2017
DOI: 10.1007/s10773-017-3275-0
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…In this case, one just needs to construct a homomorphic search circuit (or evaluation circuit) with homomorphic circuits for gates from G and adjust the key update algorithm accordingly. %randomly generate a 14-bit evaluation key, the 1st row is y1, the 2nd row is d1 38 evalKeyBits = randi([0,1], [2,7]); 39 disp('the random evaluation key:');disp(evalKeyBits); 40 encState = kron(kron(Z^encKeyBits(2,1) * X^encKeyBits(1,1),Z^encKeyBits(2,2) * ... X^encKeyBits(1,2)),Z^encKeyBits (2, curKeyBits(1,1) = xor(lastStepKeyBits(1,1),c); 133 curKeyBits(2,1) = mod(lastStepKeyBits(1,1) * (mod(c + evalKeyBits(1,7) + 1,2)) + ... lastStepKeyBits(2,1) + evalKeyBits(2,7) + evalKeyBits(1,7) , 2);…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, one just needs to construct a homomorphic search circuit (or evaluation circuit) with homomorphic circuits for gates from G and adjust the key update algorithm accordingly. %randomly generate a 14-bit evaluation key, the 1st row is y1, the 2nd row is d1 38 evalKeyBits = randi([0,1], [2,7]); 39 disp('the random evaluation key:');disp(evalKeyBits); 40 encState = kron(kron(Z^encKeyBits(2,1) * X^encKeyBits(1,1),Z^encKeyBits(2,2) * ... X^encKeyBits(1,2)),Z^encKeyBits (2, curKeyBits(1,1) = xor(lastStepKeyBits(1,1),c); 133 curKeyBits(2,1) = mod(lastStepKeyBits(1,1) * (mod(c + evalKeyBits(1,7) + 1,2)) + ... lastStepKeyBits(2,1) + evalKeyBits(2,7) + evalKeyBits(1,7) , 2);…”
Section: Resultsmentioning
confidence: 99%
“…= eye(2);%defined the related unitary transform = sym([1/2^(1/2),1/2^(1/2);1/2^(1/2),-1/2^(1/2)]); = sym([0,1;1,0]);Z = sym([1,0;0,-1]);S = sym([1,0;0,1i]); 4 S_adjoint = transpose(conj(S)); 5 CNOT = sym([1,0,0,0;0,1,0,0;0,0,0,1;0,0,1,0;]);6 %CNOT with 3 qubits involved,the 3rd qubit act as target,the 1st qubit act as control 7 CNOT_13 = sym(blkdiag(eye(4),X,X)); ,j -4) = sym(1); 17 end 18 %the 4th qubit act as control,the 1st qubit act as target 19 CNOT_41 = sym(zeros(16,16)); 20 for j = 1 : 2 : 15 21 CNOT_41(j,j) = sym(1); ([1/2;1/2;1/2;1/2]);%set the input state 30 oracleQubit = sym([1/sqrt(2);-1/sqrt(2)]); 31 plainState = kron(dataQubits,oracleQubit); 32 %randomly generate a 4-bit encryption key, the 1st row is x0,the 2nd is z0 33 encKeyBits_forDataQubits = randi([0,1],[2,2]); 34 %the encrytion key for oracle qubit is 0,0 or unencrypted 35 encKeyBits = [encKeyBits_forDataQubits,[0;0]]; 36 disp('the random encryption key:');disp(encKeyBits); 37…”
mentioning
confidence: 99%
“…Addition and multiplication can be performed on the re-encrypted ciphertext, and each user involved can decrypted the computed result using their own private key, which is corresponding to the public key used for the first level encryption. Quantum cryptography was introduced in the SHE scheme to obtain unconditional security and efficient query on ciphertext in [76], and the proposed scheme belongs to symmetric encryption. Multiuser training machine learning model on encrypted data is also studied in recent years.…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
“…Bösch et al distinguish SEs based on the number of allowable client access in [20] as follows: Most of the oriented SSEs are classified into S/S, which is a suitable architecture for outsourcing data. However, some of recent researches aim to expand SSE to be a multi-user model by employing a proxy server and homomorphic encryptions [21][22][23]. Further details about SSEs are described in Section 2.4.…”
Section: Related Searchable Techniquesmentioning
confidence: 99%