Continuous-variable quantum computing on encrypted data

Article, Preprint English OPEN
Marshall, Kevin; Jacobsen, Christian Scheffmann; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik Lund;

The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not ... View more
  • References (36)
    36 references, page 1 of 4

    IBM. What will we make of this moment? 2013 IBM Annual Report, 2–13 (2013).

    Naehrig M., Lauter K. & Vaikuntanathan V. in Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW'11 113–124 ACM (2011).

    Rivest R., Adleman L. & Dertouzos M. in Foundations of Secure Computation Vol. 4 (eds DeMillo, R., Dobkin, D., Jones, A. & Lipton, R.) 169–180 (Academic Press, New York, 1978).

    Gentry C. in Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC ‘09 169–178 ACM (2009).

    Brakerski Z. & Vaikuntanathan V. in Proceedings of the 2011 IEEE 52Nd Annual Symposium on Foundations of Computer Science, FOCS' 11 97–106 IEEE Computer Society (2011).

    Brakerski Z., Gentry C. & Vaikuntanathan V. in Proceedings of the 3rd Innovations in Theoretical Computer Science Conference 309–325 ACM (2012).

    Gentry C., Halevi S. & Smart N. P. Homomorphic evaluation of the AES circuit. Preprint available at (2015).

    Yu L., Pérez-Delgado C. A. & Fitzsimons J. F. Limitations on information-theoretically-secure quantum homomorphic encryption. Phys. Rev. A 90, 050303 (2014).

    Childs A. M.Secure assisted quantum computation. Quantum Info. Comput.5, 456–466 (2005).

  • Metrics
    No metrics available
Share - Bookmark