Quantum Homomorphic Encryption

Slides:



Advertisements
Similar presentations
Department of Computer Science & Engineering University of Washington
Advertisements

Generating Random Stabilizer States in Matrix Multiplication Time: A Theorem in Search of an Application Scott Aaronson David Chen.
Quantum Computation and Quantum Information – Lecture 3
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
University of Queensland
Light and Matter Tim Freegarde School of Physics & Astronomy University of Southampton Quantum computation.
Randomness Extraction and Privacy Amplification with quantum eavesdroppers Thomas Vidick UC Berkeley Based on joint work with Christopher Portmann, Anindya.
GENERALIZED STABILIZERS Ted Yoder. Quantum/Classical Boundary How do we study the power of quantum computers compared to classical ones? Compelling problems.
ELE 523E COMPUTATIONAL NANOELECTRONICS W3: Quantum Computing, 22/9/2014 FALL 2014 Mustafa Altun Electronics & Communication Engineering Istanbul Technical.
How to Delegate Computations: The Power of No-Signaling Proofs Ron Rothblum Weizmann Institute Joint work with Yael Kalai and Ran Raz.
Midterm Exam for Quantum Computing Class Marek Perkowski.
Quantum Error Correction SOURCES: Michele Mosca Daniel Gottesman Richard Spillman Andrew Landahl.
1 EPR Pairs and Quantum Teleportation 2005/08/11.
1 Welcome to the presentation on Computational Capabilities with Quantum Computer By Anil Kumar Javali.
University of Queensland
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
CSEP 590tv: Quantum Computing
1 Recap (I) n -qubit quantum state: 2 n -dimensional unit vector Unitary op: 2 n  2 n linear operation U such that U † U = I (where U † denotes the conjugate.
Introduction to Quantum Logic 2002/10/08 Tuesday Jung-wook Kim.
Introduction to Quantum logic (2) Yong-woo Choi.
ROM-based computations: quantum versus classical B.C. Travaglione, M.A.Nielsen, H.M. Wiseman, and A. Ambainis.
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
Network Security Chapter
Binary Addition Addition Rules: = = = = = carry 1 1 carry 1 Example 1: Example 2:
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
Outline Main result Quantum computation and quantum circuits Feynman’s sum over paths Polynomials QuPol program “Quantum Polynomials” Quantum polynomials.
Quantum Computing Presented by: Don Davis PHYS
Short course on quantum computing Andris Ambainis University of Latvia.
Solving mutual exclusion by using entangled Qbits Mohammad Rastegari proff: Dr.Rahmani.
David Westenberger Lucas Zurek. What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?
1 hardware of quantum computer 1. quantum registers 2. quantum gates.
Quantum one-time programs Anne Broadbent Gus Gutoski Douglas Stebila extended abstract: Cryptology ePrint Archive, Report 2013/343 full version (old):
Introduction to Quantum Key Distribution
A brief introduction to Quantum computer
QUANTUM COMPUTING What is it ? Jean V. Bellissard Georgia Institute of Technology & Institut Universitaire de France.
Quantum Computing Reversibility & Quantum Computing.
Shor’s Factoring Algorithm
1/22 Quantum Algorithms Deutsch-Josza Algorithm: quantum computers are more powerful than classical ones. b f(b) b f(b) b f(b) 0 1 b f(b) 0.
Introduction to Quantum Computing
Generating Toffoli Networks from ESOP Expressions Yasaman Sanaee Winter 2009 University of New Brunswick.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 653 Lecture.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Capabilities and limitations of quantum computers Michele Mosca 1 November 1999 ECC ’99.
Basic Q.C. One moose, two moose Red moose, blue moose Live moose, dead moose.
Quantum Cryptography Christian Schaffner
Quantum Cost Calculation of Reversible Circuit Sajib Mitra MS/ Department of Computer Science and Engineering University of Dhaka
Second Price Auctions A Case Study of Secure Distributed Computing Bart De Decker Gregory Neven Frank Piessens Erik Van Hoeymissen.
KEYNOTE OF THE FUTURE 1: CIARA MOORE CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
1 An Introduction to Quantum Computing Sabeen Faridi Ph 70 October 23, 2007.
Attendance Syllabus Textbook (hardcopy or electronics) Groups s First-time meeting.
Quantum gates SALEEL AHAMMAD SALEEL. Introduction.
Homomorphic encryption of quantum data
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
Quantum Computing: The Future of Computing
Quantum Teleportation
Quantum Cryptography Christian Schaffner
By Nealesh Ragoodial - Security Capstone
بسم الله الرحمن الرحيم الموضوع:الوضوء صفته وفرائضه وسننه
Quantum Computing Dorca Lee.
Chap 4 Quantum Circuits: p
Introduction to Quantum logic (2)
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Quantum Ensemble Computing
Quantum Computing Prabhas Chongstitvatana Faculty of Engineering
Linear Optical Quantum Computing
COT 6200 Quantum Computing Fall 2010
COT 6200 Quantum Computing Fall 2010
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Quantum Search Beyond Grover
Presentation transcript:

Quantum Homomorphic Encryption Stacey Jeffery (including joint work with Anne Broadbent)

Homomorphic Encryption

Quantum Homomorphic Encryption

Outline

Quantum Information

Classical Information

Classical Information

Quantum Bits: “Qubits”

Classical vs. Quantum Circuits

Classical Circuits

Quantum Circuits

Quantum vs. Classical Circuits

Encrypting Quantum Information: The Quantum One-time Pad

The Pauli Group and Quantum One-Time Pad

The Pauli Group and Quantum One-Time Pad

The Pauli Group and Quantum One-Time Pad

Homomorphic Encryption

(Classical) Homomorphic Encryption

The Trivial Scheme

(Classical) Homomorphic Encryption

Quantum Homomorphic Encryption

Computational Security of QHE

Our Results

Prior Results

Summary of Results

Clifford Scheme

The Clifford Group

Scheme 1: QHE for Cliffords (CL)

Features of the Clifford Scheme

Summary of Results

Summary of Results

Summary of Results

Summary of Results

Adding Reversible Multiplication?

Reversible Multiplication: Toffoli Gate

Aside: No-Cloning/Uncertainty

Aside: No-Cloning/Uncertainty

Homomorphic Reversible Multiplication?

Homomorphic Reversible Multiplication?

Homomorphic Reversible Multiplication?

Summary

Further Reading