Limitations on transversal computation through quantum homomorphic encryption

被引:0
|
作者
Newman, Michael [1 ]
Shi, Yaoyun [2 ]
机构
[1] Department of Mathematics, University of Michigan, 530 Church Street, Ann Arbor,MI,48109, United States
[2] Alibaba Quantum Laboratory, Alibaba Group USA, 500 108th Ave NE, Bellevue,WA,98004, United States
来源
Quantum Information and Computation | 2018年 / 18卷 / 11-12期
基金
美国国家科学基金会;
关键词
Codes (symbols) - Quantum noise - Quantum cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Transversality is a simple and effective method for implementing quantum computation fault-tolerantly. However, no quantum error-correcting code (QECC) can transversally implement a quantum universal gate set (Eastin and Knill, Phys. Rev. Lett., 102, 110502). Since reversible classical computation is often a dominating part of useful quantum computation, whether or not it can be implemented transversally is an important open problem. We show that, other than a small set of non-additive codes that we cannot rule out, no binary QECC can transversally implement a classical reversible universal gate set. In particular, no such QECC can implement the Toffoli gate transversally. We prove our result by constructing an information theoretically secure (but inef-ficient) quantum homomorphic encryption (ITS-QHE) scheme inspired by Ouyang et al. (arXiv:1508.00938). Homomorphic encryption allows the implementation of certain functions directly on encrypted data, i.e. homomorphically. Our scheme builds on almost any QECC, and implements that code’s transversal gate set homomorphically. We observe a restriction imposed by Nayak’s bound (FOCS 1999) on ITS-QHE, implying that any ITS quantum fully homomorphic scheme (ITS-QFHE) implementing the full set of classical reversible functions must be highly inefficient. While our scheme incurs exponential overhead, any such QECC implementing Toffoli transversally would still violate this lower bound through our scheme. © Rinton Press.
引用
收藏
页码:927 / 948
相关论文
共 50 条
  • [21] Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
    Tang, Yongli
    Guo, Menghao
    Li, Binyong
    Geng, Kaixin
    Yu, Jinxia
    Qin, Baodong
    ENTROPY, 2025, 27 (01)
  • [22] On statistically-secure quantum homomorphic encryption
    Lai, Ching-Yi (cylai0616@gmail.com), 2018, Rinton Press Inc. (18): : 9 - 10
  • [23] ON STATISTICALLY-SECURE QUANTUM HOMOMORPHIC ENCRYPTION
    Lai, Ching-Yi
    Chung, Kai-Min
    QUANTUM INFORMATION & COMPUTATION, 2018, 18 (9-10) : 785 - 794
  • [24] A Secure Multiparty Quantum Homomorphic Encryption Scheme
    Zhang, Jing-Wen
    Chen, Xiu-Bo
    Xu, Gang
    Li, Heng-Ji
    Wang, Ya-Lan
    Miao, Li-Hua
    Yang, Yi-Xian
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 2835 - 2848
  • [25] Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
    Amorim, Ivone
    Costa, Ivan
    MATHEMATICS, 2023, 11 (13)
  • [26] Homomorphic encryption of linear optics quantum computation on almost arbitrary states of light with asymptotically perfect security
    Ouyang, Yingkai
    Tan, Si-Hui
    Fitzsimons, Joseph
    Rohde, Peter P.
    PHYSICAL REVIEW RESEARCH, 2020, 2 (01):
  • [27] Accelerating Stencil Computation with Fully Homomorphic Encryption Using GPU
    Zhou, Xianlong
    Li, Pei
    Chen, Jiageng
    Yao, Shixiong
    EURO-PAR 2024: PARALLEL PROCESSING, PT III, EURO-PAR 2024, 2024, 14803 : 212 - 224
  • [28] Quantum Search on Encrypted Data Based on Quantum Homomorphic Encryption
    Zhou, Qing
    Lu, Songfeng
    Cui, Yongquan
    Li, Li
    Sun, Jie
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [29] Quantum secure direct communication based on quantum homomorphic encryption
    Huang, Xi
    Zhang, Shibin
    Chang, Yan
    Yang, Fan
    Hou, Min
    Cheng, Wen
    MODERN PHYSICS LETTERS A, 2021, 36 (37)
  • [30] Secure Computation over Cloud using Fully Homomorphic Encryption
    Bilakanti, Anusha
    Anjana, N. B.
    Divya, A.
    Divya, K.
    Chakraborty, Nilotpal
    Patra, G. K.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 633 - 636