Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homo...
Guardado en:
Autores principales: | , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
American Physical Society
2020
|
Materias: | |
Acceso en línea: | https://doaj.org/article/63f82ae6e9aa4e759a467414445aeea0 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:63f82ae6e9aa4e759a467414445aeea0 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:63f82ae6e9aa4e759a467414445aeea02021-12-02T12:09:32ZExperimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol10.1103/PhysRevX.10.0110382160-3308https://doaj.org/article/63f82ae6e9aa4e759a467414445aeea02020-02-01T00:00:00Zhttp://doi.org/10.1103/PhysRevX.10.011038http://doi.org/10.1103/PhysRevX.10.011038https://doaj.org/toc/2160-3308A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme.W. K. ThamHugo FerrettiKent Bonsma-FisherAharon BrodutchBarry C. SandersAephraim M. SteinbergStacey JefferyAmerican Physical SocietyarticlePhysicsQC1-999ENPhysical Review X, Vol 10, Iss 1, p 011038 (2020) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Physics QC1-999 |
spellingShingle |
Physics QC1-999 W. K. Tham Hugo Ferretti Kent Bonsma-Fisher Aharon Brodutch Barry C. Sanders Aephraim M. Steinberg Stacey Jeffery Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol |
description |
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme. |
format |
article |
author |
W. K. Tham Hugo Ferretti Kent Bonsma-Fisher Aharon Brodutch Barry C. Sanders Aephraim M. Steinberg Stacey Jeffery |
author_facet |
W. K. Tham Hugo Ferretti Kent Bonsma-Fisher Aharon Brodutch Barry C. Sanders Aephraim M. Steinberg Stacey Jeffery |
author_sort |
W. K. Tham |
title |
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol |
title_short |
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol |
title_full |
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol |
title_fullStr |
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol |
title_full_unstemmed |
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol |
title_sort |
experimental demonstration of quantum fully homomorphic encryption with application in a two-party secure protocol |
publisher |
American Physical Society |
publishDate |
2020 |
url |
https://doaj.org/article/63f82ae6e9aa4e759a467414445aeea0 |
work_keys_str_mv |
AT wktham experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol AT hugoferretti experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol AT kentbonsmafisher experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol AT aharonbrodutch experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol AT barrycsanders experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol AT aephraimmsteinberg experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol AT staceyjeffery experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol |
_version_ |
1718394632582201344 |