Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published January 2020 | public
Journal Article

Verifying quantum computations at scale: A cryptographic leash on quantum devices

Abstract

Rapid technological advances point to a near future where engineered devices based on the laws of quantum mechanics are able to implement computations that can no longer be emulated on a classical computer. Once that stage is reached, will it be possible to verify the results of the quantum device? Recently, Mahadev introduced a solution to the following problem: Is it possible to delegate a quantum computation to a quantum device in a way that the final outcome of the computation can be verified on a classical computer, given that the device may be faulty or adversarial and given only the ability to generate classical instructions and obtain classical readout information in return? Mahadev's solution combines the framework of interactive proof systems from complexity theory with an ingenious use of classical cryptographic techniques to tie a "cryptographic leash'' around the quantum device. In these notes I give a self-contained introduction to her elegant solution, explaining the required concepts from complexity, quantum computing, and cryptography, and how they are brought together in Mahadev's protocol for classical verification of quantum computations.

Additional Information

© 2019 American Mathematical Society. Received by editor(s): February 6, 2019. Published electronically: October 9, 2019. I am indebted to Urmila Mahadev for numerous conversations that helped clarify her work. I thank Victor Albert, Alexandru Georghiu, Urmila Mahadev, and Oded Regev for comments on earlier versions of these notes.

Additional details

Created:
August 19, 2023
Modified:
October 19, 2023