{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:16:34Z","timestamp":1775384194336,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2312754,2245344"],"award-info":[{"award-number":["2312754,2245344"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545385","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"404-414","source":"Crossref","is-referenced-by-count":13,"title":["Dynamic Pulse Switching for Protection of Quantum Computation on Untrusted Clouds"],"prefix":"10.1109","author":[{"given":"Theodoros","family":"Trochatos","sequence":"first","affiliation":[{"name":"Yale University"}]},{"given":"Sanjay","family":"Deshpande","sequence":"additional","affiliation":[{"name":"Yale University"}]},{"given":"Chuanqi","family":"Xu","sequence":"additional","affiliation":[{"name":"Yale University"}]},{"given":"Yao","family":"Lu","sequence":"additional","affiliation":[{"name":"Yale University"}]},{"given":"Yongshan","family":"Ding","sequence":"additional","affiliation":[{"name":"Yale University"}]},{"given":"Jakub","family":"Szefer","sequence":"additional","affiliation":[{"name":"Yale University"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Interactive proofs for quantum computations","author":"Aharonov","year":"2008"},{"key":"ref2","article-title":"Classic McEliece","volume-title":"Technical report, National Institute of Standards and Technology","author":"Albrecht","year":"2020"},{"key":"ref3","author":"Analog","journal-title":"Hmc649a documentation"},{"key":"ref4","article-title":"A guide to fully homomorphic encryption","author":"Armknecht","year":"2015","journal-title":"Cryptology ePrint Archive"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-021-00091-1"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1109\/FOCS.2009.36","article-title":"Universal blind quantum computation","volume-title":"2009 50th Annual IEEE Symposium on Foundations of Computer Science","author":"Broadbent","year":"2009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i3.71-113"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.26421\/qic5.6-4"},{"key":"ref9","article-title":"Intel sgx explained","author":"Costan","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref10","first-page":"L58","article-title":"The ibm q experience and qiskit open-source quantum computing software","volume-title":"APS March meeting abstracts","volume":"2018","author":"Cross","year":"2018"},{"issue":"20","key":"ref11","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.108.200502","article-title":"Blind quantum computing with weak coherent pulses","volume":"108","author":"Dunjko","year":"2012","journal-title":"Physical Review Letters"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-017-0025-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.96.012303"},{"issue":"1","key":"ref14","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.96.012303","article-title":"Unconditionally verifiable blind quantum computation","volume":"96","author":"Fitzsimons","year":"2017","journal-title":"Physical Review A"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/13801"},{"key":"ref16","article-title":"Ibms roadmap for scaling quantum technology","author":"Gambetta","year":"2020","journal-title":"IBM Research Blog"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/17\/8\/083040"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aa5cff"},{"issue":"23","key":"ref19","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.111.230501","article-title":"Efficient universal blind quantum computation","volume":"111","author":"Giovannetti","year":"2013","journal-title":"Physical Review Letters"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s42354-021-0330-z"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.119.050503"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3550488"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107190"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/18m1231055"},{"issue":"23","key":"ref26","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.111.230502","article-title":"Optimal blind quantum computation","volume":"111","author":"Mantri","year":"2013","journal-title":"Physical Review Letters"},{"key":"ref27","article-title":"Interactive proofs for bqp via self-tested graph states","author":"McKague","year":"2013","journal-title":"arXiv preprint"},{"issue":"23","key":"ref28","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.109.230502","article-title":"Continuous-variable blind quantum computation","volume":"109","author":"Morimae","year":"2012","journal-title":"Physical Review Letters"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.89.060302","volume-title":"Verification for measurement-only blind quantum computing","author":"Morimae","year":"2014"},{"key":"ref30","volume-title":"Ground state blind quantum computation on aklt state","author":"Morimae","year":"2011"},{"issue":"1","key":"ref31","doi-asserted-by":"crossref","DOI":"10.1038\/ncomms2043","article-title":"Blind topological measurement-based quantum computation","volume":"3","author":"Morimae","year":"2012","journal-title":"Nature Communications"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.050301"},{"issue":"5","key":"ref33","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.87.050301","article-title":"Blind quantum computation protocol in which alice only makes measurements","volume":"87","author":"Morimae","year":"2013","journal-title":"Physical Review A"},{"key":"ref34","volume-title":"Composable security of measuring-alice blind quantum computation","author":"Morimae","year":"2013"},{"key":"ref35","author":"Newark","journal-title":"f2258nlgk8 rf attenuator documentation"},{"key":"ref36","author":"Omole","year":"2020","journal-title":"Cirq: A python framework for creating, editing, and invoking quantum circuits"},{"key":"ref37","author":"Patel","year":"2023","journal-title":"Toward privacy in quantum program execution on untrusted quantum cloud computing machines for business-sensitive quantum needs"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9530-9_16"},{"key":"ref39","author":"Qorvo","journal-title":"Cmd272p3 dpdt transfer switch documentation"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1038\/nature12035"},{"issue":"11","key":"ref41","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Ronald","year":"1978","journal-title":"Foundations of secure computation"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.060301"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01760-5_10"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1038\/srep33467"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358265"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/lca.2023.3325852"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2023.3325852"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545385.pdf?arnumber=10545385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:12:22Z","timestamp":1717906342000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545385","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}