Frontiers of Data and Computing ›› 2025, Vol. 7 ›› Issue (6): 55-67.

CSTR: 32002.14.jfdc.CN10-1649/TP.2025.06.006

doi: 10.11871/jfdc.issn.2096-742X.2025.06.006

• Special Issue: Call for Papers for the 40th National Conference on Computer Security • Previous Articles     Next Articles

Survey of Verification Methods for Delegated Quantum Computation

YUAN Zimeng1,2(),LONG Chun1,2,*(),LI Jing2,YANG Fan2,FU Yuhao2,WEI Jinxia1,2,WAN Wei1,2   

  1. 1. University of Chinese Academy of Sciences, Beijing 100190, China
    2. Computer Network Information Center, Chinese Academy of Sciences, Beijing 100083, China
  • Received:2025-08-01 Online:2025-12-20 Published:2025-12-17
  • Contact: LONG Chun E-mail:zmyuan@cnic.cn;anquanip@cnic.cn

Abstract:

[Objective] This paper systematically reviews and analyzes the research progress and current status of the verification methods for delegated quantum computation. [Coverage] This paper surveys 74 publications from mainstream conferences and journals spanning 1994 to 2025, covering core achievements and cutting-edge developments in quantum computing verification. [Methods] Classifying verification methods into three categories (weak quantum capability, entanglement, computational assumptions) based on client-side quantum capability requirements, we establish a taxonomy framework. By comparing communication patterns, overhead and fault tolerance, we distill evolutionary trends and comparative advantages of these approaches. [Results] Three complementary patterns emerge: weak-quantum-client schemes offer maturity but require client-side quantum capabilities; entanglement-based schemes need only classical clients but require multi-server collaboration; computational-assumption schemes feature minimal communication yet rely on post-quantum cryptography. Overhead decreases from exponential to near-linear complexity, though theoretical optimization is approaching asymptotic bottlenecks. [Conclusions] Research focus is shifting from theoretical optimization to practical deployment, urgently demanding cross-platform experimental validation and standardized protocols for multi-party delegated computation scenarios.

Key words: quantum computation, delegated computation, verification of computation, quantum cryptography