Zhen-Zhen Li, Zhao Zhang, Ya-Jing Li, Dong-Fei Wang, Han Zhang
{"title":"Multi-party quantum homomorphic encryption scheme based on quantum teleportation","authors":"Zhen-Zhen Li, Zhao Zhang, Ya-Jing Li, Dong-Fei Wang, Han Zhang","doi":"10.1016/j.jisa.2025.104157","DOIUrl":null,"url":null,"abstract":"<div><div>The quantum homomorphic encryption involves performing homomorphic operations directly on the quantum ciphertext state without the need to convert the ciphertext to plaintext before performing homomorphic operations. In this paper, we propose an n-party quantum homomorphic encryption scheme based on quantum teleportation, which can be used to achieve non-interactivity, eliminate errors caused by T-gate evaluation, and allow clients’ private data to undergo arbitrary quantum computations across multiple servers without the need for the server to decrypt the data. In this scheme, the client prepares and encrypts GHZ states and single-particle states. Subsequently, the client transmits the single-particle states and particles of the GHZ state to the server. The server performs joint measurements on the received particles, performs homomorphic operations on the single-particle states, and simultaneously updates the key. Finally, the result of the homomorphic operation is decrypted using the first particle in the GHZ state. This scheme is non-interactive, information-theoretically secure, and utilizes a one-time quantum channel. Furthermore, we apply the Quantum Homomorphic Encryption (QHE) scheme to quantum private comparison and successfully perform private comparison operations on the origin quantum.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104157"},"PeriodicalIF":3.8000,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001942","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The quantum homomorphic encryption involves performing homomorphic operations directly on the quantum ciphertext state without the need to convert the ciphertext to plaintext before performing homomorphic operations. In this paper, we propose an n-party quantum homomorphic encryption scheme based on quantum teleportation, which can be used to achieve non-interactivity, eliminate errors caused by T-gate evaluation, and allow clients’ private data to undergo arbitrary quantum computations across multiple servers without the need for the server to decrypt the data. In this scheme, the client prepares and encrypts GHZ states and single-particle states. Subsequently, the client transmits the single-particle states and particles of the GHZ state to the server. The server performs joint measurements on the received particles, performs homomorphic operations on the single-particle states, and simultaneously updates the key. Finally, the result of the homomorphic operation is decrypted using the first particle in the GHZ state. This scheme is non-interactive, information-theoretically secure, and utilizes a one-time quantum channel. Furthermore, we apply the Quantum Homomorphic Encryption (QHE) scheme to quantum private comparison and successfully perform private comparison operations on the origin quantum.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.