Functionality Description
Delegated Computation is the task of assigning computation on hidden data to a powerful untrusted party (a device) by a weak (in terms of computational powers) party while maintaining privacy of hidden data from the powerful party. Protocols under this functionality are commonly called Client-Server protocols. Delegated Quantum Computation (DQC) protocols involve partially or fully classical Client delegating a quantum computation to fully powerful single/multiple quantum Server/Servers. All DQC protocols involve three main stages, Preparation Stage, Computation Stage and Output Correction Stage. The roles of Client and Server in the different stages may differ according to the type of communication used see Protocols list.
Protocols
No protocols implement this functionality yet.
Classical Analogues
No content has been added to this section, yet!
Real-world Use Cases
- Quantum Task.
- No classical analog for Blind Quantum Computing where input, output and computation can be hidden. Classical analogue for Homomorphic encryption techniques exist, hiding only the input and the output of the client and not the computation.
- Quantum machine learning. acheck
Properties
- Universalityย A protocol for delegated quantum computation is universal if it client can use the server to compute any quantum circuit.
- Correctnessย A protocol is correct if the output of clientโs input after Serverโs processing is correct, given that both parties follow the protocol honestly.
- Blindnessย The protocol is blind to the server (who, in this case is the adversary/dishonest party) means that clientโs computation is hidden from the server during the entire protocol.
- Compactness Decryption of datat the end of the protocol should be independent of the size of the quantum circuit used for computation.
- Full Homomorphism A homomorphic encryption which can perform any quantum computation.
Further Information
Secure Delegated Computation was an open problem in classical computation until Gentryโs work in 1994 on Homomorphic Encryption using Lattice Based Cryptography [1]. An analogue was required in case of delegating quantum data. Childs proposed the first work in the field in 2005 [2]. Unlike the classical scheme, this protocol could not only hide the input and output of the client from the sever but also clientโs computation. This was a breakthrough as there exists no such scheme in classical cryptography which could provide this additional functionality, called โblindnessโ. Arrighi and Salvail later showed [3] that hiding of computation was possible only for a few functions. They also coined the notion of verifiability. In 2009, Broadbent, Fitzsimons and Kashefi developed prepare and send universal blind quantum computation, which was the first scheme to solve this problem for any quantum circuit. This property, also known as universality, opened the gates for further research in this field. New protocols came into picture, some using the measurement based quantum computation framework like blind quantum computation and some devising homomorphic encryption for quantum data. Out of which, prepare-and-send universal blind quantum computation has been proven to be universally composable i.e. it is secure in any and every scenerio possible. The only other protocol which is proven to be universally composable is Quantum Key Distribution. All the above protocols required quantum communication until the latest work by Urmila Mahadev in 2018, classical fully homomorphic encryption for quantum circuits. It requires no quantum operation on the clientโs side. pseudo-secret random qubit generator is a functionality different from delegation of quantum computation. It comes with multiple uses, one of which being universal blind quantum computation. This protocol also requires no quantum computation on clientโs side in order to instruct server to prepare her secret random qubits, of which she has complete knowledge but not the server.
Review Papers:
- Fitzsimons (2017)ย gives an overview of delegated quantum computation
- Dunjko et al (2013)ย gives the abstract cryptography framework for delegated computing and uses it prove universal composability of UBQC.
References
- Gentry, C., 2009.ย A fully homomorphic encryption scheme. Stanford university.
- Childs, Andrew M. โSecure assisted quantum computation.โย arXiv preprint quant-ph/0111046ย (2001).
- Arrighi, P. and Salvail, L., 2006. Blind quantum computation.ย International Journal of Quantum Information,ย 4(05), pp.883-898.


Leave a Reply