Quantum computing on encrypted data

被引:114
|
作者
Fisher, K. A. G. [1 ,2 ]
Broadbent, A. [1 ,3 ]
Shalm, L. K. [1 ,4 ]
Yan, Z. [1 ,5 ]
Lavoie, J. [1 ,2 ]
Prevedel, R. [1 ,6 ]
Jennewein, T. [1 ,2 ]
Resch, K. J. [1 ,2 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[2] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
[3] Univ Ottawa, Dept Math & Stat, Ottawa, ON K1N 6N5, Canada
[4] Natl Inst Stand & Technol, Boulder, CO 80305 USA
[5] Macquarie Univ, Dept Phys & Astron, MQ Photon Res Ctr, Ctr Ultrahigh Bandwidth Devices Opt Syst CUDOS, Sydney, NSW 2109, Australia
[6] Max F Perutz Labs GmbH, Res Inst Mol Pathol, A-1030 Vienna, Austria
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1038/ncomms4074
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data
    Sardar, Laltu
    Bansal, Gaurav
    Ruj, Sushmita
    Sakurai, Kouichi
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 465 - 473
  • [42] New construction of secure range query on encrypted data in cloud computing
    Wang, Shao-Hui
    Han, Zhi-Jie
    Chen, Dan-Wei
    Wang, Ru-Chuan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (02):
  • [43] Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Shekokar, Narendra
    Sampat, Kunjita
    Chandawalla, Chandni
    Shah, Jahnavi
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 499 - 505
  • [44] Verifiable Ranked Search Over Dynamic Encrypted Data in Cloud Computing
    Liu, Qin
    Nie, Xiaohong
    Liu, Xuhui
    Peng, Tao
    Wu, Jie
    2017 IEEE/ACM 25TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2017,
  • [45] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [46] A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys
    Wang, Boyang
    Li, Ming
    Chow, Sherman S. M.
    Li, Hui
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 337 - 345
  • [47] Privacy-preserving multikey computing framework for encrypted data in the cloud
    Zhang, Jun
    Jiang, Zoe L.
    Li, Ping
    Yiu, Siu Ming
    INFORMATION SCIENCES, 2021, 575 : 217 - 230
  • [48] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [49] Investigating the Application of One Instruction Set Computing for Encrypted Data Computation
    Tsoutsos, Nektarios Georgios
    Maniatakos, Michail
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 21 - 37
  • [50] SECURE ENCRYPTED TRANSMISSION OF NETWORK DATA IN CLOUD COMPUTING TECHNOLOGY ENVIRONMENT
    MIAO Z.
    ZHAO C.
    Scalable Computing, 2024, 25 (04): : 2671 - 2678