Unifying communication paradigms in measurement-based delegated quantum computing
Pith reviewed 2026-05-19 08:20 UTC · model grok-4.3
The pith
Delegated quantum computing protocols can be translated between prepare-and-send and receive-and-measure settings by implementing missing components in each.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
By implementing the key components of most DQC protocols in the respective missing setting, we provide a method to build prospective protocols in both settings simultaneously and to translate existing protocols from one setting into the other.
What carries the argument
Cross-implementation of protocol components (qubit preparation, resource-state entanglement, and measurement) that were originally developed for only one of the two communication settings.
If this is right
- New protocols can be designed from the outset to function in both prepare-and-send and receive-and-measure regimes.
- Existing protocols written for one setting can be systematically rewritten for the other.
- Setting-dependent theoretical constraints are shown to be avoidable rather than inevitable.
Where Pith is reading between the lines
- The translation method could allow hardware teams to pick whichever setting is easier to implement on their particular devices.
- Hybrid protocols that switch communication direction partway through a computation become conceivable.
- The same cross-implementation approach might extend to other quantum communication tasks that currently treat preparation and measurement roles asymmetrically.
Load-bearing premise
That the key components of existing protocols can be realized in the alternate setting without introducing new cryptographic or experimental constraints that would invalidate the original security or blindness guarantees.
What would settle it
A concrete demonstration that at least one standard component, such as a particular entangled resource state or measurement pattern, cannot be moved to the other setting while preserving the original blindness property.
Figures
read the original abstract
Delegated quantum computing (DQC) allows clients with low quantum capabilities to outsource computations to a server hosting a quantum computer. This process is often envisioned within the measurement-based quantum computing framework, as it naturally facilitates blindness of inputs and computation. Hence, the overall process of setting up and conducting the computation encompasses a sequence of three stages: preparing the qubits, entangling the qubits to obtain the resource state, and measuring the qubits to run the computation. There are two primary approaches to distributing these stages between the client and the server that impose different constraints on cryptographic techniques and experimental implementations. In the prepare-and-send setting, the client prepares the qubits and sends them to the server, while in the receive-and-measure setting, the client receives the qubits from the server and measures them. Although these settings have been extensively studied independently, their interrelation and whether setting-dependent theoretical constraints are inevitable remain unclear. By implementing the key components of most DQC protocols in the respective missing setting, we provide a method to build prospective protocols in both settings simultaneously and to translate existing protocols from one setting into the other.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper claims that the prepare-and-send and receive-and-measure settings in measurement-based delegated quantum computing can be unified by reassigning the key components (qubit preparation, resource-state entanglement, and measurement) between client and server, thereby enabling simultaneous construction of protocols in both settings and translation of existing protocols from one setting to the other while preserving security properties such as blindness.
Significance. If the translations rigorously preserve cryptographic guarantees, the work would offer a systematic bridge between two previously separate paradigms, allowing protocol designers to adapt constructions across experimental constraints without separate security analyses; this could streamline development of practical DQC schemes.
major comments (2)
- [Abstract and main construction (around the unification method)] The central claim that translations preserve blindness and verifiability rests on an unproven invariance of the cryptographic reduction under setting swap. No section derives that the simulator for the client's input in the new view remains computationally indistinguishable from the ideal functionality under the original hardness assumptions; the reduction is only sketched at the level of the abstract resource state.
- [Sections describing explicit translations of existing protocols] For the representative protocols whose key components are implemented in the alternate setting, the manuscript does not provide a full security analysis showing that no new cryptographic or experimental constraints invalidate the original guarantees; this is load-bearing for the translation claim.
minor comments (2)
- [Introduction] A diagram contrasting the stage distribution (preparation, entanglement, measurement) in both settings would improve clarity of the unification method.
- [Throughout the manuscript] Notation for resource states and client-server interfaces should be standardized across sections to avoid ambiguity when describing the reassignments.
Simulated Author's Rebuttal
We thank the referee for their thorough review and valuable feedback on our manuscript. We address each major comment below and outline the revisions we will make to strengthen the security arguments.
read point-by-point responses
-
Referee: [Abstract and main construction (around the unification method)] The central claim that translations preserve blindness and verifiability rests on an unproven invariance of the cryptographic reduction under setting swap. No section derives that the simulator for the client's input in the new view remains computationally indistinguishable from the ideal functionality under the original hardness assumptions; the reduction is only sketched at the level of the abstract resource state.
Authors: We agree that the current presentation of security preservation under the setting swap is at a high level. The manuscript sketches the invariance at the abstract resource state but does not contain an explicit derivation of the simulator's indistinguishability in the swapped view. In the revised version we will add a dedicated subsection that constructs the simulator for the swapped setting and proves computational indistinguishability from the ideal functionality under the original hardness assumptions. revision: yes
-
Referee: [Sections describing explicit translations of existing protocols] For the representative protocols whose key components are implemented in the alternate setting, the manuscript does not provide a full security analysis showing that no new cryptographic or experimental constraints invalidate the original guarantees; this is load-bearing for the translation claim.
Authors: The manuscript illustrates the general translation method with representative protocols but does not supply complete security analyses for the translated instances. We acknowledge that verifying the absence of new constraints is necessary for the claim. In the revision we will expand the relevant sections to include full security analyses for the representative protocols in each translation direction, confirming that the original hardness assumptions continue to hold and that no additional experimental constraints are introduced. revision: yes
Circularity Check
No significant circularity; constructive translation method is self-contained
full rationale
The paper presents a constructive approach to implementing key components of DQC protocols (qubit preparation, entanglement, measurement) in the alternate communication setting to enable translation between prepare-and-send and receive-and-measure paradigms. No steps reduce by definition to their inputs, no fitted parameters are relabeled as predictions, and no load-bearing claims rest on self-citations that themselves require the target result. The derivation relies on explicit protocol translations rather than self-referential assumptions, remaining independent of the paper's own fitted values or prior unverified results.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Validity of the measurement-based quantum computing model and standard cryptographic assumptions for delegated quantum computing.
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
By implementing the key components of most DQC protocols in the respective missing setting, we provide a method to build prospective protocols in both settings simultaneously and to translate existing protocols from one setting into the other.
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We first introduce the abstract cryptography framework in section 2... single-client blind DQC (Sblind), single-client verifiable DQC (Sver), Collective Remote State Preparation (RSP)
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
In: Advances in Cryptology – ASIACRYPT 2020 (2020)
Badertscher, C., Cojocaru, A., Colisson, L., Kashefi, E., Leichtle, D., Mantri, A., Wallden, P.: Security limitations of classical-client del- egated quantum computing. In: Advances in Cryptology – ASIACRYPT 2020 (2020). https://doi.org/10.1007/978-3-030-64834-323
-
[2]
Measurement-based quantum computation
Briegel, H.J., Browne, D.E., D¨ur, W., Raussendorf, R., Van den Nest, M.: Measurement-based quantum computation. Nature Phys. 5, 19–26 (2009). https://doi.org/10.1038/nphys1157
-
[3]
Broadbent, A.: How to verify a quantum computation. Th. Comp.14(1), 1–37 (2018). https://doi.org/10.4086/toc.2018.v014a011
-
[4]
Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation. 50th Ann. IEEE Symp. Found. Comp. Sc.2009, 517 (2009). https://doi.org/10.1109/focs.2009.36
-
[5]
In: Lecture Notes in Computer Science, pp
Broadbent, A., Karvonen, M.: Categorical composable cryptography. In: Lecture Notes in Computer Science, pp. 161–183. Springer International Publishing (2022). https://doi.org/10.1007/978-3-030-99253-8 9
-
[6]
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Ann. IEEE Symp. Found. Comp. Sc. pp. 136–145 (2001). https://doi.org/10.1109/SFCS.2001.959888
-
[7]
https://doi.org/10.48550/arXiv.2402.01445
Colisson, L., Markham, D., Yehia, R.: All graph state verification protocols are composably secure (2024). https://doi.org/10.48550/arXiv.2402.01445
-
[8]
In: Advances in Cryptology – ASIACRYPT 2014 (2014)
Dunjko, V ., Fitzsimons, J.F., Portmann, C., Renner, R.: Composable security of delegated quantum computation. In: Advances in Cryptology – ASIACRYPT 2014 (2014). https://doi.org/10.1007/978-3-662-45608-822
-
[9]
Fitzsimons, J.F., Kashefi, E.: Unconditionally verifiable blind quantum computation. Phys. Rev. A 96, 012303 (2017). https://doi.org/10.1103/physreva.96.012303
- [10]
-
[11]
Greganti, C., Roehsner, M.C., Barz, S., Morimae, T., Walther, P.: Demonstration of measurement-only blind quantum computing. New J. Phys.18, 013020 (2016). https://doi.org/10.1088/1367-2630/18/1/013020
-
[12]
Hayashi, M., Morimae, T.: Verifiable measurement-only blind quantum computing with stabilizer testing. Phys. Rev. Lett. 115, 220502 (2015). https://doi.org/10.1103/PhysRevLett.115.220502
-
[13]
Hein, M., Eisert, J., Briegel, H.J.: Multiparty entanglement in graph states. Phys. Rev. A 69, 062311 (2004). https://doi.org/10.1103/PhysRevA.69.062311
-
[14]
Kapourniotis, T., Kashefi, E., Leichtle, D., Music, L., Ollivier, H.: Asymmetric secure multi-party quantum computation with weak clients against dishonest majority. Quant. Sc. Tech.10(2), 025015 (2025). https://doi.org/10.1088/2058-9565/adaf12
-
[15]
Kashefi, E., Music, L., Wallden, P.: The quantum cut-and-choose technique and quantum two-party computation (2017), https://arxiv.org/abs/1703.03754
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[16]
Kashefi, E., Pappa, A.: Multiparty delegated quantum computing. Crypt.1, 12 (2017). https://doi.org/10.3390/cryptography1020012
-
[17]
Kashefi, E., Wallden, P.: Optimised resource construction for verifiable quantum computation. J. Phys. A 50, 145306 (2017). https://doi.org/10.1088/1751-8121/aa5dac
-
[18]
PRX Quantum 2(4), 040302 (2021)
Leichtle, D., Music, L., Kashefi, E., Ollivier, H.: Verifying bqp computations on noisy devices with minimal overhead. PRX Quantum 2(4), 040302 (2021)
work page 2021
-
[19]
PRX Quantum 2, 040302 (Oct 2021)
Leichtle, D., Music, L., Kashefi, E., Ollivier, H.: Verifying bqp computations on noisy devices with minimal overhead. PRX Quantum 2, 040302 (Oct 2021). https://doi.org/10.1103/PRXQuantum.2.040302
-
[20]
In: Theory of Security and Applications
Maurer, U.: Constructive Cryptography – A New Paradigm for Security Definitions and Proofs. In: Theory of Security and Applications. pp. 33–56. Springer Berlin Heidelberg, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27375-93
-
[21]
In: Innovations in Computer Science
Maurer, U., Renner, R.: Abstract cryptography. In: Innovations in Computer Science. Tsinghua University Press (2011)
work page 2011
-
[22]
Morimae, T.: Verification for measurement-only blind quantum computing. Phys. Rev. A 89, 060302 (2014). https://doi.org/10.1103/PhysRevA.89.060302
-
[23]
Morimae, T.: Measurement-only verifiable blind quantum computing with quantum input verification. Phys. Rev. A94, 042301 (Oct 2016). https://doi.org/10.1103/PhysRevA.94.042301
-
[24]
Morimae, T., Fujii, K.: Blind quantum computation protocol in which alice only makes measurements. Phys. Rev. A87, 050301 (2013). https://doi.org/10.1103/physreva.87.050301
- [25]
-
[26]
Portmann, C., Renner, R.: Security in quantum cryptography. Rev. Mod. Phys. 94(2), 025008 (Jun 2022). https://doi.org/10.1103/revmodphys.94.025008
-
[27]
Raussendorf, R., Harrington, J., Goyal, K.: A fault-tolerant one-way quantum computer. Ann. Phys. 321(9), 2242–2270 (2006). https://doi.org/10.1016/j.aop.2006.01.012
-
[28]
Raussendorf, R., Briegel, H.J.: A one-way quantum computer. Phys. Rev. Lett. 86, 5188–5191 (May 2001). https://doi.org/10.1103/PhysRevLett.86.5188
-
[29]
Science388(6746), 509–513 (2025)
Wei, Y .C., Stas, P.J., Suleymanzade, A., Baranes, G., Machado, F., Huan, Y .Q., Knaut, C.M., Ding, S.W., Merz, M., Knall, E.N., Yazlar, U., Sirotin, M., Wang, I.W., Machielse, B., Yelin, S.F., Borregaard, J., Park, H., Lonˇcar, M., Lukin, M.D.: Universal distributed blind quantum computing with solid-state qubits. Science388(6746), 509–513 (2025). https:...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.