Actively secure two-party evaluation of any quantum operation

41Citations
Citations of this article
49Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map F ε L(A in ⊗ B in) → L(A out ⊗ B out), given as a quantum circuit, upon their joint quantum input state ρ in ε D(A in ⊗ B in). Our protocol leaks no more to any active adversary than an ideal functionality for F provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4]. © 2012 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Dupuis, F., Nielsen, J. B., & Salvail, L. (2012). Actively secure two-party evaluation of any quantum operation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7417 LNCS, pp. 794–811). https://doi.org/10.1007/978-3-642-32009-5_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free