Quantum Searchable Encryption for Cloud Data Based on Full-Blind Quantum
Computation
- URL: http://arxiv.org/abs/2309.13685v1
- Date: Sun, 24 Sep 2023 16:17:53 GMT
- Title: Quantum Searchable Encryption for Cloud Data Based on Full-Blind Quantum
Computation
- Authors: Wenjie Liu, Yinsong Xu, Wen Liu, Haibin Wang, and Zhibin Lei
- Abstract summary: Searchable encryption (SE) is a positive way to protect users sensitive data in cloud computing setting.
In this paper, a multi-client universal circuit-based full-blind quantum computation (FBQC) model is proposed.
- Score: 5.218765255236295
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Searchable encryption (SE) is a positive way to protect users sensitive data
in cloud computing setting, while preserving search ability on the server side,
i.e., it allows the server to search encrypted data without leaking information
about the plaintext data. In this paper, a multi-client universal circuit-based
full-blind quantum computation (FBQC) model is proposed. In order to meet the
requirements of multi-client accessing or computing encrypted cloud data, all
clients with limited quantum ability outsource the key generation to a trusted
key center and upload their encrypted data to the data center. Considering the
feasibility of physical implementation, all quantum gates in the circuit are
replaced with the combination of {\pi}/8 rotation operator set {Rz({\pi}/4),
Ry({\pi}/4), CRz({\pi}/4), CRy({\pi}/4), CCRz({\pi}/4), CCRy({\pi}/4)}. In
addition, the data center is only allowed to perform one {\pi}/8 rotation
operator each time, but does not know the structure of the circuit (i.e.,
quantum computation), so it can guarantee the blindness of computation. Then,
through combining this multi-client FBQC model and Grover searching algorithm,
we continue to propose a quantum searchable encryption scheme for cloud data.
It solves the problem of multi-client access mode under searchable encryption
in the cloud environment, and has the ability to resist against some quantum
attacks. To better demonstrate our scheme, an example of our scheme to search
on encrypted 2-qubit state is given in detail. Furthermore, the security of our
scheme is analysed from two aspects: external attacks and internal attacks, and
the result indicates that it can resist against such kinds of attacks and also
guarantee the blindness of data and computation.
Related papers
- PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud [7.87660609586004]
Cloud computing poses a high risk of data leakage in quantum machine learning (QML)
We propose a co-design framework for preserving the data security of QML with the Q paradigm, namely PristiQ.
arXiv Detail & Related papers (2024-04-20T22:03:32Z) - Enc2DB: A Hybrid and Adaptive Encrypted Query Processing Framework [47.11111145443189]
We introduce Enc2DB, a novel secure database system following a hybrid strategy on and openGauss.
We present a micro-benchmarking test and self-adaptive mode switch strategy that can choose the best execution path (cryptography or TEE) to answer a given query.
We also design and implement a ciphertext index compatible with native cost model and querys to accelerate query processing.
arXiv Detail & Related papers (2024-04-10T08:11:12Z) - Ciphertext-Only Attack on a Secure $k$-NN Computation on Cloud [0.0]
encryption can prevent unauthorized access, data breaches, and the resultant financial loss, reputation damage, and legal issues.
Sanyashi et al. proposed an encryption scheme to facilitate privacy-preserving $k$-NN computation on the cloud.
We give an efficient algorithm and empirically demonstrate that their encryption scheme is vulnerable to the ciphertext-only attack (COA)
arXiv Detail & Related papers (2024-03-14T03:53:01Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Delegated variational quantum algorithms based on quantum homomorphic
encryption [69.50567607858659]
Variational quantum algorithms (VQAs) are one of the most promising candidates for achieving quantum advantages on quantum devices.
The private data of clients may be leaked to quantum servers in such a quantum cloud model.
A novel quantum homomorphic encryption (QHE) scheme is constructed for quantum servers to calculate encrypted data.
arXiv Detail & Related papers (2023-01-25T07:00:13Z) - Privacy and correctness trade-offs for information-theoretically secure
quantum homomorphic encryption [19.014535120129345]
Quantum homomorphic encryption allows computation by a server directly on encrypted data.
For such constructions to be possible, quantum homomorphic encryption must satisfy two privacy properties.
Our work unravels fundamental trade-offs between circuit privacy, data privacy and correctness for a broad family of quantum homomorphic encryption protocols.
arXiv Detail & Related papers (2022-05-24T15:02:34Z) - NeuraCrypt: Hiding Private Health Data via Random Neural Networks for
Public Training [64.54200987493573]
We propose NeuraCrypt, a private encoding scheme based on random deep neural networks.
NeuraCrypt encodes raw patient data using a randomly constructed neural network known only to the data-owner.
We show that NeuraCrypt achieves competitive accuracy to non-private baselines on a variety of x-ray tasks.
arXiv Detail & Related papers (2021-06-04T13:42:21Z) - Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted
Data [4.825895794318393]
Proposed quantum principal component extraction algorithm (QPCE)
A quantum homomorphic ciphertext dimension reduction scheme (QHEDR)
A quantum ciphertext dimensionality reduction scheme implemented in the quantum cloud.
arXiv Detail & Related papers (2020-11-19T07:16:22Z) - Quantum k-means algorithm based on Trusted server in Quantum Cloud
Computing [4.825895794318393]
In the quantum k-means algorithm, the core subroutine is the Quantum minimization algorithm (GroverOptim)
We use quantum homomorphic encryption scheme (QHE) to encrypt the data and upload it to the cloud for computing.
This paper also proposes a T-gate update scheme based on trusted server in quantum ciphertext environment.
arXiv Detail & Related papers (2020-11-09T13:06:27Z) - Faster Secure Data Mining via Distributed Homomorphic Encryption [108.77460689459247]
Homomorphic Encryption (HE) is receiving more and more attention recently for its capability to do computations over the encrypted field.
We propose a novel general distributed HE-based data mining framework towards one step of solving the scaling problem.
We verify the efficiency and effectiveness of our new framework by testing over various data mining algorithms and benchmark data-sets.
arXiv Detail & Related papers (2020-06-17T18:14:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.