Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks

Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can perform ar...

Full description

Saved in:
Bibliographic Details
Main Authors: Yongli Tang, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu, Baodong Qin
Format: Article
Language:English
Published: MDPI AG 2024-12-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/27/1/7
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can perform are usually somewhat limited, which significantly reduces the flexibility of the scheme in quantum network environments. In this paper, we propose a novel <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>t</mi><mo>,</mo><mspace width="4.pt"></mspace><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula>-threshold QHE (TQHE) network scheme based on the Shamir secret sharing protocol, which allows <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>k</mi><mspace width="4.pt"></mspace><mo>(</mo><mi>t</mi><mo>≤</mo><mi>k</mi><mo>≤</mo><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula> evaluators to collaboratively perform evaluation computation operations on each qubit within the shared encrypted sequence. Moreover, each evaluator, while possessing the ability to perform all single-qubit unitary operations, is able to perform arbitrary single-qubit gate computation task assigned by the data owner. We give a specific (3, 5)-threshold example, illustrating the scheme’s correctness and feasibility, and simulate it on IBM quantum computing cloud platform. Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence.
ISSN:1099-4300