COMPUTER-IMPLEMENTED METHOD BASED ON FRAMEWORK OF EXACT HOMOMORPHIC ENCRYPTION AND SYSTEM ON FRAMEWORK OF EXACT HOMOMORPHIC ENCRYPTION

Information

  • Patent Application
  • 20250233725
  • Publication Number
    20250233725
  • Date Filed
    January 15, 2025
    12 months ago
  • Date Published
    July 17, 2025
    5 months ago
  • Inventors
    • Su; Zheng-Yao
  • Original Assignees
Abstract
A computer-implemented method based on a framework of Exact Homomorphic Encryption, EHE, protecting information from transmission, to processing and to storage. The EHE framework consists of the message encryption and the computation encryption, safeguarding both data and operations. A crucial step toward the construction of EHE is replacing classical logic gates with quantum gates, which acting on variables to generate multivariate polynomials alongside operating on quantum states conventionally. The generated polynomial sets serve as public keys for encrypting message and computation. Two fundamental traits of quantum gates, invertibility and noncommutativity, establish the success of EHE. As an isomorphism conducting with invertible gates, EHE naturally performs exact encrypted computation in full homomorphism as well as exact decryption. Grounded on a combinatorially high complexity offered by retrieving a circuit of noncommuting gates, EHE not only surpasses the security 2128 of the post-quantum standard, but also straightforwardly reaches 21024 for hyper quantum resilience. Blind computation is attained further, thus sheltering data and operations concurrently. The EHE framework can be regarded as a substantive manifestation of noncommutative cryptography. EHE has been deployable on CPU and GPU, showcasing the capability of exercising encrypted computations of large sizes and high complications over diverse functions.
Description
BACKGROUND OF THE INVENTION
1. Field of the Invention

The present disclosure generally relates to a method for constructing a method based on a framework of exact homomorphic encryption, particularly, to a method based on a framework of exact homomorphic encryption for encryption and computation.


2. Description of the Related Art

Homomorphic Encryption (HE) permits users to compute on encrypted messages without prior decryption, thus rendering a high level of security for the data processing. Over the next 30 years, improvements in HE remained rather constrained until Gentry's proposal in 2009. His dissertation theoretically allowed arbitrary encrypted computation contingent upon unlimited resources. While, the accumulation of noise poses a hindrance to execute this technique. The predicament is especially pronounced by dint of the exponential growth of noise with the number of multiplications.


Quantum computing has garnered much attention recently inasmuch as its momentous influence not only on data processing, but also on information protection. An intriguing field of study in relation to the security hazard is Quantum Public-Key Encryption (QPKE). The core approach entails the production of one-way functions to generate a quantum state that plays the role of a public key for encrypting message. QPKE is impeded mainly by necessitating sizable quantum operations, which falls into the hurdle of scaling up quantum computers.


Quantum Homomorphic Encryption (QHE) is another research area that has become increasingly appealing to safeguard data manipulation. Typically, an encrypted computation is exercised with a fault-tolerant Clifford+T circuit. Explicitly, physical qubits outnumber logical qubits by at least several hundred times, refuting the accessibility of QHE. An alternative rephrases a present HE to its quantum version. Aside from receiving the demerits of HE schemes aforesaid, the method in view consumes numerous qubits and then encounters the scalability barrier of quantum computers.


A serial of episodes elucidates a structure called the Quotient Algebra Partition, QAP, universally existing in finite-dimensional unitary Lie algebras. Given this structure inherited by every stabilizer code, a general methodology of Fault Tolerance Quantum Computation in QAP, abbreviated as QAPFTQC, elicits an algorithmic procedure achieving the acquirement that every action in every error-correcting code is fault tolerant. A fault tolerance quantum computation is thence derived by applying this encode on the codeword.


SUMMARY OF THE INVENTION

Accordingly, inventors of the present inventive concept introduce a computer-implemented method based on a framework of exact homomorphic encryption and a system for encryption and computation on a framework of exact homomorphic encryption which are stemming from the concept of QAPFTQC. The framework Exact Homomorphic Encryption, EHE, is proposed to admit computations on encrypted data. The message encryption and the computation encryption of EHE are thought of as analogous to the cryptograph of a quantum state and the fault-tolerant counterpart of a computation in QAPFTQC.


The present inventive concept provides a computer-implemented method based on a framework of exact homomorphic encryption (EHE), wherein the method comprises:


S10. providing a multivariate polynomial of k variables ƒ(x)=Στ∈Z2kcτcτ wherein ƒ(x) is a linear combination of monomials xτ of degrees≤k with coefficients cτ∈Z2, and each monomial xτ is expressed as xτ=x1σ1x2σ2 . . . xkσk, where xr∈Z2, τ=σ1σ2 . . . σr . . . σk∈Z2k and r∈[k], with [k] denoting a set of positive integers from 1 to k;


S20. introducing elementary gates Λrθ of k qubits, where the integer r signifies the r-th qubit as a target qubit of the elementary gate, and nonzero entities of k-bit binary string θ=ϵ1ϵ2 . . . ϵk∈Z2k indicate positions of qubits serving as control bits;


S30. applying elementary gates on quantum states;


S40. applying elementary gates on the variables to generate multivariate polynomials over a binary field Z2, formulated as the following transformation rule,











Λ
r
θ




x
s


=


x
s

+


δ
rs



x
θ







Eq
.

1







wherein xs∈Z2 is a binary variable and xθ=x1ϵ1x2ϵ2 . . . xkϵk a monomial of k variables;


S50. defining a first encryption mapping custom-characteren which is an ordered product of elementary gates randomly chosen; and


S60. applying the first encryption operator custom-characteren to generate a set of w multivariate polynomials that serves as a public encryption key for encoding a k-qubit plaintext into a w-qubit ciphertext, w≥k, for message encryption.


According to the present inventive concept, the elementary gates comprises the negation, the CNOT, the Toffoli, and the multi-controlled gates.


According to the present inventive concept, wherein the method further comprises:


S70. introducing a desired operation M of n qubits, n>w, wherein M is represented as a circuit composed of n-qubit elementary gates;


S80. defining a second encryption mapping custom-charactercv, wherein custom-charactercv is an ordered product of n-qubit elementary gates randomly chosen;


S90. encoding the desired operation M into an encrypted action, wherein the desired operation M is cryptified into an encrypted action U through the first encryption operator custom-characteren and the second encryption operator custom-charactercv;


S100. generating an encrypted polynomial set from the encrypted action U; and


S110. evaluating the encrypted polynomial set on the ciphertext to yield an encrypted computation.


According to the present inventive concept, wherein the step S40 further comprises:


S41. giving a second binary string ζ, wherein the second binary string ζ determines how variables interact within the monomial;


S42. modifying the monomial xθ based on the second binary string ζ into a modified form xζθ; and


S43. expanding the Eq. 1 to a formation











Λ
r

θ
,
ζ



x
s


=


x
s

+


δ
rs




x
_

ζ
θ







Eq
.

2







where s∈[k] and xζθ is defined as xζθi=1k(xii)ϵi.


According to the present inventive concept, wherein the step S50 further comprises:


S51. defining the first encryption operator custom-characteren as a product operation custom-character which is a k-qubit ordered product of elementary gates, as:








=






i
=
1




n



Λ

r
i


θ
i




,




where Λriθi denotes the i-th elementary gate acting on the ri-th qubit with a control string θicustom-character2k;


S52. defining a reverse product operation custom-character, wherein custom-character is the order-reversed product of custom-character, which is expressed as:



custom-characteri=n1Λriθi; and


S53. establishing an equality between the product operation custom-character and its reverse custom-character for each basis state |xcustom-character:



custom-character|xcustom-character=custom-character|xcustom-character, where x∈custom-character2k.


According to the present inventive concept, wherein the step S50 further comprises:


S54. preparing an initial set of the multivariable polynomials custom-characterin={gj(x)|j∈[w]}, wherein gj(x) corresponds to each of ƒ(x), wherein each of gj(x) is expressed as:


gj(x)=Σr∈Z2kcτ,jxτ,


where cτ,j∈Z2 are binary coefficients;


S55. applying the product operation custom-characteren on each polynomial in the initial polynomial set custom-characterin; and


S56. outputting an ordered set of polynomials custom-characterw,k(custom-characteren; x)={ƒ(x)=custom-characteren|├gj(x): j∈[w]}, serving as a public encryption key, where w≥k is the number of the polynomials.


According to the present inventive concept, wherein the step S60 further comprises:


S61. providing the plaintext |mcustom-character, wherein the plaintext is of k qubits; and


S62. encoding the plaintext to the ciphertext |ccustom-character, wherein the ciphertext is of w qubits, generated by evaluating the public encryption custom-characterw,k(custom-characteren;x) on the plaintext, such that












"\[LeftBracketingBar]"

c



=



"\[LeftBracketingBar]"




f
1

(
m
)




f
2

(
m
)








f
w

(
m
)






,




where m∈Z2k, c∈Z2w and ƒj(m)∈Z2 is the evaluation of the j-th polynomial ƒj(x)∈custom-characterw,k(custom-characteren; x) on the plaintext, 1≤j≤w.


According to the present inventive concept, wherein the number of different polynomial sets, generated by all permutations of the elementary gates composing the operator custom-character, is a minimum of h!, where h is a size of a maximal set of pairwise noncommuting gates in custom-character.


According the present inventive concept, wherein the step S60 further comprises:


S63. decrypting the w-qubit ciphertext |ccustom-character to |mcustom-character⊗|rcustom-character=custom-characteren|ccustom-character by the first encryption mapping custom-characteren to recover the plaintext m.


According to the present inventive concept, wherein the method further comprises:


S120. defining an encrypted action custom-charactercv, wherein custom-charactercv=(custom-characteren−1⊗I){circumflex over (M)}custom-charactercv, with {circumflex over (M)} is an order-reversed product of M, n≥w, and I is an identity operator of n−w qubits; and


S130. given the w-qubit ciphertext |ccustom-character of the k-qubit plaintext |mcustom-character derived from the second encryption operator custom-charactercv and an n-qubit action M, n=w≥k, generating an encrypted polynomial set












𝒫

n
,
n


(


𝒰
cv


;
z

)

=

{



α
i

(
z
)

=


𝒰
cv




z
i

:

i


[
n
]





}


,




Eq
.

3







wherein custom-charactercv is an encrypted action, and expressed as custom-charactercv=custom-charactercv{circumflex over (M)}custom-charactercv, and αi(z) is the i-th polynomial of custom-charactern,n(custom-charactercv;z), z=z1z2 . . . zn∈Z2n.


According to the present inventive concept, wherein the method further comprises:


S140. given the w-qubit ciphertext |ccustom-character of the k-qubit plaintext |mcustom-character derived from the first encryption operator custom-characteren and an n-qubit action M, n>w≥k, generating an encrypted polynomial set












𝒫

n
,
w


(


𝒰
cv

;
z

)

=

{



β
i

(
z
)

=


𝒰
cv



z
i

:

i


[
n
]





}


,




Eq
.

4







wherein βi(z) is the i-th polynomial of custom-charactern,w(custom-charactercv; z), z=z1z2 . . . zn∈Z2n.


According to the present inventive concept, wherein the method further comprises:


S150. parallelling a number e of sectional encrypted circuits custom-charactercv,q composing custom-charactercv, q∈[e];


S160. generating a sequential evaluation of encrypted polynomial sets











𝒫

n
,
w


(


𝒰

cv
,
q


;
z

)

=


{



β

i
,
q


(
z
)

=


𝒰

cv
,
q




z
i

:

i


[
n
]





}

.





Eq
.

5







The present inventive concept further provides a system for encryption and computation on a framework of exact homomorphic encryption, comprising:


a program for executing the computer-implemented method based on a framework of exact homomorphic encryption according to the present inventive concept; and


a computing architecture comprising a processing unit, wherein the program is deployed on the computing architecture.


According to the present inventive concept, wherein the program for executing the computer-implemented method comprising a software for exact homomorphic encryption, wherein the software comprises a first code and a second code.


According to the present inventive concept, wherein the first code is for the message encryption.


According to the present inventive concept, wherein the second code is for executing the computer-implemented method based on a framework of exact homomorphic encryption.


According to the present inventive concept, wherein the computing architecture comprises a CPU, GPU, or a combination thereof.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic flow diagrams according to an embodiment of the present inventive concept;



FIG. 2 is a schematic diagram of the elementary gate used in the algorithm according to the present inventive concept;



FIG. 3 is a schematic flow diagrams according to another embodiment of the present inventive concept;



FIG. 4 is a schematic flow diagrams according to another embodiment of the present inventive concept;



FIG. 5 is a schematic flow diagrams according to another embodiment of the present inventive concept;



FIG. 6 is a schematic flow diagrams according to another embodiment of the present inventive concept;



FIG. 7 is a schematic flow diagrams according to another embodiment of the present inventive concept;



FIG. 8 shows (a) the process of an embodiment of the present inventive concept where the message and computation are mapped to an identical space; and (b) the process of another embodiment of the present inventive concept that the message and computation are mapped to different spaces of encryption;



FIG. 9 is a block diagrams according to an embodiment of the present inventive concept;



FIG. 10 shows test data of the message encryption according to an embodiment of the present inventive concept; and



FIG. 11 shows test data of the cryptovaluations according to another embodiment of the present inventive concept. according to an embodiment of the present inventive concept.





DETAILED DESCRIPTION

The present inventive concept is described by the following specific embodiments. Those with ordinary skills in the arts can readily understand other advantages and functions of the present inventive concept after reading the disclosure of this specification. Any changes or adjustments made to their relative relationships, without modifying the substantial technical contents, are also to be construed as within the range implementable by the present inventive concept.


Moreover, the word “exemplary” or “embodiment” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as exemplary or an embodiment is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the word “exemplary” or “embodiment” is intended to present concepts and techniques in a concrete fashion.


As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more,” unless specified otherwise or clear from context to be directed to a singular form.


Please refer to FIG. 1 which is a schematic flow diagrams according to an embodiment of the method of the present inventive concept. The present inventive concept provides a computer-implemented method based on a framework of exact homomorphic encryption (EHE), wherein the method may comprise:


S10. providing a multivariate polynomial of k variables ƒ(x)=Στ∈Z2kcτxτ.


According to the present inventive concept, ƒ(x) is a linear combination of monomials xτ of degrees≤k with coefficients cτ∈Z2. Each monomial xτ may be expressed as xτ=x1σ1x2σ2 . . . xkσk, where xr∈Z2, τ=σ1σ2 . . . σr . . . σk∈Z2k and r∈[k], with [k] denoting a set of positive integers from 1 to k.


According to the present inventive concept, the formulation provides the foundational representation of polynomials in the binary field Z2.


The polynomial ƒ(x) may serve as the foundation for encoding and transforming data in the EHE framework.


According to the present inventive concept, the method may further comprise:


S20. introducing elementary gates Λrθ of k qubits, where the integer r signifies the r-th qubit as a target qubit of the elementary gate, and nonzero entities of k-bit binary string θ=ϵ1ϵ2 . . . ϵk∈Z2k indicate positions of qubits serving as control bits;


According to the present inventive concept, the elementary gates may act on k-qubit quantum states and the gates may be represented by the transformation Λrθ, wherein r may identify the target qubit and θ=ϵ1ϵ2 . . . ϵk∈Z2k may specify the control bits.


According to the present inventive concept, the elementary gates may comprise the negation, the CNOT, the Toffoli, and the multi-controlled gates as shown in FIG. 2.


Every elementary gate is a transformation of dimension-one preserving that maps a basis quantum state into another, referring to FIG. 2 for the diagrammatic exemplification. Since AND and OR can be rephrased in Toffoli gates attended with ancilla qubits, this set vouches for the computational universality. These gates may operate on quantum states to enable transformations within the EHE framework. The method of the present inventive concept leverages fundamental quantum operations to manipulate data securely and make the transformation flexibly by including these gates.


Each of elementary gates used in the present inventive concept is dimension-one preserving. This design avoids the heavy memory demands associated with simulating full quantum states, making it feasible on both CPU and GPU without the need for quantum computers.


According to the present inventive concept, the method may further comprise: S30. applying elementary gates on quantum states;


S40. applying elementary gates on the variables to generate multivariate polynomials over a binary field Z2, formulated as the following transformation rule,











Λ
r
θ


x
s


=


x
s

+


δ
rs



x
θ







Eq
.

1







wherein xs∈Z2 is a binary variable and xθ=x1ϵ1x2ϵ2 . . . xkϵk represents the monomial transformation of k variables which induced by the gate.


According to the present inventive concept, these steps may provide a precise mechanism for transforming quantum states into multivariate polynomials over the binary field Z2.


According to the present inventive concept, the method may further comprise:


S50. defining a first encryption mapping custom-characteren which is an ordered product of elementary gates randomly chosen; and


S60. applying the first encryption operator custom-characteren to generate a set of w multivariate polynomials that serves as a public encryption key for encoding a k-qubit plaintext into a w-qubit ciphertext, w≥k, for message encryption.


The first encryption mapping is constructed to encode plaintext into ciphertext by applying transformations to the input polynomials. According to the precent inventive concept, the output may be a set of w-multivariate polynomials, which may form a public encryption key.


The mapping of Eq. 1 de facto unveils the polynomial representation of elementary gates. Applied by this mapping, the variable xs receives a shift of the product xθ if the s-th qubit is identical to the target bit, or remains intact otherwise. In practical maneuvers, elementary gates operate on variables of monomials. The gate Λrθ is said to be of rank t if 0 contains a number t of nonzero bits. That is, a negation is of rank zero, a CNOT rank one, a Toffoli rank two, and a multi-controlled gate is of rank t≥3. Notice that every elementary gate defined here is unitary and involutory.


Please refer to FIG. 3 which is a schematic flow diagrams according to another embodiment of the method of the present inventive concept.


According to the present inventive concept, wherein the method may further comprise:


S70. introducing a desired operation M of n qubits, n>w, wherein M is represented as a circuit composed of n-qubit elementary gates.


According to the present inventive concept, the operation may be represented as a circuit composed of n-qubit elementary gates and may serve as the computation to be encrypted and performed homomorphically.


According to the present inventive concept, the method may further comprise:


S80. defining a second encryption mapping custom-charactercv, wherein custom-charactercv is an ordered product of n-qubit elementary gates randomly chosen.


According to the present inventive concept, the second encryption mapping custom-charactercv may introduce cryptographic complexity.


According to the present inventive concept, the method may further comprise:


S90. encoding the desired operation M into an encrypted action, wherein the desired operation M is cryptified into an encrypted action U through the first encryption operator custom-characteren and the second encryption operator custom-characterev.


According to the present inventive concept, the process ensures that the operation M is transformed into a secure, encrypted form compatible with ciphertext computations.


According to the present inventive concept, the method may further comprise:


S100. generating an encrypted polynomial set from the encrypted action U; and


S110. evaluating the encrypted polynomial set on the ciphertext to yield an encrypted computation.


According to the present inventive concept, the encrypted action U may enable computations to be performed in the encrypted domain. The polynomial sets may serve as intermediaries to evaluate encrypted operations.


The computation can be performed homomorphically without decrypting the ciphertext by the present inventive concept. The evaluation process, referred to as cryptovaluation, may establish the duality between polynomial evaluation and state computation, validating the integrity of the encrypted computation.


Please refer to FIG. 4 which is a schematic flow diagrams according to an embodiment of the method of the present inventive concept.


According to the present inventive concept, wherein the step S40 may further comprise:


S41. giving a second binary string ζ, wherein the second binary string ζ determines how variables interact within the monomial;


S42. modifying the monomial xθ based on the second binary string ζ into a modified form xζθ; and


S43. expanding the Eq. 1 to a formation











Λ
r

θ
,
ζ



x
s


=


x
s

+


δ
rs




x
_

ζ
θ







Eq
.

2







where s∈[k] and xζθ is defined as xζθi=1k(xii)ϵi.


According to the present inventive concept, the second binary string ζ is introduced to modify the monomial interactions through control bits. The second binary string ζ may be used to augment the role of control bits by introducing an additional degree of freedom for variable modification.


According to the present inventive concept, the monomial xθ may be transformed into the modified form xζθ, defined as









x
_

ζ
θ

=






i
=
1




k




(


x
i

+

ς
i


)


ϵ
i




,




where xi∈Z2 may represent the variables, ζi∈Z2 may modify the interaction for each variable based on its binary value, and ϵi may determine the control bit configuration.


According to the present inventive concept, the most general definition of an elementary gate of k variables over Z2 may be written as Eq. 2.


According to the present inventive concept, expanding the Eq. 1 to Eq. 2 is to generalize the transformation rule, where xζθ may incorporate the second binary string ζ.


According to the present inventive concept, the generalization may support more complex polynomial transformations and enhance the framework's ability to represent and process non-linear relationships.


Please refer to FIG. 5 which is a schematic flow diagrams according to an embodiment of the method of the present inventive concept.


According to the present inventive concept, wherein the step S50 may further comprise:


S51. defining the first encryption operator custom-characteren as a product operation custom-character which is a k-qubit ordered product of elementary gates, as:








=






i
=
1




n



Λ

r
i


θ
i




,




where Λriθi denotes the i-th elementary gate acting on the ri-th qubit with a control string θicustom-character2k.


According to the present inventive concept, θicustom-character2k may represent he control string, specifying which qubits interact during the operation.


According to the present inventive concept, the ordered product custom-character may encapsulate the sequential application of these gates to transform states into encrypted representations.


According to the present inventive concept, the use of elementary gates, e.g., negation, CNOT, Toffoli, may be used as the building blocks of encryption mappings.


According to the present inventive concept, wherein the step S50 may further comprise:


S52. defining a reverse product operation custom-character, wherein custom-character is the order-reversed product of custom-character, which is expressed as:



custom-characteri=n1Λriθi.


In this embodiment, the reverse operation may ensure symmetry and facilitates invariance properties essential for encryption and decryption processes in the method of the present inventive concept.


According to the present inventive concept, wherein the step S50 may further comprise:


S53. establishing an equality between the product operation custom-character and its reverse custom-character for each basis state |xcustom-character:















"\[LeftBracketingBar]"



x




=



^





"\[LeftBracketingBar]"

x





,




Eq
.

3







where x∈custom-character2k.


According to the present inventive concept, an elementary gate of k qubits Λrθ sends a basis state of the same number of qubits |α1α2 . . . αr . . . αk) to














Λ
r
θ





"\[LeftBracketingBar]"



a
1



a
2






a
r






a
k






=


a
1



a
2






(


a
r

+

a
θ


)






a
k





.





Eq
.

2

-
1











here


r



[
k
]


,

θ
=



ϵ
1



ϵ
2






ϵ
k



and



a
θ


=



a
1

ϵ
1




a
2

ϵ
2







a
k

ϵ
k






Z
2
k

.








The equality of Eq. 3 is deemed as the evaluation duality between a state and its associated polynomials. Specifically, |custom-character|├xcustom-character=|y1(x)y2(x) . . . yk(x)custom-character stands for a sequence of ordered polynomials written in a state. The s-th member, ys(x)=custom-character|├x, is the polynomial reaped by acting the product operation custom-characterruθu . . . ΛA2θ2Λr1θ1 embracing u≥1 elementary gates on the s-th variable xs of x=x1x2 . . . xk∈Z2k, s∈[k]. The state custom-character|xcustom-character is the resultant of activating the order-reversed product custom-characterr1θ1Λr2θ2 . . . Λruθu of custom-charactere R on |xcustom-character. This equality elucidates the equivalence of the polynomial evaluation and the state computation, namely |custom-characterxcustom-character=a=custom-character|acustom-character by substituting a multi-valued string α for the input x of polynomials ys(x) respectively. The validness of Eq. 3 will be confirmed through the process that repetitively employs Eq. 1 to generate polynomial monomials and Eq. 2-1 to calculate state components.


The transformations applied by custom-character and its reverse custom-character may yield equivalent outcomes, regardless of the order of gate application.


According to the present inventive concept, the sequential application of gates in custom-character may introduce layers of complexity, leveraging the noncommutative properties of elementary gates for enhanced security.


The equality custom-character|xcustom-character=custom-character|xcustom-character establishes an invariant property that strengthens the theoretical foundation of the encryption process.


Please further refer to FIG. 5. According to the present inventive concept, wherein the step S50 may further comprises:


S54. preparing an initial set of the multivariable polynomials custom-characterin={gj(x)|j∈[w]}, wherein gj(x) corresponds to each of ƒ(x), wherein each of gj(x) is expressed as:


gj(x)=Σr∈Z2kcτ,jxτ,


where cτ,j∈Z2 are binary coefficients and xτ=x1σ1x2σ2 . . . xkσk are monomials of degree≤k.


According to the present inventive concept, the polynomial set may be structured and compatible with subsequent encryption transformations.


According to the present inventive concept, wherein the step S50 may further comprises:


S55. applying the product operation custom-characteren on each polynomial in the initial polynomial set custom-characterin; and


S56. outputting an ordered set of polynomials custom-characterw,k(custom-characteren; x)={ƒj(x)=custom-characteren|├gj(x):j∈[w]}, serving as a public encryption key, where w≥k is the number of the polynomials.


In this embodiment, the first encryption operator custom-characteren may be applied to each polynomial gj(x) in custom-characterin. The transformation is expressed as: ƒj(x)=custom-characteren|├gj(x), ∀j∈[w], where ƒj(x) represents the encrypted polynomial.


The polynomials may be transformed into secure forms while retaining their structural consistency.


The algorithm favors the first encryption operator custom-characteren including a certain number of multi-controlled gates of higher ranks≥2 for the purpose of breeding polynomials of higher degrees in custom-characterw,k(custom-characteren;z). Within the composition of custom-characteren, a pair of gates Λrθ and Λsτ are noncommuting if the r-th digit in τ or the s-th digit in θ is non-null, r and s∈[k].


In this embodiment, w≥k ensures sufficient encoding capacity for the plaintext. And the set custom-characterw,k(custom-characteren;x) may serve as a reusable key for encoding plaintexts into ciphertexts.


Please refer to FIG. 6 which is a schematic flow diagrams according to an embodiment of the method of the present inventive concept.


According to the present inventive concept, wherein the step S60 may further comprises:


S61. providing the plaintext |mcustom-character, wherein the plaintext is of k qubits; and


S62. encoding the plaintext to the ciphertext |ccustom-character, wherein the ciphertext is of w qubits, generated by evaluating the public encryption custom-characterw,k(custom-characteren;x) on the plaintext, such that












"\[LeftBracketingBar]"

c



=



"\[LeftBracketingBar]"




f
1

(
m
)




f
2

(
m
)






f
w

(
m
)






,




where m∈Z2k, c∈Z2w and ƒj(m)∈Z2 is the evaluation of the j-th polynomial ƒj(x)∈Ψw,k(∩en;x) on the plaintext, 1≤j≤w.


In this embodiment, the plaintext |mcustom-character may be served as the data to be encrypted using the EHE framework of the present inventive concept and the public encryption custom-characterw,k(custom-characteren;x) may be serves as the functional basis for encoding the plaintexts into the ciphertexts. Specifically, the ciphertext |ccustom-character is the evaluation of the public key custom-characterw,k(custom-characteren;x), a multivariate polynomial set, on the input message x=m.


According to the present inventive concept, wherein the number of different polynomial sets, generated by all permutations of the elementary gates composing the operator custom-character, is a minimum of h!, where h is a size of a maximal set of pairwise noncommuting gates in custom-character.


In an embodiment of the present inventive concept, the concept of a maximal set of pairwise noncommuting gates within custom-character is introduced, wherein pairwise noncommuting gates satisfy A·B≠B·A, ensuring that their order impacts the resulting transformations. Besides, the size of the maximal set is denoted as h, capturing the structural complexity of custom-character.


As an implication, cracking the public key custom-characterw,k(custom-characteren;x) generated by an encryption mapping custom-character, whose maximal set of pairwise noncommuting gates is of size h, costs a combinatorial complexity comparable to h!.


The overall complexity is given by h1!·hl-1! . . . h1! for encryption mappings custom-characteren composed of multiple disjoint subsets of mutually noncommuting gates (hr, r∈[l]). By doing so, a cryptographic complexity criterion may be established based on the structural properties of the encryption operator custom-character. This result may directly quantify the security strength of the encryption mapping of the present inventive concept.


Please further refer to FIG. 6. According to the present inventive concept, wherein the step S60 may further comprises:


S63. decrypting the w-qubit ciphertext |ccustom-character to |mcustom-character⊗|rcustom-character=custom-characteren|ccustom-character by the first encryption mapping custom-characteren to recover the plaintext m.


Due to the duality, the ciphertext |ccustom-character=|custom-characteren|├xcustom-characterx=e, through evaluating custom-characterw,k(custom-characteren;x) over a w-qubit state |ecustom-character to |mcustom-character⊗|rcustom-character, equals custom-characteren|ecustom-character. Here, |rcustom-character is a basis state of w−k qubits randomly assigned and custom-characteren the order-reversed product of custom-characteren. Since every elementary gate is its own inverse, custom-characteren−1=custom-characteren. The plaintext |mcustom-character is thereby recovered from custom-characteren|ccustom-character=custom-characteren|ccustom-character=|ecustom-character.


According to the present inventive concept, the duality relationship and the invertibility of elementary gates used in Ren lead to the exactness of decryption, so that the plaintext is able to be accurately recovered from the ciphertext without error, which may distinguish the method of the present inventive concept from the noisy decryption methods in traditional systems.


The complexities of attacking the invertible message encryption, IME, of w qubits is proven to satisfy the complexity criteria Tde-NC>TICRP>TXL>2w, where Tde-NC is the decompositional noncommutativity complexity for this IME, TICRP is the complexity of solving Invertible Circuit Reconstruction Problem (ICRP) for this IME, TXL is the complexity of attacking this IME via the XL algorithm, and 2w is the complexity of attacking this IME via the brute-force method.


The complexity criteria of IME suggest that attacking the private key is more difficult than breaking the public key or the ciphertext.


Grounded on the complexity criteria, the security strength of IME may be straightforwardly increased with moderate efforts, whose minimum strength grows linearly with the length of input plaintext.


Based on the complexity criteria, the security of IME with a public key custom-characterw,k(custom-characteren;x) surpasses the post-quantum standard 2128, and further attains the suggested threshold 21024 of hyper quantum resilience.


The security requirements of IME fulfill the advanced privacy demands beyond the post-quantum standards.


The security requirements of IME prevent information from quantum attacks, including Grover's algorithm, quantum annealing and quantum Groebner-basis algorithm.


Please refer to FIG. 7 which is a schematic flow diagrams according to an embodiment of the method of the present inventive concept.


According to the present inventive concept, wherein the method may further comprises:


S120. defining an encrypted action custom-charactercv, wherein custom-charactercv=(custom-characteren−1⊗I){circumflex over (M)}custom-charactercv, with {circumflex over (M)} is an order-reversed product of M, n≥w, and Iis an identity operator of n−w qubits; and


S130. given the w-qubit ciphertext |ccustom-character of the k-qubit plaintext |mcustom-character derived from the second encryption operator custom-charactercv and an n-qubit action M, n=w≥k, generating an encrypted polynomial set












𝒫

n
,
n


(


𝒰
cv


;
z

)

=

{



α
i

(
z
)

=


𝒰
cv




z
i

:

i


[
n
]





}


,




Eq
.

3







wherein custom-charactercv is an encrypted action, and expressed as custom-charactercv=custom-charactercv−1{circumflex over (M)}custom-charactercv, which is the adjoint of the encrypted action. Besides, αi(z) is the i-th polynomial in the encrypted polynomial set custom-charactern,n(custom-charactercv;z), z=z1z2 . . . zn∈Z2n which is derived by applying custom-charactercv on the variables z.


The present inventive concept borrows the mechanism of QAPFTQC to encipher computations.


Assume that a k-qubit plaintext is encoded into a w-qubit ciphertext via a multivariate polynomial set generated by the first encryption operator custom-characteren, which is the encryption mapping, k≤w. Accompanied by the second encryption operator custom-charactercv, an n-qubit operation M, a circuit of elementary gates, is concealed into the encrypted action custom-charactercv=(custom-characteren−1⊗I){circumflex over (M)}custom-charactercv with {circumflex over (M)} is an order-reversed product of M, n≥w.


This encrypted action is a simplified form of the fault tolerant encode in QAPFTQC. Let the circuit of custom-charactercv be rephrased as a set of n multivariate polynomials. Grounded on the poetic duality, evaluating this polynomial set on the ciphertext yields the cryptovaluation. Finally, custom-charactercv may serve as the private cryptovaluation key to decrypt the encrypted computation.


To begin with, consider w=n. In this scenario, the message and computation are mapped into an identical space of encryption as depicted in FIG. 8(a).


In this embodiment, the polynomial set custom-characterw,k(‰cv;x) generated by custom-charactercv, which is the public key for invertible message encryption, IME, encodes |mcustom-character into a ciphertext |ccustom-character. On the strength of the duality relation, this ciphertext is alternatively written as |ccustom-character=custom-charactercv|mcustom-character⊗|0custom-character from exercising the order-reversed product custom-charactercv of custom-charactercv on the product state |mcustom-character⊗|0custom-character of |mcustom-character and the (n−k)-qubit null state |0custom-character. A step further is drawing custom-charactercv that encodes M into the composition custom-charactercv=custom-charactercvMcustom-charactercv−1, resulting in the encrypted computation custom-charactercv|ccustom-character=custom-charactercvM|mcustom-character⊗|0custom-character called the cryptovaluation. Here, custom-charactercv is the order-reversed product of the encrypted action custom-charactercv.


With the associated state custom-charactercv|├zcustom-character=|α1(z)α2(z) . . . αn(z)) and i∈[n], it relishes the duality custom-charactercv|ccustom-character=custom-charactercv|├zcustom-characterz=c between the state computation and the polynomial evaluation. Thus, the cryptovaluation is engaged in custom-charactercv|├zcustom-characterz=c of calculating the polynomial set custom-charactern,n(custom-charactercv;z) on the ciphertext |ccustom-character. The operator custom-charactercv=custom-charactercv works as the private cryptovaluation key of the decryption, namely custom-charactercv|custom-charactercv|├zcustom-characterz=c=custom-charactercvcustom-charactercv|ccustom-character=M|mcustom-character⊗|0custom-character. Refer to FIG. 8(a) for the diagram outlining the process. In the scenario n=w, the message and computation are elegantly sent into an identical space of encryption under the same encryption operator custom-charactercv.


According to the present inventive concept, custom-characteren−1 is the inverse of the first encryption operator, which decodes the ciphertext into a form compatible with {circumflex over (M)}. The use of {circumflex over (M)} make sure the invertibility of the computation and the consistency with the EHE framework's duality principles in the present inventive concept.


Besides, the encrypted action custom-charactercv enables secure computation by maintaining the encrypted state throughout the process, preserving data confidentiality.


Please further refer to FIG. 7. According to the present inventive concept, wherein the method may further comprises:


S140. given the w-qubit ciphertext |ccustom-character of the k-qubit plaintext |mcustom-character derived from the first encryption operator Ren and an n-qubit action M, n>w≥k, generating an encrypted polynomial set












𝒫

n
,
w


(


𝒰
cv

;
z

)

=

{



β
i

(
z
)

=



𝒰
cv


z
i

:
i



[
n
]



}


,




Eq
.

4







wherein βi(z) is the i-th polynomial in the encrypted polynomial set custom-charactern,w(custom-charactercv;z), z=z1z2 . . . zn∈Z2n, encapsulating the transformation applied by custom-charactercv.


Here, the encode custom-charactercv=custom-charactercvM(custom-characteren−1⊗I) is the order-reversed product of encrypted action custom-charactercv, with M sandwiched by the operator of input errors custom-characteren−1⊗I and the operator of output errors custom-charactercv.


The proof is similar as mentioned above, but replacing the encryption operator custom-charactercv−1 of custom-charactercvby custom-characteren−1⊗I, the encrypted polynomial set custom-charactern,n(custom-charactercv;z) by custom-charactern,w(custom-charactercv;z), and the polynomial state |custom-charactercv|├zcustom-character by |custom-charactercv|├zcustom-character. Similarly, ascertained from the duality relation, the output of the cryptovaluation is the polynomial evaluation |custom-charactercv|├zcustom-characterz=c on the product state |ccustom-character=|ccustom-character⊗|0′custom-character of |ccustom-character and a null basis state |0′custom-character of n−w qubits. Likewise, the operator custom-charactercv decrypts the evaluation. Please refer to FIG. 8(b) which pictures this process.


According to the present inventive concept, wherein the method further comprises:


S150. parallelling a number e of sectional encrypted circuits custom-charactercv,q composing custom-charactercv,q∈[e]; and


S160. generating a sequential evaluation of encrypted polynomial sets











𝒫

n
,
w


(


𝒰

cv
,
q


;
z

)

=

{



β

i
,
q


(
z
)

=



𝒰

cv
,
q



z
i

:
i



[
n
]



}





Eq
.

5







In an embodiment of the present inventive concept, ciphertext |ccustom-character, a w-qubit ciphertext derived from the first encryption mapping custom-characteren, encodes the k-qubit plaintext |mcustom-character, wherein |ccustom-character may serve as the input for the encrypted computational action. Then, custom-charactercv may further transform the ciphertext |ccustom-character within the encrypted domain. Next, the encrypted polynomial set custom-charactern,w(custom-charactercv;z) is generated, where each βi(z) may correspond to a transformed variable zi under the action of custom-charactercv.


In another embodiment of the present inventive concept, the encrypted action custom-charactercv may be partitioned into e sectional encrypted circuits custom-charactercv,q, each of the sectional circuit may independently handle a subset of the computations, facilitating the parallelized execution. Each of the sectional circuit custom-charactercv may be applied to the variables zi in the encrypted domain.


For every circuit q, an encrypted polynomial set custom-charactern,w(custom-charactercv,q;z) is generated custom-charactern,w(custom-charactercv,q;z)={βi,q(z)=custom-charactercv,q|├zi├zi;i∈[n]}, where each βi,q(z) may correspond to a transformed variable zi by the sectional circuit custom-charactercv,q.


After all sectional circuits custom-charactercv,q have been applied, their outputs, the polynomial sets, may be sequentially combined. The sequential evaluation consolidates the partial results from each custom-charactern,w(custom-charactercv,q;z) into the final encrypted polynomial set to complete the computation.


More specifically, depending on computing environments, the number e ranges from n/2 to 4n on the single-CPU and from n/8 to n on the multiple cores. Due to this division, the circuit is factorized into a product custom-charactercv=custom-characterecustom-charactere-1 . . . . custom-character2custom-character1 of e component actions custom-characterq, q∈[e]. By arbitrarily taking a number e of sectional encryption operators custom-characterq individually comprising elementary gates randomly generated, each member custom-characterq is converted into a sectional encrypted circuit custom-charactercv,q=custom-characterqcustom-characterqcustom-characterq-1−1 for 2≤q≤e−1, with custom-charactercv,1=custom-character1custom-character1 and custom-charactercv,e=custom-characterecustom-charactere−1. That is, the encrypted action is rewritten as







𝒰
cv

=


(


𝒰
e




e

-
1



)



(



e



𝒰

e
-
1






e
-
1


-
1



)





(



2



𝒰
2




1

-
1



)




(



1



𝒰
1


)

.






Since encrypted polynomial sets custom-charactern,w(custom-charactercv,q;z) are engendered independently from the encrypted circuits custom-charactersv,q it enables a highly concurrent generation of polynomial sets. Founded on the duality, the sequential evaluation of polynomial states |custom-charactercv,q|├z) educes the harvest of the cryptovaluation. With the initial input |ccustom-character, a prior output is tapped as the subsequent input of steps from q′=1 to q′=eq, i.e., |c1custom-character=|custom-charactercv,1|├zcustom-characterz=c and |cq′+1custom-character=|custom-charactercv,q′+1|├zcustom-characterz=cq′, for q′<e. The final evaluation |ccustom-character is the consequent of this encrypted computation.


The complexity of attacking the computation encryption, cryptovaluation, of n qubits on w-qubit ciphertexts is greater than 2w.


In a cryptovaluation, attacking the private key is more difficult than breaking the public key or the ciphertext.


In a cryptovaluation, the security strength may be straightforwardly increased with moderate efforts, whose minimum strength grows linearly with the length of input ciphertext.


In a cryptovaluation, the security surpasses the post-quantum standard 2128, and further attains the suggested threshold 21024 of hyper quantum resilience.


The security requirements of cryptovaluation fulfill the advanced privacy demands beyond the post-quantum standards.


The security requirements of cryptovaluation prevent information from quantum attacks, including Grover's algorithm, quantum annealing and quantum Groebner-basis algorithm.


Please refer to FIG. 9. The present inventive concept further provides a system 10 for encryption and computation on a framework of exact homomorphic encryption, comprising:


a program 11 for executing the computer-implemented method based on a framework of exact homomorphic encryption according to the present inventive concept; and


a computing architecture 12, wherein the program 11 is deployed on the computing architecture 12.


According to the inventive concept, the computing architecture 12 may comprise a processing unit 121. The processing unit may be, but not limited to, for example, CPU, GPU, Tensor Processing Unit, Field Programmable Gate Array, Application-Specific Integrated Circuit, Quantum Processing Units, Neural Processing Unit, Trusted Platform Architecture, High-Bandwidth Memory, or the similar, or a combination thereof.


According to the present inventive concept, the program 11 for executing the computer-implemented method comprises a software 110 for exact homomorphic encryption, wherein the software 110 may comprise a first code 111 and a second code 112.


According to the present inventive concept, the first code 111 may be used for the message encryption.


According to the present inventive concept, the second code 112 may be used for executing the computer-implemented method based on a framework of exact homomorphic encryption.


In an embodiment of the present inventive concept, system for encryption and computation on a framework of exact homomorphic encryption may comprise a program comprising a EHE software for executing the method based on a framework of exact homomorphic encryption according to the present inventive concept; and a 64-bit computing architecture, wherein the program is deployed on the computing architecture.


In this embodiment, the EHE software may consist of two codes. The first code may be for IME and the second code may be for executing EHE inclusive of both encryptions of the message and computation.


Please refer to FIG. 10 which shows the test data of the message encryption according to an embodiment of the present inventive concept.


In this embodiment, two parameters of the public key custom-characterw,k(custom-characteren;z)P are put into the pair (k,w). As shown in Table 1, tkg-sc, tkg-mc and tkg-sg denote the key-generation times, ten-sc, ten-mc and ten-sg denote the encoding times, and tde-sc, tde-mc and tde-sg denotes the decoding times on the single-CPU, multi-CPUs and single-node GPU, respectively. The duration of reading and exchange of data is absorbed, which occupies around 4% in the key generation, 90% in the encoding and 2% in the decoding.


Due to their significantly higher degree of parallelism, larger memory capacity, and faster data transfer rates, the multi-CPU and single-node GPU platforms may achieve approximately a tenfold to twentyfold increase in efficiency for key generation and encoding compared to single-CPU systems. Nevertheless, regarding the decoding process involving elementary gates numbered linearly in w, operating on ciphertexts, it exhibits short and comparable execution times across all three platforms.


In this embodiment, a case involving the maximum parameter pair (6400,6440) is presented, which offers a robust encryption with a high level of security that remains challenging to achieve for existing post-quantum cryptosystems. Implemented within reasonable time increments of the key generation and the encoding, the sectional stratagem is equally well-adapted for the message encryption and is anticipated to further heighten the level of security.


Please refer to FIG. 11 which shows the test data of the cryptovaluations according to another embodiment of the present inventive concept.


Regarding the sectional cryptovaluation governed by the second code, the triplet (k, w, n) encodes the three parameters of the encrypted polynomial sets custom-charactern,w(custom-charactercv,q;z). To enable blind computation, it is essential that the encrypted functions remain indistinguishable during the computational process. To achieve this, the runtimes for generating the encrypted polynomials are carefully calibrated to be nearly identical.


In this embodiment, The number of sections is in the range n/2≤e≤4n on the single-CPU and n/8≤e≤n on the multi-CPUs and single-node GPU.


Tkg-sc, Tkg-mc and Tkg-sg denote the longest task span of the polynomial generation among sections, Tevl-sc, Tevl-mc and Tevl-sg denote the evaluation times, and Tde-sc, Tde-mc and Tde-sg denote the decoding times on the single-CPU, multiple CPUs and single-node GPU, respectively.


The entire temporal course covers the time of data reading and communication, which conforms to the proportions the same as those of IME. As shown in FIG. 10, the increased parallelism, memory capacity, and bandwidth of multi-CPU and single-node GPU platforms result in a performance boost of 10 to 20 times for generating encrypted polynomial sets and performing polynomial evaluations compared to the baseline single-CPU system. Existing homomorphic encryption (HE) systems struggle to achieve similar efficiency gains, as their parallelism is largely constrained by the inherently sequential nature of recursive noise reduction.


In this embodiment, the deciphering times are comparable across the three computing platforms. The parameter triplet reaches a maximum of (256, 280, 400) on the single-CPU, (1536, 1560, 2400) on multiple CPUs and (1024, 1050, 1600) on the single-node GPU, respectively.


The method and system based on a framework of exact homomorphic encryption of the present inventive concept demonstrate a clear advantage in handling encrypted computations of significantly larger sizes, far surpassing the limitations of existing HE systems.


According to the present inventive concept, if the blindness is lifted from cryptovaluations of linear-k functions, conducted in simpler encryptions with fewer sections, the key-generation and encoding times may reduce by a factor of ten or more, and the plaintext size undergoes a minimum 1.5-fold expansion.


Additional improvements in processing speed and memory efficiency can be achieved with precise single-bit operations, rather than 64-bit computing units.


It is clearly that the performance of the present inventive concept becomes increasingly great as the scale of the problem grows, significantly outperforming existing HE systems. This superiority stems from the ability of the present inventive concept to leverage intrinsic parallelism across multiple stages, including circuit segmentation, polynomial generation, polynomial evaluation, and monomial calculation. Additionally, at the foundational level of machine code, the use of invertible gates proves highly suitable for developing energy-efficient systems.


Experimental findings showcase that EHE possesses the capability of performing encrypted computations of large sizes and sophistication over diverse functions.


The present inventive concept provides a method and a system based on a framework of exact homomorphic encryption, EHE, which merges two concepts, quantum computation and cryptography. Quantum gates are introduced to EHE, substituting for non-invertible logic operations used in finite computations. Each quantum gate acts on not only on quantum states conventionally, but also on variables to generate polynomials. This approach enables the implementation of message and computation encryption through an encryption transformation constructed from a randomly chosen product of quantum gates.


Due to the succinct duality relation of the EHE framework, the ciphertext is generated by evaluating a polynomial set on the input plaintext, while the result of an encrypted computation is obtained by evaluating an encrypted polynomial set on the ciphertext. Disparate to prolix cryptograms of the two major existing post-quantum cryptosystems, the size of ciphertext provided by the present inventive concept is compact.


The success of the method and the system based on a framework of EHE of the present inventive concept lies in two fundamental properties of quantum gates: invertibility and noncommutativity. Unlike the noisy schemes of existing homomorphic encryption, the present inventive concept achieves exact encrypted computations through the use of invertible gates, ensuring precise decryption that surpasses the noisy deciphering methods of current encryption systems.


Furthermore, blindness in homomorphic computations is achieved through the indiscernibility of encoded functions, thus protecting both data and operations, a feat not achievable in current HE When facing quantum adversarial attacks, the present inventive concept exceeds the standard quantum resilience threshold of 2128 and surpass the suggested hyper-quantum resilience benchmark of 21024. Since each activated gate preserves dimensionality, i.e., is dimension-one preserving, the present inventive concept is seamlessly implementable on classical computing environments without requiring quantum computers.


It is suggested to build EHE dedicated hardware holding the Massive Parallelism, Great Amount of Memory, Rapid Data Access-Transfer, Cores Affording Minimal Functionalities, and Accurate Single-Bit Computation through collaborative efforts with multinational corporations.


The EHE framework is deployable on a magnitude of applications, including, but no limited to, Military Defence, Governmental Affairs, Financial Services, Trustworthy AI, Medical Healthcare, Next-Generation Telecommunication, Low-Earth Orbit (LEO), Unmanned Aerial Vehicle (UAV), etc.; the strengths of EHE in each subject appreciably enhanced with dedicated hardware of portable devices forged via the miniaturization technology founded on Taiwan's leading semiconductor industry.


The foregoing descriptions of the detailed embodiments are only illustrated to disclose the features and functions of the present inventive concept and not restrictive of the scope of the present inventive concept. It should be understood to those in the art that all modifications and variations according to the spirit and principle in the disclosure of the present inventive concept should fall within the scope of the appended claims.

Claims
  • 1. A computer-implemented method based on a framework of exact homomorphic encryption (EHE), wherein the method comprises: S10. providing a multivariate polynomial of k variables ƒ(x)=Στ∈Z2kcτxτ wherein ƒ(x) is a linear combination of monomials xτ of degrees≤k with coefficients cτ∈Z2, and each monomial xτ is expressed as xτ=x1σ1x2σ2 . . . xkσk, where xτ∈Z2, τ=σ1σ2 . . . σr . . . σk∈Z2k and r∈[k], with [k] denoting a set of positive integers from 1 to k;S20. introducing elementary gates Λrθ of k qubits, where the integer r signifies the r-th qubit as a target qubit of the elementary gate, and nonzero entities of k-bit binary string θ=ϵ1ϵ2 . . . ϵk∈Z2k indicate positions of qubits serving as control bits;S30. applying elementary gates on quantum states;S40. applying elementary gates on the variables to generate multivariate polynomials over a binary field Z2, formulated as the following transformation rule,
  • 2. The computer-implemented method based on a framework of exact homomorphic encryption of claim 1, the elementary gates comprising the negation, the CNOT, the Toffoli, and the multi-controlled gates.
  • 3. The computer-implemented method based on a framework of exact homomorphic encryption of claim 2, wherein the method further comprises: S70. introducing a desired operation M of n qubits, n>w, wherein M is represented as a circuit composed of n-qubit elementary gates;S80. defining a second encryption mapping cv, wherein cv is an ordered product of n-qubit elementary gates randomly chosen;S90. encoding the desired operation M into an encrypted action, wherein the desired operation M is cryptified into an encrypted action U through the first encryption operator en and the second encryption operator ev;S100. generating an encrypted polynomial set from the encrypted action U; andS110. evaluating the encrypted polynomial set on the ciphertext to yield an encrypted computation.
  • 4. The computer-implemented method based on a framework of exact homomorphic encryption of claim 3, wherein the step S40 further comprises: S41. giving a second binary string ζ, wherein the second binary string ζ determines how variables interact within the monomial;S42. modifying the monomial xθ based on the second binary string ζ into a modified form xζθ; andS43. expanding the Eq. 1 to a formation
  • 5. The computer-implemented method based on a framework of exact homomorphic encryption of claim 4, wherein the step S50 further comprises: S51. defining the first encryption operator en as a product operation which is a k-qubit ordered product of elementary gates, as:
  • 6. The computer-implemented method based on a framework of exact homomorphic encryption of claim 5, wherein the step S50 further comprises: S54. preparing an initial set of the multivariable polynomials en={gj(x)/j∈[w]}, wherein gj(x) corresponds to each of ƒ(x), wherein each of gj(x) is expressed as: gj(x)=Σr∈Z2kcτ,jxτ, where cτ,j∈Z2 are binary coefficients;S55. applying the product operation en on each polynomial in the initial polynomial set in; andS56. outputting an ordered set of polynomials w,k(en;x)={ƒ(x)=en|├gj(x):j∈[w]}, serving as a public encryption key, where w≥k is the number of the polynomials.
  • 7. The computer-implemented method based on a framework of exact homomorphic encryption of claim 6, wherein the step S60 further comprises: S61. providing the plaintext (m, wherein the plaintext is of k qubits; andS62. encoding the plaintext to the ciphertext |c, wherein the ciphertext is of w qubits, generated by evaluating the public encryption w,k(en;x) on the plaintext, such that
  • 8. The computer-implemented method based on a framework of exact homomorphic encryption of claim 7, wherein the number of different polynomial sets, generated by all permutations of the elementary gates composing the operator , is a minimum of h!, where h is a size of a maximal set of pairwise noncommuting gates in .
  • 9. The computer-implemented method based on a framework of exact homomorphic encryption of claim 7, wherein the step S60 further comprises: S63. decrypting the w-qubit ciphertext |c to |m⊗|r=en|c by the first encryption mapping en to recover the plaintext m.
  • 10. The computer-implemented method based on a framework of exact homomorphic encryption of claim 9, wherein the method further comprises: S120. defining an encrypted action cv, wherein the cv=(en−⊗{circumflex over (M)}cv, with {circumflex over (M)} is an order-reversed product of M, n≥w, and I is an identity operator of n−w qubits; andS130. given the w-qubit ciphertext |c of the k-qubit plaintext |m derived from the second encryption operator cv and an n-qubit action M, n=w≤k, generating an encrypted polynomial set
  • 11. The computer-implemented method based on a framework of exact homomorphic encryption of claim 10, wherein the method further comprises: S140. given the w-qubit ciphertext |c of the k-qubit plaintext |m derived from the first encryption operator en and an n-qubit action M, n>w≥k, generating an encrypted polynomial set
  • 12. The computer-implemented method based on a framework of exact homomorphic encryption of claim 11, wherein the method further comprises: S150. parallelling a number e of sectional encrypted circuits cv,q composing cv, q∈[e]; andS160. generating a sequential evaluation of encrypted polynomial sets
  • 13. A system for encryption and computation on a framework of exact homomorphic encryption, comprising: a program for executing the computer-implemented method based on a framework of exact homomorphic encryption according to claim 1; anda computing architecture comprising a processing unit, wherein the program is deployed on the computing architecture.
  • 14. The system for encryption and computation on a framework of exact homomorphic encryption of claim 13, wherein the program for executing the computer-implemented method comprising a software for exact homomorphic encryption, wherein the software comprises a first code and a second code.
  • 15. The system for encryption and computation on a framework of exact homomorphic encryption of claim 14, wherein the first code is for the message encryption.
  • 16. The system for encryption and computation on a framework of exact homomorphic encryption of claim 14, wherein the second code is for executing the computer-implemented method based on a framework of exact homomorphic encryption.
  • 17. The system for encryption and computation on a framework of exact homomorphic encryption of claim 13, wherein the computing architecture comprises a CPU, GPU, or a combination thereof.
RELATED APPLICATIONS

The present application claims the priority of U.S. Provisional Patent Application No. 63/621,188, filed on Jan. 16, 2024, the disclosure of which is hereby incorporated by reference herein in its entirety.

Provisional Applications (1)
Number Date Country
63621188 Jan 2024 US