Multi-party blind quantum computation protocol with mutual authentication in network
Blind quantum computation (BQC) can ensure a client with limited quantum capability safely delegates computing tasks to a remote quantum server. In order to resist attacks from ignoring identity authentication in BQC protocols, it is necessary to guarantee the legality of both clients and servers in...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2021-06, Vol.64 (6), p.162302, Article 162302 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Blind quantum computation (BQC) can ensure a client with limited quantum capability safely delegates computing tasks to a remote quantum server. In order to resist attacks from ignoring identity authentication in BQC protocols, it is necessary to guarantee the legality of both clients and servers in a multi-party BQC network. So we propose a multi-party BQC protocol involving three phases to distribute shared keys and authenticate identities. Firstly, by using the advantages of measurement device independent quantum key distribution (MDI-QKD), the registered client and the assigned server could share the initial key safely in registration phase. Secondly, with the help of semi-honest certificate authority (CA), mutual identity authentication phase realizes the two-way authentication from both sides through the shared key simultaneously. Thirdly, in the blind quantum computing phase, a registered client can complete his computing task by just measuring the qubits from the assigned server rather than preparing the qubits. Moreover, combined with first-in-first-out (FIFO) principle, clients’ authentication and blind quantum computing can be processed in parallel. The protocol can also be applied in other multi-party BQC protocols with the universality of resource states. Compared with other BQC protocols, the reliability of the protocol with identity authentication is guaranteed, and the efficiency will be significantly reflected in real experiments. |
---|---|
ISSN: | 1674-733X 1869-1919 |
DOI: | 10.1007/s11432-020-2977-x |