Abstract

With experimental quantum computing technologies now in their infancy, the search for efficient means of testing the correctness of these quantum computations is becoming more pressing. An approach to the verification of quantum computation within the framework of interactive proofs has been fruitful for addressing this problem. Specifically, an untrusted agent (prover) alleging to perform quantum computations can have his claims verified by another agent (verifier) who only has access to classical computation and a small quantum device for preparing or measuring single qubits. However, when this quantum device is prone to errors, verification becomes challenging and often existing protocols address this by adding extra assumptions, such as requiring the noise in the device to be uncorrelated with the noise on the prover’s devices. In this paper, we present a simple protocol for verifying quantum computations, in the presence of noisy devices, with no extra assumptions. This protocol is based on post hoc techniques for verification, which allow for the prover to know the desired quantum computation and its input. We also perform a simulation of the protocol, for a one-qubit computation, and find the error thresholds when using the qubit repetition code as well as the Steane code.

Highlights

  • This content was downloaded from IP address 129.215.240.223 on 20/11/2018 at 14:56 pt Alexandru Gheorghiu,1, 2 Matty J

  • It is believed that the containment is strict, since, in principle, the prover can produce proof states that cannot be generated by the poly-time quantum verifier

  • It is straightforward to show that a constant rate of noise on these devices will lead to the failure of the protocol for sufficiently large computations

Read more

Summary

General rights

Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights.

Take down policy
INTRODUCTION
Complexity theory
Post hoc verification
OF QUANTUM COMPUTATION
The fault tolerant protocol
Numerical results
Encoded state
Probability of depolarization error
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call