Editing Classical Fully Homomorphic Encryption for Quantum Circuits

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 30: Line 30:
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.
== Notation ==
== Notation ==
*<math>m</math>: classical data of client's required quantum input states
*<math>m</math>: Message
*<math>\lambda</math>: security parameter
*<math>\lambda</math>: security parameter
* <math>k</math>: security parameter
* <math>k</math>: security parameter
* <math>\tilde{x}</math>: encrypted pad key
* <math>\tilde{x}</math>: encrypted pad key
*<math>s</math>: concatenated pad key elements
*<math>c=HE.Enc_{pk}(s)</math> Encryption of s using public key <math>pk</math> via classical HE encryption step.
*<math>\hat{c}</math>: converted c using classical HE in order to use it with <math>AltHE</math>
* <math>\tilde{x}^{[l]}</math>: <math>l^{th}</math> bit of encrypted pad key
* <math>\tilde{x}^{[l]}</math>: <math>l^{th}</math> bit of encrypted pad key
* <math>L_c</math>: depth of a layer of circuit where each layer contains Clifford gates and Toffoli gates
* <math>L_c</math>: depth of a layer of circuit where each layer contains Clifford gates and Toffoli gates
Line 57: Line 54:
*The functions <math>f_0, f_1</math> used must be trapdoor claw-free(TCF) such that one it is not possible to find a triple <math>(\mu_0,\mu_1,y)</math> such that <math>f_0(\mu_0)=f_1(\mu_1)=y</math>
*The functions <math>f_0, f_1</math> used must be trapdoor claw-free(TCF) such that one it is not possible to find a triple <math>(\mu_0,\mu_1,y)</math> such that <math>f_0(\mu_0)=f_1(\mu_1)=y</math>


==Knowledge Graph==
== Pseudocode==  
 
{{graph}}
 
==Protocol Description==  
*Boxed texts are not part of the code but contain proofs used in various steps, illustrated for a better understanding of the protocol.
*Boxed texts are not part of the code but contain proofs used in various steps, illustrated for a better understanding of the protocol.
==='''Stage 1''' Client’s Preparation===
==='''Stage 1''' Client’s Preparation===
Please note that all contributions to Quantum Protocol Zoo may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Quantum Protocol Zoo:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)

Template used on this page: