Acknowledgement
This work was supported by Electronics and Telecommunications Research Institute(ETRI) grant funded by the Korean government[24ZS1320, Research on Quantum-Based New Cryptographic System for Ensuring Perfect Data Privacy].
References
- A. Childs, "Secure assisted quantum computation," Quant. Inf. Comput. vol. 5, no. 6, 2005. pp. 456-466.
- A. Ambainis et al., "Private quantum channels," in Proc. 41st Annu. Symp. Foundations Comput. Sci., (Los Alamitos, CA, USA), 2000.
- K. Fisher et al., "Quantum computing on encrypted data," Nat Commun., vol. 5, 2014.
- P. Arrighi and L. Salvail, "Blind quantum computation," Int. J. Quantum Inform., vol. 4, no. 5, 2006, pp. 883-898.
- A. Broadbent, "Delegating private quantum computations," Can. J. Phys. vol. 93, no. 9, 2015, pp. 941-946.
- X. Tan et al., "Universal half-blind quantum computation," Ann. Telecommun., vol. 72, no. 9-10, 2017, pp. 1-7.
- W. Liu et al., "Full-blind delegating private quantum computation," Comput. Materials Continua, vol. 56, no. 2, 2018, pp. 211-223.
- A. Broadbent, "How to Verify a Quantum Computation," Theory Comput., vol. 14 no. 11, 2018, pp. 1-37.
- J.F. Fitzsimons and E. Kashefi, "Unconditionally verifiable blind quantum computation," Phys. Rev. A vol. 96, 2017.
- A. Broadbent, J. Fitzsimons, and E. Kashefi, "Universal blind quantum computation," in 50th Annu. IEEE Symp. Foundations Comput. Sci. (Atlanta, GA, USA), 2009.
- S. Barz et al., "Demonstration of blind quantum computing," Sci., vol. 335, no. 6066, 2012, pp. 303-308.
- T. Morimae and K. Fujii, "Blind quantum computation protocol in which Alice only makes measurements," Phys. Rev. A, vol. 87, 2013.
- W. Reichardt, F. Unger, and U. Vazirani, "A classical leash for a quantum system: Command of quantum systems via rigidity of CHSH games," arXiv Preprint, 2012, https://doi.org/10.48550/arXiv.1209.0448.
- W. Reichardt, F. Unger, and U. Vazirani, "Classical command of quantum systems," Nature, vol. 496, 2013, pp. 456-460.