Instantaneous non-local computation of low T-depth quantum circuits

Open Access
Authors
Publication date 09-2016
Host editors
  • A. Broadbent
Book title 11th Conference on the Theory of Quantum Computation, Communication and Cryptography
Book subtitle TQC 2016, September 27-29, 2016, Berlin, Germany
ISBN (electronic)
  • 9783959770194
Series Leibniz International Proceedings in Informatics
Event 11th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2016
Article number 9
Number of pages 24
Publisher Saarbrücken/Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
Organisations
  • Interfacultary Research - Institute for Logic, Language and Computation (ILLC)
Abstract

Instantaneous non-local quantum computation requires multiple parties to jointly perform a quantum operation, using pre-shared entanglement and a single round of simultaneous communication. We study this task for its close connection to position-based quantum cryptography, but it also has natural applications in the context of foundations of quantum physics and in distributed computing. The best known general construction for instantaneous non-local quantum computation requires a pre-shared state which is exponentially large in the number of qubits involved in the operation, while efficient constructions are known for very specific cases only. We partially close this gap by presenting new schemes for efficient instantaneous non-local computation of several classes of quantum circuits, using the Clifford+T gate set. Our main result is a protocol which uses entanglement exponential in the T-depth of a quantum circuit, able to perform non-local computation of quantum circuits with a (poly-)logarithmic number of layers of T gates with quasi-polynomial entanglement. Our proofs combine ideas from blind and delegated quantum computation with the garden-hose model, a combinatorial model of communication complexity which was recently introduced as a tool for studying certain schemes for quantum position verification. As an application of our results, we also present an efficient attack on a recently-proposed scheme for position verification by Chakraborty and Leverrier.

Document type Conference contribution
Language English
Published at https://doi.org/10.4230/LIPIcs.TQC.2016.9
Other links https://www.scopus.com/pages/publications/84990175361 https://drops.dagstuhl.de/opus/portals/lipics/index.php?semnr=16020
Downloads
LIPIcs-TQC-2016-9 (Final published version)
Permalink to this page
Back