Skip to main content
Log in

Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Existing classical ciphertext retrieval schemes are mainly developed according to the homomorphic encryption that is a cryptographic technique based on computational complexity theory of mathematical puzzles. In quantum computing, on the one hand, most of traditional asymmetric encryption can be quickly cracked as the computational capacity of quantum computer is much higher than that of traditional digital computer. Hence, the quantum homomorphic encryption scheme is widely used in data encryption for the issue of privacy protection in quantum computing. But on the other the retrieval efficiency of homomorphic encrypted data is insufficient especially in quantum cloud computing. Therefore, this paper proposes a novel quantum homomorphic encryption ciphertext retrieval (QHECR) scheme basing on the Grover algorithm to solve the problem of homomorphic encrypted ciphertext data retrieval in quantum cloud computing. Our scheme is to improve such retrieval efficiency mentioned above where the interaction process is not required even if the T-gate exists in the circuit. In the experiment, two qubits without the T-gate are conducted on both simulations and real quantum devices by using IBM quantum information science kit (Qiskit). The results show that the proposed QHECR scheme is capable of achieving the retrieval encrypted data when the T-gate does not exist in the evaluation circuit in ciphertext environment. Moreover, a verification experiment about the T-gate key update algorithm is implemented to verify the feasibility and reliability of the proposed scheme in the Qiskit as well, which indicates that the QHECR is still available when the T-gate exists in the circuit. Since the decryption is inefficient when there are exponential T-gates in the circuit, our proposed scheme is suitable for low T-gate complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Gong, C., Xiao, Y., Li, M., Han, S., Lin, N., Guo, Z.: Ciphertext retrieval technology of homomorphic encryption based on cloud pretreatment. In: International Conference on Neural Information Processing, pp. 741–751. Springer, Cham (2017)

  2. Dijk, M.V., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Advances in Cryptology-EURORYPT 2010. Springer, Berlin, pp. 24–43 (2010)

  3. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)

  4. Gong, C., Li, M., Zhao, L., Guo, Z., Han, G.: Homomorphic evaluation of the integer arithmetic operations for mobile edge computing. In: Wireless Communications and Mobile Computing, pp. 1–13 (2018)

  5. Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: 52nd Annual Symposium on Foundation of Computer Science. IEEE (2011)

  6. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of Annual Symposium on the Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, pp. 124–134 (1994)

  7. Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. Found. Secure Comput. 4, 169–179 (1978)

    MathSciNet  Google Scholar 

  8. Rohde, P.P., Fitzsimons, J.F., Alexei, G.: Quantum walks with encrypted data. Phys. Rev. Lett. 109, 150501 (2012)

    Article  ADS  Google Scholar 

  9. Min, L.: Symmetric quantum fully homomorphic encryption with perfect security. Quantum Inf. Process. 12, 3675–3687 (2013)

    Article  MathSciNet  Google Scholar 

  10. Wang, Y., She, K., Luo, Q., Fan, Y., Chao, Z.: Symmetric weak ternary quantum homomorphic encryption schemes. Mod. Phys. Lett. B 30, 1650076 (2016)

    Article  ADS  MathSciNet  Google Scholar 

  11. Tan, S.H., Kettlewell, J.A., Ouyang, Y., Chen, L., Fitzsimons, J.F.: A quantum approach to fully homomorphic encryption. Sci. Rep. 6, 1–8 (2014)

    Google Scholar 

  12. Fisher, K.A.G., Broadbent, A., Shalm, L.K., Yan, Z., Lavoie, J., Prevedel, R., Jennewein, T., Resch, K.J.: Quantum computing on encrypted data. Nat. Commun. 5, 3074 (2014)

    Article  ADS  Google Scholar 

  13. Min, L.: Quantum fully homomorphic encryption scheme based on universal quantum circuit. Quantum Inf. Process. 14, 1–11 (2015)

    Article  MathSciNet  Google Scholar 

  14. Liang, M., Yang, L: Quantum fully homomorphic encryption scheme based on quantum fault-tolerant construction. arXiv: 1503.04061v1

  15. Li, Y., PerezDelgado, C.A., Fitzsimons, J.F.: Limitations on information theoretically secure quantum homomorphic encryption. Phys. Rev. A 90, 050303 (2014)

    Article  Google Scholar 

  16. Lai, C.-Y., Chung, K.-M.: On statistically-secure quantum homomorphic encryption. Quantum Inf. Comput. 18, 785–794 (2018)

    MathSciNet  Google Scholar 

  17. Alagic, G., Dulek, Y., Schaffner, C., Speelman, F.: Quantum fully homomorphic encryption with verification. In: ASIACRYPT 2017, Part I, LNCS, vol. 10624, pp. 438–467 (2017)

  18. Zeuner, J., Pitsios, I., Tan, S.-H., Sharma, A.N., Fitzsimons, J.F., Osellame, R., Walther, P.: Experimental quantum homomorphic encryption. arXiv: 1803.10246v2

  19. Broadbent, A., Jeffery, S.: Quantum homomorphic encryption for circuits of low T-gate complexity. Proc. Adv. Cryptol. 2015, 609–629 (2015)

    MathSciNet  MATH  Google Scholar 

  20. Broadbent, A.: Delegating private quantum computations. Can. J. Phys. 93, 410–413 (2015)

    Article  Google Scholar 

  21. Lin, L., Xiao, M., Song, X.: Authenticated semiquantum dialogue with secure delegated quantum computation over a collective noise channel. Quantum Inf. Process. 17, 12 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  22. Sun, X., Wang, T., Sun, Z., Ping, W., Yu, J., Xie, W.: An efficient quantum somewhat homomorphic symmetric searchable encryption. Int. J. Theor. Phys. 56, 1–11 (2017)

    Article  MathSciNet  Google Scholar 

  23. Zhou, Q., Lu, S.: Quantum search on encrypted data based on quantum homomorphic encryption. arXiv: 1711.10066v2

  24. Liang, M.: Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security. arXiv: 1812.07107v1

  25. Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79, 325 (1997)

    Article  ADS  Google Scholar 

  26. Aleksandrowicz, G., Alexander, T., Barkoutsos, P., Bello, L, et al.: Qiskit: an open-source framework for quantum computing (2019). https://doi.org/10.5281/zenodo.2562110

  27. Gottesman, D., Chuang, I.L.: Quantum teleportation is a universal computational primitive. Nature 402, 390–393 (1999)

    Article  ADS  Google Scholar 

  28. Jozsa, R.: An introduction to measurement based quantum computation. Quantum Inf. Process. 199, 137–158 (2005)

    Google Scholar 

  29. Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)

    Article  ADS  Google Scholar 

  30. Wu, J., Zou, L., Zhao, L., Al-Dubai, A., Mackenzie, L., Min, G.: A multi-UAV clustering strategy for reducing insecure communication range. Comput. Netw. 158, 132–142 (2019)

    Article  Google Scholar 

  31. Haque, M.S., Chowdhury, M.U.: A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV). In: International Conference on Security and Privacy in Communication Systems. Springer, Cham (2017)

Download references

Acknowledgements

This work is funded by the Scientific Research Foundation for Advanced Talents from Shenyang Aerospace University - 18YB06.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han Qi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gong, C., Du, J., Dong, Z. et al. Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing. Quantum Inf Process 19, 105 (2020). https://doi.org/10.1007/s11128-020-2603-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-020-2603-0

Keywords

Navigation