• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Analysis and improvement of verifiable blind quantum computation

    2022-05-16 07:08:14MinXiao肖敏andYannanZhang張艷南
    Chinese Physics B 2022年5期

    Min Xiao(肖敏) and Yannan Zhang(張艷南)

    1College of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China

    2Chongqing Key Laboratory of Cyberspace and Information Security,Chongqing University of Posts and Telecommunications,Chongqing 400065,China

    Keywords: verifiable blind quantum computation,universal blind quantum computation,measurement-based quantum computation

    1. Introduction

    Great progress has been made in quantum computer research,but a quantum state is so sensitive to the environment that any slight change can induce a decoherence effect on it.Hence,costly and sophisticated instruments are needed to ensure the stability of the quantum state. A long-term process is needed to realize the popularization of quantum computers as well as classical computers. It is of great practical significance to build a quantum computing server,which can provide cheap and convenient quantum computing services to ordinary users through remote delegation. Blind quantum computation (BQC)allows the client’s inputs, algorithms and outputs to be secret to the server, which satisfies the client’s privacy requirements. In existing research, the requirements for the client’s quantum computation capabilities are contingent on BQC models,and making the client as classical as possible is the main development direction. The measurement-only BQC model[4]requires the client to be capable of quantum measurement and accessing quantum channels,the universal BQC model[5]requires the client to be able to prepare single qubits and access the quantum channel,and the multiple-server BQC model[6,7]based on this model can realize the target of the client being completely classical.

    Considering actual computation experiments, the results may be incorrect due to the dishonesty of the computation environment or the server; the verifiable BQC protocol enables the client to verify the computation results of the server. Existing studies have explored both the verification of BQC with the quantum measurement capability of the client[8–11]and the verification of the universal BQC.[12–14]

    In 2005, Childs[15]proposed the first BQC protocol,based on the quantum circuit model. The quantum states in the protocol are encrypted by one-time pads, and the client should qualify for quantum storage and quantum swap gate execution. In 2006, Arrighi and Salvail[16]proposed a BQC protocol that only requires the user to prepare and measure entangled states, which reduces the requirements of the client’s quantum capability. Nonetheless, the protocol just computes certain classical functions,which is not a universal BQC protocol.

    In 2009,based on the measurement-based quantum computation model, Broadbentet al.[5]proposed the first universal BQC protocol, which requires the client to prepare single qubits and access the quantum channel. According to the qubits sent by the client, the server constructs the resource state(brickwork state)for computation,and then measures the qubits of the brickwork state and completes the computation under the control of the client. To further reduce the quantum capability requirements of the client and make the client as classical as possible,Morimae and Fuji[6]proposed a doubleserver BQC protocol that only requires the client to access the quantum channels, but the two servers cannot intercommunicate,ensuring the security of the protocol. To address this issue,Liet al.[7]proposed a three-server BQC protocol. Using entanglement swapping technology,users just need to have the capacity to access quantum channels,and the three servers can directly communicate with each other. Nevertheless, the protocol requires three quantum servers and corresponding interactions between them,so the implementation of quantum computation is still hard. Therefore,Xuet al.[17]proposed universal single-server BQC for classical clients in 2014. In 2013,Morimae and Fuji[4]proposed a measurement-only BQC protocol. In this protocol,the preparation of qubits is outsourced to the server, and the specific computation is completed by the client. Compared with the common multiple-server BQC model,the client needs to have more quantum capabilities.

    BQC has been verified by experiments in some studies.In 2011,Barzet al.[18]first elaborated the experimental demonstration of blind quantum computing. They demonstrated a variety of blind delegate computations,including one and two qubit gates and the Deutsch and Grover algorithms. It is noteworthy that the experiment is the first step towards unconditionally secure quantum computing in client–server environments. In 2013,Fitzsimonset al.[19]proposed the first experimental verification of verifiable universal BQC. It theoretically indicates how a verifier with the least quantum resources can test a quantum computer and experimentally demonstrates the protocol with four photon qubits. In 2016, Gregantiet al.[20]utilized photonic devices to generate four-qubit cluster states, and experimentally proved the results of computation and verification of a measurement-only BQC protocol.In 2017, Huanget al.[21]implemented a proof-of-principle experiment for completely classical clients. All BQC experiments before this protocol require the client to have weak quantum capabilities. However, this experiment proves the feasibility of a completely classical client performing secure computing on a quantum computation server by experiments,which has a significant bearing on secure cloud quantum computing.

    In practice, the correctness of BQC may be affected by diverse factors, such as channel noise, server dishonesty and device error. There are two main techniques to solve the above problems in the current research. One is to adopt logic qubits with fault tolerance or error correction capabilities as basic quantum computation resources,like fault-tolerant codes DF states[22,23]or quantum error-correcting codes.[5,24,25]This method largely aims at the influence of environmental noise in quantum computation. Another way is to insert special qubits for detection in the computation graph and exploit the computation results of these qubits to verify the correctness of the overall computation results,so as to discover the dishonesty of the server with a certain probability.

    In 2014,Morimae[4]proposed a verifiable BQC protocol for the measurement-only BQC model. The server prepared the RHG state[26]as the verifiable computation graph state,and the client measured all the qubits and judged whether the server was honest in light of the measurement results of the trap qubits. In 2015,the verifiable BQC protocol proposed by Hayashi and Morimae[9]did not utilize trap qubits. The protocol asked the server Bob to generate a copy of the graph state for BQC, and each qubit was sent to the client Alice in turn.Alice verified the stabilizer[10]of the graph state copy to determine whether Bob had sent the correct graph state, to finally determine whether Bob was honest.

    For the universal BQC model,Fitzsimons and Kashefi[12]proposed an unconditionally verifiable universal BQC protocol(FK protocol)in 2015, and introduced the cylinder brickwork state and the dotted-complete graph state as the new computation resource state. In addition to computation qubits,the computation resource state also includes the dummy qubits and the trap qubits, which eliminates the entanglement between the computation qubits and the trap qubits by the dummy qubits, so that each trap qubit has a certain measurement result through the verification of the measurement results of trap qubits,realizing the detection of the server’s computation. In 2017, Kashefi and Wallden[13]improved the above protocol and designed an optimization scheme with fewer quantum resources(KW protocol). In 2020,Xuet al.[14]further improved the construction method of the verifiable computation graph state(XTH protocol), which reduces quantum resources and realizes a lower probability of accepting an incorrect computation result. However,its coloring scheme has limitations,and the probability of accepting incorrect computation results remains at a high level.In this paper,we improve this work to compensate for the deficiencies of the original scheme and further reduce the probability of accepting incorrect computation results. The number of required qubits is the same as for the XTH protocol,while the probability of accepting the wrong computation result is reduced from the original minimum (0.866)d*to (0.819)d*, whered*is the number of repeated execution of the protocol.

    The rest of this paper is organized as follows. In Section 2,we introduce and analyze the existing verifiable universal BQC protocols. In Section 3, the limitations of the existing schemes are analyzed and our improvement protocol is put forward. Finally,a summary is given in Section 4.

    2. Verifiable universal BQC protocols

    Suppose that the client is Alice and the server is Bob in BQC.To introduce trap qubits as detectors in the computation graph state is the main inspiration to realize the verifiability of the computation results. The position and state of these trap qubits are unknown to Bob, so Bob cannot interfere with the actual quantum computation while keeping the trap qubits unaffected.

    2.1. Preliminaries

    2.1.1. The operation of adding vertices

    The operation of adding a vertex to each edge of a graphGis denoted as~(G). The graphGafter performing the~(G)operation is called the dotted graph, which is denoted as ~G.The newly added vertices are called the added vertices, and the set of added vertices is denoted asA(~G). The original vertices are called the primary vertices, and the set of primary vertices is denoted asP(~G).

    Figure 1 shows the complete graphK4and the dottedcomplete graph ~K4with four vertices,|A(~K4)|=6,|P(~K4)|=4.

    Fig.1. Complete graph K4 and the corresponding dotted-complete graph ~K4.

    In the verifiable universal BQC protocol,the computation is mainly performed by designing the graph state with a verification function. In the following description, we utilize the graph language to express the designing idea of the computation graph state,and then utilize the graph state in the specific computation process.

    2.1.2. Types of qubits in the computation graph

    Computation qubits This refers to the qubits that perform the actual quantum computation in the computation graph state.

    Trap qubits This refers to the qubits in the computation graph state to verify the correctness of the computation results.

    Dummy qubits This refers to the qubits that are not entangled with any qubit in the computation graph state.Dummy qubits are randomly in|0〉or|1〉. The controlled phase reversal CZ operation does not entangle the qubits in|0〉or|1〉with other qubits. In a graph with a verification function, all the qubits on the adjacent vertex positions of the trap qubits are dummy qubits,which makes the trap qubits unentangled with the computation qubits in the graph state. Accordingly, the measurement of the computation qubits does not impact the trap qubits, and each trap qubit has an explicit measurement result.

    2.2. FK protocol[12] based on the dotted-complete graph state

    2.2.1. Overview

    This scheme utilizes a dotted-complete graph state as the resource state,the author proves it can realize universal quantum computation via performing single-qubit measurement on dotted-complete graph state. The dotted-complete graph state contains redundant qubits(trap qubits and dummy qubits),so as to perform the verification function. According to its own computation task,Alice designs a dotted-complete graph state,determines the positions of computation qubits, trap qubits and dummy qubits and their corresponding series of measurements,and next prepares corresponding single qubits(dummy qubits are in|0〉or|1〉at random, while other qubits are in|+θ〉at random,whereθ ∈{π/4,...,7π/4}). Bob performs controlled phase reversal CZ operation on these qubits to generate a dotted-complete graph state,and then performs a series of measurements specified by Alice on this graph state to complete computation and verification.

    2.2.2. Construction of dotted-complete graph state with verification function

    (I)Alice selects the security parameterdand transforms the quantum circuit into a series of single qubit measurements on theN-vertices fault-tolerant graph state|GL〉,so as to confirm that the graph state designed for computation ought to be a dotted-complete graph state|?K3N〉with 3Nprimary vertices.

    (II) Alice determines the position of the computation qubits, trap qubits and dummy qubits in the graph state and their corresponding series of measurements in the graph state in the following ways:

    (i)The primary vertices of the dotted-complete graph corresponding to the graph|?K3N〉are randomly selected as a set of three primary verticesP1,P2,P3. The qubits,which are located at the added vertex between any two primary vertices belonging to different primary vertex sets, are selected as dummy qubits. The remaining qubits form three separate primary vertices sets of the dotted-complete subgraph stateP1,P2,P3, denoted as ?KP1, ?KP2, ?KP3.

    (ii)One of the three subgraph states is randomly selected as the graph state to perform the computation task. The qubits at the primary vertex positions are all computation qubits,and the qubits at the other positions are dummy qubits. The computation on the graph state|GL〉is realized by performing the measurement operation.The other two subgraph states are utilized solely for verification. The qubits at the primary vertex(or added vertex) positions are taken as trap qubits, and the surplus of qubits at the added vertex(or primary vertex)positions are dummy qubits.

    For Bob,the positions of computation qubits,trap qubits and dummy qubits are entirely random. Therefore,the verification to the server can be implemented.

    2.2.3. Performance index

    The authors define“ε-verifiable”to measure the verification ability of the verifiable universal BQC protocol.

    Definition 1 A verifiable BQC protocol is“ε-verifiable”,which means that the upper bound of the probability of Alice accepting incorrect results isε.

    For the computation executed on theN-qubits graph state, the scheme needs 3N(3N+1)/2 qubits, which realizes“(2/3)「2d/5-verifiable”,wheredis a security parameter,representing the distance of error correcting code used in the FK protocol.

    2.3. KW protocol[13]

    Intending to cut down the resource state expenditure of the FK protocol, the KW protocol propounds a new graph state,the dotted triple-graph state,to execute computation and verification.

    2.3.1. Dotted triple-graph

    As shown in Fig.2,the construction method of the dotted triple-graph is as follows:

    (i)A base graphGis given,where verticesv ∈V(G)and edgese ∈E(G),as shown in Fig.2(a).

    Fig.2. Construction of DT(G).

    (iii) For each edgee(vi,vj)∈E(G) connecting two verticesvi,vj(i/=j), a set containing nine edges is defined to connect each vertex inPviandPvj.

    (iv)The graph obtained according to step(ii)and step(iii)is the triple graphT(G),as shown in Fig.2(b).

    (v) The dotting operation is executed onT(G), and the added vertices are denoted asAewith squares. Finally, the dotted triple-graphDT(G)is obtained,as shown in Fig.2(c).

    2.3.2. Construction of dotted triple-graph state with verifiable

    Similar to the FK protocol, Alice sets the trap qubits and dummy qubits in the computation dotted triple-graph state|DT(G)〉,prepares the corresponding qubits and performs specific measurements to realize the verification function. Alice selects the computation qubits,trap qubits and dummy qubits by designing the coloring scheme.

    (I) A coloring scheme is designed for the dotted triplegraphDT(G). Assuming that the color set is{green, white,red,black},the method is as follows:

    (i) The color of each primary vertex inDT(G) is randomly determined to be white, black or green, and the colors of the three vertices in each primary vertex set vary from one to another,as shown in Fig.3(a).

    (ii)The color of each added vertex is determined in light of the primary vertex color. The specific rules are as follows:if the color of the two primary vertices adjacent to the added vertex are the same, then the added vertex is colored as the primary vertex; otherwise,the added vertex is colored as red,as shown in Fig.3(b).

    (II) According to the coloring scheme, Alice determines the position of computation qubits, trap qubits and dummy qubits.

    (i)According to the coloring scheme of the dotted triplegraphDT(G),Alice chooses the red qubits of added vertex positions as dummy qubits,and the remaining qubits form three subgraph states which are the same as the dotted triple-graph state|DT(G)〉of the basic graph state|G〉. Each subgraph state contains only one color and the color is definitely disparate as shown in Fig.3(c).

    (ii) Alice randomly selects one of the three subgraph states as the graph state to perform the computation task. The other two subgraph states are utilized solely for verification.The qubits at the primary vertices(or added vertices)are taken as trap qubits, and the remaining qubits at the added vertices(or primary vertices)are dummy qubits,as shown in Fig.3(d).

    Fig.3. Coloring and break operations of DT(G).

    Fig.4. Construction of S(G).

    2.3.3. Performance index

    The number of vertices of the dotted triple-graphDT(G)designed by this protocol is|V(DT(G))|=3|V(G)|+9|E(G)|,where|V(G)|=Nand|E(G)|≤cN;cis the maximum degree of the vertices of the base graphG,which is a constant. Compared with the FK protocol, the cost of the resource state is reduced from quadraticO(N2)to linearO(N). The KW protocol realizes“8/9≈0.899-verifiable”. Aimed at enhancing the verification ability,the scheme proposes that the protocol can be implemented “0.899d*-verifiable” by executing the same computation task multiple times, whered*is the number of repeated executions of the protocol.

    2.4. XTH protocol[14]

    On behalf of further decreasing the resource state expenditure and enhancing the verification capability of KW protocol, the XTH protocol exploits utilization of the graph state corresponding to the sandglass-like graph to perform computation.

    2.4.1. Sandglass-like graph

    As shown in Fig. 4, the construction method of the sandglass-like graph is as follows:

    (i) They are given a base graphG, where verticesv ∈V(G)and edgese ∈E(G),as shown in Fig.4(a).

    (v) The dotting operation is executed onI(G), and the added vertices are denoted asAewith squares. Finally, the sandglass-like graphS(G)is obtained,as shown in Fig.4(c).

    2.4.2. Construction of sandglass-like graph state with verifiable

    Similar to the KW protocol, Alice chooses the computation qubits, trap qubits and dummy qubits by designing the coloring scheme on the sandglass-like graph state.

    (I) A coloring scheme is designed for the sandglass-like graphS(G).Assuming that the color set is{green,white,red},the method is as follows:

    (i)In each primary vertex set,one vertex is randomly selected to be colored green,and the remaining vertex is colored red with a probability ofαand white with a probability of 1-α,whereαis a constant.

    (ii) The color of the added vertex is determined in light of the primary vertex color. The specific rules are as follows:if the colors of the two adjacent primary vertices are different,the added vertex is colored white;if the two primary vertices adjacent to the added vertex are green, the added vertex is colored green; and if the two primary vertices adjacent to the added vertex are white,the added vertex is colored red,as shown in Fig.5(a).

    (II) According to the coloring scheme, Alice determines the position of computation qubits, trap qubits and dummy qubits.

    According to the coloring scheme of the sandglass-like graphS(G), Alice selects the qubits at the white vertices as the dummy qubits,and the remaining qubits form a subgraph state which is the same as the dotted graph state|D(G)〉of the basic graph state|G〉and some qubits which are not entangled with any qubit(corresponding to the red vertex positions).The subgraph state is utilized as the graph state to perform the computation task,and the qubits at the red vertices are utilized as trap qubits,as shown in Fig.5(b).

    Fig.5. Coloring and break operations of S(G).

    2.4.3. Performance index

    The number of vertices of the sandglass-like graphS(G)designed by this protocol is|V(S(G))|=2|V(G)|+4|E(G)|,where|V(G)|=Nand|E(G)|≤cN;cis the maximum degree of the vertices of the base graphG, which is a constant.Compared with the KW protocol, the cost of the resource state is further reduced. The XTH protocol realizes “0.866-verifiable”. In order to further improve the verification capability,the method of multiple execution of the same computation task proposed by the FK protocol is adopted to finally realize“(0.866)d*-verifiable”,andd*is the number of repeated executions of the protocol.

    3. Improvement of the XTH protocol

    3.1. Limitations of coloring scheme in XTH protocol

    Although the XTH protocol utilizes fewer resources to improve the KW protocol and realize the verification of the computation results of the BQC server, the protocol still has the following problems.

    According to the coloring scheme,the color set of any primary vertex set is{green, white}or{green, red}. There are edges between any two vertices belonging to different vertex sets in the sandglass-like graph, which means that there exist added vertices. Hence,the colors of the two primary vertices adjacent to any added vertex may be different, or they may both be green,white,or red.

    (i) The coloring scheme does not consider how to color the added vertices when the two primary vertices are both red.The situation is that if there are two adjacent primary vertices whose colors are red,it would not take the corresponding qubits of added vertex positions into account in the subsequent computation. If the qubits at these positions are simply selected as dummy qubits,the trap qubits in the final graph state will only contain the primary vertices without added vertices,as shown in Fig.6. If the server’s dishonesty acts on the qubits of added vertex positions,the client can not detect it.

    (ii) The coloring scheme may result in no red vertices in all the primary vertices; after selecting white vertices as dummy qubits,the trap qubits in the final graph state only include added vertices but no primary vertices. If the server’s dishonesty acts on the qubits of primary vertex positions, the client cannot detect it. This protocol adopts the resource state of the XTH protocol. A new coloring scheme for the sandglass-like graphS(G)is designed,which solves the problem of coloring limitations in the XTH protocol and further improves the detection ability.

    Fig.6. An example of coloring limitation in XTH protocol.

    3.2. Improved coloring scheme

    (i)The color set of primary vertices is{red,green,blue}.In each primary vertex set,one vertex is randomly selected to be colored green,and the remaining vertex is colored red with a probability ofαand blue with a probability of 1-α,whereα ∈(0,1)is a constant.

    (ii) The color set of the added vertices is{white, red,green,blue}. The colors of the added vertices are determined in light of the primary vertex color. The rules are as follows.

    If the colors of the two primary vertices adjacent to the added vertex are different, the added vertex will be colored white;if the two primary vertices adjacent to the added vertex are green, the added vertex is colored green; if the two primary vertices adjacent to the added vertex are red, the added vertex is colored blue;and if the two primary vertices adjacent to the added vertex are blue, the added vertex is colored red,as shown in Figs.7(a)and 8(a).

    Fig.7. Improved coloring scheme 1 of S(G).

    3.3. Determination of computation qubits,dummy qubits,

    and trap qubits

    According to the above coloring scheme,the client selects the qubits at the white vertex positions as the dummy qubits.The remaining qubits form a subgraph state which is the same as the dotted graph state|D(G)〉of the basic graph state|G)〉,a subgraph state composed of red and blue vertices,and some qubits which are not entangled with any qubit, as shown in Figs.7(b)and 8(b).

    When the number of blue vertices is no less than that of red vertices: The qubits at the red vertices are selected as the dummy qubits. All the qubits that are not entangled with any qubits in the graph state are taken as the trap qubits, and the subgraph state that is the same as the dotted graph state|D(G)〉is taken as the computation graph state to perform the computation task, in which all the qubits are computation qubits, as shown in Fig.7(c).

    When the number of red vertices is more than that of blue vertices: The qubits at the blue vertices are selected as the dummy qubits. All the qubits that are not entangled with any qubits in the graph state are taken as the trap qubits, and the subgraph state that is the same as the dotted graph state|D(G)〉is taken as the computation graph state to perform the computation task, in which all the qubits are computation qubits, as shown in Fig.8(c).

    Fig.8. Improved coloring scheme 2 of S(G).

    3.4. Implementation of the protocol

    The implementation of the protocol is divided into preparation phase, computation phase and verification phase. We assume that the client in our protocol is Alice, and the server is Bob.

    3.4.1. Preparation phase

    (i) Alice designs the sandglass-like graphS(G) according to the computation task and randomly selects a coloring scheme satisfying the following conditions, then determines the position of the computation qubits,dummy qubits and trap qubits in the sandglass-like graphS(G):

    When coloring,in order to determine the position of trap qubits in the final graph state both in the primary vertex set and in the added vertex set, Alice randomly selects a coloring scheme to ensure that the colors of primary vertices in the coloring scheme include three colors,and simultaneously,the number of blue vertices is no less than that of red vertices,which notably makes the detection rate of the scheme higher.Otherwise, another coloring scheme satisfying this condition is selected again.

    (ii) Alice records the sequence of measurement angles on each qubit, whereφ= (φi)1≤i≤(2N+4cN)andφi ∈A ≡{0,π/4,...,7π/4}; for all the trap qubits and dummy qubits,φi=0.

    (iii) Alice prepares a binary stringsof length 2N+4cNwith all initial values of 0,which is utilized to record the measurement results of each qubit.

    (iv) Alice records the random valuesθi,ri,di,xicorresponding to qubiti,whereθi ∈A,ri,di,xi ∈{0,1}.

    (v) Alice prepares the qubits needed for the sandglasslike graph state|S(G)〉. If the qubit is a dummy qubit, it is prepared as|di〉,otherwise it is ∏j∈NG(i)∩D Zdj|+θi〉,whereDis the set of all dummy qubits in the graph state|S(G)〉, andNG(i) is the set of all adjacent vertices of vertexiin graphS(G). Bob utilizes controlled phase reversal CZ operation to prepare a sandglass-like graph state for the received qubits.

    3.4.2. Computation phase

    (i) Alice computes the measurement angleδi=C(i,φi,θi,ri,s)of each qubit, and sends the measurement angle to Bob;if qubitiis a dummy qubit,thenφi=θi+riπ.

    (ii)Bob utilizes basis|±δi〉to measure qubiti,and then sends the measurement resultbito Alice.

    (iii)Alice modifies the value ofsiinstobi ⊕ri.

    (iv)The above steps are repeated until the computation is completed.

    (v)Bob sends the computation result to Alice.

    3.4.3. Verification phase

    Alice verifies the measurement results of trap qubits. For the measurement resultbtof each trap qubit, ifbt=rtis satisfied,Bob is proven to be honest,and Alice accepts the computation results;otherwise,Alice judges that Bob is dishonest and refuses the computation.

    3.5. Protocol analysis

    3.5.1. Blindness and correctness analysis

    The blindness and correctness are similar to the XTH protocol.

    For the blindness,because the positions of all trap qubits and dummy qubits in the computation graph state are unknown to Bob,the protocol satisfies blindness.

    For correctness,we have designed a new coloring scheme to determine the position of each qubit in the computation graph state. Two independent computation and trap subgraphs can be obtained by measuring the dummy qubits in the computation graph state. The computation subgraph is used to perform the computation function similar to the universal BQC protocol. Each qubit in the trap subgraph can obtain a deterministic computation measurement result if the server executes the measurement honestly. Therefore, the correctness of the computation subgraph comes from the correctness of the universal BQC protocol, and the correctness of the trap subgraph comes from the deterministic computation results of each trap qubit. Hence,the protocol satisfies correctness.

    3.5.2. Verifiability analysis

    According to the structure and coloring of the resource state,for any non-output primary vertex set,the color set is{green,red,white}with the probability of(1-α)2(the qubits corresponding to the vertices in the added vertex set are composed of computation qubits, trap qubits and dummy qubits), and the probability of 1-(1-α)2is{green, white}(the qubits corresponding to the vertices in the added vertex set are composed of computation qubits and dummy qubits)and|Aeβ|=4.ε=max{(1/2)+(1/2)α,(3/4)+(1/2)α-(1/4)α2}.

    If there are more red vertices than blue vertices in the selected coloring scheme,then whenαis infinitely close to 1,εwill also be infinitely close to 1,which greatly reduces the detection rate of the scheme. Therefore,for the coloring scheme,only the scheme with no less blue vertices than red ones is selected.

    However, whenαis infinitely close to 1, the probability that the number of blue vertices in the coloring scheme is no less than the number of red vertices is relatively low,so combining the two cases, choosingα= 0.85, thenε=max{0.575,0.819}=0.819.

    This scheme does not consider non-trivial attack acts on the output primary vertex qubits. Since the main focus of this solution is to achieve verifiable BQC without adding additional client quantum capabilities, non-trivial attacks acting on the output of the primary vertex qubits mean that the computation output is a quantum output, and the client needs to measure the output qubits. Quantum measurement will undoubtedly increase the quantum capability requirements of the client.

    Therefore,the maximum probability that Alice accepts an incorrect computation result in this scheme isε=0.819.

    In order to reduce the probability of Alice accepting an incorrect computation result, repetition technology similar to the KW and XTH protocols is adopted. Diverse random parameters are selected for each repetition. For the same computation, each repetition will have the same computation result.Therefore,the maximum probability of Alice accepting an incorrect result is“(0.819)d*-verifiable”,whered*is the number of repetitions.

    3.5.3. Comparison with existing protocols

    Table 1 shows the comparison between the proposed protocol and the existing work(FK protocol,KW protocol,XTH protocol)in terms of the required resource state cost and verifiability index. The results show that the proposed protocol compensates for the existing protocol limitations and improves the verification ability.

    Table 1. Comparison of cost and verification capability of verifiable BQC scheme.

    4. Conclusion

    BQC is of great significance to the application of quantum computation in practice. In this paper, the existing verifiable universal BQC protocols are analyzed and compared in detail.The limitations of existing protocols are corrected and the verification capability is markedly improved. Generally speaking,the verification ability of the protocols in the research needs further improvement,and the quantum capability of the client needs further reduction.In the future,the verifiability of multiserver universal BQC with the classical clients can be considered. Ref.[27]summarizes various challenges and future development directions in the field of verifiable BQC, such as significant reduction of the overhead and noise sensitivity,and verification of quantum simulators and other special-purpose devices,which provides guidance for future research.

    国产一区有黄有色的免费视频| 国产成人精品福利久久| www.精华液| 天天影视国产精品| 精品一区二区免费观看| 精品亚洲成a人片在线观看| 久久热在线av| 天天影视国产精品| 自拍欧美九色日韩亚洲蝌蚪91| 男人舔女人的私密视频| 观看av在线不卡| 国产精品国产三级国产专区5o| 色精品久久人妻99蜜桃| 国产精品99久久99久久久不卡 | 久久人妻熟女aⅴ| 亚洲自偷自拍图片 自拍| 你懂的网址亚洲精品在线观看| 精品国产国语对白av| 成人亚洲欧美一区二区av| 毛片一级片免费看久久久久| 国产一区二区激情短视频 | 久久久久久人妻| 一区二区av电影网| 乱人伦中国视频| 亚洲精品在线美女| 免费看av在线观看网站| 欧美黑人精品巨大| 韩国av在线不卡| 看免费av毛片| 2018国产大陆天天弄谢| 成人午夜精彩视频在线观看| 国产男女内射视频| 国产av一区二区精品久久| 亚洲av电影在线观看一区二区三区| 黄片小视频在线播放| av国产精品久久久久影院| 成人亚洲精品一区在线观看| 人妻人人澡人人爽人人| 最近最新中文字幕大全免费视频 | 日韩 欧美 亚洲 中文字幕| 亚洲五月色婷婷综合| 啦啦啦在线免费观看视频4| 国产一区二区在线观看av| 欧美日韩综合久久久久久| 亚洲成人国产一区在线观看 | 亚洲色图综合在线观看| 精品国产一区二区三区久久久樱花| 中文乱码字字幕精品一区二区三区| 日韩一本色道免费dvd| 18禁动态无遮挡网站| 亚洲av男天堂| 秋霞伦理黄片| 啦啦啦中文免费视频观看日本| 成人亚洲欧美一区二区av| 欧美日韩精品网址| 如日韩欧美国产精品一区二区三区| 久久久久久人妻| 亚洲精品国产一区二区精华液| 国产伦理片在线播放av一区| 少妇猛男粗大的猛烈进出视频| 免费观看av网站的网址| 久久久久国产精品人妻一区二区| 成人黄色视频免费在线看| 亚洲国产精品国产精品| 欧美中文综合在线视频| 91精品三级在线观看| 婷婷色综合www| 亚洲精品久久久久久婷婷小说| 伊人久久大香线蕉亚洲五| 精品午夜福利在线看| 久久av网站| 欧美乱码精品一区二区三区| 日韩av在线免费看完整版不卡| 超碰97精品在线观看| 18禁裸乳无遮挡动漫免费视频| 免费在线观看完整版高清| 丝袜美足系列| 久久久亚洲精品成人影院| 久久久久久久大尺度免费视频| 最新在线观看一区二区三区 | 在线观看免费日韩欧美大片| 18禁观看日本| 亚洲av日韩在线播放| 一区二区三区四区激情视频| 成人免费观看视频高清| 午夜激情av网站| 亚洲欧洲国产日韩| 午夜福利一区二区在线看| 久久97久久精品| 人成视频在线观看免费观看| 亚洲国产成人一精品久久久| 在线观看三级黄色| 久久鲁丝午夜福利片| 国产精品熟女久久久久浪| 黄片无遮挡物在线观看| 国产又爽黄色视频| 成年人免费黄色播放视频| 午夜日韩欧美国产| 亚洲精品视频女| 精品人妻一区二区三区麻豆| 国产乱人偷精品视频| a级片在线免费高清观看视频| 国产精品.久久久| 水蜜桃什么品种好| 七月丁香在线播放| 在线精品无人区一区二区三| 日本欧美国产在线视频| 免费观看a级毛片全部| 欧美在线黄色| 91精品伊人久久大香线蕉| 久久久亚洲精品成人影院| 国产乱人偷精品视频| 91老司机精品| 欧美精品一区二区大全| 男人舔女人的私密视频| 国产日韩一区二区三区精品不卡| 狠狠婷婷综合久久久久久88av| 亚洲精品国产区一区二| 高清av免费在线| 久久精品人人爽人人爽视色| 久久精品久久久久久久性| 国产亚洲午夜精品一区二区久久| 成人亚洲欧美一区二区av| 美女视频免费永久观看网站| 夫妻午夜视频| 成人国产麻豆网| 久久ye,这里只有精品| 日韩av免费高清视频| 亚洲成国产人片在线观看| 亚洲av成人精品一二三区| 波多野结衣一区麻豆| 国产av码专区亚洲av| 伊人久久大香线蕉亚洲五| 久久97久久精品| 哪个播放器可以免费观看大片| 另类亚洲欧美激情| 亚洲一区中文字幕在线| 日日撸夜夜添| 看十八女毛片水多多多| 老司机靠b影院| 黄片播放在线免费| 日韩av在线免费看完整版不卡| 国产精品秋霞免费鲁丝片| 黄片无遮挡物在线观看| 亚洲激情五月婷婷啪啪| 久久久国产精品麻豆| 男女午夜视频在线观看| 亚洲伊人色综图| 在线观看免费视频网站a站| 国产精品久久久久久久久免| 亚洲精品久久午夜乱码| 日本午夜av视频| 性高湖久久久久久久久免费观看| 欧美成人精品欧美一级黄| 日本爱情动作片www.在线观看| 18在线观看网站| 少妇被粗大的猛进出69影院| 老司机亚洲免费影院| 精品久久蜜臀av无| 久久99一区二区三区| 国产色婷婷99| 国产精品嫩草影院av在线观看| 国产精品人妻久久久影院| 51午夜福利影视在线观看| 日本欧美视频一区| 欧美国产精品va在线观看不卡| 色吧在线观看| 满18在线观看网站| 午夜免费观看性视频| 在线免费观看不下载黄p国产| 国产亚洲最大av| 十八禁人妻一区二区| 国产又色又爽无遮挡免| 亚洲精品第二区| 91老司机精品| 久久精品久久久久久噜噜老黄| 亚洲成色77777| 新久久久久国产一级毛片| 天天影视国产精品| 咕卡用的链子| 少妇的丰满在线观看| 欧美日韩一区二区视频在线观看视频在线| 在线观看人妻少妇| 无限看片的www在线观看| 大码成人一级视频| 欧美精品人与动牲交sv欧美| 80岁老熟妇乱子伦牲交| 秋霞在线观看毛片| 久久综合国产亚洲精品| 少妇被粗大猛烈的视频| 老司机影院毛片| 免费少妇av软件| 国产精品99久久99久久久不卡 | 另类精品久久| 99久久综合免费| av又黄又爽大尺度在线免费看| 久久精品国产亚洲av高清一级| 久热这里只有精品99| 老司机在亚洲福利影院| 成人18禁高潮啪啪吃奶动态图| 欧美日韩视频精品一区| 日韩熟女老妇一区二区性免费视频| 国产爽快片一区二区三区| 亚洲自偷自拍图片 自拍| 高清av免费在线| 亚洲美女黄色视频免费看| 久久久国产精品麻豆| 午夜福利视频在线观看免费| 老司机深夜福利视频在线观看 | 一级黄片播放器| 久久青草综合色| 亚洲一级一片aⅴ在线观看| 母亲3免费完整高清在线观看| 人妻一区二区av| 伊人久久国产一区二区| 中文字幕精品免费在线观看视频| 夫妻午夜视频| 久久久久精品久久久久真实原创| 精品国产乱码久久久久久男人| 国产精品久久久人人做人人爽| 国产无遮挡羞羞视频在线观看| 精品少妇内射三级| 亚洲国产中文字幕在线视频| 大香蕉久久成人网| 国产一区二区激情短视频 | 亚洲一码二码三码区别大吗| 一本一本久久a久久精品综合妖精| 男人舔女人的私密视频| av女优亚洲男人天堂| 91老司机精品| 中文字幕色久视频| 亚洲美女黄色视频免费看| 国产有黄有色有爽视频| 熟女av电影| 精品亚洲成a人片在线观看| 麻豆乱淫一区二区| 黑人巨大精品欧美一区二区蜜桃| 国产成人精品福利久久| 免费女性裸体啪啪无遮挡网站| 久久天躁狠狠躁夜夜2o2o | 色精品久久人妻99蜜桃| 又大又黄又爽视频免费| 日韩av不卡免费在线播放| 国产精品一区二区在线观看99| 午夜免费男女啪啪视频观看| 伊人久久国产一区二区| 亚洲熟女毛片儿| 一区二区三区乱码不卡18| 国产视频首页在线观看| 爱豆传媒免费全集在线观看| 国产黄色免费在线视频| 成人亚洲欧美一区二区av| 欧美老熟妇乱子伦牲交| 亚洲图色成人| 90打野战视频偷拍视频| 亚洲精品aⅴ在线观看| 黄片无遮挡物在线观看| 菩萨蛮人人尽说江南好唐韦庄| 欧美中文综合在线视频| xxxhd国产人妻xxx| 91精品国产国语对白视频| 久久久精品94久久精品| 十八禁网站网址无遮挡| 国产色婷婷99| 极品少妇高潮喷水抽搐| 女的被弄到高潮叫床怎么办| a级毛片黄视频| 亚洲成人手机| 国产日韩一区二区三区精品不卡| 日韩中文字幕视频在线看片| 成人国产麻豆网| 中文欧美无线码| 欧美精品一区二区大全| 国产av码专区亚洲av| 久久精品国产亚洲av涩爱| 亚洲人成网站在线观看播放| 女人高潮潮喷娇喘18禁视频| 老汉色∧v一级毛片| 一级黄片播放器| 美女国产高潮福利片在线看| 亚洲欧美一区二区三区久久| 一区二区三区四区激情视频| 在线观看国产h片| 国产精品 欧美亚洲| 精品久久蜜臀av无| 亚洲伊人久久精品综合| 99精品久久久久人妻精品| 国产黄色免费在线视频| 精品国产一区二区三区久久久樱花| 久久精品熟女亚洲av麻豆精品| 超碰97精品在线观看| 超碰成人久久| 丝袜美足系列| 国产99久久九九免费精品| svipshipincom国产片| 国产成人欧美在线观看 | 国产成人精品福利久久| 亚洲精品一二三| 精品国产一区二区三区四区第35| 18禁观看日本| 婷婷色av中文字幕| 亚洲欧美一区二区三区国产| 亚洲四区av| 人妻人人澡人人爽人人| 少妇猛男粗大的猛烈进出视频| 亚洲情色 制服丝袜| 男女国产视频网站| 在线观看三级黄色| 少妇人妻久久综合中文| 国产国语露脸激情在线看| 大香蕉久久成人网| 18在线观看网站| 日韩人妻精品一区2区三区| 国产成人精品久久二区二区91 | 国产精品无大码| 国产一区二区三区av在线| 超色免费av| 视频在线观看一区二区三区| 麻豆av在线久日| 国产女主播在线喷水免费视频网站| 欧美xxⅹ黑人| 交换朋友夫妻互换小说| av网站免费在线观看视频| 亚洲国产精品一区二区三区在线| 久久精品国产亚洲av高清一级| 国产成人精品久久久久久| 人人妻人人澡人人爽人人夜夜| 国产免费又黄又爽又色| 精品亚洲成国产av| 女的被弄到高潮叫床怎么办| 人妻人人澡人人爽人人| 丰满乱子伦码专区| 成年女人毛片免费观看观看9 | 日韩伦理黄色片| 日本wwww免费看| 最新在线观看一区二区三区 | avwww免费| 午夜福利一区二区在线看| 一区二区日韩欧美中文字幕| 久热这里只有精品99| 亚洲精品一二三| 不卡视频在线观看欧美| 国产在线免费精品| 夫妻性生交免费视频一级片| 精品国产露脸久久av麻豆| 精品国产露脸久久av麻豆| 男女免费视频国产| 久久天躁狠狠躁夜夜2o2o | 成人免费观看视频高清| 老司机影院毛片| 国产成人精品在线电影| 日韩熟女老妇一区二区性免费视频| 亚洲av电影在线进入| 精品免费久久久久久久清纯 | 日日撸夜夜添| 高清欧美精品videossex| 日日啪夜夜爽| 波野结衣二区三区在线| 欧美日韩一级在线毛片| 观看美女的网站| 久久人人爽人人片av| 午夜福利一区二区在线看| 久久精品国产亚洲av涩爱| 国产av精品麻豆| 亚洲激情五月婷婷啪啪| 欧美日韩一级在线毛片| 一本色道久久久久久精品综合| 欧美少妇被猛烈插入视频| 亚洲色图综合在线观看| 精品久久久精品久久久| 曰老女人黄片| 免费看av在线观看网站| 黑人巨大精品欧美一区二区蜜桃| 精品一区二区三卡| 免费在线观看完整版高清| 女人久久www免费人成看片| 国产免费福利视频在线观看| 亚洲国产精品一区三区| 免费日韩欧美在线观看| 免费黄频网站在线观看国产| 中文字幕另类日韩欧美亚洲嫩草| 日韩制服骚丝袜av| 午夜91福利影院| 国产日韩欧美亚洲二区| 最近中文字幕2019免费版| 亚洲熟女精品中文字幕| 大码成人一级视频| 免费观看性生交大片5| 热99国产精品久久久久久7| 天堂俺去俺来也www色官网| 18禁观看日本| 人妻 亚洲 视频| 久久女婷五月综合色啪小说| 日韩人妻精品一区2区三区| 免费在线观看黄色视频的| 久久久国产一区二区| 久久97久久精品| 欧美日韩av久久| 亚洲美女搞黄在线观看| 少妇被粗大的猛进出69影院| videosex国产| 视频在线观看一区二区三区| 精品久久久久久电影网| 伦理电影免费视频| 天天躁日日躁夜夜躁夜夜| 秋霞在线观看毛片| 丝袜喷水一区| 99re6热这里在线精品视频| 亚洲欧美精品自产自拍| 免费观看a级毛片全部| 熟女少妇亚洲综合色aaa.| 91精品国产国语对白视频| 国产黄色视频一区二区在线观看| www.自偷自拍.com| 1024香蕉在线观看| 免费观看av网站的网址| 国产 一区精品| 一级片'在线观看视频| av在线播放精品| 久久久久国产精品人妻一区二区| 97在线人人人人妻| 亚洲精品美女久久久久99蜜臀 | 一区二区日韩欧美中文字幕| 成人亚洲精品一区在线观看| 欧美日韩成人在线一区二区| 可以免费在线观看a视频的电影网站 | 两性夫妻黄色片| 成年女人毛片免费观看观看9 | 日日撸夜夜添| 国产99久久九九免费精品| 亚洲欧美一区二区三区国产| 乱人伦中国视频| 国产探花极品一区二区| 亚洲国产欧美一区二区综合| 十分钟在线观看高清视频www| 免费观看性生交大片5| 少妇人妻精品综合一区二区| 极品少妇高潮喷水抽搐| 国产一区二区三区综合在线观看| 久久免费观看电影| 99久久精品国产亚洲精品| 亚洲精华国产精华液的使用体验| 色精品久久人妻99蜜桃| av片东京热男人的天堂| 久久99热这里只频精品6学生| 九色亚洲精品在线播放| 午夜影院在线不卡| 成人亚洲欧美一区二区av| 成人黄色视频免费在线看| 久久ye,这里只有精品| 亚洲欧美色中文字幕在线| 少妇人妻久久综合中文| 啦啦啦啦在线视频资源| 永久免费av网站大全| 亚洲国产欧美网| www.自偷自拍.com| 黄色视频不卡| 国产精品无大码| 在线观看国产h片| 亚洲精品第二区| 久久婷婷青草| 国产女主播在线喷水免费视频网站| 国产97色在线日韩免费| 亚洲成人手机| 丝瓜视频免费看黄片| 国产精品.久久久| av福利片在线| 国精品久久久久久国模美| 国产无遮挡羞羞视频在线观看| 亚洲视频免费观看视频| 久久天躁狠狠躁夜夜2o2o | 亚洲精品久久久久久婷婷小说| 亚洲国产中文字幕在线视频| 五月天丁香电影| 国产日韩欧美亚洲二区| 久久av网站| 叶爱在线成人免费视频播放| 国产麻豆69| 亚洲国产欧美网| 涩涩av久久男人的天堂| 在线天堂最新版资源| 性少妇av在线| 亚洲欧美清纯卡通| 午夜影院在线不卡| 亚洲第一区二区三区不卡| 色吧在线观看| 又黄又粗又硬又大视频| 午夜福利视频在线观看免费| 一级毛片黄色毛片免费观看视频| 极品人妻少妇av视频| 色播在线永久视频| 亚洲国产精品国产精品| 国产av码专区亚洲av| 精品午夜福利在线看| 色婷婷久久久亚洲欧美| 一区福利在线观看| 日韩av在线免费看完整版不卡| 在线观看国产h片| 国产精品久久久久久精品古装| 在线精品无人区一区二区三| 中文字幕人妻熟女乱码| 激情视频va一区二区三区| 电影成人av| 亚洲成人手机| 国产伦理片在线播放av一区| 可以免费在线观看a视频的电影网站 | 免费黄网站久久成人精品| 婷婷色麻豆天堂久久| 五月天丁香电影| 国产成人午夜福利电影在线观看| 日本色播在线视频| 啦啦啦在线免费观看视频4| 久久精品国产a三级三级三级| 天天添夜夜摸| 亚洲综合色网址| 亚洲熟女毛片儿| 国产在线免费精品| 久久久久视频综合| 秋霞在线观看毛片| 亚洲中文av在线| 自拍欧美九色日韩亚洲蝌蚪91| 侵犯人妻中文字幕一二三四区| 不卡视频在线观看欧美| 七月丁香在线播放| 欧美精品亚洲一区二区| 黄片小视频在线播放| 午夜老司机福利片| www日本在线高清视频| 人妻一区二区av| 成人漫画全彩无遮挡| 欧美黑人欧美精品刺激| 国产99久久九九免费精品| 精品酒店卫生间| 好男人视频免费观看在线| 看十八女毛片水多多多| 一二三四中文在线观看免费高清| 亚洲成色77777| 精品久久久精品久久久| 一级毛片黄色毛片免费观看视频| 久久 成人 亚洲| 美女高潮到喷水免费观看| 青青草视频在线视频观看| 国产在线视频一区二区| 成人18禁高潮啪啪吃奶动态图| 国产一卡二卡三卡精品 | 曰老女人黄片| 一级片免费观看大全| 97精品久久久久久久久久精品| 超色免费av| 亚洲五月色婷婷综合| 91国产中文字幕| 久久久久久免费高清国产稀缺| 两性夫妻黄色片| 热re99久久精品国产66热6| 一级片免费观看大全| 下体分泌物呈黄色| 亚洲av国产av综合av卡| 亚洲欧美一区二区三区国产| 国产av精品麻豆| 黄色怎么调成土黄色| 日韩,欧美,国产一区二区三区| 久久99热这里只频精品6学生| 精品人妻熟女毛片av久久网站| 亚洲国产精品一区三区| 欧美在线黄色| 在线观看免费午夜福利视频| 国产欧美日韩一区二区三区在线| 欧美精品一区二区大全| 色视频在线一区二区三区| 久久精品人人爽人人爽视色| av国产久精品久网站免费入址| 国产有黄有色有爽视频| 校园人妻丝袜中文字幕| 国产一区二区激情短视频 | 999久久久国产精品视频| 国产成人91sexporn| 日本91视频免费播放| 熟女少妇亚洲综合色aaa.| 国产av一区二区精品久久| 伦理电影免费视频| 欧美老熟妇乱子伦牲交| 亚洲精品国产一区二区精华液| 一个人免费看片子| 精品久久久久久电影网| 免费黄频网站在线观看国产| 亚洲国产中文字幕在线视频| 青春草视频在线免费观看| 男女高潮啪啪啪动态图| 熟女av电影| 欧美日韩视频高清一区二区三区二| 国产不卡av网站在线观看| 人人妻人人添人人爽欧美一区卜| 美女高潮到喷水免费观看| 亚洲国产欧美网| 成年美女黄网站色视频大全免费| 国产老妇伦熟女老妇高清| 欧美精品人与动牲交sv欧美| 国产一区二区三区av在线| 成年av动漫网址| 男女高潮啪啪啪动态图| 国产熟女欧美一区二区| 欧美 日韩 精品 国产| 黑人猛操日本美女一级片| 丝袜美腿诱惑在线| 超碰97精品在线观看| 午夜久久久在线观看| 美女脱内裤让男人舔精品视频| 老汉色∧v一级毛片| 高清av免费在线| 天天添夜夜摸| 欧美亚洲日本最大视频资源| 多毛熟女@视频| 免费观看人在逋| 狠狠精品人妻久久久久久综合| 搡老乐熟女国产|