{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:16:39Z","timestamp":1775880999853,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61572532"],"award-info":[{"award-number":["61572532"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11128-021-03301-y","type":"journal-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T07:02:37Z","timestamp":1635750157000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Blind quantum machine learning based on quantum circuit model"],"prefix":"10.1007","volume":"20","author":[{"given":"Xu","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1275-7599","authenticated-orcid":false,"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,1]]},"reference":[{"issue":"6","key":"3301_CR1","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/BF02650179","volume":"21","author":"RP Feynman","year":"1982","unstructured":"Feynman, R.P.: Simulating physics with computers. Int. J. Theor. Phys. 21(6), 467\u2013488 (1982)","journal-title":"Int. J. Theor. Phys."},{"key":"3301_CR2","doi-asserted-by":"crossref","unstructured":"Deutsch, D.: Quantum theory, the Church-Turing principle and the universal quantum computer. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. R. Soc. 400(1818), 97\u2013117 (1985)","DOI":"10.1098\/rspa.1985.0070"},{"key":"3301_CR3","doi-asserted-by":"crossref","unstructured":"Deutsch, D., Jozsa, R.: Rapid solution of problems by quantum computation. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. R. Soc. 439(1907), 553\u2013558 (1992)","DOI":"10.1098\/rspa.1992.0167"},{"key":"3301_CR4","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1137\/S0097539796300921","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26, 1411\u20131473 (1997)","journal-title":"SIAM J. Comput."},{"key":"3301_CR5","doi-asserted-by":"crossref","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information (10th Anniv. Version), 221\u2013226, Cambridge university Press, the UK (2010)","DOI":"10.1017\/CBO9780511976667"},{"key":"3301_CR6","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. IEEE, pp. 124\u2013134 (1994)"},{"issue":"2","key":"3301_CR7","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)","journal-title":"Phys. Rev. Lett."},{"issue":"7779","key":"3301_CR8","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","volume":"574","author":"F Arute","year":"2019","unstructured":"Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J.C., Barends, R., Biswas, R., Boixo, S., Brandao, F.G., Buell, D.A., et al.: Quantum supremacy using a programmable superconducting processor. Nature 574(7779), 505\u2013510 (2019)","journal-title":"Nature"},{"key":"3301_CR9","doi-asserted-by":"crossref","unstructured":"Veluru, S., Rahulamathavan, Y., et\u00a0al.: Privacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis, pp. 364\u2013385. IGI Global Publisher, New York (2014)","DOI":"10.4018\/978-1-4666-6559-0.ch017"},{"issue":"6","key":"3301_CR10","first-page":"456","volume":"5","author":"AM Childs","year":"2005","unstructured":"Childs, A.M.: Secure assisted quantum computation. Quantum Inf. Comput. 5(6), 456\u2013466 (2005)","journal-title":"Quantum Inf. Comput."},{"key":"3301_CR11","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation. In: Proceedings of the 50th annual IEEE symposium on foundations of computer science (FOCS 2009), pp. 517\u2013526 (2009)","DOI":"10.1109\/FOCS.2009.36"},{"issue":"2","key":"3301_CR12","doi-asserted-by":"publisher","first-page":"022312","DOI":"10.1103\/PhysRevA.68.022312","volume":"68","author":"R Raussendorf","year":"2003","unstructured":"Raussendorf, R., Browne, D.E., Briegel, H.J.: Measurement-based quantum compuation on cluster states. Phys. Rev. A 68(2), 022312 (2003)","journal-title":"Phys. Rev. A"},{"key":"3301_CR13","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1126\/science.1214707","volume":"20","author":"S Barz","year":"2012","unstructured":"Barz, S., Kashefi, E., Broadbent, A., Fitzsimons, J., Zeilinger, A., Walther, P.: Demonstration of blind quantum computing. Science 20, 303\u2013308 (2012)","journal-title":"Science"},{"issue":"3\u20134","key":"3301_CR14","first-page":"200","volume":"15","author":"T Morimae","year":"2015","unstructured":"Morimae, T., Dunjko, V., Kashefi, E.: Ground state blind quantum computation on AKLT State. Quantum Inf. Comput. 15(3\u20134), 200\u2013234 (2015)","journal-title":"Quantum Inf. Comput."},{"key":"3301_CR15","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1038\/ncomms2043","volume":"3","author":"T Morimae","year":"2012","unstructured":"Morimae, T., Fujii, K.: Blind topological measurement-based quantum computation. Nat. Commun. 3, 1036 (2012)","journal-title":"Nat. Commun."},{"key":"3301_CR16","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.109.230502","volume":"109","author":"T Morimae","year":"2012","unstructured":"Morimae, T.: Continuous-variable blind quantum computation. Phys. Rev. Lett. 109, 230502 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"3301_CR17","doi-asserted-by":"publisher","first-page":"060301(R)","DOI":"10.1103\/PhysRevA.87.060301","volume":"87","author":"JT Sueke","year":"2013","unstructured":"Sueke, J.T., Koshiba, T., Morimae, T.: Ancilla-driven universal blind quantum computation. Phys. Rev. A 87, 060301(R) (2013)","journal-title":"Phys. Rev. A"},{"key":"3301_CR18","doi-asserted-by":"publisher","first-page":"020502","DOI":"10.1103\/PhysRevLett.111.020502","volume":"111","author":"T Morimae","year":"2013","unstructured":"Morimae, T., Fujii, K.: Secure entanglement distillation for double-server blind quantum computation. Phys. Rev. Lett. 111, 020502 (2013)","journal-title":"Phys. Rev. Lett."},{"key":"3301_CR19","doi-asserted-by":"publisher","first-page":"040302(R)","DOI":"10.1103\/PhysRevA.89.040302","volume":"89","author":"Q Li","year":"2014","unstructured":"Li, Q., Chan, W.H., Wu, C., Wen, Z.: Triple-server blind quantum computation using entanglement swapping. Phys. Rev. A 89, 040302(R) (2014)","journal-title":"Phys. Rev. A"},{"key":"3301_CR20","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1038\/ncomms4074","volume":"5","author":"KAG Fisher","year":"2014","unstructured":"Fisher, K.A.G., Broadbent, A., Shalm, L.K., Yan, Z., Lavoie, J., Prevedel, R., Jennewein, T., Resch, K.J.: Quantum computing on encrypted data. Nat. Commun. 5, 3074 (2014)","journal-title":"Nat. Commun."},{"key":"3301_CR21","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1139\/cjp-2015-0030","volume":"93","author":"A Broadbent","year":"2015","unstructured":"Broadbent, A.: Delegating private quantum computations. Can. J. Phys. 93, 941\u2013946 (2015)","journal-title":"Can. J. Phys."},{"key":"3301_CR22","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s12243-017-0561-z","volume":"72","author":"XQ Tan","year":"2017","unstructured":"Tan, X.Q., Zhou, X.: Universal half-blind quantum computation. Ann. Telecommun. 72, 589\u2013595 (2017)","journal-title":"Ann. Telecommun."},{"key":"3301_CR23","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s11128-018-1901-2","volume":"17","author":"XQ Zhang","year":"2018","unstructured":"Zhang, X.Q., Weng, J., Li, X.C., Luo, W.Q., Tan, X.Q., Song, T.T.: Single-server blind quantum computation with quantum circuit model. Quantum Inf. Process 17, 134 (2018)","journal-title":"Quantum Inf. Process"},{"key":"3301_CR24","volume-title":"Foundations of Machine Learning","author":"M Mohri","year":"2012","unstructured":"Mohri, M., Rostamizadeh, A., Talwalkar, A.: Foundations of Machine Learning. MIT Press, Cambridge (2012)"},{"key":"3301_CR25","doi-asserted-by":"crossref","unstructured":"Hilbert, M., Lopez, P.: The world\u2019s technological capacity to store, communicate, and compute information. Science 332(6025), 60\u201365 (2011)","DOI":"10.1126\/science.1200970"},{"issue":"15","key":"3301_CR26","doi-asserted-by":"publisher","first-page":"150502","DOI":"10.1103\/PhysRevLett.103.150502","volume":"103","author":"AW Harrow","year":"2009","unstructured":"Harrow, A.W., Hassidim, A., Lloyd, S.: Quantum algorithm for linear systems of equations. Phys. Rev. Lett. 103(15), 150502 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"3301_CR27","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.113.130503","volume":"113","author":"P Rebentrost","year":"2014","unstructured":"Rebentrost, P., Mohseni, M., Lloyd, S.: Quantum support vector machine for big data classification. Phys. Rev. Lett. 113(13), 130503 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"3301_CR28","unstructured":"Wiebe, N., Kapoor, A., Svore, K.: Quantum nearest-neighbor algorithms for machine learning, arXiv:1401.2142 (2014)"},{"key":"3301_CR29","unstructured":"Lloyd, S., Mohseni, M., Rebentrost P.: Quantum algorithms for supervised and unsupervised machine learning, arXiv:1307.0411 (2013)"},{"key":"3301_CR30","unstructured":"Kerenidis, I., Prakash, A.: Quantum recommendation systems, arXiv:1603.08675 (2016)"},{"key":"3301_CR31","doi-asserted-by":"publisher","first-page":"073017","DOI":"10.1088\/1367-2630\/16\/7\/073017","volume":"16","author":"J Bang","year":"2014","unstructured":"Bang, J., Ryu, J., Yoo, S., et al.: A strategy for quantum algorithm design assisted by machine learning. New J. Phys. 16, 073017 (2014)","journal-title":"New J. Phys."},{"key":"3301_CR32","doi-asserted-by":"publisher","first-page":"103014","DOI":"10.1088\/1367-2630\/16\/10\/103014","volume":"16","author":"S Yoo","year":"2014","unstructured":"Yoo, S., Bang, J., Lee, C., et al.: A quantum speedup in machine learning: finding an $$N$$-bit Boolean function for a classification. New J. Phys. 16, 103014 (2014)","journal-title":"New J. Phys."},{"key":"3301_CR33","doi-asserted-by":"publisher","first-page":"3933","DOI":"10.1007\/s11128-015-1089-7","volume":"14","author":"J Bang","year":"2015","unstructured":"Bang, J., Lee, S.W., Jeong, H.: Protocol for secure quantum machine learning at a distant place. Quantum Inf. Process 14, 3933\u20133947 (2015)","journal-title":"Quantum Inf. Process"},{"key":"3301_CR34","doi-asserted-by":"publisher","first-page":"110504","DOI":"10.1103\/PhysRevLett.114.110504","volume":"114","author":"XD Cai","year":"2015","unstructured":"Cai, X.D., Wu, D., Su, Z.E., et al.: Entanglement-based machine learning on a quantum computer. Phys. Rev. Lett. 114, 110504 (2015)","journal-title":"Phys. Rev. Lett."},{"key":"3301_CR35","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1016\/j.scib.2017.06.007","volume":"62","author":"YB Sheng","year":"2017","unstructured":"Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62, 1025\u20131029 (2017)","journal-title":"Sci. Bull."},{"key":"3301_CR36","unstructured":"Dervovic, D., Herbster, M., Mountney, P., et\u00a0al.: Quantum linear systems algorithms: a primer, arXiv:1802.08227 (2018)"},{"key":"3301_CR37","unstructured":"Grover, L., Rudolph, T.: Creating superpositions that correspond to efficiently integrable probability distributions, arXiv:quant-ph\/0208112 (2002)"},{"key":"3301_CR38","doi-asserted-by":"crossref","unstructured":"A\u00efmeur, E., Brassard, G., Gambs, S.: Machine learning in a quantum world advances in artificial intelligence. Lecture Notes in Computer Science, Volume 4013, pp. 431\u2013442. Springer (2006)","DOI":"10.1007\/11766247_37"},{"key":"3301_CR39","doi-asserted-by":"publisher","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., DeWolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"3301_CR40","unstructured":"Kopczyk, D.: Quantum machine learning for data scientists, arXiv:1804.10068v1 (2018)"},{"key":"3301_CR41","unstructured":"Ambainis, A., Mosca, M., Tapp, A., De Wolf, R.: Private quantum channels. In: Proceedings of the 41st Annual IEEE Symposium on Foundations of Computer Science (FOCS 2000), pp. 547\u2013553 (2000)"},{"key":"3301_CR42","doi-asserted-by":"crossref","unstructured":"Barnum, H., Crepeau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: Proceedings of the 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS02), pp. 449\u2013458 (2002)","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"3301_CR43","doi-asserted-by":"publisher","first-page":"16021","DOI":"10.1038\/npjqi.2016.21","volume":"2","author":"XF Ma","year":"2016","unstructured":"Ma, X.F., Yuan, X., Cao, Z., Qi, B., Zhen, Z.: Quantum random number generation. NPJ Quantum Inf. 2, 16021 (2016)","journal-title":"NPJ Quantum Inf."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03301-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03301-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03301-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:10:18Z","timestamp":1726031418000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03301-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":43,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["3301"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03301-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"29 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"363"}}