Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homo...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: W. K. Tham, Hugo Ferretti, Kent Bonsma-Fisher, Aharon Brodutch, Barry C. Sanders, Aephraim M. Steinberg, Stacey Jeffery
Formato: article
Lenguaje:EN
Publicado: American Physical Society 2020
Materias:
Acceso en línea:https://doaj.org/article/63f82ae6e9aa4e759a467414445aeea0
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:63f82ae6e9aa4e759a467414445aeea0
record_format dspace
spelling oai:doaj.org-article:63f82ae6e9aa4e759a467414445aeea02021-12-02T12:09:32ZExperimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol10.1103/PhysRevX.10.0110382160-3308https://doaj.org/article/63f82ae6e9aa4e759a467414445aeea02020-02-01T00:00:00Zhttp://doi.org/10.1103/PhysRevX.10.011038http://doi.org/10.1103/PhysRevX.10.011038https://doaj.org/toc/2160-3308A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme.W. K. ThamHugo FerrettiKent Bonsma-FisherAharon BrodutchBarry C. SandersAephraim M. SteinbergStacey JefferyAmerican Physical SocietyarticlePhysicsQC1-999ENPhysical Review X, Vol 10, Iss 1, p 011038 (2020)
institution DOAJ
collection DOAJ
language EN
topic Physics
QC1-999
spellingShingle Physics
QC1-999
W. K. Tham
Hugo Ferretti
Kent Bonsma-Fisher
Aharon Brodutch
Barry C. Sanders
Aephraim M. Steinberg
Stacey Jeffery
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol
description A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme.
format article
author W. K. Tham
Hugo Ferretti
Kent Bonsma-Fisher
Aharon Brodutch
Barry C. Sanders
Aephraim M. Steinberg
Stacey Jeffery
author_facet W. K. Tham
Hugo Ferretti
Kent Bonsma-Fisher
Aharon Brodutch
Barry C. Sanders
Aephraim M. Steinberg
Stacey Jeffery
author_sort W. K. Tham
title Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol
title_short Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol
title_full Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol
title_fullStr Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol
title_full_unstemmed Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol
title_sort experimental demonstration of quantum fully homomorphic encryption with application in a two-party secure protocol
publisher American Physical Society
publishDate 2020
url https://doaj.org/article/63f82ae6e9aa4e759a467414445aeea0
work_keys_str_mv AT wktham experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol
AT hugoferretti experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol
AT kentbonsmafisher experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol
AT aharonbrodutch experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol
AT barrycsanders experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol
AT aephraimmsteinberg experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol
AT staceyjeffery experimentaldemonstrationofquantumfullyhomomorphicencryptionwithapplicationinatwopartysecureprotocol
_version_ 1718394632582201344