Blind Quantum Signature with Blind Quantum Computation

2016 ◽  
Vol 56 (4) ◽  
pp. 1108-1115 ◽  
Author(s):  
Wei Li ◽  
Ronghua Shi ◽  
Ying Guo
2021 ◽  
Vol 142 ◽  
pp. 107190
Author(s):  
Qin Li ◽  
Chengdong Liu ◽  
Yu Peng ◽  
Fang Yu ◽  
Cai Zhang

Entropy ◽  
2020 ◽  
Vol 22 (9) ◽  
pp. 996
Author(s):  
Qingshan Xu ◽  
Xiaoqing Tan ◽  
Rui Huang

Recent advances in theoretical and experimental quantum computing raise the problem of verifying the outcome of these quantum computations. The recent verification protocols using blind quantum computing are fruitful for addressing this problem. Unfortunately, all known schemes have relatively high overhead. Here we present a novel construction for the resource state of verifiable blind quantum computation. This approach achieves a better verifiability of 0.866 in the case of classical output. In addition, the number of required qubits is 2N+4cN, where N and c are the number of vertices and the maximal degree in the original computation graph, respectively. In other words, our overhead is less linear in the size of the computational scale. Finally, we utilize the method of repetition and fault-tolerant code to optimise the verifiability.


Author(s):  
Leonardo Disilvestro ◽  
Theodoros Kapourniotis ◽  
Elham Kashefi ◽  
Damian Markham

2015 ◽  
Vol 12 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Chia-Hung Chien ◽  
Rodney Van Meter ◽  
Sy-Yen Kuo

2013 ◽  
Vol 11 (04) ◽  
pp. 1350036 ◽  
Author(s):  
YING GUO ◽  
XIN SUN ◽  
WEI ZHANG

A chaos-based arbitrated quantum signature (AQS) scheme is designed on the basis of an improved quantum chaotic encryption algorithm whose security is ensured due to the implementation of the quantum one-time pad that embraces the key-dependent chaotic operation string. It involves in a small-scale quantum computation network with three participants in three phases, i.e. initializing phase, signing phase and verifying phase. The signatory signs the encrypted message and then the receiver verifies the signature is valid with the aid of an arbitrator who plays a crucial role when a dispute arises. Analysis shows that the signature can neither be forged nor disavowed by the malicious attackers.


Sign in / Sign up

Export Citation Format

Share Document