Exploiting Quantum Gates in Secure Computation

Maryam Ehsanpour, Stelvio Cimato, Valentina Ciriani, Ernesto Damiani

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations


Secure Multi-party Computation (SMC) has been introduced to allow the computation of generic functions between two parties that want to keep secret the input they use, and share only the computed result. One of the approach proposed to solve the SMC problem relies on the design of Garbled Circuits (GC), that are Boolean circuits that can be evaluated collaboratively achieving the SMC goal. Recently, there is a growing interest on the efficiency of this technique and on its potential applications to computation outsourcing in untrusted environments. One of the possible ways to reduce the complexity of the computation is to lower the number of non-EXOR gates in the Boolean circuit, since those gates have no cost for the execution of the secure computation protocol. In this work, we discuss the possibility to construct Garbled Circuit using quantum gates (QG), observing that, in some cases, the quantum GC requires a lower number of non-EXOR gates with respect to the corresponding classical GC implementations, thus improving the overall efficiency of the execution of the SMC protocol.

Original languageBritish English
Title of host publicationProceedings - 20th Euromicro Conference on Digital System Design, DSD 2017
EditorsMartin Novotny, Hana Kubatova, Amund Skavhaug
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages4
ISBN (Electronic)9781538621455
StatePublished - 25 Sep 2017
Event20th Euromicro Conference on Digital System Design, DSD 2017 - Vienna, Austria
Duration: 30 Aug 20171 Sep 2017

Publication series

NameProceedings - 20th Euromicro Conference on Digital System Design, DSD 2017


Conference20th Euromicro Conference on Digital System Design, DSD 2017


Dive into the research topics of 'Exploiting Quantum Gates in Secure Computation'. Together they form a unique fingerprint.

Cite this