In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be v...In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal.展开更多
An important task for quantum cloud computing is to make sure that there is a real quantum computer running,instead of classical simulation.Here we explore the applicability of a cryptographic verification scheme for ...An important task for quantum cloud computing is to make sure that there is a real quantum computer running,instead of classical simulation.Here we explore the applicability of a cryptographic verification scheme for verifying quantum cloud computing.We provided a theoretical extension and implemented the scheme on a 5-qubit NMR quantum processor in the laboratory and a 5-qubit and 16-qubit processors of the IBM quantum cloud.We found that the experimental results of the NMR processor can be verified by the scheme with about 1.4%error,after noise compensation by standard techniques.However,the fidelity of the IBM quantum cloud is currently too low to pass the test(about 42%error).This verification scheme shall become practical when servers claim to offer quantum-computing resources that can achieve quantum supremacy.展开更多
基金supported by the National Science and Technology Key Project (Grant No. 2010ZX03003-003-01)the National Basic Research Program of China (Grant No. 2007CB311203)
文摘In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal.
基金supported by National Key Research and Development Program of China (2018YFA0306600)the National Natural Science Foundation of China (11661161018, and 11927811)+7 种基金Anhui Initiative in Quantum Information Technologies (AHY050000)supported in part by the Australian Research Council (DE180100156)supported by the Natural Science Foundation of Guangdong Province (2017B030308003)the Key R&D Program of Guangdong province (2018B030326001)the Science, Technology and Innovation Commission of Shenzhen Municipality (JCYJ20170412152620376, JCYJ20170817105046702 and KYTDPT20181011104202253)the National Natural Science Foundation of China (11875160 and U1801661)the Economy, Trade and Information Commission of Shenzhen Municipality (201901161512)Guangdong Provincial Key Laboratory (2019B121203002)
文摘An important task for quantum cloud computing is to make sure that there is a real quantum computer running,instead of classical simulation.Here we explore the applicability of a cryptographic verification scheme for verifying quantum cloud computing.We provided a theoretical extension and implemented the scheme on a 5-qubit NMR quantum processor in the laboratory and a 5-qubit and 16-qubit processors of the IBM quantum cloud.We found that the experimental results of the NMR processor can be verified by the scheme with about 1.4%error,after noise compensation by standard techniques.However,the fidelity of the IBM quantum cloud is currently too low to pass the test(about 42%error).This verification scheme shall become practical when servers claim to offer quantum-computing resources that can achieve quantum supremacy.