We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map F ε L(A in ⊗ B in) → L(A out ⊗ B out), given as a quantum circuit, upon their joint quantum input state ρ in ε D(A in ⊗ B in). Our protocol leaks no more to any active adversary than an ideal functionality for F provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4]. © 2012 International Association for Cryptologic Research.
CITATION STYLE
Dupuis, F., Nielsen, J. B., & Salvail, L. (2012). Actively secure two-party evaluation of any quantum operation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7417 LNCS, pp. 794–811). https://doi.org/10.1007/978-3-642-32009-5_46
Mendeley helps you to discover research relevant for your work.