DOI QR코드

DOI QR Code

Trends in Privacy-Preserving Quantum Computing Research

프라이버시 보호 양자 컴퓨팅 연구 동향

  • Y.K. Lee
  • 이영경 (암호공학연구실)
  • Published : 2024.10.01

Abstract

Quantum computers can likely perform computations that are unattainable by classical computers, and they represent the next generation of computing technologies. Due to high costs and complex maintenance, direct ownership of quantum computers by individuals users is challenging. Future utilization is predicted to involve quantum computing servers performing delegated computations for clients lacking quantum capabilities, similar to the current utilization of supercomputing. This delegation model allows several users to benefit from quantum computing without requiring ownership, thereby providing innovation potential in various fields. Ensuring data privacy and computational integrity in this model is critical for ensuring the reliability of quantum cloud computing services. However, these requirements are difficult to achieve because classical security techniques cannot be directly applied to quantum computing. We review research on security protocols for the delegation of quantum computing with focus on data privacy and integrity verification. Our analysis covers the background of quantum computing, privacy-preserving quantum computational models, and recent research trends. Finally, we discuss challenges and future directions for secure quantum delegated computations, highlighting their importance for the commercialization and widespread adoption of quantum computing.

Keywords

Acknowledgement

This work was supported by Electronics and Telecommunications Research Institute(ETRI) grant funded by the Korean government[24ZS1320, Research on Quantum-Based New Cryptographic System for Ensuring Perfect Data Privacy].

References

  1. A. Childs, "Secure assisted quantum computation," Quant. Inf. Comput. vol. 5, no. 6, 2005. pp. 456-466.
  2. A. Ambainis et al., "Private quantum channels," in Proc. 41st Annu. Symp. Foundations Comput. Sci., (Los Alamitos, CA, USA), 2000.
  3. K. Fisher et al., "Quantum computing on encrypted data," Nat Commun., vol. 5, 2014.
  4. P. Arrighi and L. Salvail, "Blind quantum computation," Int. J. Quantum Inform., vol. 4, no. 5, 2006, pp. 883-898.
  5. A. Broadbent, "Delegating private quantum computations," Can. J. Phys. vol. 93, no. 9, 2015, pp. 941-946.
  6. X. Tan et al., "Universal half-blind quantum computation," Ann. Telecommun., vol. 72, no. 9-10, 2017, pp. 1-7.
  7. W. Liu et al., "Full-blind delegating private quantum computation," Comput. Materials Continua, vol. 56, no. 2, 2018, pp. 211-223.
  8. A. Broadbent, "How to Verify a Quantum Computation," Theory Comput., vol. 14 no. 11, 2018, pp. 1-37.
  9. J.F. Fitzsimons and E. Kashefi, "Unconditionally verifiable blind quantum computation," Phys. Rev. A vol. 96, 2017.
  10. A. Broadbent, J. Fitzsimons, and E. Kashefi, "Universal blind quantum computation," in 50th Annu. IEEE Symp. Foundations Comput. Sci. (Atlanta, GA, USA), 2009.
  11. S. Barz et al., "Demonstration of blind quantum computing," Sci., vol. 335, no. 6066, 2012, pp. 303-308.
  12. T. Morimae and K. Fujii, "Blind quantum computation protocol in which Alice only makes measurements," Phys. Rev. A, vol. 87, 2013.
  13. W. Reichardt, F. Unger, and U. Vazirani, "A classical leash for a quantum system: Command of quantum systems via rigidity of CHSH games," arXiv Preprint, 2012, https://doi.org/10.48550/arXiv.1209.0448.
  14. W. Reichardt, F. Unger, and U. Vazirani, "Classical command of quantum systems," Nature, vol. 496, 2013, pp. 456-460.