Secret-Extraction Attacks against Obfuscated Instantaneous Quantum Polynomial-Time Circuits
Quantum computing devices can now perform sampling tasks that, according to complexity-theoretic and numerical evidence, are beyond the reach of classical computers.This raises the question of how one can efficiently verify that a quantum computer operating in this regime works as intended.In 2008, Shepherd and Bremner proposed a protocol in which