Research Article
Quantum Searchable Encryption for Cloud Data Based on Delegating Quantum Computing
@INPROCEEDINGS{10.1007/978-3-030-48513-9_32, author={Yinsong Xu and Wenjie Liu and Junxiu Chen and Lian Tong}, title={Quantum Searchable Encryption for Cloud Data Based on Delegating Quantum Computing}, proceedings={Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019}, proceedings_a={CLOUDCOMP}, year={2020}, month={6}, keywords={Quantum searchable encryption Delegating quantum computing Untrusted data server Trusted key server Grover algorithm}, doi={10.1007/978-3-030-48513-9_32} }
- Yinsong Xu
Wenjie Liu
Junxiu Chen
Lian Tong
Year: 2020
Quantum Searchable Encryption for Cloud Data Based on Delegating Quantum Computing
CLOUDCOMP
Springer
DOI: 10.1007/978-3-030-48513-9_32
Abstract
Based on delegating quantum computing (DQC), a DQC model that adapts to multi-qubit and composite quantum circuits is given firstly. In this model, the single client with limited quantum ability can give her encrypted data to a powerful but untrusted quantum data server and let the data server computes over the encrypted data without decryption, where the computation is a quantum circuit composed of multiple quantum gates. Then, the client generates the decryption key to decrypt the computing result according to the circuit of computation. However, this model cannot meet the situation of multi-client accessing or computing encrypted cloud data in the cloud environment. To solve this problem, we let the client outsource key generation to a trusted key server, which composes the quantum cloud center with the data server. The clients only perform and operation according to the encryption or decryption key. Then, combined with Grover algorithm, a quantum searchable encryption scheme for cloud data based on delegating quantum computing is proposed in this paper. The data server mainly uses Grover algorithm to perform search computation on the encrypted data. Moreover, a concrete example of our scheme is discussed next, where the data server searches for 2 target items from 8 items of the encrypted data. Finally, security of our proposed scheme is analysed, which can protect the security of the data.