Skip to main content

Quantum Searchable Encryption for Cloud Data Based on Delegating Quantum Computing

  • Conference paper
  • First Online:
Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications (CloudComp 2019, SmartGift 2019)

Abstract

Based on delegating quantum computing (DQC), a DQC model that adapts to multi-qubit and composite quantum circuits is given firstly. In this model, the single client with limited quantum ability can give her encrypted data to a powerful but untrusted quantum data server and let the data server computes over the encrypted data without decryption, where the computation is a quantum circuit composed of multiple quantum gates. Then, the client generates the decryption key to decrypt the computing result according to the circuit of computation. However, this model cannot meet the situation of multi-client accessing or computing encrypted cloud data in the cloud environment. To solve this problem, we let the client outsource key generation to a trusted key server, which composes the quantum cloud center with the data server. The clients only perform X and Z operation according to the encryption or decryption key. Then, combined with Grover algorithm, a quantum searchable encryption scheme for cloud data based on delegating quantum computing is proposed in this paper. The data server mainly uses Grover algorithm to perform search computation on the encrypted data. Moreover, a concrete example of our scheme is discussed next, where the data server searches for 2 target items from 8 items of the encrypted data. Finally, security of our proposed scheme is analysed, which can protect the security of the data.

This work was supported by the National Natural Science Foundation of China under Grant 61672290, Grant 71461005, and Grand 61802002, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20171458, in part by the Natural Science Foundation of Jiangsu Higher Education Institutions under Grant 19KJB520028, and in part by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cao, Y., Kaiwartya, O., Zhuang, Y., Ahmad, N., Sun, Y., Lloret, J.: A decentralized deadline-driven electric vehicle charging recommendation. IEEE Syst. J. 13(3), 3410–3421 (2019)

    Article  Google Scholar 

  2. Qi, L., et al.: Finding all you need: web APIs recommendation in web of things through keywords search. IEEE Trans. Comput. Soc. Syst. (2019). https://doi.org/10.1109/TCSS.2019.2906925

    Article  Google Scholar 

  3. Qie, X., Jin, S., Yue, W.: An energy-efficient strategy for virtual machine allocation over cloud data centers. J. Netw. Syst. Manage. 27(4), 860–882 (2019). https://doi.org/10.1007/s10922-019-09489-w

    Article  Google Scholar 

  4. Qi, L., Chen, Y., Yuan, Y., Fu, S., Zhang, X., Xu, X.: A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web 23(2), 1275–1297 (2019). https://doi.org/10.1007/s11280-019-00684-y

    Article  Google Scholar 

  5. Bösch, C., Hartel, P., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. 47(2), 1801–1851 (2014)

    Google Scholar 

  6. Xu, X., Liu, Q., Zhang, X., Zhang, J., Qi, L., Dou, W.: A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Trans. Comput. Soc. Syst. (2019). https://doi.org/10.1109/TCSS.2019.2909137

    Article  Google Scholar 

  7. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, S&P 2000, Berkeley, CA, USA, pp. 44–55 (2000)

    Google Scholar 

  8. Goh, E.: Secure indexes. IACR Cryptol. ePrint Arch. 2003, 216 (2003)

    Google Scholar 

  9. Curtmola, R., Garay, J., Kamara, S. Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of 13th ACM Conference on Computer and Communications Security, USA, pp. 79–88 (2006)

    Google Scholar 

  10. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  11. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  12. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)

    Article  Google Scholar 

  13. Chen, L., Lee, W.-K., Chang, C.-C., Choo, K.-K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95, 420–429 (2019)

    Article  Google Scholar 

  14. Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation. In: 50th Annual IEEE Symposium on Foundations of Computer Science, Atlanta, GA, pp. 517–526 (2009)

    Google Scholar 

  15. Kong, X., Li, Q., Wu, C., Yu, F., He, J., Sun, Z.: Multiple-server flexible blind quantum computation in networks. Int. J. Theor. Phys. 55(6), 3001–3007 (2016)

    Article  Google Scholar 

  16. Arrighi, P., Salvail, L.: Blind quantum computation. Int. J. Quantum Inf. 4(5), 883–898 (2006)

    Article  Google Scholar 

  17. Tan, X., Zhou, X.: Universal half-blind quantum computation. Ann. Telecommun. 72(9), 589–595 (2017)

    Article  Google Scholar 

  18. Fisher, K.A.G., et al.: Quantum computing on encrypted data. Nat. Commun. 5, 3074 (2014)

    Article  Google Scholar 

  19. Broadbent, A.: Delegating private quantum computations. Can. J. Phys. 93(9), 941–946 (2015)

    Article  Google Scholar 

  20. Kashefi, E., Pappa, A.: Multiparty delegated quantum computing. Cryptography 1(2), 12 (2017)

    Article  Google Scholar 

  21. Nielsen, M.A., Chuang, I.: Quantum Computation and Quantum Information, 10th edn. Cambridge University Press, New York (2002)

    MATH  Google Scholar 

  22. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems & Signal Processing, Bangalore, India, pp. 175–179. Springer (1984)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinsong Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, Y., Liu, W., Chen, J., Tong, L. (2020). Quantum Searchable Encryption for Cloud Data Based on Delegating Quantum Computing. In: Zhang, X., Liu, G., Qiu, M., Xiang, W., Huang, T. (eds) Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. CloudComp SmartGift 2019 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 322. Springer, Cham. https://doi.org/10.1007/978-3-030-48513-9_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-48513-9_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-48512-2

  • Online ISBN: 978-3-030-48513-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics