The present disclosure generally relates to a system for encryption, particularly, to a system for secure multi-party exact homomorphic encryption and a computer-implemented method for performing secure multi-party exact homomorphic encryption.
Homomorphic Encryption (HE) permits users to compute on encrypted messages without prior decryption, thus rendering a high level of security for the data processing. Over the next 30 years, improvements in HE remained rather constrained until Gentry's proposal in 2009. His dissertation theoretically allowed arbitrary encrypted computation contingent upon unlimited resources. While, the accumulation of noise poses a hindrance to execute this technique. The predicament is especially pronounced by dint of the exponential growth of noise with the number of multiplications.
Quantum computing has garnered much attention recently inasmuch as its momentous influence not only on data processing, but also on information protection. An intriguing field of study in relation to the security hazard is Quantum Public-Key Encryption (QPKE). The core approach entails the production of one-way functions to generate a quantum state that plays the role of a public key for encrypting message. QPKE is impeded mainly by necessitating sizable quantum operations, which falls into the hurdle of scaling up quantum computers.
Quantum Homomorphic Encryption (QHE) is another research area that has become increasingly appealing to safeguard data manipulation. Typically, an encrypted computation is exercised with a fault-tolerant Clifford+T circuit. Explicitly, physical qubits outnumber logical qubits by at least several hundred times, refuting the accessibility of QHE. An alternative rephrases a present HE to its quantum version. Aside from receiving the demerits of HE schemes aforesaid, the method in view consumes numerous qubits and then encounters the scalability barrier of quantum computers.
A serial of episodes elucidates a structure called the Quotient Algebra Partition, QAP, universally existing in finite-dimensional unitary Lie algebras. Given this structure inherited by every stabilizer code, a general methodology of Fault Tolerance Quantum Computation in QAP, abbreviated as QAPFTQC, elicits an algorithmic procedure achieving the acquirement that every action in every error-correcting code is fault tolerant. A fault tolerance quantum computation is thence derived by applying this encode on the codeword.
Accordingly, inventors of the present inventive concept introduce a system for secure multi-party exact homomorphic encryption and a computer-implemented method for performing secure multi-party exact homomorphic encryption.
The present inventive concept provides a system for secure multi-party exact homomorphic encryption (SMPEHE), wherein the system comprises a first participant as a model provider/data receiver, a second participant as a data provider/data owner and a third participant as a computation provider, wherein the system further comprises a key generation module, a message encryption module and a computation module.
The key generation module is within the first participant, which is configured to produce an encryption mapping comprising an ordered product of elementary gates; to generate a multivariate polynomial set, serving as a public encryption key, via the encryption mapping; to form an encryption operator serving as a private key; and to create an encrypted polynomial set representing a computational instruction based on an encrypted action.
The message encryption module is within the second participant, which is configured to encode a plaintext message into a first ciphertext by the public key provided by the first participant; and to transmit the first ciphertext to the third participant.
The computation module is within the third participant, which is configured to receive the first ciphertext; and to perform a computation on the received first ciphertext by evaluating the encrypted polynomial set.
According to the present inventive concept, the computation module is further configured to output a second ciphertext; and to transmit the second ciphertext to the first participant.
According to the present inventive concept, the system further comprises a decryption module within the first participant, which is configured to decrypt the second ciphertext by using the private key to retrieve a computation result.
According to the present inventive concept, the encryption mapping is generated by combining elementary gates, including negation, Toffoli, CNOT, and multi-controlled gates, to form an encryption transformation.
According to the present inventive concept, the public encryption key is a multivariate polynomial set generated through the corresponding encryption mapping.
According to the present inventive concept, the encrypted polynomial set is generated by the encrypted action composed of a desired operation, the encryption mapping and the encryption operator, and wherein the polynomial set is used for performing computations on the first ciphertext.
According to the present inventive concept, the computation module evaluates the encrypted polynomial set in parallel or sequentially on the first ciphertext to produce the second ciphertext.
According to the present inventive concept, the first ciphertext transmitted by the second participant is a tensor-product state of multiple individual ciphertexts.
According to the present inventive concept, the encrypted polynomial set is generated from an encrypted action which is defined as:
According to the present inventive concept, a circuit of each of the encrypted action is further divided into a number jt of sections for positive integers jt and t to generate refined encrypted polynomial sets.
According to the present inventive concept, there is a first communication between the first participant and the second participant, wherein the first communication occurs in parallel or sequentially, which includes the distribution of public encryption keys from the first participant to the second participant.
According to the present inventive concept, there is a second communication between the first participant and the third participant, wherein the second communication occurs in parallel or sequentially.
According to the present inventive concept, the second communication includes the transmission of the computation instruction from the first participant to the third participant; and the transmission of the second ciphertext from the third participant to the first participant.
According to the present inventive concept, there is a third communication between the second participant and the third participant wherein the third communication occurs in parallel or sequentially, which includes the distribution of the first ciphertext from the second participant to the third participant.
The present inventive concept further provides a computer-implemented method for performing secure multi-party exact homomorphic encryption (SMPEHE) involving a first participant as a model provider/data receiver, a second participant as data provider/a data owner and a third participant as a computation provider, wherein the method comprises:
According to the present inventive concept, the method further comprises, for j=1,2, . . . , E:
According to the present inventive concept, the method further comprises:
According to the present inventive concept, the method further comprises:
According to the present inventive concept, each of the encryption mapping ,j is composed of elementary gates selected from the group consisting of negation, Toffoli, CNOT, and multi-controlled gates.
According to the present inventive concept, each of the public key ,k
j; xj) is generated by applying the encryption mapping
j to an initial polynomial set containing linear and nonlinear polynomials.
According to the present inventive concept, the encrypted polynomial sets ,w
;zj) encode computation instructions for operations performed by the third participant.
According to the present inventive concept, each of the first ciphertext cj is generated by evaluating the public key ,k
j; xj) on the plaintext message mj, producing a bit-length kj≤wj.
According to the present inventive concept, the tensor-product state of the first ciphertexts is transmitted securely to the third participant without revealing the plaintext messages.
According to the present inventive concept, the encrypted polynomial sets are evaluated independently or sequentially on the first input ciphertext to optimize computational efficiency.
According to the present inventive concept, the private key ,j is used to decrypt the second ciphertexts.
According to the present inventive concept, the method further comprises distributing the public encryption keys from the first participant to the second participant in parallel or sequentially.
According to the present inventive concept, the method further comprises:
According to the present inventive concept, the method further comprises:
The present inventive concept is described by the following specific embodiments. Those with ordinary skills in the arts can readily understand other advantages and functions of the present inventive concept after reading the disclosure of this specification. Any changes or adjustments made to their relative relationships, without modifying the substantial technical contents, are also to be construed as within the range implementable by the present inventive concept.
Moreover, the word “exemplary” or “embodiment” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as exemplary or an embodiment is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the word “exemplary” or “embodiment” is intended to present concepts and techniques in a concrete fashion.
As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more,” unless specified otherwise or clear from context to be directed to a singular form.
Please refer to
The present inventive concept provides a system for SMPEHE, wherein the system may comprise a first participant as a model provider/data receiver, a second participant as a data provider/data owner and a third participant as a computation provider, and the system may further comprise a key generation module, a message encryption module and a computation module.
According to the present inventive concept, the key generation module may be within the first participant, which is configured to produce an encryption mapping comprising an ordered product of elementary gates; to generate a multivariate polynomial set, serving as a public encryption key, via the encryption mapping; to form an encryption operator serving as a private key; and to create an encrypted polynomial set representing a computational instruction based on an encrypted action.
According to the present inventive concept, the message encryption module may be within the second participant, which is configured to encode a plaintext message into a first ciphertext by the public key provided by the first participant; and to transmit the first ciphertext to the third participant.
According to the present inventive concept, the computation module may be within the third participant, which is configured to receive the first ciphertext; and to perform a computation on the received first ciphertext by evaluating the encrypted polynomial set.
According to the present inventive concept, the computation module may be further configured to output a second ciphertext; and to transmit the second ciphertext to the first participant.
According to the present inventive concept, the system may further comprise a decryption module within the first participant, which is configured to decrypt the second ciphertext by using the private key to retrieve a computation result.
According to the present inventive concept, the encryption mapping may be generated by combining elementary gates, including negation, Toffoli, CNOT, and multi-controlled gates, to form an encryption transformation.
According to the present inventive concept, the public encryption key may be a multivariate polynomial set generated through the corresponding encryption mapping.
According to the present inventive concept, the encrypted polynomial set may be generated by the encrypted action composed of a desired operation, the encryption mapping and the encryption operator, and wherein the polynomial set may be used for performing computations on the first ciphertext.
According to the present inventive concept, the computation module may evaluate the encrypted polynomial set in parallel or sequentially on the first ciphertext to produce the second ciphertext.
According to the present inventive concept, the first ciphertext transmitted by the second participant may be a tensor-product state of multiple individual ciphertexts.
According to the present inventive concept, a circuit of each of the encrypted action is further divided into a number jt of sections for positive integers jt and t to generate refined encrypted polynomial sets.
According to the present inventive concept, there is a first communication between the first participant and the second participant, wherein the first communication occurs in parallel or sequentially, which includes the distribution of public encryption keys from the first participant to the second participant.
According to the present inventive concept, there is a second communication between the first participant and the third participant, wherein the second communication occurs in parallel or sequentially.
According to the present inventive concept, the second communication includes the transmission of the computation instruction from the first participant to the third participant; and the transmission of the second ciphertext from the third participant to the first participant.
According to the present inventive concept, there is a third communication between the second participant and the third participant wherein the third communication occurs in parallel or sequentially, which includes the distribution of the first ciphertext from the second participant to the third participant.
Please refer to
Please refer to
Please refer to
S120. distributing the encrypted polynomial sets {,w
;zj):j=1, 2, . . . , E} among L independent third participants;
S130. evaluating each of the encrypted polynomial set ,w
;zj) on an input |
=|cj
|0n
, where |0n
is a null state of nj-wj qubits, wherein |cj
may be the ciphertext of the j-th member for IME;
S140. generating the second ciphertexts |s=|s1
⊗|s2
⊗ . . . ⊗|sE
, wherein |s
may be the ciphertext of cryptovaluation; and
S150. transmitting the second ciphertexts |s) to the first participant.
Please further refer to
S160. decrypting each of the second ciphertext |sj using the corresponding private key
,j to recover computation outcomes. The second ciphertext |sj
may be the ciphertext of j-th member in the cryptovaluation.
According to the present inventive concept, each of the encryption mapping ,j is composed of elementary gates selected from the group consisting of negation, Toffoli, CNOT, and multi-controlled gates.
According to the present inventive concept, each of the public key ,k
,j; xj) is generated by applying the encryption mapping
,j to an initial polynomial set containing linear and nonlinear polynomials.
According to the present inventive concept, the encrypted polynomial sets ,w
;zj) encode computation instructions for operations performed by the third participant, as shown in
According to the present inventive concept, each of the first ciphertext cj is generated by evaluating the public encryption key ,k
,j; xj) on the plaintext message mj, producing a bit-length kj≤wj, as show in
According to the present inventive concept, the tensor-product state of the first ciphertexts is transmitted securely to the third participant without revealing the plaintext messages.
According to the present inventive concept, the encrypted polynomial sets are evaluated independently or sequentially on the first input ciphertext to optimize computational efficiency.
According to the present inventive concept, the private key ,j is used to decrypt the second ciphertexts.
According to the present inventive concept, the method further comprises distributing the public encryption keys from the first participant to the second participant in parallel or sequentially.
According to the present inventive concept, the method further comprises:
According to the present inventive concept, the method further comprises:
Please refer to (
; x) and releases this key, after which {circle around (2)} the second participant takes the public key to encode an message m into the ciphertext c.
Then, {circle around (3)} The ciphertext c is then sent to the third participant from the second participant. Subsequently, {circle around (4)} the first participant provides the computation instructions/model w(
;z) to the third participant for further processing. Once the computations are performed, {circle around (5)} the resulting ciphertext s is sent back to the first participant by the third participant. Finally, the first participant decrypts the computation result s via the private key
to obtain the final output of the process.
Please refer to
According to this embodiment, the process starts with {circle around (1)} the first participant produces a public key {,k
j; xj):j=1, 2, . . . , E} and releases the public key. Next, {circle around (2)} The second participant encodes the j-th message mj into the ciphertext cj by using the public key.
After that, {circle around (3)} the aggregated ciphertext c is then transmitted from the second participant to the third participant. Subsequently, {circle around (4)} the first participant provides the computation instructions/model {,w
;zj):j=1, 2, . . . , E} to the third participant for execution.
Finally, {circle around (5)} the third participant sends the computation result ciphertext
back to the first participant, and the j-th component |sj is decrypted into the corresponding j-th component of the computation result via the private key
,j.
According to an embodiment of the present inventive concept, a multivariate polynomial of k variables f(x)=Eτ∈z
In this embodiment, the formulation provides the foundational representation of polynomials in the binary field Z2.
The polynomial f(x) may serve as the foundation for encoding and transforming data in the EHE framework in the system of the present inventive concept, where public encryption keys are generated as multivariate polynomial sets.
According to an embodiment of the present inventive concept, elementary gates Λrθ of k qubits are introduced, where the integer r signifies the r-th qubit as a target qubit of the elementary gate, and nonzero entities of k-bit binary string θ=∈1∈2 . . . ∈k∈Z2k indicate positions of qubits serving as control bits.
In this embodiment, the elementary gates may act on k-qubit quantum states and the gates may be represented by the transformation Λrθ, wherein r may identify the target qubit and θ=∈1∈2 . . . ∈k∈Z2k may specify the control bits.
In this embodiment, the elementary gates may comprise the negation gates, the controlled-NOT, CNOT, gates, Toffoli gates, and multi-controlled gates as shown in
Every elementary gate is a transformation of dimension-one preserving that maps a basis quantum state into another, referring to
Each of elementary gates used in the present inventive concept is designed to be dimension-one preserving, avoiding the memory-intensive demands associated with simulating full quantum states. This design may support the feasibility of implementing the system on classical computing platforms, such as CPUs and GPUs, without the need for quantum hardware.
According to an embodiment of the present inventive concept, elementary gates are applied on quantum states. In this embodiment, elementary gates may act on the variables to generate multivariate polynomials over a binary field Z2, formulated as the following transformation rule,
According to an embodiment of the present inventive concept, a first encryption mapping may be defined, which is an ordered product of elementary gates randomly chosen. The first encryption operator
is applied to generate a set of w multivariate polynomials that serves as a public encryption key for encoding a k-qubit plaintext into a w-qubit first ciphertext, where w≥k, for message encryption.
The first encryption mapping is constructed to encode plaintext into ciphertext by applying transformations to the input polynomials. According to the precent inventive concept, the output may be a set of w-multivariate polynomials, which may form a public encryption key.
The transformation rule described in Eq. 1 de facto unveils the polynomial representation of elementary gates. When this mapping is applied, the variable xs receives a shift of the product xθ if the s-th qubit corresponds to the target bit, or remains intact otherwise. In practical maneuvers, the elementary gates act on variables of monomials. The gate Λrθ is said to be of rank t if θ contains a number t of nonzero bits. That is, a negation gate is of rank zero, a CNOT gate is of rank one, a Toffoli gate is rank two, and a multi-controlled gate is of rank t≥3. Every elementary gate defined here is unitary and involutory.
According to an embodiment of the present inventive concept, a desired operation M of n qubits are introduced, where n>w, and M is represented as a circuit composed of n-qubit elementary gates. In this embodiment, the operation M may serve as the computation to be encrypted and performed homomorphically.
According to an embodiment of the present inventive concept, a second encryption mapping is defined, wherein
is an ordered product of n-qubit elementary gates randomly chosen. The second encryption mapping
may introduce cryptographic complexity.
According to an embodiment of the present inventive concept, the desired operation M may be encoded into an encrypted action U, wherein the desired operation M is cryptified into an encrypted action U through the first encryption operator and the second encryption operator
. The process may ensure that the operation M is transformed into a secure, encrypted form compatible with ciphertext computations.
According to an embodiment of the present inventive concept, an encrypted polynomial set is generated from the encrypted action U, and the encrypted polynomial set may be evaluated on the ciphertext to yield an encrypted computation.
According to an embodiment of the present inventive concept, the encrypted action U may enable computations to be performed in the encrypted domain. The polynomial sets may serve as intermediaries to evaluate encrypted operations.
The computation can be performed homomorphically without decrypting the ciphertext by the system of the present inventive concept. The evaluation process, referred to as cryptovaluation, may establish the duality between polynomial evaluation and state computation, thereby validating the integrity of the encrypted computation.
According to an embodiment of the present inventive concept, a second binary string ζ is introduced, wherein the second binary string ζ determines how variables interact within the monomial. The monomial xθ may be modified based on the second binary string ζ into a modified form
In this embodiment, the second binary string ζ is used to modify the monomial interactions through control bits introducing an additional degree of freedom in variable transformations.
According to an embodiment of the present inventive concept, the monomial xθ may be transformed into the modified form
According to the present inventive concept, the most general form of an elementary gate acting on k variables over Z2 may be expressed in Eq. 2.
According to the present inventive concept, the generalization of Eq. 1 into Eq. 2 enhances the transformation rule by incorporating the second binary string ζ.
According to the present inventive concept, the generalization may support more complex polynomial transformations and improve the framework's ability in the system of the present inventive concept to represent and process non-linear relationships in the encrypted polynomial sets.
According to an embodiment of the present inventive concept, the first encryption operator may be further defined as a product operation
which is a k-qubit ordered product of elementary gates, as:
According to the present inventive concept, the control string θi∈ may specify which qubits interact during the operation.
According to the present inventive concept, the ordered product may encapsulate the sequential application of these gates to transform plaintext states into encrypted representations.
According to the present inventive concept, the use of elementary gates, e.g., the negation, the CNOT, Toffoli gates, may be used as the building blocks of encryption mappings.
According to an embodiment of the present inventive concept, a reverse product operation may be further defined, wherein
is the order-reversed product of
, which is expressed as:
In this embodiment, the reverse operation may ensure symmetry and facilitates invariance properties that are essential for encryption and decryption processes within the SMPEHE framework of the system of the present inventive concept.
According to an embodiment of the present inventive concept, an equality may be established between the product operation and its reverse
for each basis state |x
:
According to the present inventive concept, an elementary gate of k qubits Λrθ sends a basis state of the same number of qubits |a1a2 . . . ar . . . ak to
The equality in Eq. 3 is deemed as the evaluation duality between a state and its associated polynomials. Specifically, |x
=|y1(x)y2(x) . . . yk(x)
indicates a sequence of ordered polynomials written in a state. The s-th polynomial, ys(x)=
x, is the is the resulted polynomial of applying the product operation
=Λr
|x
results from activating the order-reversed product
=Λr
on the basis state |x
. This equality elucidates the equivalence of the polynomial evaluation and the state computation, namely |
x
=a=
|a
by substituting a multi-valued string a for the input x of polynomials ys(x) respectively. The validness of Eq. 3 is confirmed through a process that repetitively employs Eq. 1 to generate polynomial monomials and Eq. 2-1 to calculate state components.
The transformations applied by and its reverse
may yield equivalent outcomes, independent of the order of gate application.
According to the present inventive concept, the sequential application of gates in may introduce layers of cryptographic complexity by leveraging the noncommutative properties of elementary gates for enhanced security.
The equality |x
=
|x
establishes an invariant property that strengthens the theoretical foundation of the encryption process in the system of the present inventive concept.
According to an embodiment of the present inventive concept, an initial set of the multivariable polynomials ={gj(x)|j∈[w]} is prepared, wherein gj(x) corresponds to each polynomial f(x), wherein each of gj(x) is expressed as:
In this embodiment, the polynomial set may be structured and compatible with subsequent encryption transformations, enabling the efficient computation in the SMPEHE framework in the system of the present inventive concept
According to an embodiment of the present inventive concept, the first encryption operator is applied on each polynomial in the initial polynomial set
. The resulting ordered set of polynomials is denoted as
(
; x)={fj(x)=
gj(x): j∈[w]}, where w≥k is the number of the polynomials. This ordered set may serve as a public encryption key, as shown in
In this embodiment, the first encryption operator may transform each polynomial gj(x) in
into a corresponding encrypted polynomial fj(x). The transformation is expressed as: fj(x)=
+gj(x),∀j∈[w].
The polynomials may be transformed into secure forms while retaining their structural consistency.
The algorithm favors the first encryption operator including a certain number of multi-controlled gates of higher ranks ≥2 for the purpose of breeding polynomials of higher degrees in
(
; x). In the composition of
, a pair of gates Λrθ and Λsτ are noncommuting if the r-th digit in τ or the s-th digit in θ is non-null, r and s∈[k].
In this embodiment, the condition w≥k ensures sufficient encoding capacity for the plaintext. The set (
; x) may serve as a reusable key for encoding plaintexts into ciphertexts.
According to an embodiment of the present inventive concept, the plaintext |m may be provided, wherein the plaintext is of k qubits. The plaintext may be encoded to the first ciphertext |c
, wherein the ciphertext is of w qubits. The ciphertext is generated by evaluating the public encryption
(
; x) on the plaintext, such that
In this embodiment, the plaintext |m) may serve as the data to be encrypted using the EHE framework of the present inventive concept and the public encryption ,k(
; x) may serve as the functional basis for encoding the plaintexts into the ciphertexts. Specifically, the ciphertext |c
is the evaluation of the public key
,k(
; x), a multivariate polynomial set, on the input message x=m.
According to the present inventive concept, wherein the number of different polynomial sets, generated by all permutations of the elementary gates composing the operator , is a minimum of h!, where h is a size of a maximal set of pairwise noncommuting gates in
.
In an embodiment of the present inventive concept, the concept of a maximal set of pairwise noncommuting gates within is introduced, wherein pairwise noncommuting gates satisfy A·B≠B·A, ensuring that their order impacts the resulting transformations. Besides, the size of the maximal set is denoted as h, capturing the structural complexity of
.
As a result, attempting to reconstruct the public key ,k(
; x) generated by an encryption mapping
with a maximal set of size h incurs a combinatorial complexity of at least h!.
The overall complexity is given by hl!·hl-1! . . . h1! for encryption mappings composed of multiple disjoint subsets of mutually noncommuting gates (hr, r∈[l]). This establishes a cryptographic complexity criterion based on the structural properties of the encryption operator
. This result may directly quantify the security strength of the encryption mapping of the present inventive concept.
According to an embodiment of the present inventive concept, the w-qubit first ciphertext |c may be decrypted to |m
⊗|r
=
|c
by the first encryption mapping
to recover the plaintext m.
The complexities of attacking the invertible message encryption, IME, of w qubits is proven to satisfy the complexity criteria Tde-NC>TICRP>TXL>2w, where Tde-NC is the decompositional noncommutativity complexity for this IME, TICRP is the complexity of solving Invertible Circuit Reconstruction Problem (ICRP) for this IME, TXL is the complexity of attacking this IME via the XL algorithm, and 2w is the complexity of attacking this IME via the brute-force method.
The complexity criteria of IME suggest that attacking the private key is more difficult than breaking the public key or the ciphertext.
Grounded on the complexity criteria, the security strength of IME may be straightforwardly increased with moderate efforts, whose minimum strength grows linearly with the length of input plaintext.
Based on the complexity criteria, the security of IME with a public key ,k(
; x) surpasses the post-quantum standard 2128, and further attains the suggested threshold 21024 of hyper quantum resilience.
The security requirements of IME fulfill the advanced privacy demands beyond the post-quantum standards, especially surpassing the security level 256 bits.
The security requirements of IME prevent information from quantum attacks, including Grover's algorithm, quantum annealing and quantum Groebner-basis algorithm.
Please further refer to ,k
,j; xj),
,j), 1≤j≤E, where the j-th member possesses the polynomial set,
,k
,j; xj), serving as the j-th public key and the j-th encryption mapping,
,j serving as the j-th private key, kj is the bit-length of the plaintext xj∈Z2k
,k
,j; xj).
In multipartite IME, a number E of messages/plaintexts mj ∈Z2k=|c1
⊗|c2
⊗ . . . ⊗|CE
is generated, where the message mj of the j-th member is a state of kj qubits, 1≤j≤E and kj≤wj.
In multipartite IME, each individual ciphertext cj is decrypted into mj via ,j.
The multipartite IME follows a similar security criteria as those in IME, Tde-NC>TICRP>TXL>2w, here w=Σj=1Ewj, and also inherits similar security requirements as the aforementioned in IME.
Due to the duality, the ciphertext |c=[
x
x=e, through evaluating
,k(
; x) over a w-qubit state |e
to |m
⊗|r
, equals
|e
. Here, |r
is a basis state of w-k qubits randomly assigned and
the order-reversed product of
. Since every elementary gate is its own inverse,
=
. The plaintext |m
is thereby recovered from
|c
=
|c
=|e
.
According to the present inventive concept, the duality relationship and the invertibility of elementary gates used in lead to the exactness of decryption, so that the plaintext is able to be accurately recovered from the ciphertext without error, which may distinguish the system of the present inventive concept from the noisy decryption methods in traditional systems.
According to the present inventive concept, the encrypted polynomial set may be generated from an encrypted action which is defined as:
=(
,j⊗In
,j;
According to the present inventive concept, a circuit of each of the encrypted action may be further divided into a number jt of sections for positive integers jt and t to generate refined encrypted polynomial sets.
According to an embodiment of the present inventive concept, an encrypted action , is defined, wherein
=(
⊗I){circumflex over (M)}
, with {circumflex over (M)} is an order-reversed product of M, n≥w, and/is an identity operator of n-w qubits; the w-qubit ciphertext |c
of the k-qubit plaintext |m
derived from the second encryption operator
and an n-qubit action M may be given, n=w≥k, generating an encrypted polynomial set:
The present inventive concept borrows the mechanism of QAPFTQC to encipher computations.
Assume that a k-qubit plaintext is encoded into a w-qubit ciphertext via a multivariate polynomial set generated by the first encryption operator , which is the encryption mapping, k≤w. Accompanied by the second encryption operator
, an n-qubit operation M, a circuit of elementary gates, is concealed into the encrypted action
=(
⊗I){circumflex over (M)}
with {circumflex over (M)} is an order-reversed product of M, n≥w.
This encrypted action is a simplified form of the fault tolerant encode in QAPFTQC. Let the circuit of be rephrased as a set of n multivariate polynomials. Grounded on the poetic duality, evaluating this polynomial set on the ciphertext yields the cryptovaluation. Finally,
may serve as the private cryptovaluation key to decrypt the encrypted computation.
In the case w=n, the message and computation are mapped into an identical space of encryption as depicted in
Please further refer to ,k (
;x) generated by
, which is the public encryption key for invertible message encryption, IME, encodes |m
into a ciphertext |c
. On the strength of the duality relation, this ciphertext is alternatively written as |c
=
|m
|⊗|0
from exercising the order-reversed product
of
on the product state |m
⊗|0
of |m
and the (n-k)-qubit null state |0
. A step further is drawing
that encodes M into the composition
=
M
, resulting in the encrypted computation
|c
=
M|m
⊗|0
called the cryptovaluation. Here,
is the order-reversed product of the encrypted action
tv.
With the associated state z
=|α1(z)α2(z) . . . αn(z)) and i∈[n], it relishes the duality
|c
=
z
z=c between the state computation and the polynomial evaluation. Thus, the cryptovaluation is engaged in
z
z=c of calculating the polynomial set
,n(
;z) on the ciphertext |c
. The operator
=
works as the private cryptovaluation key of the decryption, namely
|
z
z=c=
|c
=M|m
⊗|0
. Refer to
.
According to the present inventive concept, is the inverse of the first encryption operator, which decodes the ciphertext into a form compatible with {circumflex over (M)}. The use of {circumflex over (M)} make sure the invertibility of the computation and the consistency with the EHE framework's duality principles in the system of the present inventive concept.
Besides, the encrypted action enables secure computation by maintaining the encrypted state throughout the process, preserving data confidentiality.
According to an embodiment of the present inventive concept, the w-qubit ciphertext |c of the k-qubit plaintext |m
derived from the first encryption operator
and an n-qubit action M is given, n>w≥k, generating an encrypted polynomial set:
Here, the encoded operation =
M(
⊗I) is the order-reversed product of encrypted action
, with M sandwiched by the operator of input errors
⊗I and the operator of output errors
.
The proof is similar as mentioned above, but replacing the encryption operator of
by
⊗I, the encrypted polynomial set
,n(
;z) by
,w(
;z), and the polynomial state
+z
by |
+z
. Similarly, ascertained from the duality relation, the output of the cryptovaluation is the polynomial evaluation |
z
z=
|0′) of |c
and a null basis state |0′
of n-w qubits. Likewise, the operator
decrypts the evaluation. Please refer to
According to an embodiment of the present inventive concept, a number e of sectional encrypted circuits ,g composing
may be paralleled, q∈[e]; and a sequential evaluation of encrypted polynomial sets may be generated as:
In an embodiment of the present inventive concept, ciphertext |c, a w-qubit ciphertext derived from the first encryption mapping
, encodes the k-qubit plaintext |m
, wherein |c) may serve as the input for the encrypted computational action. Then,
may further transform the ciphertext |c
within the encrypted domain. Next, the encrypted polynomial set
,w(
;z) is generated, where each βi(z) may correspond to a transformed variable zi under the action of
.
In another embodiment of the present inventive concept, the encrypted action may be partitioned into e sectional encrypted circuits
,q, each of the sectional circuit may independently handle a subset of the computations, facilitating the parallelized execution. Each of the sectional circuit
may be applied to the variables z; in the encrypted domain.
For every circuit q, an encrypted polynomial set ,w(
,q;z) is generated
,w(
,q;z)={βi,q(z)=
,q
zi; i∈[n]}, where each βi,q(z) may correspond to a transformed variable zi by the sectional circuit
,q.
After all sectional circuits ,q have been applied, their outputs, the polynomial sets, may be sequentially combined. The sequential evaluation consolidates the partial results from each
,w(
,q;z) into the final encrypted polynomial set to complete the computation.
The complexity of attacking the computation encryption, cryptovaluation, of n qubits on w-qubit ciphertexts is greater than 2w.
In a cryptovaluation, attacking the private key is more difficult than breaking the public key or the ciphertext.
In a cryptovaluation, the security strength may be straightforwardly increased with moderate efforts, whose minimum strength grows linearly with the length of input ciphertext.
In a cryptovaluation, the security surpasses the post-quantum standard 2128, and further attains the suggested threshold 21024 of hyper quantum resilience.
The security requirements of cryptovaluation fulfill the advanced privacy demands beyond the post-quantum standards, especially surpassing the security level 256 bits.
SMPEHE follows similar security criteria and requirements as those in EHE.
The security requirements of cryptovaluation prevent information from quantum attacks, including Grover's algorithm, quantum annealing and quantum Groebner-basis algorithm.
According to the present inventive concept, there is a first communication between the first participant and the second participant, wherein the first communication occurs in parallel or sequentially, which includes the distribution of public encryption keys from the first participant to the second participant.
According to an embodiment of the present inventive concept, the first communication between the first participant and the second participant may refer to the distribution of the public encryption key from the first participant to the second participant. This may enable the second participant to encrypt their plaintext data into ciphertexts.
In an embodiment, the ciphertext |c is the evaluation of the public key
,k(
; x), a multivariate polynomial set, on the input message x=m.
In this embodiment, the second participant may use the public encryption key to transform the plaintext message m into the first ciphertext |c. The process of accessing the public encryption key is the foundational step in the first communication between the participants.
According to the present inventive concept, there is a second communication between the first participant and the third participant, wherein the second communication occurs in parallel or sequentially.
According to the present inventive concept, the second communication includes the transmission of the computation instruction from the first participant to the third participant; and the transmission of the second ciphertext from the third participant to the first participant.
According to the present inventive concept, the second communication between the first participant and the third participant may involve two key steps, transmission of computation instructions, and transmission of computation results.
In an embodiment of the present inventive concept, the first participant may send encrypted polynomial sets, which may represent the computation instructions, to the third participant to perform computations on the encrypted data. This allows the third participant to perform operations on the encrypted data. After performing the computations, the third participant may further send back the result of the encrypted computation, referred to as the second ciphertext, to the first participant to decrypt the result using the private key.
In an embodiment, the encrypted computation which refers as cryptovaluation is the fruition of evaluating the encrypted polynomial set on an input ciphertext. The result of the encrypted computation is the evaluated polynomial set, which is returned as an encrypted output. The encrypted results are transmitted to the first participant for decryption.
In this embodiment, the first participant sends the encrypted polynomial set to the third participant as computation instructions. The encrypted polynomial set encodes the function to be computed. After evaluating the polynomial set, the third participant sends the result back to the first participant as an encrypted output, i.e. the second ciphertext. This explicitly states that the encrypted computation results are sent from the third participant to the first participant.
According to the present inventive concept, there is a third communication between the second participant and the third participant wherein the third communication occurs in parallel or sequentially, which includes the distribution of the first ciphertext from the second participant to the third participant.
According to the present inventive concept, the third communication between the second participant and the third participant involves the transmission of the first ciphertext (i.e., the encrypted message) from the second participant to the third participant. The third communication may allow the computation provider to receive the encrypted data on which the computations are performed.
In an embodiment of the present inventive concept, the ciphertext |c is the evaluation of the public key
k(
; x) on the input message x=m. The encrypted message is transmitted to the computation provider. Encrypted polynomial sets and ciphertexts may be processed either sequentially or in parallel to optimize computational efficiency.
In this embodiment, the formation of the first ciphertext by the second participant after encrypting the plaintext using the public key provided by the first participant. The transmission of the first ciphertext from the second participant to the third participant ensures that the encrypted data reaches the third participant for further processing. The data flow, including ciphertext transmission can be implemented using either parallel or sequential methods, depending on the architecture.
The third communication ensures that the computation provider receives the necessary encrypted data to perform cryptovaluation (the computation on encrypted data).
This communication pathway supports flexible data transfer methods in parallel or sequential but primarily focuses on securely transferring the encrypted input data without exposing the plaintext.
The foregoing descriptions of the detailed embodiments are only illustrated to disclose the features and functions of the present inventive concept and not restrictive of the scope of the present inventive concept. It should be understood to those in the art that all modifications and variations according to the spirit and principle in the disclosure of the present inventive concept should fall within the scope of the appended claims.
The present application claims the priority of U.S. Provisional Patent Application No. 63/621,188, filed on Jan. 16, 2024, the disclosure of which is hereby incorporated by reference herein in its entirety.
| Number | Date | Country | |
|---|---|---|---|
| 63621188 | Jan 2024 | US |