Abstract
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme.
12 More- Received 12 November 2018
- Revised 9 August 2019
- Accepted 19 November 2019
DOI:https://doi.org/10.1103/PhysRevX.10.011038
Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.
Published by the American Physical Society
Physics Subject Headings (PhySH)
Popular Summary
Fully homomorphic encryption (FHE) enables a variety of fascinating cryptographic applications. These include secure delegated computation (where a server can help perform computation on clients’ encrypted data without having to decrypt it first), zero-knowledge proofs (where one party can prove to another that one has the answer to a problem or function without having to divulge what that answer is), and two-party secure computation (where two parties, each possessing a different secret, can jointly compute an answer that depends on their secret, without either party having to divulge their secret to the other). Here, we present the first implementation of a quantum FHE scheme.
While the first FHE for classical computers was constructed a decade ago, a similar effort on the quantum computing front culminated in a theoretical proposal only recently. To date, all experimental implementations have either focused on particular use cases at the expense of the FHE’s versatility or compromised on security. Our work represents the first experimental implementation of a quantum scheme that is unencumbered by caveats that prevented previous schemes from being applicable to a wide range of cryptographic uses. We also demonstrate a two-party computation task to highlight the capabilities of our FHE scheme.
We hope this work will aid and encourage other researchers in exploring the wide gamut of potential cryptographic use cases enabled by quantum FHE and its real-world implementation.