Continuous-variable quantum computing on encrypted data

Article, Preprint English OPEN
Marshall, Kevin ; Jacobsen, Christian Scheffmann ; Schäfermeier, Clemens ; Gehring, Tobias ; Weedbrook, Christian ; Andersen, Ulrik Lund (2016)

The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks.
  • References (36)
    36 references, page 1 of 4

    IBM. What will we make of this moment? 2013 IBM Annual Report, 2–13 (2013).

    Naehrig M., Lauter K. & Vaikuntanathan V. in Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW'11 113–124 ACM (2011).

    Rivest R., Adleman L. & Dertouzos M. in Foundations of Secure Computation Vol. 4 (eds DeMillo, R., Dobkin, D., Jones, A. & Lipton, R.) 169–180 (Academic Press, New York, 1978).

    Gentry C. in Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC ‘09 169–178 ACM (2009).

    Brakerski Z. & Vaikuntanathan V. in Proceedings of the 2011 IEEE 52Nd Annual Symposium on Foundations of Computer Science, FOCS' 11 97–106 IEEE Computer Society (2011).

    Brakerski Z., Gentry C. & Vaikuntanathan V. in Proceedings of the 3rd Innovations in Theoretical Computer Science Conference 309–325 ACM (2012).

    Gentry C., Halevi S. & Smart N. P. Homomorphic evaluation of the AES circuit. Preprint available at https://eprint.iacr.org (2015).

    Yu L., Pérez-Delgado C. A. & Fitzsimons J. F. Limitations on information-theoretically-secure quantum homomorphic encryption. Phys. Rev. A 90, 050303 (2014).

    Childs A. M.Secure assisted quantum computation. Quantum Info. Comput.5, 456–466 (2005).

  • Metrics
    No metrics available
Share - Bookmark