Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation

被引:0
|
作者
Jiang Liu
Qin Li
Junyu Quan
Can Wang
Jinjing Shi
Haozhen Situ
机构
[1] Xiangtan University,School of Cyberspace Security
[2] Central South University,School of Computer Science and Engineering
[3] South China Agricultural University,College of Mathematics and Informatics
来源
Designs, Codes and Cryptography | 2022年 / 90卷
关键词
Quantum homomorphic encryption; Quantum computation; Quantum cryptography; 81P68; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum homomorphic encryption (QHE) allows computation on encrypted data by employing the principles of quantum mechanics. Usually, only one evaluator is chosen to complete such computation and it is easy to get overburdened in network. In addition, users sometimes do not trust only one evalutor. Recently, Chen et al. proposed a very flexible QHE scheme based on the idea of (k, n)-threshold quantum state sharing where d evaluators can finish the required operations by cooperating together as long as k≤d≤n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ k \le d \le n$$\end{document}. But it can only calculate some of single-qubit unitary operations when k≥2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k\ge 2$$\end{document} and the quantum capability of each evaluator is a bit demanding. In this paper, we propose an improved flexible QHE scheme which extends the operations that can be computed in the QHE scheme proposed by Chen et al. to involve all single-qubit unitary operations even if k≥2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k \ge 2$$\end{document} and reduces the quantum capability of at least d-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$d-1$$\end{document} evaluators. We also give an example to show the feasibility of the improved scheme and simulate it on the IBM’s cloud quantum computing platform.
引用
收藏
页码:577 / 591
页数:14
相关论文
共 50 条
  • [31] Quantum Fully Homomorphic Encryption Scheme for Cloud Privacy Data Based on Quantum Circuit
    Zhu, Hongfeng
    Wang, Chaonan
    Wang, Xueying
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (08) : 2961 - 2975
  • [32] Experimental quantum homomorphic encryption
    Jonas Zeuner
    Ioannis Pitsios
    Si-Hui Tan
    Aditya N. Sharma
    Joseph F. Fitzsimons
    Roberto Osellame
    Philip Walther
    npj Quantum Information, 7
  • [33] Experimental quantum homomorphic encryption
    Zeuner, Jonas
    Pitsios, Ioannis
    Tan, Si-Hui
    Sharma, Aditya N.
    Fitzsimons, Joseph F.
    Osellame, Roberto
    Walther, Philip
    NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [34] A quantum approach to homomorphic encryption
    Si-Hui Tan
    Joshua A. Kettlewell
    Yingkai Ouyang
    Lin Chen
    Joseph F. Fitzsimons
    Scientific Reports, 6
  • [35] Simulation of a Homomorphic Encryption System
    Bozduman, Hanife Cagil
    Afacan, Erkan
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2020, 5 (01) : 479 - 484
  • [36] Speech Encryption Scheme Based on BFV Homomorphic Encryption
    Zhang, Qiuyu
    Ba, Yujiao
    Hu, Yingjie
    Zhao, Zhenyu
    Jia, Yugui
    International Journal of Network Security, 2022, 24 (05) : 855 - 866
  • [37] Circular Secure Homomorphic Encryption Scheme
    Zhao X.
    Fu Y.
    Song W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2117 - 2124
  • [38] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [39] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [40] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453