum prover as a trusted measurement device.
  • The protocol's security relies on cryptographic hardness assumptions, such as the Learning with Errors (LWE) problem, and the use of trapdoor claw-free and injective functions.
  • This work demonstrates that classical verification of quantum computations is possible under certain assumptions, offering a path towards more scalable and trustworthy quantum computing implementations.

Classical Verification of Quantum Computations

The paper "Classical Verification of Quantum Computations" by Urmila Mahadev presents a protocol that enables the interaction between a classical computer and a quantum prover to verify quantum computations' outputs. This protocol introduces a method for classical verifiers to confirm quantum results without needing a full quantum verifier, thereby addressing a long-standing question in quantum computing.

Measurement Protocol and Classical Verification

The core contribution in this paper is the measurement protocol that forces a quantum prover to act as a classical verifier's trusted measurement device. This protocol relies on the cryptographic hardness assumption that the Learning with Errors (LWE) problem is insurmountable for efficient quantum machines. The process compels the quantum prover to construct an nn-qubit state, which must then be measured as requested by the verifier in either the standard or Hadamard basis.

Protocol Design and Analysis

The measurement protocol is grounded on two primary components—trapdoor claw-free functions and trapdoor injective function families. These cryptographic constructs ensure that the prover commits to a quantum state and cannot adaptively alter the measurement results in response to the verifier's choice of basis.

  1. Trapdoor Claw-Free Functions (NTCF): These functions allow forming a classical commitment to a quantum state by associating it with a claw—a pair of inputs mapping to the same output, which are computationally hard to identify simultaneously.
  2. Trapdoor Injective Functions: This family of functions helps in classical commitment by ensuring non-overlapping images for function pairs, which is crucial for extracting classical measurement outcomes via predetermined bases by the verifier.

Strength of the Protocol

The protocol's soundness is reliant on several cryptographic properties. First, it utilizes computational assumptions like the difficulty of solving specific instances of LWE to maintain robustness against quantum attacks. Secondly, the protocol achieves a completeness that lets the verifier, with negligible computational overhead, ensure that the quantum prover's state corresponds to a singular comprehensible quantum state by providing indistinguishable outputs from an ideal quantum state measurement.

Implications for Quantum Computing

The implications of this work are profound, both theoretically and practically. Theoretically, it shows that classical verification of quantum computations is plausible under certain cryptographic assumptions. Practically, it opens avenues for scalable quantum computation verification, which could vastly improve the integrity and trust of quantum computation outputs, especially as quantum computing moves towards more complex and commercially viable implementations.

Future Directions

Further research could optimize the efficiency of this protocol and explore other hardness assumptions for broader applicability. Additionally, integration with existing quantum communication protocols, perhaps including error-correcting methods to reduce noise impact from quantum measurements, would be a worthwhile pursuit.

In summary, the paper presents a significant step towards bridging the gap between quantum and classical computing through a well-structured protocol underpinned by robust cryptographic principles, making quantum technology more accessible and verifiable by classical means.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 3 tweets with 24 likes about this paper.