Quantum Walks with Encrypted Data
نویسندگان
چکیده
منابع مشابه
Nested Quantum Walks with Quantum Data Structures
We develop a new framework that extends the quantum walk framework of Magniez, Nayak, Roland, and Santha, by utilizing the idea of quantum data structures to construct an efficient method of nesting quantum walks. Surprisingly, only classical data structures were considered before for searching via quantum walks. The recently proposed learning graph framework of Belovs has yielded improved uppe...
متن کاملContinuous-variable quantum computing on encrypted data
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigat...
متن کاملQuantum Search on Encrypted Data Based on Quantum Homomorphic Encryption
Here we propose a quantum search protocols on ciphered superposition state based on quantum homomorphic encryption where a client Alice with limited quantum ability can deliver her encrypted quantum data to a powerful but untrusted quantum search server and let the server search for her without decryption. By outsourcing the key-updating and interaction work to a trusted key center, the client ...
متن کاملQuantum Walks with Gremlin
A quantum walk places a traverser into a superposition of both graph location and traversal “spin.” The walk is defined by an initial condition, an evolution determined by a unitary coin/shiftoperator, and a measurement based on the sampling of the probability distribution generated from the quantum wavefunction. Simple quantum walks are studied analytically, but for large graph structures with...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2012
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.109.150501