Quantum computing on encrypted data

被引:114
|
作者
Fisher, K. A. G. [1 ,2 ]
Broadbent, A. [1 ,3 ]
Shalm, L. K. [1 ,4 ]
Yan, Z. [1 ,5 ]
Lavoie, J. [1 ,2 ]
Prevedel, R. [1 ,6 ]
Jennewein, T. [1 ,2 ]
Resch, K. J. [1 ,2 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[2] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
[3] Univ Ottawa, Dept Math & Stat, Ottawa, ON K1N 6N5, Canada
[4] Natl Inst Stand & Technol, Boulder, CO 80305 USA
[5] Macquarie Univ, Dept Phys & Astron, MQ Photon Res Ctr, Ctr Ultrahigh Bandwidth Devices Opt Syst CUDOS, Sydney, NSW 2109, Australia
[6] Max F Perutz Labs GmbH, Res Inst Mol Pathol, A-1030 Vienna, Austria
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1038/ncomms4074
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Computing on encrypted data and its applicability to a coalition operations environment
    Bent, Graham
    Bergamaschi, Flavio
    Hunt, Hamish
    GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR VI, 2015, 9464
  • [32] A shareable keyword search over encrypted data in cloud computing
    Li Xu
    Chi-Yao Weng
    Lun-Pin Yuan
    Mu-En Wu
    Raylin Tso
    Hung-Min Sun
    The Journal of Supercomputing, 2018, 74 : 1001 - 1023
  • [33] An effective comparison protocol over encrypted data in cloud computing
    Jiang, Leqi
    Cao, Yi
    Yuan, Chengsheng
    Sun, Xingming
    Zhu, Xiaoli
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [34] Dynamic access control of encrypted data in cloud computing environment
    Xiang S.
    Zhu Z.
    International Journal of Performability Engineering, 2019, 15 (03) : 969 - 976
  • [35] Verifiable Search Over Updatable Encrypted Data in Cloud Computing
    Ocansey, Selasi Kwame
    Wang, Changda
    Ametepe, Wolali
    Xu, Qinbao
    Zeng, Yu
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (06) : 156 - 161
  • [36] Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
    Agrawal, Shashank
    Agrawal, Shweta
    Prabhakaran, Manoj
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 501 - 531
  • [37] Efficient Semantic Search over Encrypted Data in Cloud Computing
    Moh, Teng-Sheng
    Ho, Kam Ho
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 382 - 390
  • [38] Preferred Keyword Search over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2013 IEEE/ACM 21ST INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2013, : 207 - 212
  • [39] Computing Encrypted Cloud Data Efficiently under Multiple Keys
    Wang, Boyang
    Li, Ming
    Chow, Sherman S. M.
    Li, Hui
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 504 - 513
  • [40] Quantum computing for data science
    Sanders, Barry C.
    20TH INTERNATIONAL WORKSHOP ON ADVANCED COMPUTING AND ANALYSIS TECHNIQUES IN PHYSICS RESEARCH, 2023, 2438