Introduction

The discovery that quantum systems could be harnessed to process data in a fundamentally new way has led to the burgeoning field of quantum information processing. This approach to computation holds the promise of more efficient algorithms for a variety of tasks including integer factorization1, search2 and quantum simulation3. However, quantum information processing has also found applications in the area of cryptography, which has been a focus of the field since the discovery of secure quantum key distribution protocols by Bennett and Brassard4, and Ekert5. The information theoretic security of these protocols stands in stark contrast to the reliance of classical key agreement protocols on assumptions of computational hardness, and indeed a major goal of quantum cryptography research is to replicate and extend the functionality present in existing classical schemes while providing stronger, information theoretic, security guarantees.

In the world of classical cryptography, a central topic in recent years has been the study of homomorphic encryption6,7,8. Homomorphic encryption is a form of encryption which allows data processing to be performed on encrypted data without access to the encryption key. In general, a homomorphic encryption system is composed of four components: a key generation algorithm, an encryption algorithm that encrypts the data using the generated key, a decryption algorithm that decrypts the data using the key, and an evaluation algorithm which is used to process the data without decryption. Thus homomorphic encryption allows for secret data to be processed by third parties without allowing them access to the plaintext. After decryption, the plaintext output reveals the processed data. A scheme is termed fully-homomorphic if it allows for arbitrary processing of the encrypted data. Although the idea for homomorphic encryption has existed for some time6, it was not until 2009 that a fully-homomorphic encryption scheme was discovered by Gentry7. Gentry’s scheme is only computationally secure, relying on the assumed hardness of certain worst-case problems over ideal lattices, and the sparse subset sum problem, although the condition requiring ideal lattices was later dropped8.

Recent successes in quantum cryptography in finding information theoretically secure protocols for blind computation9,10,11,12,13,14 and verifiable computing15,16,17,18, problems closely linked to homomorphic encryption, have motivated the question of whether quantum mechanics allows for information theoretically secure homomorphic encryption schemes. Indeed, a number of attempts have been made to find a quantum analogue of homomorphic encryption19,20,21,22,23,24, however these attempts have inevitably run into a barrier. It is now known that it is not possible to achieve perfect information theoretic security while enabling arbitrary processing of encrypted data, unless the size of the encoding is allowed to grow exponentially25. As a result, some schemes19,20,21,22 have required interaction between parties to enable deterministic computation. These requirements parallel those of blind quantum computation which hides both the data and the computation being done on it. Another scheme by Broadbent and Jeffery23 allow the evaluation of circuits of low T-gate complexity by building on a classical fully homomorphic encryption scheme. Incorporating ideas from the garden-hose model of computation, Dulek, Schaffner, and Speelman24 expanded this scheme to allow the evaluation of polynomial-depth circuits. However, these schemes are dependent on computational assumptions, necessary for the underlying classical homomorphic encryption schemes, for their security. The question then remains as to whether information theoretically secure homomorphic encryption is possible without expanding the definition to include interactive protocols. One might consider implementing a quantum one-time pad on the data, which takes the data to the maximally mixed state. One could perform arbitrary quantum computations on the encrypted data, and then construct a decryption algorithm that depends on the computation performed19. However homomorphic encryption schemes need to satisfy compactness: the decryption operation must be less computationally expensive than the evaluation on the encrypted data. The Achilles heel of such a scheme is that it fails to satisfy compactness. A first step in the direction of non-interactive quantum protocols with compactness was presented by Rohde et al.26 for a restricted model of quantum computation known as the BosonSampling model27 which is non-universal. Furthermore, the scheme ensures only that the encoded information and the accessible information differ by an amount proportional to bits when m bits are encrypted, which is a relatively weak security guarantee. An information-theoretically secure scheme that allows for processing of encrypted data beyond BosonSampling is not known to date.

In this paper, we present a private-key homomorphic encryption protocol that supports a broad class of computations, including and extending beyond BosonSampling, while providing certain information theoretic security guarantees by bounding the information accessible to an adversary. While this is not a standard cryptographic measure of security, it provides a reasonable measure of privacy in a standalone setting which is free of computational assumptions. However, stronger security definition based on trace distance exists28. The protocol we present ensures a gap between the information accessible to an adversary and actual information encoded that grows as mlog2(d/m) + m(log2)−1 bits when bits are encrypted using m d-level systems. This is a significantly stronger security guarantee than that offered by the scheme presented by Rohde et al.26. We present our results in three parts. First we present a general approach to homomorphic encryption stemming from the group theoretic structure of quantum operations. We then present a family of operations which allow for a broad class of computations to be performed on encrypted data for a range of encryption schemes satisfying certain symmetry constraints. This class of quantum computations can be thought of as manipulations of bosons in a manner independent of their internal state. The computation begins with a set of bosons, each in a unique spatial mode with all modes occupied, with the internal state of each boson specifying the input to the computation. The computation consists of manipulating the spatial degree of freedom of the bosons, in such a way that operations depend only on the number of bosons in a mode and not their internal state. At the end of the computation, both the spatial and internal degree of freedom of the bosons are measured. This model includes BosonSampling, using the encoding due to Rohde et al.26, but extends far beyond it due to a much richer group structure of the set of allowed operations. We conclude with a concrete encoding which supports such computations while satisfying the necessary symmetry constraints and show that it limits the accessible information as described above.

Results

Group theoretic approach

We approach the problem of creating a homomorphic encryption scheme via the most naive route: we try to construct a set of encryption operations which commute with the operations used to implement computation on the encrypted data. However, this approach immediately encounters a barrier when applied to the case of universal computation. In such a case the computation operations form a group, either the unitary group in the case of quantum computation or the symmetric group in the case of classical reversible computation, which does not usually commute with other operations. Indeed, any irreducible representation of these groups only commutes with operators proportional to the identity, precluding non-trivial encryption. However, for reducible representations of these groups, there can exist non-trivial operators which commute with the entire group. This provides a natural route to constructing a homomorphic encryption scheme which allows the evaluation of operators chosen from some group G on encrypted data, by choosing a representation of the group with a non-trivial centralizer. The set of operations used to perform the encryption must be chosen as a subset of this centralizer. While it is not immediately obvious that encryption operations chosen this way should actually be able to hide information, the BosonSampling scheme presented in Rohde et al.26 provides an example of such an encoding where a non-trivial amount of information is hidden.

Representation of computation

Our protocol uses m identical bosonic particles; each particle has a spatial degree of freedom limited to a finite number of modes x = 1, …, m and an internal state α = 0, …, d − 1 (see Fig. 1). We design our scheme such that the encryption operations affect only the internal states of the particles, and the computation operations affect only the spatial modes of the particles. Since the input to the computation is supplied using the internal states of the particles, but the computation is performed using manipulation of only spatial modes, it may appear that the input does not affect the computation. This is not the case, however, since the internal states of the particles affect the computation by altering interference between particles.

Figure 1
figure 1

This figure shows Alice’s encoding scheme for m bosonic particles each in one of d internal states.

Each particle has a spatial degree of freedom labeled by x. The encoding operation is effected across the particles in a tensor product way. The evaluation operation is taken from the group G, which acts non-trivially only on the spatial modes of the m bosons, and can put multiple bosons in a single spatial mode. Post-evaluation, the encryption is removed via the inverse encoding operation to reveal the evaluated plaintext.

Each particle can be represented as a state created out from a vacuum state via a creation operator , with . The bosonic creation operators and commute, and satisfy the orthogonality condition . Note that we make no assumption on the internal states of the m particles, any two particles can have the same or different internal states. Explicitly, the initial state of our scheme is

which we denote as for short, where is our plaintext. Since the values of α1, …, αm are selected from the integers from 0 to d − 1, there are dm possible orthogonal input states, spanning a complex Euclidean space .

The set of computation operations that we are allowed to perform contains a group of unitary operations, generated by a set of infinitesimal generators with a large cardinality. The state space of m identical bosons can be expressed as a symmetric subspace of a Hilbert space , where and denote the space for the internal degrees of freedom and the spatial modes of the m identical bosons respectively. Due to the indistinguishability of the bosons, the state of the system is invariant under permutation of particles, and hence the system can only occupy states within the subspace of which respect this permutational symmetry. The computational operations, which act only on , must respect this symmetry, and hence the infinitesimal generators of the group of such operations are permutation-invariant. We proceed to elucidate the structure of these infinitesimal generators. Each boson can be in one of m possible spatial modes, and hence there are m2 generalized Pauli operators each of dimension m that act non-trivially on the spatial degree of freedom of each boson. Let the corresponding Hermitian and non-Hermitian generalized Pauli operators constitute the sets and respectively. We construct a set that contains a maximal number of linearly independent operators from . The Hermitian set then comprises of m2 infinitesimal generators of the unitary group operating non-trivially only on the spatial modes on the i-th boson. The infinitesimal generators of group of computation operations are then symmetric sums of the m-fold tensor product of elements from , with each such element corresponding to one boson. The number of such symmetric sums is exactly the number of ways to distribute m indistinguishable spatial labels (because of the requirement of permutation-invariance) among m2 distinct elements of , which is . Hence the set of computation operations G that we can perform contains a group of unitary operators, GC, generated by a set of infinitesimal generators with a cardinality of at least . If we denote the set of all infinitesimal generators of the spatial part of GC by C, then , where is the identity operator on the internal states of the m bosons. The computation subgroup GC intuitively corresponds to a model of computation with interacting bosons of d species in which the computation only depends on the spatial labels of the bosons.

Contained within GC are unitaries generated by the following infinitesimal generators:

for 1 ≤ x, y ≤ m. These operators are infinitesimal generators for operations that are equivalent to beam-splitters for xy, and phase-shifters for x = y in the quantum optics setting. Since we can generate the phase-shifters and the beam-splitters as in Reck et al.29, these infinitesimal generators generate a dimension m unitary group isomorphic to U(m)30,31,32 from which the evaluator’s computation operations can be chosen. These are the same elements used to construct those of the BosonSampling model. All particles in the BosonSampling model are indistinguishable (have the same internal states); the particles in our model however need not be indistinguishable, because each particle can be chosen as a d-level system independently. If we were to filter out particles with one of the d internal states, we are left with a system that is equivalent to d − 1 BosonSampling models by linearity of passive linear optics. This is a generalization of the insight used to encrypt BosonSampling instances in Rohde et al.26.

Hence our computation space includes a hard sampling problem as a special case. However, it is currently unknown whether our model allows for encoded universal computation on a space of size exponential in m.

Encoding scheme — For the encryption operation, a unitary operator , is applied to the internal state of the m particles as is depicted in Fig. 1. Since only acts on the internal states of the particles, provided that it operates identically on all particles, it commutes with our computation operations that act trivially on the internal states of the particles. In this section, we give a specific choice which enables non-trivial hiding of information.

In what follows, we drop the spatial labels of the particles and make them implicit. We define the computational basis states of each particle to be for α = 0, …, d − 1, and define the discrete Fourier transform on as

Denote the basis states of in the Fourier transform basis as , and define the trigonometric terms cα(k) = cos(2παk/d) and sα(k) = sin(2παk/d) for arbitrary integers α and k. The generators of the encoding are, for ,

where is the cyclic shift operation on the internal state of each particle such that . To simplify our calculations, we choose to express our generators in the following basis instead:

where . It is easy to verify that in the Fourier transform basis, .

Data represented using the logical basis can be encrypted by choosing a key, , where each is an integer chosen uniformly at random from the non-negative integers {0, …, m}, and applying the random unitary operation on each particle, where

and are the secret random angles. It is convenient to think of as a product of integer powers of , so that .

After the encoding, computation can still be performed on the encrypted data using the operations described in the previous section. However, for an adversary that does not have access to , the information encoded is obscured. Once the evaluation is completed, the output can be decrypted by applying on every particle to yield the processed plaintext. Surprisingly, with this simple encryption-decryption process, any quantum computation chosen from G which is performed on the encrypted state yields the same result when decrypted, as if it were performed on the unencrypted state. The result is an encryption scheme that admits privacy homomorphisms for operations chosen from G.

Our scheme works because the encryption operators affect only the internal states of the particles at each site, while the computation leaves the internal states of every particle invariant. In the particular encryption scheme we have chosen, the encryption operators generate an abelian group A that acts trivially on the spatial modes. Hence the evaluator can perform operations in the tensor product of the group G and the abelian group A.

Hidden information

Here we show that our quantum homomorphic scheme can hide a number of bits proportional to m. Without knowing the key, the ensemble is where denotes the plaintext, and the corresponding encrypted state is

It is illuminating to look at the ensemble in the Fourier transform basis as here the encoding is diagonal. We can write in the form and the non-zero coefficients are those for which the number of ’s in is equal to the number of ’s in for all . Let denote . Then

where is the Lee weight which counts the number of times appears in the vector . The non-zero terms in Eq. (8) can be partitioned into sets labeled by integer partitions of m. Let Pm,d be the set of integer partitions of m into d (possibly empty) parts and let λ be a partition in Pm,d. In Eq. (8), strings for which all Lee weights are equal belong to the same partition λ. The entries in λ = (λ0, λ1, …, λd−1) give the number of times a particular element appears in . With this notation, we get

where is the multinomial coefficient, and

which is invariant under permutation of the particles.

Theorem 1 For all probability distributions over plaintexts , the accessible information of the encoding, without knowing the key, is upper bounded by bits when Alice sends m d-level particles.

Proof: First, we observe that the elements of are related by powers of . Since is unitary and commutes with the encoding , it must be that is the same for all . For simplicity, we analyze :

where we have used the orthogonality of the different partitions labelled by λ in the third equality33, and that has rank one in the final equality. Similar arguments can be made for ,

The inequality above occurs because applying a channel that randomizes over , by applying a random power of to each particle, symmetrizes the probability distribution to the uniform distribution, but cannot decrease entropy. The second term of Eq. (12) obeys the identity

and is hence a maximally mixed state in the partition labeled by λ with a rank of Rλ, with entropy at most . Using these facts and putting Eqs (11, 12, 13) together, we obtain a bound on the Holevo quantity of

which in turn bounds the accessible information.

Discussion

When m is large,

and the gap, between the encoded information and the information accessible to an adversary, is at least

Thus if d = m and bits are encoded, this gap scales at least proportional to m. Moreover if for r in the open unit interval, the gap asymptotically approaches (1 − r) as a fraction of bits encoded. This is a significantly stronger security than that offered by Rohde et al.26, while at the same time significantly extending the functionality by allowing computations beyond BosonSampling to be performed on the encrypted data, thus bringing us closer to the goal of achieving a quantum fully homomorphic encryption scheme. As our bound in Eq. (14) is independent of the probability distribution used for the encoding, the bound on the accessible information holds even if the a priori distribution on the plaintext is not uniform.

Methods

The aim of this section is two-fold. First, to give the explicit form of the computation operators contained in GC which is strictly a subgroup of G. Second, to show that the encryption and computation operators of our QHE scheme commute.

Let , where is the set of all states of the form where αj {0, 1, …, d − 1} and xj {1, 2, …, m} are the internal and spatial labels respectively. Hence the Hilbert space of m bosons lies within the tensor product space where each denotes the Hilbert space of each boson with the subscript j as a label on the j-th boson, and is equal to . As our particles are identical bosons, the state of the m particles must be invariant under permutation of the labels of the particles. Thus, the set of all possible states for our m-bosons is the symmetric subspace of .

For our scheme, the computation operators act only on the spatial mode of the particles. Each bosonic particle can be in one of m possible spatial modes, and hence there are m2 generalized Pauli operators each of dimension m that act non-trivially on the spatial degree of freedom of each boson. In order to define the infinitesimal generators of the computation, let us first define the multi-qudit generalized Pauli operator given a tensor product of generalized Pauli operators34. The set of generalized Pauli operators of size m can be defined as

where , and . Define and as the Hermitian and non-Hermitian operators in respectively. Now let denote the identity operator on the Hilbert space and define to be the identity operator on the internal subsystem of all the bosons except for the j-th boson, given explicitly by

For every generalized Pauli operator , we define to be the multi-particle operator that only acts non-trivially on the spatial degree of freedom of the j-th particle where it applies the operator P. Correspondingly define the Hermitian and non-Hermitian operators on particle j as and respectively. Then our multi-particle generalized Pauli has the form

where .

The generalized Pauli operators are not always Hermitian, but the infinitesimal generators of unitary operations must be Hermitian. To generate unitary elements, we would have to make the non-Hermitian operators of Hermitian. Let denote a subset of comprising of a maximal number of linearly independent elements. Then an orthogonal set of Hermitian operators in the Hilbert-Schmidt inner product that acts on the j-th particle is .

For a given m-tuple of operators, , , we define the corresponding symmetric sum,

where Sm denotes the symmetric group of order m. The set of denotes the set of all infinitesimal generators for the spatial part of GC. The group GC of unitary operators generated from C that is contained within G is

where is the identity operator on the internal state of the m bosons. It is in this sense that the infinitesimal generators in C generate the group GC. The cardinality of C is precisely the number of ways to distribute m indistinguishable spatial labels among m2 distinct elements of which is . Any encryption operator that we consider can be written as a linear operator on the tensor product space where

where is the identity operator on the spatial subsystem of the m bosons. This trivially commutes with all computation operators from GC, as can be seen from Eq. (21).

The no-go theorem of Yu et al.25 implies that for perfect information theoretic security, the size of the encoding must scale with the number of bits required to the computation to be performed on the encrypted data. For extremely limited classes of computation, such as only applying Pauli operators, this is trivially satisfiable with an encoding that scales linearly with the input size. However, when the set of possible computation has super-exponential cardinality, as is the case for universal classical or quantum computation, perfect security cannot be achieved. Our results, then, can be seen as evidence that an equivalent no-go theorem does not hold when the security demand is relaxed.

Additional Information

How to cite this article: Tan, S.-H. et al. A quantum approach to homomorphic encryption. Sci. Rep. 6, 33467; doi: 10.1038/srep33467 (2016).