In the universal blind quantum computation problem, a client wants to make use of a single quantum server to evaluate $C|0\rangle$ where $C$ is an arbitrary quantum circuit while keeping $C$ secret. The client's goal is to use as few resources as possible. This problem, first raised by Broadbent, Fitzsimons and Kashefi [FOCS09, arXiv:0807.4154], has become fundamental to the study of quantum cryptography, not only because of its own importance, but also because it provides a testbed for new techniques that can be later applied to related problems (for example, quantum computation verification). Known protocols on this problem are mainly either information-theoretically (IT) secure or based on trapdoor assumptions (public key encryptions). In this paper we study how the availability of symmetric-key primitives, modeled by a random oracle, changes the complexity of universal blind quantum computation. We give a new universal blind quantum computation protocol. Similar to previous works on IT-secure protocols (for example, BFK [FOCS09, arXiv:0807.4154]), our protocol can be divided into two phases. In the first phase the client prepares some quantum gadgets with relatively simple quantum gates and sends them to the server, and in the second phase the client is entirely classical -- it does not even need quantum storage. Crucially, the protocol's first phase is succinct, that is, its complexity is independent of the circuit size. Given the security parameter $\kappa$, its complexity is only a fixed polynomial of $\kappa$, and can be used to evaluate any circuit (or several circuits) of size up to a subexponential of $\kappa$. In contrast, known schemes either require the client to perform quantum computations that scale with the size of the circuit [FOCS09, arXiv:0807.4154], or require trapdoor assumptions [Mahadev, FOCS18, arXiv:1708.02130].
翻译:在通用盲量计算问题中,一个客户想要使用一个单一量子服务器来评估 $C =0\rangle$ 702, 因为它提供了一个测试点, 并且可以随后应用于相关问题的新技术( 例如, 量子计算核查 ) 。 客户的目标是尽可能少地使用资源。 这个问题首先由Broadbent、 Fitzsimons 和 Kashefi 提出 [ FOCS09, arXiv: 0807.4154] 。 这个问题已经成为量子加密研究的基础, 不仅因为它本身的重要性, 而且还因为它提供了一个测试点, 这个测试点提供了一种测试, 这个测试点可以再应用于相关的技术( 例如, 量子计算 ) 。 量子计算 。 这个测试点主要是信息- 量子电路路路路路路路路路路路路路路路路路路路路路路路路路路路路路路路, 或者基于陷阱的假设 。 使用量路路路路路路路路路路路路路路路路路路路路路路路程的计算系统, 需要一些的直路路路路路路路路路路路路路路路路路路路路路路路路通, 。