Research

Paper

TESTING March 10, 2026

Verified delegated quantum computation requires techniques beyond cut-and-choose

Authors

Fabian Wiesner, Anna Pappa

Abstract

Delegated quantum computation enables a client with limited quantum capabilities to outsource computations to a more powerful quantum server while preserving correctness and privacy. Verification is crucial in this setting to ensure that the untrusted quantum server performs the computation honestly and returns correct results. A common verification method is the quantum cut-and-choose technique. Inspired by classical verification methods for two-party computation, the client uses the majority of the delegated rounds to test the server's honesty, while keeping the remaining ones for the actual computation. Combining this technique with other methods, such as quantum error correction, could help achieve negligible cheating probabilities for the server; however, such methods can impose significant overheads making implementations unfeasible for the near-term future. In this work, we investigate whether cut-and-choose can yield efficient and secure verifiable quantum computation without additional costly techniques. We find that verifiable delegated quantum computation protocols relying solely on cut-and-choose techniques cannot be secure and efficient at the same time.

Metadata

arXiv ID: 2603.09368
Provider: ARXIV
Primary Category: quant-ph
Published: 2026-03-10
Fetched: 2026-03-11 06:02

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2603.09368v1</id>\n    <title>Verified delegated quantum computation requires techniques beyond cut-and-choose</title>\n    <updated>2026-03-10T08:45:23Z</updated>\n    <link href='https://arxiv.org/abs/2603.09368v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2603.09368v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>Delegated quantum computation enables a client with limited quantum capabilities to outsource computations to a more powerful quantum server while preserving correctness and privacy. Verification is crucial in this setting to ensure that the untrusted quantum server performs the computation honestly and returns correct results. A common verification method is the quantum cut-and-choose technique. Inspired by classical verification methods for two-party computation, the client uses the majority of the delegated rounds to test the server's honesty, while keeping the remaining ones for the actual computation. Combining this technique with other methods, such as quantum error correction, could help achieve negligible cheating probabilities for the server; however, such methods can impose significant overheads making implementations unfeasible for the near-term future. In this work, we investigate whether cut-and-choose can yield efficient and secure verifiable quantum computation without additional costly techniques. We find that verifiable delegated quantum computation protocols relying solely on cut-and-choose techniques cannot be secure and efficient at the same time.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='quant-ph'/>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CR'/>\n    <published>2026-03-10T08:45:23Z</published>\n    <arxiv:comment>19 pages, 2 figures, 2 protocols</arxiv:comment>\n    <arxiv:primary_category term='quant-ph'/>\n    <author>\n      <name>Fabian Wiesner</name>\n    </author>\n    <author>\n      <name>Anna Pappa</name>\n    </author>\n  </entry>"
}