Randomly Choose an Angle from an Immense Number of Angles to Rotate Qubits, Compute and Reverse

02/12/2023
by   Dor Bitan, et al.
0

This paper studies information-theoretically secure quantum homomorphic encryption (QHE) schemes of classical data. Previous works on information-theoretically secure QHE schemes (like Childs'05, Liang'13, and others) are typically based on the Quantum-One-Time-Pad (QOTP) approach of Ambainis et al. [AMTdW'00]. There, the encryption of a bit is a qubit, randomly selected from a set of four possible qubits. This paper takes a different approach and presents the RBE (Random-Basis Encryption) scheme – a QHE scheme in which the encryption of a bit is a qubit, randomly selected from a set of an immense number of qubits. Second, this paper studies weak measurements (WM) and presents a WM-based attack on legacy QOTP-based Quantum Key Distribution (QKD) protocols. Then, we use the RBE scheme to construct a QKD protocol and argue that this protocol is resilient to such WM-based attacks. Finally, this paper raises the following question. Entanglement is an essential resource in quantum information and quantum computation research. Hence, once generated, how can its owner secure entangled systems of qubits? We inspect possible QOTP-based solutions, suggest an RBE-based solution, and discuss some of the benefits of the latter.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/02/2018

A quantum homomorphic encryption scheme for polynomial-sized circuits

Quantum homomorphic encryption (QHE) is an encryption method that allows...
research
10/02/2018

A rebit-based quantum homomorphic encryption scheme

Quantum homomorphic encryption (QHE) is an encryption method that allows...
research
07/21/2018

Quantum e-commerce: A comparative study of possible protocols for online shopping and other tasks related to e-commerce

A set of quantum protocols for online shopping is proposed and analyzed ...
research
09/13/2023

Functional Encryption in the Bounded Storage Models

Functional encryption is a powerful paradigm for public-key encryption w...
research
05/01/2018

Privacy preserving distributed optimization using homomorphic encryption

This paper studies how a system operator and a set of agents securely ex...
research
03/15/2023

Verifiable encodings in multigroup fully homomorphic encryption

This article presents the application of homomorphic authenticators, rep...
research
05/11/2022

Delay Encryption by Cubing

Delay Encryption (often called Timed-Release Encryption) is a scheme in ...

Please sign up or login with your details

Forgot password? Click here to reset