Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2422436.2422473acmconferencesArticle/Chapter ViewAbstractPublication PagesitcsConference Proceedingsconference-collections
abstract

A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games

Published: 09 January 2013 Publication History

Abstract

Can a classical experimentalist command an untrusted quantum system to realize arbitrary quantum dynamics, aborting if it misbehaves? If so, then we could realize the dream of device-independent quantum cryptography: using untrusted quantum devices to establish a shared random key, with security based on the correctness of quantum mechanics. It would also allow for testing whether a claimed quantum computer is truly quantum. We prove a rigidity theorem for the famous Clauser-Horne-Shimony-Holt (CHSH) game, first formulated to provide a means of experimentally testing the violation of the Bell inequalities. The theorem shows that the only way for the two non-communicating quantum players to win many games played in sequence is if their shared quantum state is close to the tensor product of EPR states (Bell states) and their measurements are the optimal CHSH measurements on successive qubits. This theorem may be viewed as analogous to classical multi-linearity testing, in the sense that the outcome of local checks gives a characterization of a global object.
The rigidity theorem provides the basis of a technique by which a classical system can certify the joint, entangled state of a bipartite quantum system, as well as command the application of specific operators on each subsystem. This leads directly to a scheme for device-independent quantum key distribution. Control over the state and operators can also be leveraged to create more elaborate protocols for realizing general quantum circuits. In particular, it allows us to establish that a quantum interactive proof system with a classical verifier is as powerful as one with a quantum verifier, or QMIP = MIP*.

References

[1]
Ben W. Reichardt, Falk Unger, and Umesh Vazirani. Classical command of quantum systems via rigidity of CHSH games. 2012, arXiv:1209.0449 {quant-ph}.
[2]
Ben W. Reichardt, Falk Unger, and Umesh Vazirani. A classical leash for a quantum system: Command of quantum systems via rigidity of CHSH games. 2012, arXiv:1209.0448 {quant-ph}.

Cited By

View all
  • (2024)A Computational Test of Contextuality and, Even Simpler Proofs of Quantumness2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00073(1106-1125)Online publication date: 27-Oct-2024
  • (2023)Multi-client distributed blind quantum computation with the Qline architectureNature Communications10.1038/s41467-023-43617-014:1Online publication date: 25-Nov-2023
  • (2023)Equivalence of single-server and multiple-server blind quantum computation protocolsQuantum Information Processing10.1007/s11128-022-03812-222:1Online publication date: 18-Jan-2023
  • Show More Cited By

Index Terms

  1. A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer Science
    January 2013
    594 pages
    ISBN:9781450318594
    DOI:10.1145/2422436

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CHSH game
    2. quantum computing

    Qualifiers

    • Abstract

    Conference

    ITCS '13
    Sponsor:
    ITCS '13: Innovations in Theoretical Computer Science
    January 9 - 12, 2013
    California, Berkeley, USA

    Acceptance Rates

    Overall Acceptance Rate 172 of 513 submissions, 34%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 06 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Computational Test of Contextuality and, Even Simpler Proofs of Quantumness2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00073(1106-1125)Online publication date: 27-Oct-2024
    • (2023)Multi-client distributed blind quantum computation with the Qline architectureNature Communications10.1038/s41467-023-43617-014:1Online publication date: 25-Nov-2023
    • (2023)Equivalence of single-server and multiple-server blind quantum computation protocolsQuantum Information Processing10.1007/s11128-022-03812-222:1Online publication date: 18-Jan-2023
    • (2022)The acrobatics of BQPProceedings of the 37th Computational Complexity Conference10.4230/LIPIcs.CCC.2022.20(1-17)Online publication date: 20-Jul-2022
    • (2022)Constant gap between conventional strategies and those based on C*-dynamics for self-embezzlementQuantum10.22331/q-2022-07-07-7556(755)Online publication date: 7-Jul-2022
    • (2022)Classical Verification of Quantum ComputationsSIAM Journal on Computing10.1137/20M137182851:4(1172-1229)Online publication date: 1-Jan-2022
    • (2022)Multi-server blind quantum computation protocol with limited classical communication among serversQuantum Information Processing10.1007/s11128-022-03430-y21:3Online publication date: 18-Feb-2022
    • (2021)Capacity of Quantum Private Information Retrieval With Multiple ServersIEEE Transactions on Information Theory10.1109/TIT.2020.302251567:1(452-463)Online publication date: Jan-2021
    • (2021)Device-Independent QKDQuantum Key Distribution10.1007/978-3-030-73991-1_6(159-182)Online publication date: 5-Aug-2021
    • (2020)Security Limitations of Classical-Client Delegated Quantum ComputingAdvances in Cryptology – ASIACRYPT 202010.1007/978-3-030-64834-3_23(667-696)Online publication date: 5-Dec-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media