首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Blind quantum computation with identity authentication
Authors:Qin Li  Zhulin Li  Wai Hong Chan  Shengyu Zhang  Chengdong Liu
Institution:1. College of Information Engineering, Xiangtan University, Xiangtan 411105, China;2. Department of Mathematics and Information Technology, The Education University of Hong Kong, Hong Kong;3. Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong;4. China General Technology Research Institute, Beijing 100091, China
Abstract:Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.
Keywords:Blind quantum computation  Identity authentication  Quantum cryptography
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号