2015
DOI: 10.1007/978-3-662-48000-7_30
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity

Abstract: Fully homomorphic encryption is an encryption method with the property that any computation on the plaintext can be performed by a party having access to the ciphertext only. Here, we formally define and give schemes for quantum homomorphic encryption, which is the encryption of quantum information such that quantum computations can be performed given the ciphertext only. Our schemes allow for arbitrary Clifford group gates, but become inefficient for circuits with large complexity, measured in terms of the no… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
169
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 104 publications
(169 citation statements)
references
References 44 publications
0
169
0
Order By: Relevance
“…Following the definition in Ref. [33], Ref. [16] defines IND, IND-CPA and IND-CCA with an incremental way instead of interactive game.…”
Section: Quantum Block Encryptionmentioning
confidence: 99%
“…Following the definition in Ref. [33], Ref. [16] defines IND, IND-CPA and IND-CCA with an incremental way instead of interactive game.…”
Section: Quantum Block Encryptionmentioning
confidence: 99%
“…This includes topics such as the encryption of quantum messages in the information-theoretic [9,41,134,153], entropic [95,96] and computational [52] settings, quantum secret sharing [77], multi-party quantum computation [22], authentication of quantum messages [15], two-party secure function evaluation [98,99], quantum anonymous transmission [49,74], quantum one-time programs [54] and quantum homomorphic encryption [52,239].…”
Section: Further Topicsmentioning
confidence: 99%
“…Later, the researchers study QHE schemes with certain loosen condition. For example, the interactivity is allowed in the schemes [9,14], the expected security level is computational security [15,16], the client accommodates the server with enough copies of encrypted ancillary states [17,18]. The scheme in Ref.…”
Section: Introductionmentioning
confidence: 99%