Abstract
Existing classical ciphertext retrieval schemes are mainly developed according to the homomorphic encryption that is a cryptographic technique based on computational complexity theory of mathematical puzzles. In quantum computing, on the one hand, most of traditional asymmetric encryption can be quickly cracked as the computational capacity of quantum computer is much higher than that of traditional digital computer. Hence, the quantum homomorphic encryption scheme is widely used in data encryption for the issue of privacy protection in quantum computing. But on the other the retrieval efficiency of homomorphic encrypted data is insufficient especially in quantum cloud computing. Therefore, this paper proposes a novel quantum homomorphic encryption ciphertext retrieval (QHECR) scheme basing on the Grover algorithm to solve the problem of homomorphic encrypted ciphertext data retrieval in quantum cloud computing. Our scheme is to improve such retrieval efficiency mentioned above where the interaction process is not required even if the T-gate exists in the circuit. In the experiment, two qubits without the T-gate are conducted on both simulations and real quantum devices by using IBM quantum information science kit (Qiskit). The results show that the proposed QHECR scheme is capable of achieving the retrieval encrypted data when the T-gate does not exist in the evaluation circuit in ciphertext environment. Moreover, a verification experiment about the T-gate key update algorithm is implemented to verify the feasibility and reliability of the proposed scheme in the Qiskit as well, which indicates that the QHECR is still available when the T-gate exists in the circuit. Since the decryption is inefficient when there are exponential T-gates in the circuit, our proposed scheme is suitable for low T-gate complexity.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Gong, C., Xiao, Y., Li, M., Han, S., Lin, N., Guo, Z.: Ciphertext retrieval technology of homomorphic encryption based on cloud pretreatment. In: International Conference on Neural Information Processing, pp. 741–751. Springer, Cham (2017)
Dijk, M.V., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Advances in Cryptology-EURORYPT 2010. Springer, Berlin, pp. 24–43 (2010)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)
Gong, C., Li, M., Zhao, L., Guo, Z., Han, G.: Homomorphic evaluation of the integer arithmetic operations for mobile edge computing. In: Wireless Communications and Mobile Computing, pp. 1–13 (2018)
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: 52nd Annual Symposium on Foundation of Computer Science. IEEE (2011)
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of Annual Symposium on the Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, pp. 124–134 (1994)
Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. Found. Secure Comput. 4, 169–179 (1978)
Rohde, P.P., Fitzsimons, J.F., Alexei, G.: Quantum walks with encrypted data. Phys. Rev. Lett. 109, 150501 (2012)
Min, L.: Symmetric quantum fully homomorphic encryption with perfect security. Quantum Inf. Process. 12, 3675–3687 (2013)
Wang, Y., She, K., Luo, Q., Fan, Y., Chao, Z.: Symmetric weak ternary quantum homomorphic encryption schemes. Mod. Phys. Lett. B 30, 1650076 (2016)
Tan, S.H., Kettlewell, J.A., Ouyang, Y., Chen, L., Fitzsimons, J.F.: A quantum approach to fully homomorphic encryption. Sci. Rep. 6, 1–8 (2014)
Fisher, K.A.G., Broadbent, A., Shalm, L.K., Yan, Z., Lavoie, J., Prevedel, R., Jennewein, T., Resch, K.J.: Quantum computing on encrypted data. Nat. Commun. 5, 3074 (2014)
Min, L.: Quantum fully homomorphic encryption scheme based on universal quantum circuit. Quantum Inf. Process. 14, 1–11 (2015)
Liang, M., Yang, L: Quantum fully homomorphic encryption scheme based on quantum fault-tolerant construction. arXiv: 1503.04061v1
Li, Y., PerezDelgado, C.A., Fitzsimons, J.F.: Limitations on information theoretically secure quantum homomorphic encryption. Phys. Rev. A 90, 050303 (2014)
Lai, C.-Y., Chung, K.-M.: On statistically-secure quantum homomorphic encryption. Quantum Inf. Comput. 18, 785–794 (2018)
Alagic, G., Dulek, Y., Schaffner, C., Speelman, F.: Quantum fully homomorphic encryption with verification. In: ASIACRYPT 2017, Part I, LNCS, vol. 10624, pp. 438–467 (2017)
Zeuner, J., Pitsios, I., Tan, S.-H., Sharma, A.N., Fitzsimons, J.F., Osellame, R., Walther, P.: Experimental quantum homomorphic encryption. arXiv: 1803.10246v2
Broadbent, A., Jeffery, S.: Quantum homomorphic encryption for circuits of low T-gate complexity. Proc. Adv. Cryptol. 2015, 609–629 (2015)
Broadbent, A.: Delegating private quantum computations. Can. J. Phys. 93, 410–413 (2015)
Lin, L., Xiao, M., Song, X.: Authenticated semiquantum dialogue with secure delegated quantum computation over a collective noise channel. Quantum Inf. Process. 17, 12 (2018)
Sun, X., Wang, T., Sun, Z., Ping, W., Yu, J., Xie, W.: An efficient quantum somewhat homomorphic symmetric searchable encryption. Int. J. Theor. Phys. 56, 1–11 (2017)
Zhou, Q., Lu, S.: Quantum search on encrypted data based on quantum homomorphic encryption. arXiv: 1711.10066v2
Liang, M.: Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security. arXiv: 1812.07107v1
Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79, 325 (1997)
Aleksandrowicz, G., Alexander, T., Barkoutsos, P., Bello, L, et al.: Qiskit: an open-source framework for quantum computing (2019). https://doi.org/10.5281/zenodo.2562110
Gottesman, D., Chuang, I.L.: Quantum teleportation is a universal computational primitive. Nature 402, 390–393 (1999)
Jozsa, R.: An introduction to measurement based quantum computation. Quantum Inf. Process. 199, 137–158 (2005)
Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)
Wu, J., Zou, L., Zhao, L., Al-Dubai, A., Mackenzie, L., Min, G.: A multi-UAV clustering strategy for reducing insecure communication range. Comput. Netw. 158, 132–142 (2019)
Haque, M.S., Chowdhury, M.U.: A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV). In: International Conference on Security and Privacy in Communication Systems. Springer, Cham (2017)
Acknowledgements
This work is funded by the Scientific Research Foundation for Advanced Talents from Shenyang Aerospace University - 18YB06.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gong, C., Du, J., Dong, Z. et al. Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing. Quantum Inf Process 19, 105 (2020). https://doi.org/10.1007/s11128-020-2603-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-020-2603-0