2022
DOI: 10.1007/s10623-021-00993-2
|View full text |Cite
|
Sign up to set email alerts
|

Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Unless quantum technology is integrated into blockchain technology, the components of classical blockchain are exposed to quantum attacks [5], resulting in security risks to the internal technologies and external performance of the blockchain. Currently, we have already seen the development of information-theoretically secure quantum protocols, such as quantum homomorphic encryption protocols [15,16], quantum image encryption [17,18], and quantum digital signature [19,20], while several attempts have been made to incorporate post-quantum cryptography [21,22]. These protocols bring benefits to the internal technologies and external performance of blockchain, achieving privacy, security, effectiveness, and profitability under quantum attacks.…”
Section: Related Books and Surveysmentioning
confidence: 99%
“…Unless quantum technology is integrated into blockchain technology, the components of classical blockchain are exposed to quantum attacks [5], resulting in security risks to the internal technologies and external performance of the blockchain. Currently, we have already seen the development of information-theoretically secure quantum protocols, such as quantum homomorphic encryption protocols [15,16], quantum image encryption [17,18], and quantum digital signature [19,20], while several attempts have been made to incorporate post-quantum cryptography [21,22]. These protocols bring benefits to the internal technologies and external performance of blockchain, achieving privacy, security, effectiveness, and profitability under quantum attacks.…”
Section: Related Books and Surveysmentioning
confidence: 99%
“…The privacy protection of quantum machine learning is an emergent field and there is a lot of research about it. Most of the existing literature protects privacy by means of quantum homomorphic encryption [15][16][17][18][19][20][21][22], quantum differential privacy [23,24] and quantum secure multi-party computing [25][26][27]. Each method achieves privacy protection in different ways and presents different levels of security and availability.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, Fisher et al [15] proposed a key update algorithm for quantum operations on ciphertext data, and Liang et al [16] proposed the concept of quantum complete homomorphic encryption. Since then, QHE has been widely used in quantum encryption computing [17][18][19][20]. In recent years, QHE has been gradually applied to quantum machine learning.…”
Section: Introductionmentioning
confidence: 99%