Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.

Slides:



Advertisements
Similar presentations
Closed Timelike Curves Make Quantum and Classical Computing Equivalent
Advertisements

How Much Information Is In Entangled Quantum States? Scott Aaronson MIT |
The Learnability of Quantum States Scott Aaronson University of Waterloo.
Quantum Software Copy-Protection Scott Aaronson (MIT) |
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
Quantum Double Feature Scott Aaronson (MIT) The Learnability of Quantum States Quantum Software Copy-Protection.
New Evidence That Quantum Mechanics Is Hard to Simulate on Classical Computers Scott Aaronson Parts based on joint work with Alex Arkhipov.
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
How to Solve Longstanding Open Problems In Quantum Computing Using Only Fourier Analysis Scott Aaronson (MIT) For those who hate quantum: The open problems.
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
Quantum Computing with Noninteracting Bosons
University of Queensland
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
How to Delegate Computations: The Power of No-Signaling Proofs Ron Rothblum Weizmann Institute Joint work with Yael Kalai and Ran Raz.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
March 11, 2015CS21 Lecture 271 CS21 Decidability and Tractability Lecture 27 March 11, 2015.
1 Adapted from Oded Goldreich’s course lecture notes.
Quantum Error Correction SOURCES: Michele Mosca Daniel Gottesman Richard Spillman Andrew Landahl.
Randomized and Quantum Protocols in Distributed Computation Michael Ben-Or The Hebrew University Michael Rabin’s Birthday Celebration.
University of Queensland
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
1 More on Distributed Coordination. 2 Who’s in charge? Let’s have an Election. Many algorithms require a coordinator. What happens when the coordinator.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
How to play ANY mental game
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Secure Multi-Party Quantum Computation Michael Ben-Or QCrypt 2013 Tutorial M. Ben-Or, C. Crépeau, D. Gottesman, A.Hassidim, A. Smith, arxiv.org/abs/
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
PROBABILISTIC COMPUTATION By Remanth Dabbati. INDEX  Probabilistic Turing Machine  Probabilistic Complexity Classes  Probabilistic Algorithms.
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
2012/1/25 Complete Problem for Perfect Zero-Knowledge Quantum Interactive Proof Jun Yan State Key Laboratory of Computer Science, Institute.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Interactive proof systems Section 10.4 Giorgi Japaridze Theory of Computability.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
Nawaf M Albadia
Quantum and classical computing Dalibor HRG EECS FER
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 1.
Quantum Cryptography Antonio Acín
NP ⊆ PCP(n 3, 1) Theory of Computation. NP ⊆ PCP(n 3,1) What is that? NP ⊆ PCP(n 3,1) What is that?
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Shift Register Circuits Mark M. Wilde arXiv: National Institute of Standards and Technology, Wednesday, June 10, 2009 To appear in Physical.
Attendance Syllabus Textbook (hardcopy or electronics) Groups s First-time meeting.
Topic 36: Zero-Knowledge Proofs
A low cost quantum factoring algorithm
Q Jeff Kinne.
How to Delegate Computations: The Power of No-Signaling Proofs
3rd Lecture: QMA & The local Hamiltonian problem (CNT’D)
Qubit Recycling in Quantum Computation
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Quantum Computation – towards quantum circuits and algorithms
CS21 Decidability and Tractability
Presentation transcript:

Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University of Jerusalem 1.Testing the Borders of Quantum Mechanics: Karl Popper: a scientific physical theory must be falsifiable. Is QM a falsifiable theory? [Vazirani’07]. Is it possible to test QM “outside of BPP”? 2.The Experimental Aspect: How can one verify that a physical system is indeed a quantum computer? 3.Cryptographic-Commercial: Is it possible to trust the outcome of a company that sells quantum CPU time? How can we check that a system we want to buy is indeed a quantum computer? TheoryExperiment F=ma E=mc 2 In Physics predictions and experimental results are compared According to the modern Church–Turing thesis any reasonable physical system can be simulated efficiently by a probabilistic Turing machine Theorems : 1.There exists a QPIP for Q-CIRCUIT.  BQP=QPIP. 2.Q-CIRCUIT has a fault tolerant QPIP protocol: computation and communication are subject to noise. 3.Q-CIRCUIT has a blind QPIP protocol. A blind protocols is one where the prover gains no information about the function being computed or the input.  Can we achieve this with a completely classical verifier? (Find a protocol or prove impossibility result)  And what if we allow two provers? (Preliminary results [Broadbent at al.] show this with entangled provers.)  To be physically realizable, the QPIP must work in the presence of noise.  Fault tolerant quantum computation schemes encode each qubit by a poly-log number of qubits. If we allow the verifier a quantum memory of poly-log qubits, we can add fault tolerant techniques to the simple QPIP protocol.  However, when keeping the verifier’s quantum memory constant, we do not know how to make the scheme fault tolerant. Motivation for a new QPIP protocol  Handle noise with a constant quantum size verifier.  Reduce quantum communication.  Transfer the bulk of quantum computation to the prover. Eve Alice Classical Keys k  K A QAS is a pair of quantum algorithms A and B together with a set of classical keys K such that: A encodes an input in the message space A k : H  M B decodes and checks validity B k : M  H  V A QAS is  secure if  |φ  : Completeness:  k  K: B k A k (  )= |φ  φ| ⊗ |VAL  VAL| Soundness: For any adversary operator O, set: Then:... n1 j k 1.Requests of qubits for the gate U i 2.Decodes, applies U i and encodes. 3.Returns the qubits to the prover. Requests output qubit, decodes and measures 1 Making the protocol blind: Verifier asks for all pairs of qubits ProverVerifier Making the computation of U|x  blind: we use a universal circuit Q, which on input |“U”  |x  outputs |“U”  U|x  Fault tolerance: we adapt standard techniques to the QPIP protocol. Care is due since the verifier needs to prepare authenticated states sequentially, due to lack of space. Interactive View of Shor’s Algorithm For N=xy,x≤y decide whether x i =1  P sends x,y: x≤y & xy=N.  V accepts if xy=N & x i =1 Quantum Prover Interactive Proof (QPIP) In QPIP:  The prover (P) is computationally restricted to BQP.  The verifier (V) is a hybrid quantum-classical machine: A BPP machine +O(1) qubits.  Quantum and classical communication channels. The Clifford QAS Alice prepares |φ  |0 ⊗ d , and applies a random U  C m+d, The Clifford group on m+d qbits. Bob applies U -1 and measures the last d qubits. Declares the state valid only if they are all |0 . Abort otherwise. Intuitively, in error detection codes we want to detect a given set of errors (say, all errors on <d qubits). with certainty. In contrast, in QAS we would like to detect any error with high probability Quantum Channel The Strength of Quantum Mechanics is (also) a Weakness Using Interaction A Simple Quantum Authentication Scheme Signed Quantum Reed-Solomon Error Detection Codes The Signed RS QAS Alice Picks a random k, encodes the message using C k, and then applies a random Pauli P to the resulting state. Bob applies P -1 and checks whether the message is in C k. Logical operations C-NOT, Fourier and measurement in the computational basis, are performed transversally, independently of k. Proof sketch  The random Pauli transforms any attack by Eve to a (not necessarily uniform) mixture of Pauli operators  Pauli operators are detected with high probability over k. [BCGHS’06] introduced the signed quantum RS code C k When m=2d+1, it detects d errors. Motivating QuestionsResults Simple QPIP Protocol Polynomial Based QPIP Protocol Shor’s Answer is Not Sufficient Quantum Authentication (QAS) Fault Tolerant QPIP Open Questions VerifierProver Authenticates input qubits  Secure assisted quantum computation. A.M. Childs [Chi01] Large quantum memory, blind, not secure against malicious server.  Blind quantum computation. P. Arrighi and L. Salvail [AS06] Public randomly verifiable function, secure against individual attacks.  Independently: Universal blind quantum computation. A. Broadbent, J. Fitzsimons, E. Kashefi [BFK08]. Similar results motivated by blind computation. Verifier’s memory is of one qubit! Related Work 13 Quantum Computation is interesting since we think it violates the modern Church Turing thesis because we believe BPP≠BQP, and that BQP can be realized physically. Following these beliefs, it is impossible to compute predictions for quantum experiments! The Problems  Probably BQP  NP So this reasoning will not work for all problems in BQP.  Probably factorization is not BQP complete (log depth quantum circuit). Can we verify the evaluation of Jones poly?  100 bit numbers can be factorized on a PC  Shor’s algorithm cannot be used to test a 100 qubit quantum computer. The Answer  Shor’s algorithm can be run on a large number N, the answer can be easily verified.  Verification rather than prediction.  Assuming factoring is intractable this is the first test of QM outside of BPP.  This works for any problem in NP  BQP Quantum Channel Works with any QAS: The verifier uses the prover as an untrusted storage device. The verifier accepts if all qubits are correctly authenticated & the result of the final measurement is 1 Q-CIRCUIT: Input: a quantum circuit gates: U=U T …U 1, acting on n input qbits. Output: distinguish between: Interactive proofs [GMR85] A protocol between a BPP verifier (V) and a computationally unbounded prover (P) such that:  For all x  L: Pr(V accepts)>  2 / 3  For all x  L: Pr(V rejects) >  2 / 3 A B CD Proof Idea  Eve’s operator O is translated by the random Clifford to the following operator: a uniform mixture of Paulis.  Bob detects an error unless P is the identity on the last d qubits. The probability for this bad event is 2 -d We need the prover to be able to apply gates, without knowing the authentication code!  Authenticated input qubits & Toffoli states  Prover performs gates, Verifier updates his Key.  Verifier interprets results of Prover’s measurements via Classical communication.  The verifier accepts if all qubits are correctly authenticated & the result of the final measurement is 1. Quantum Channel Classical Channel Bob