Hostname: page-component-7b9c58cd5d-7g5wt Total loading time: 0 Render date: 2025-03-13T11:42:45.642Z Has data issue: false hasContentIssue false

Quantum delegated and federated learning via quantum homomorphic encryption

Published online by Cambridge University Press:  04 February 2025

A response to the following question: What are the priorities and the points to be addressed by a legal framework for quantum technologies?

Weikang Li*
Affiliation:
Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing, China
Dong-Ling Deng*
Affiliation:
Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing, China Shanghai Qi Zhi Institute, Shanghai, China Hefei National Laboratory, Hefei, China
*
Corresponding authors: Weikang Li; Email: [email protected]; Dong-Ling Deng; Email: [email protected]
Corresponding authors: Weikang Li; Email: [email protected]; Dong-Ling Deng; Email: [email protected]
Rights & Permissions [Opens in a new window]

Abstract

Quantum learning models hold the potential to bring computational advantages over the classical realm. As powerful quantum servers become available on the cloud, ensuring the protection of clients’ private data becomes crucial. By incorporating quantum homomorphic encryption schemes, we present a general framework that enables quantum delegated and federated learning with a computation-theoretical data privacy guarantee. We show that learning and inference under this framework feature substantially lower communication complexity compared with schemes based on blind quantum computing. In addition, in the proposed quantum federated learning scenario, there is less computational burden on local quantum devices from the client side, since the server can operate on encrypted quantum data without extracting any information. We further prove that certain quantum speedups in supervised learning carry over to private delegated learning scenarios employing quantum kernel methods. Our results provide a valuable guide toward privacy-guaranteed quantum learning on the cloud, which may benefit future studies and security-related applications.

Type
Results
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2025. Published by Cambridge University Press

Introduction

Quantum machine learning exhibits a novel paradigm of learning and inference based on data (Biamonte et al., Reference Biamonte, Wittek, Pancotti, Rebentrost, Wiebe and Lloyd2017; Dunjko and Briegel, Reference Dunjko and Briegel2018; Das Sarma et al., Reference Sarma, Deng and Duan2019; Cerezo et al., Reference Cerezo, Verdon, Huang, Cincio and Coles2022), which is promising to bring advantages over classical methods for certain learning tasks (Rebentrost et al., Reference Rebentrost, Mohseni and Lloyd2014; Liu et al., Reference Liu, Arunachalam and Temme2021; Huang et al., Reference Huang, Broughton, Cotler, Chen, Li, Mohseni, Neven, Babbush, Kueng, Preskill and McClean2022; Molteni et al., Reference Molteni, Gyurik and Dunjko2024). These advantages mainly focus on the computational complexity (Anshu and Arunachalam, Reference Anshu and Arunachalam2024; Banchi et al., Reference Banchi, Pereira, Jose and Simeone2024), for example the running time and number of samples required to build the learning model. To obtain such quantum-versus-classical learning advantages, it is usually required to make hardness assumptions on certain computational problems (Liu et al., Reference Liu, Arunachalam and Temme2021; Gyurik and Dunjko, Reference Gyurik and Dunjko2023), or utilize quantum correlations for unconditional proofs (Gao et al., Reference Gao, Anschuetz, Wang, Cirac and Lukin2022; Zhang et al., Reference Zhang, Gong, Li and Deng2024). With a fully-fledged quantum computer featuring a large number of individually addressable and high-fidelity qubits, such learning advantages could be experimentally demonstrated. Along this line, a long-term goal is to achieve advantageous applications for practical tasks and benefit other fields (Daley et al., Reference Daley, Bloch, Kokail, Flannigan, Pearson, Troyer and Zoller2022).

However, aside from the computational aspect, the security issue is also crucial for near-term and future quantum applications (Sheng and Zhou, Reference Sheng and Zhou2017; Liu and Jiang, Reference Liu and Jiang2024; Hai et al., Reference Hai, Hung, Coopmans and Geerts2024; Caro et al., Reference Caro, Hinsche, Ioannou, Nietner and Sweke2024; Flöther, Reference Flöther2023). As this field progresses, the early generations of publicly available quantum computers are most likely expensive and only presented in the form of cloud quantum servers. For learning tasks, a client could upload the training data as well as the learning algorithm to the quantum server. After the server completes the learning procedure, the results will be sent back to the client for further use. In this delegated learning scenario, a natural question arises: How can one ensure that the client’s data or computation is kept private from the server? Indeed, a malicious server may try to infer from the learning procedure or even disobey the instructions from the client to extract sensitive information. It is therefore of both theoretical and practical importance to develop privacy-preserving delegated learning protocols.

The exploration of private delegated quantum computations dates back to an interactive protocol (Childs, Reference Childs2005), where a client, Alice, with limited quantum capabilities, delegates a task to a more powerful quantum server, Steve. Within the delegation procedure, a quantum one-time pad scheme is applied to hide the information of a quantum state (Ambainis et al., Reference Ambainis, Mosca, Tapp and De Wolf2000). The following works along this direction are mainly divided into two categories—blind quantum computing and quantum homomorphic encryption. In blind quantum computing, the client utilizes interactive protocols to hide all information from the server, including the input, output, and computation (Broadbent et al., Reference Broadbent, Fitzsimons and Kashefi2009). This framework has been developed and applied to enhance the security of quantum learning tasks (Li et al., Reference Li, Lu and Deng2021; Li, Li et al., Reference Li, Li, Amer, Shaydulin, Chakrabarti, Wang, Xu, Tang, Schoch, Kumar, Lim, Li, Cappellaro and Pistoia2024). In comparison, quantum homomorphic encryption focuses on quantum operations to be performed on encrypted data in such a way that the underlying plaintext data remains hidden from the server. During the whole delegated computation process, there is only one round of interaction between the two parties (Broadbent and Jeffery, Reference Broadbent, Jeffery, Gennaro and Robshaw2015; Mahadev, Reference Mahadev2020; Dulek et al., Reference Dulek, Schaffner, Speelman, Robshaw and Katz2016; Brakerski, Reference Brakerski, Shacham and Boldyreva2018; Ouyang et al., Reference Ouyang, Tan and Fitzsimons2018; Tham et al., Reference Tham, Ferretti, Bonsma-Fisher, Brodutch, Sanders, Steinberg and Jeffery2020; Ma and Li, Reference Ma and Li2022) and it is shown feasible to support variational quantum algorithms (Li, Quan et al., Reference Li, Quan, Shi, Zhang and Li2024). We emphasize a key difference between the two approaches. In blind quantum computing, the server is treated as a “dumb” entity that is completely unaware of the computations performed. In contrast, quantum homomorphic encryption allows the server to execute computations on encrypted quantum data, where the server knows the algorithm being applied without gaining any information about the processed data.

In this work, we leverage ideas of quantum homomorphic encryption and present a general framework for both quantum delegated learning and federated learning as illustrated in Figure 1, which further supports delegated inference after the learning process. We first construct a quantum classification model and adapt it to the quantum homomorphic encryption scenario. For the training samples in the form of general quantum states, it is required to encrypt these states before sending them to the quantum server. The non-trivial role of quantum homomorphic encryption is reflected by the fact that it allows the quantum server to manipulate the encrypted states, and further provide the desired outputs in an encrypted form. After receiving the outputs from the server, the client can efficiently recover the correct results by decryption. This feature enables us to design delegated optimization strategies in a privacy-preserving fashion. We further discuss several intriguing aspects of learning under this framework, including lower communication complexity, less demand for local computational power, higher compatibility with error correction schemes, and provable quantum speedups with kernel methods.

Figure 1. A schematic illustration of quantum delegated and federated learning adapting quantum homomorphic encryption techniques. On the left side, we exhibit single-client quantum delegated learning. For the training data in the form of quantum states or classical bits, the client applies a quantum or classical one-time pad to encrypt it, respectively. Upon receiving the data, the server homomorphically operates on the encrypted data and returns the encrypted results, which contain the information for model optimization, to the client. After decrypting the results, the client could then update the model parameters. On the right side, the protocol is extended to the multi-party federated learning scenario, where different clients, each holding their private data, can collaboratively train a shared model.

Framework and theoretical background

We start with the theoretical framework for quantum delegated learning with quantum homomorphic encryption. Given a general n-qubit quantum state |ψ x 〉, an information-theoretical secure encryption way is to apply the quantum one-time pad to this state:

(1) $$\left| \left.\psi _{x}\right\rangle \right.\rightarrow (Z^{{a_{1}}}\otimes \ldots \otimes Z^{{a_{n}}})(X^{{b_{1}}}\otimes \ldots \otimes X^{{b_{n}}})\left| \left.\psi _{x}\right\rangle \right.,$$

where Z and X denote Pauli-Z and Pauli-X gates respectively, a i and b i are encryption keys chosen from {0, 1} randomly and independently (Ambainis et al., Reference Ambainis, Mosca, Tapp and De Wolf2000). For anyone without the keys a i and b i , this encrypted state is equivalent to a maximally mixed state and thus no information can be extracted. Since homomorphic encryption works with encrypted data, it would be desirable if compatible schemes could be designed for the above one-time-padded data to achieve high-level security. Yet, this is challenging unless either (1) the client sends over certain quantum states which contain information about the keys and can be exploited to implement quantum operations on the server, or (2) the information-theoretical security, which is strong, is converted to a computation-theoretical one, assuming the hardness of certain problems, such as learning with errors (Broadbent and Jeffery, Reference Broadbent, Jeffery, Gennaro and Robshaw2015; Mahadev, Reference Mahadev2020; Dulek et al., Reference Dulek, Schaffner, Speelman, Robshaw and Katz2016; Brakerski, Reference Brakerski, Shacham and Boldyreva2018; Fisher et al., Reference Fisher, Broadbent, Shalm, Yan, Lavoie, Prevedel, Jennewein and Resch2014; Ouyang et al., Reference Ouyang, Tan and Fitzsimons2018; Tham et al., Reference Tham, Ferretti, Bonsma-Fisher, Brodutch, Sanders, Steinberg and Jeffery2020; Ma and Li, Reference Ma and Li2022).

Here, we adapt the schemes from Refs. (Mahadev, Reference Mahadev2020; Dulek et al., Reference Dulek, Schaffner, Speelman, Robshaw and Katz2016; Brakerski, Reference Brakerski, Shacham and Boldyreva2018; Ma and Li, Reference Ma and Li2022) as technical subroutines for our framework. Instead of only encrypting the quantum data, the homomorphic encryption scheme includes two parallel computations. Let $\hat{f}({\bf a},{\bf b})$ denote the quantum encryption operation in Equations (1) and ${\rm Enc}({\bf a},{\bf b})$ be a classical encryption function, where ${\bf a},{\bf b}$ denote the classical keys a 1, …, a n and b 1, …, b n , respectively. For a given quantum sample |ψ x 〉, the client generates classical keys ${\bf a},{\bf b}$ , and sends both the encrypted state $\hat{f}({\bf a},{\bf b})\left| \left.\psi _{x}\right\rangle \right.$ and encrypted classical keys ${\rm Enc}({\bf a},{\bf b})$ to the server. By applying the quantum homomorphic encryption protocol, the server homomorphically applies a target operation U to the original state after receiving these two pieces of information. The data processing can be illustrated as

(2) $$\matrix{ {{\rm{Enc}}\left( {{\bf{a}},{\bf{b}}} \right) \to {\rm{Enc}}\left( {{\bf{a'}},{\bf{b'}}} \right),} \hfill \cr \cr{{\hat f\left( {{\bf{a}},{\bf{b}}} \right)\left| {{\psi _x}\rangle \to \hat f\left( {{\bf{a'}},{\bf{b'}}} \right)U} \right|{\psi _x}\rangle, } }} $$

where the encryption key is updated to ${\bf a}{\rm '},{\bf b}{\rm '}$ and the server can homomorphically compute ${\rm Enc}({\bf a}{\rm '},{\bf b}{\rm '})$ without access to the true values of ${\bf a}{\rm '}$ and ${\bf b}{\rm '}$ (Mahadev, Reference Mahadev2020). Besides, the setting for handling general quantum states can be relaxed to states on the computational basis in certain scenarios, which allows a purely classical client and will be discussed in the section on quantum learning advantages with kernel methods.

Delegated learning with an untrusted server

We first consider variational quantum classifiers, which is applicable to near-term quantum devices, in our delegated learning setting (Cerezo et al., Reference Cerezo, Arrasmith, Babbush, Benjamin, Endo, Fujii, McClean, Mitarai, Yuan, Cincio and Coles2021). The learning model is built on a parameterized quantum circuit denoted by U θ , where θ represents the collection of trainable parameters. For a training sample |ψ x (i)〉 indexed by i, the output of this model is an expectation value 〈ψ x (i)|U θ OU θ |ψ x (i)〉 for a certain observable O. By designing appropriate cost functions to measure the distance between the current output value and the target one, an optimization procedure can be applied to capture the data pattern and update circuit parameters. Assuming the label of this sample is y(i), the mean square error can be used as a cost function:

(3) $${C}_{{\rm MSE}}={1 \over N}\sum _{i} (\left\langle \left.\psi _{x}(i)\right| \right.U_{\boldsymbol{\theta }}^{\dagger }OU_{\boldsymbol{\theta }}\left| \left.\psi _{x}(i)\right\rangle \right.-y(i))^{2},$$

where N denotes the size of the training set.

The delegated learning procedure begins with encrypting the training data according to Equation (2) on the client’s side. To compile the variational quantum learning model in the homomorphic encryption scenario, it is worth considering the encryption protocol allowing efficient implementation of arbitrary single-qubit gates (Ma and Li, Reference Ma and Li2022). After the server homomorphically processes the data, the output quantum state becomes $\hat{f}({\bf a}{\rm '},{\bf b}{\rm '})U_{\boldsymbol{\theta }}|\psi _{x}\rangle$ with updated classical keys. In general, the prediction of the learned model is made according to the expectation value of certain local observables. Without loss of generality, we choose a two-label classification task and a Pauli-Z measurement on qubit indexed by k, that is Z k , as the prediction. The classification can be made by defining the expectation value of Z k over zero as class 1, and otherwise as class 2. However, since the output state is encrypted by ${\bf a}{\rm '}$ and ${\bf b}{\rm '}$ , we need to decode the measured values from the server accordingly. We note that $\left\langle \left.\psi _{x}(i)\right| \right.U_{\boldsymbol{\theta }}^{\dagger }\hat{f}^{\dagger }({\bf a}{\rm '},{\bf b}{\rm '})Z_{k}\hat{f}({\bf a}{\rm '},{\bf b}{\rm '})U_{\boldsymbol{\theta }}\left| \left.\psi _{x}(i)\right\rangle \right.$ can be simplified to (−1) b k ψ x (i)|U θ Z k U θ |ψ x (i)〉, where b k ′ is the k-th element in ${\bf b}{\rm '}$ . This indicates that the sign of the target output is also encrypted. On the server’s side, only the encrypted classical keys and encrypted states are available and it is impossible to obtain the correct output. On the contrary, the client holds the decryption key to the function Enc() and thus can efficiently decrypt the value of b k ′ after receiving ${\rm Enc}({\bf a}{\rm '},{\bf b}{\rm '})$ , after which the correct output value can be deciphered from the encrypted one.

The above idea has a direct application in delegated inference on a powerful quantum server which, for example, is equipped with a large-scale and fine-tuned quantum learning model. Such models may be built on sophisticated platforms and thus expensive, only deployed on the cloud and allowing clients to send computation queries remotely. For a general quantum state sample, a quantum one-time pad encrypts it first and the quantum learning model can make predictions on the encrypted data following the quantum homomorphic encryption protocol. Assume the output obtained by the server is w. With decryption keys of Enc(), only the client can decipher the classical keys ${\bf a}{\rm '},{\bf b}{\rm '}$ and make correct classification of this sample according to (−1) b k sign(w).

In addition to delegated inference, learning in a delegated fashion is also important in data-sensitive scenarios, for example an institution holds private health data while a server holds high computational power. This task reduces to implementing optimization under the homomorphic encryption scheme. Back to Equation (3), our goal is to optimize the variational parameters θ to minimize the cost function over the training set. During this procedure, a crucial step is to calculate the gradients of the cost function with respect to these parameters. To this end, we can apply finite difference methods or the parameter-shift rule (Mitarai et al., Reference Mitarai, Negoro, Kitagawa and Fujii2018; Schuld et al., Reference Schuld, Bergholm, Gogolin, Izaac and Killoran2019), both of which boil down to measuring the expectation values of the same observable by shifting certain parameters in the quantum circuit. Under the proposed delegated learning framework, the server can flexibly shift the model parameters and obtain the desired gradients in an encrypted form. The client decrypts the gradients and uploads the updated parameters to the server, which completes an optimization iteration.

Extension to federated learning

Federated machine learning, also known as collaborative training, allows the training of a shared model across multiple parties while keeping their private training data safe (Kairouz et al., Reference Kairouz, McMahan and Avent2021). Developing techniques along this line is crucial for scenarios where the data is sensitive and each party only holds a small share insufficient for training, such as limited patients data held by different hospitals. Federated learning is traditionally achieved by aggregating model updates computed by local parties to a central server (Kairouz et al., Reference Kairouz, McMahan and Avent2021), which has been extended to the quantum domain recently (Li et al., Reference Li, Lu and Deng2021; Chen and Yoo, Reference Chen and Yoo2021; Du et al., Reference Du, Qian, Wu and Tao2022; Zhao, Reference Zhao2023; Chu et al., Reference Chu, Jiang and Chen2023; Ren et al., Reference Ren, Yu, Yan, Xu, Shen, Zhu, Niyato, Dong and Kwek2024; Chehimi et al., Reference Chehimi, Chen, Saad, Towsley and Debbah2024). Yet, such a conventional approach would suffer from a trade-off between privacy preserving and local computational power requirement: if each party computes on their own devices and uploads the gradients to collaboratively train a model, there are high requirements for local computational power; Instead, if they upload their data directly to a central server to release local computational burden, a malicious server may violate their data privacy.

With the federated learning framework built upon quantum homomorphic encryption and delegated learning, we overcome the above trade-off and achieve both data privacy and the utilization of remote computational power. Suppose there are M independent parties, each holding their dataset with a limited size. A learning epoch proceeds by enumerating all the parties. For each party, a subset of samples are randomly selected. The samples are encrypted using the quantum one-time pad before being sent to the quantum server with the encrypted classical keys ${\rm Enc}({\bf a},{\bf b})$ . With a similar idea in delegated learning, by decrypting ${\rm Enc}({\bf a}{\rm '},{\bf b}{\rm '})$ to obtain the updated classical keys, the party can recover the correct gradient values of a given cost function. After taking a weighted sum of the calculated gradients over the selected samples in this party’s dataset, an update of model parameters is then uploaded to the quantum server. Such optimization can be iteratively applied until the training converges (Algorithm 2).

It is worth mentioning that, since the model parameters are publicly trained, there is inevitable private information flowing from training samples to the server. Previous works from both quantum (Li et al., 2021; Li, Kumar et al., Reference Li, Kumar, Song, Chakrabarti and Pistoia2024) and classical (Zhu et al., Reference Zhu, Liu and Han2019) community have shown that the uploaded gradients can be utilized to infer the input data through reverse engineering. This is an intrinsic feature for training a public model. To defend against potential attacks, various strategies can be applied as additional subroutines in the original protocol. An effective way is to adapt differential privacy and add appropriate noise to the calculated gradients, which provides an information-theoretical bound on the leaked privacy (Li et al., Reference Li, Lu and Deng2021; Abadi et al., Reference Abadi, Chu, Goodfellow, McMahan, Mironov, Talwar and Zhang2016). In the quantum learning setting, secure inner product estimation and secure weighted gradient summation techniques have also been explored and can be utilized to enhance privacy protection (Li, Kumar et al., Reference Li, Li, Amer, Shaydulin, Chakrabarti, Wang, Xu, Tang, Schoch, Kumar, Lim, Li, Cappellaro and Pistoia2024).

Algorithm 1. Quantum federated learning

Analysis

The framework introduced for quantum delegated and federated learning through quantum homomorphic encryption bears several intriguing merits. First, this approach reduces local computational burdens, ensuring that training on edge quantum devices is not necessary for data owners. For this point, delegated learning based on blind quantum computing also provides a solution. The difference lies in the fact that, unlike blind quantum computing where the server is treated as an unknowing entity, the server in our framework is fully capable of performing computations and knowing the algorithm without access to the original data. From an information-theoretical point of view, if the client hides all the information about the data and computation from the server - as achieved in the protocols based on blind computing - then for each round of delegated learning, the client has to transfer all the information about the quantum learning model to the server which might be a huge amount even in a classical description. In contrast, here in the proposed scheme we only focus on protecting the private data information, while the server holds the model to manipulate the encrypted data. In this way, the client only needs to send the training samples to the server and participate in the optimization procedure, while there is no need to hold and transfer the model information. A direct consequence of this feature is that there is substantially less communication required between the server and clients during the learning and inference processes, minimizing overhead in a distributed network.

Error correction

Aside from the communication complexity aspect, since the server directly works on the encrypted data and is in full control of executing the quantum circuit, quantum error correction schemes can be naturally applied without involving the client (Terhal, Reference Terhal2015). For protocols based on blind computing subroutines, hiding all the computational details from the server becomes a double-edged sword: On the one hand, perfect privacy can be achieved in single-party delegated learning. On the other hand, however, the client does not have detailed device information on the server, and the server has no knowledge about the delegated computation. Thus, error correction becomes comparably more demanding, with additional overhead and efforts on both the client and server for fault-tolerant delegated quantum learning (Morimae and Fujii, Reference Morimae and Fujii2012; Gheorghiu et al., Reference Gheorghiu, Kashefi and Wallden2015; Chien et al., Reference Chien, Meter and Kuo2015).

Computational learning advantage

In the delegated learning scenario, designing quantum learning tasks with computational advantages is more challenging. On the one hand, transferring training data to the server or preparing initial states remotely will bring additional computational costs, and quantifying quantum speedups becomes more subtle: For example, in the well-known quantum support vector machine protocol (Rebentrost et al., Reference Rebentrost, Mohseni and Lloyd2014), by querying a data oracle, the learning model finally achieves the running time scaling as 𝒪(log(Nd)), where N and d denote the number of samples and dimension of the feature space, respectively. This features an exponential speedup over the classical methods. However, in the delegated learning setting, transferring such a dataset immediately brings 𝒪(Nd) complexity, which nullifies all the speedups. On the other hand, cryptographic methods are applied to operate on encrypted data, which brings additional overheads on the server’s side. To exhibit speedups in quantum learning under our framework, we consider the case of learning with classical data (Liu et al., Reference Liu, Arunachalam and Temme2021; Sweke et al., Reference Sweke, Seifert, Hangleiter and Eisert2021; Jerbi et al., Reference Jerbi, Gyurik, Marshall, Molteni and Dunjko2024). More specifically, we consider a concept class defined based on the discrete logarithm problem (Liu et al., Reference Liu, Arunachalam and Temme2021; Gyurik and Dunjko, Reference Gyurik and Dunjko2023):

Definition 1 For an n-bit prime number p with a generator a of p *, we define the concept class based on the discrete logarithm problem as 𝒞 n DLP = {c i } i ∈ ℤ p *, where

(4) $${c_i}\left( x \right) = \left( {\matrix{ { + 1,} \hfill & {if{\rm{\;lo}}{{\rm{g}}_a}\ x \in \left[ {i,i + {{p - 3} \over 2}} \right],} \hfill \cr { - 1,} \hfill & {otherwise.} \hfill \cr } } \right.$$

Assuming the hardness of the discrete logarithm problem, it is classically intractable to learn the above concept class (Liu et al., Reference Liu, Arunachalam and Temme2021). For a quantum learner, for any sample x, it can efficiently prepare the feature state $|\phi (x)\rangle ={1 \over \sqrt{2^{k}}}\sum _{i=0}^{2^{k}-1} \left| \left.xa^{i}\right\rangle \right.$ where k = nt log n for a constant t (Liu et al., Reference Liu, Arunachalam and Temme2021). By estimating the inner products of these feature states, we obtain a kernel matrix that further allows a classical computer to build a linear classifier.

In our proposed framework, since the data is in the form of bit strings, the encrypted state $\hat{f}({\bf a},{\bf b})|\psi _{x}\rangle$ is also in the computational basis. Thus, we can instead send the corresponding encrypted classical bit string to the server and let the server prepare the initial state, releasing the requirement of limited quantum power for the clients. In other words, the clients can be purely classical without any quantum power in our scenario. By sending both the data and ancillary bits in encrypted forms and homomorphically applying the feature mappings, the server obtains the encrypted feature state ${1 \over \sqrt{2^{k}}}\sum _{i=0}^{2^{k}-1} \hat{f}({\bf a},{\bf b})\left| \left.xa^{i}\right\rangle \right.$ . To estimate the kernel element between two samples x 1 and x 2, we apply the same quantum one-time pad $\hat{f}({\bf a},{\bf b})$ so that the inner product of the two encrypted output states is exactly the desired kernel element. During this process, sending classical bit strings takes 𝒪(N 2 d/ϵ 2) additional complexity with N, d, and ϵ being the number of samples, the data dimensionality, and the target additive error, respectively. Meanwhile, quantum homomorphic encryption brings a constant overhead for each gate. Thus in all, the delegated learning framework takes at most polynomial computational overheads, and the exponential quantum-classical learning separation still holds. We mention that the above computational learning advantage is not limited to the discrete logarithm concept class. By designing proper learning problems, similar protocols may be implemented, for example for the discrete cube root problems (Gyurik and Dunjko, Reference Gyurik and Dunjko2023; Kearns and Vazirani, Reference Kearns and Vazirani1994), with a final goal towards practical and real-life applications.

Conclusions and outlooks

In this work, we have developed a quantum delegated and federated learning framework based on quantum homomorphic encryption, which guarantees computation-theoretic privacy while leveraging the computational power of quantum servers. Our framework allows for training and inference on encrypted data with reduced communication complexity, making it a promising approach for future quantum cloud services. The delegation of computation to quantum servers not only removes the computational burden for clients but also preserves provable quantum speedups in certain learning tasks employing kernel methods.

This work makes a primary step forward in enabling delegated, secure, scalable, and efficient quantum machine learning systems. Future studies could focus on extending the framework to more complex learning models and improving the privacy guarantees through advanced cryptographic techniques. In addition, integrating cutting-edge classical learning models into the framework could further enhance its real-world applicability. While promising, several challenges remain to be addressed. One issue involves managing the inevitable information leakage that occurs when publicly trained models, such as federated quantum learning models, are reverse-engineered to infer private training data. Although techniques like differential privacy can mitigate such risks as discussed above, additional work is needed to ensure robust protection in other scenarios. Finally, while the current framework reduces local computational requirements to a certain degree, the quantum homomorphic encryption adds a constant yet large prefactor to the overall complexity on the server’s side. This renders its experimental demonstration with current noisy intermediate-scale quantum devices unattainable. Developing more efficient protocols that could further enhance scalability and minimize computational complexity would be crucial for both near-term and future applications.

Data availability statement

Data availability is not applicable to this article as no new data were created or analyzed in this study.

Acknowledgements

We thank Qi Ye, Si Jiang, Junyu Liu, and Dong Yuan for their helpful discussions.

Author contribution

WL and DLD conceived and designed the study and wrote the article.

Financial support

This work is supported by the National Natural Science Foundation of China (Grants No. 12075128 and No. T2225008), the Innovation Program for Quantum Science and Technology (No. 2021ZD0302203), Tsinghua University Dushi Program, and the Shanghai Qi Zhi Institute Innovation Program SQZ202318.

Competing interests

The authors declare no conflicts of interest.

Ethics statement

Ethical approval and consent are not relevant to this article type.

References

Connections references

D.’Auria, V and Teller, M (2023) What are the priorities and the points to be addressed by a legal framework for quantum technologies? Research Directions: Quantum Technologies. 1, e9. https://doi.org/10.1017/qut.2023.3.Google Scholar

References

Abadi, M, Chu, A, Goodfellow, I, McMahan, HB, Mironov, I, Talwar, K and Zhang, L (2016) Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16 (Association for Computing Machinery, New York, NY, USA, pp. 308318.Google Scholar
Ambainis, A, Mosca, M, Tapp, A and De Wolf, R (2000) Private quantum channels. In Proceedings 41st Annual Symposium on Foundations of Computer Science, pp. 547553.Google Scholar
Anshu, A and Arunachalam, S (2024) A survey on the complexity of learning quantum states. Nature Reviews Physics 6(1), 5969. https://doi.org/10.1038/s42254-023-00662-4.Google Scholar
Banchi, L, Pereira, JL, Jose, ST and Simeone, O (2024) Statistical complexity of quantum learning. Advanced Quantum Technologies 2024, 2300311.Google Scholar
Biamonte, J, Wittek, P, Pancotti, N, Rebentrost, P, Wiebe, N and Lloyd, S (2017) Quantum machine learning. Nature 549(7671), 195202. https://doi.org/10.1038/nature23474.Google Scholar
Brakerski, Z (2018) Quantum FHE (almost) as secure as classical. In Shacham, H and Boldyreva, A (eds.), Advances in Cryptology – CRYPTO 2018. Cham: Springer International Publishing, pp. 6795.Google Scholar
Broadbent, A, Fitzsimons, J and Kashefi, E (2009) Universal blind quantum computation. In 2009 50th Annual IEEE Symposium on Foundations of Computer Science, pp. 517526.Google Scholar
Broadbent, A and Jeffery, S (2015) Quantum homomorphic encryption for circuits of low T-gate complexity. In Gennaro, R and Robshaw, M (eds), Advances in Cryptology – CRYPTO 2015. Berlin, Heidelberg: Springer, pp. 609629.Google Scholar
Caro, MC, Hinsche, M, Ioannou, M, Nietner, A and Sweke, R (2024) Classical verification of quantum learning. In 15th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl Leibniz-Zentrum für Informatik.Google Scholar
Cerezo, M, Arrasmith, A, Babbush, R, Benjamin, SC, Endo, S, Fujii, K, McClean, JR, Mitarai, K, Yuan, X, Cincio, L and Coles, PJ (2021) Variational quantum algorithms. Nature Reviews Physics 3(9), 625644. https://doi.org/10.1038/s42254-021-00348-9.Google Scholar
Cerezo, M, Verdon, G, Huang, H-Y, Cincio, L and Coles, PJ (2022) Challenges and opportunities in quantum machine learning. Nature Computational Science 2(9), 567576. https://doi.org/10.1038/s43588-022-00311-3.Google Scholar
Chehimi, M, Chen, SY-C, Saad, W, Towsley, D and Debbah, M (2024) Foundations of quantum federated learning over classical and quantum networks. IEEE Network 38(1), 124130. https://doi.org/10.1109/MNET.2023.3327365.Google Scholar
Chen, SY-C and Yoo, S (2021) Federated quantum machine learning. Entropy 23(4), 460. https://doi.org/10.3390/e23040460.Google Scholar
Chien, C-H, Meter, RV and Kuo, S-Y (2015) Fault-tolerant operations for universal blind quantum computation. Journal on Emerging Technologies in Computing Systems 12(1), 126. https://doi.org/10.1145/2700248.Google Scholar
Childs, AM (2005) Secure assisted quantum computation. Quantum Information & Computation 5(6), 456466.Google Scholar
Chu, C, Jiang, L and Chen, F (2023) CryptoQFL: quantum federated learning on encrypted data. In IEEE International Conference on Quantum Computing and Engineering (QCE), vol. 01, pp. 12311237.Google Scholar
Daley, AJ, Bloch, I, Kokail, C, Flannigan, S, Pearson, N, Troyer, M and Zoller, P (2022) Practical quantum advantage in quantum simulation. Nature 607(7920), 667676. https://doi.org/10.1038/s41586-022-04940-6.Google Scholar
Du, Y, Qian, Y, Wu, X and Tao, D (2022) A distributed learning scheme for variational quantum algorithms. IEEE Transactions on Quantum Engineering 3, 116. https://doi.org/10.1109/TQE.2022.3175267.Google Scholar
Dulek, Y, Schaffner, C and Speelman, F (2016) Quantum homomorphic encryption for polynomial-sized circuits. In Robshaw, M and Katz, J (eds.), In, Advances in Cryptology – CRYPTO 2016. Berlin, Heidelberg: Springer, pp. 332.Google Scholar
Dunjko, V and Briegel, HJ (2018) Machine learning & artificial intelligence in the quantum domain: A review of recent progress. Reports on Progress in Physics 81(7), 074001. https://doi.org/10.1088/1361-6633/aab406.Google Scholar
Fisher, KAG, Broadbent, A, Shalm, LK, Yan, Z, Lavoie, J, Prevedel, R, Jennewein, T and Resch, KJ (2014) Quantum computing on encrypted data. Nature Communications 5, 3074.Google Scholar
Flöther, FF (2023) The state of quantum computing applications in health and medicine. Research Directions: Quantum Technologies 1, e10.Google Scholar
Gao, X, Anschuetz, ER, Wang, S-T, Cirac, JI and Lukin, MD (2022) Enhancing generative models via quantum correlations. Physical Review X 12, 021037.Google Scholar
Gheorghiu, A, Kashefi, E and Wallden, P (2015) Robustness and device independence of verifiable blind quantum computing. New Journal of Physics 17(8), 083040. https://doi.org/10.1088/1367-2630/17/8/083040.Google Scholar
Gyurik, C and Dunjko, V (2023) Exponential separations between classical and quantum learners, arXiv: 2306.16028.Google Scholar
Hai, R, Hung, S-H, Coopmans, T and Geerts, F (2024) Data management in the noisy intermediate-scale quantum era, arXiv: 2409.14111.Google Scholar
Huang, H-Y, Broughton, M, Cotler, J, Chen, S, Li, J, Mohseni, M, Neven, H, Babbush, R, Kueng, R, Preskill, J and McClean, JR (2022) Quantum advantage in learning from experiments. Science 376(6598), 11821186. https://doi.org/10.1126/science.abn7293.Google Scholar
Jerbi, S, Gyurik, C, Marshall, SC, Molteni, R and Dunjko, V (2024) Shadows of quantum machine learning. Nature Communications 15(1), 5676. https://doi.org/10.1038/s41467-024-49877-8.Google Scholar
Kairouz, P, McMahan, HB, Avent, B, et al. (2021) Advances and open problems in federated learning Foundations and Trends® in Machine Learning 14(1–2), 1210.Google Scholar
Kearns, MJ and Vazirani, U (1994) An Introduction to Computational Learning Theory. Cambridge, MA, USA: MIT Press.Google Scholar
Li, C, Kumar, N, Song, Z, Chakrabarti, S and Pistoia, M (2024) Privacy-preserving quantum federated learning via gradient hiding. Quantum Science and Technology 9, 035028.Google Scholar
Li, C, Li, B, Amer, O, Shaydulin, R, Chakrabarti, S, Wang, G, Xu, H, Tang, H, Schoch, I, Kumar, N, Lim, C, Li, J, Cappellaro, P and Pistoia, M (2024) Blind quantum machine learning with quantum bipartite correlator. Physical Review Letters 133(12), 120602. https://doi.org/10.1103/PhysRevLett.133.120602.Google Scholar
Li, Q, Quan, J, Shi, J, Zhang, S and Li, X (2024) Secure delegated variational quantum algorithms. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 43(10), 31293142. https://doi.org/10.1109/TCAD.2024.3391690.Google Scholar
Li, W, Lu, S and Deng, D-L (2021) Quantum federated learning through blind quantum computing. Science China Physics, Mechanics & Astronomy 64(10), 100312. https://doi.org/10.1007/s11433-021-1753-3.Google Scholar
Liu, J and Jiang, L (2024) Quantum data center: Perspectives. IEEE Network 38(5), 160166. https://doi.org/10.1109/MNET.2024.3397836.Google Scholar
Liu, Y, Arunachalam, S and Temme, K (2021) A rigorous and robust quantum speed-up in supervised machine learning. Nature Physics 17(9), 10131017. https://doi.org/10.1038/s41567-021-01287-z.Google Scholar
Ma, G and Li, H (2022) Quantum fully homomorphic encryption by integrating pauli one-time pad with quaternions. Quantum 6, 866. https://doi.org/10.22331/q.Google Scholar
Mahadev, U (2020) Classical homomorphic encryption for quantum circuits. Siam Journal on Computing 52, FOCS18.Google Scholar
Mitarai, K, Negoro, M, Kitagawa, M and Fujii, K (2018) Quantum circuit learning. Physical Review A 98(3), 032309. https://doi.org/10.1103/PhysRevA.98.032309.Google Scholar
Molteni, R, Gyurik, C and Dunjko, V (2024) Exponential quantum advantages in learning quantum observables from classical data, arXiv: 2405.02027.Google Scholar
Morimae, T and Fujii, K (2012) Blind topological measurement-based quantum computation. Nature Communications 3(1), 1036. https://doi.org/10.1038/ncomms2043.Google Scholar
Ouyang, Y, Tan, S-H and Fitzsimons, JF (2018) Quantum homomorphic encryption from quantum codes. Physical Review A 98(4), 042334. https://doi.org/10.1103/PhysRevA.98.042334.Google Scholar
Rebentrost, P, Mohseni, M and Lloyd, S (2014) Quantum support vector machine for big data classification. Physical Review Letters 113(13), 130503. https://doi.org/10.1103/PhysRevLett.113.130503.Google Scholar
Ren, C, Yu, H, Yan, R, Xu, M, Shen, Y, Zhu, H, Niyato, D, Dong, ZY and Kwek, LC (2024) Towards Quantum Federated Learning, arXiv: 2306.09912.Google Scholar
Sarma, S Das, Deng, D-L and Duan, L-M (2019) Machine learning meets quantum physics. Physics Today 72(3), 4854. https://doi.org/10.1063/PT.3.4164.Google Scholar
Schuld, M, Bergholm, V, Gogolin, C, Izaac, J and Killoran, N (2019) Evaluating analytic gradients on quantum hardware. Physical Review A 99(3), 032331. https://doi.org/10.1103/PhysRevA.99.032331.Google Scholar
Sheng, Y-B and Zhou, L (2017) Distributed secure quantum machine learning. Science Bulletin 62(14), 10251029. https://doi.org/10.1016/j.scib.2017.06.007.Google Scholar
Sweke, R, Seifert, J-P, Hangleiter, D and Eisert, J (2021) On the quantum versus classical learnability of discrete distributions. Quantum 5, 417. https://doi.org/10.22331/q.Google Scholar
Terhal, BM (2015) Quantum error correction for quantum memories. Reviews of Modern Physics 87(2), 307346. https://doi.org/10.1103/RevModPhys.87.307.Google Scholar
Tham, WK, Ferretti, H, Bonsma-Fisher, K, Brodutch, A, Sanders, BC, Steinberg, AM and Jeffery, S (2020) Experimental demonstration of quantum fully homomorphic encryption with application in a two-party secure protocol. Physical Review X 10, 011038.Google Scholar
Zhang, Z, Gong, W, Li, W and Deng, D-L (2024) Quantum-classical separations in shallow-circuit-based learning with and without noises. Communications Physics 7, 290.Google Scholar
Zhao, H (2023) Non-IID quantum federated learning with one-shot communication complexity. Quantum Machine Intelligence 5, 3.Google Scholar
Zhu, L, Liu, Z and Han, S (2019) Deep leakage from gradients. In Advances in Neural Information Processing Systems, vol. 32. Vancouver, Canada: Curran Associates, Inc.Google Scholar
Figure 0

Figure 1. A schematic illustration of quantum delegated and federated learning adapting quantum homomorphic encryption techniques. On the left side, we exhibit single-client quantum delegated learning. For the training data in the form of quantum states or classical bits, the client applies a quantum or classical one-time pad to encrypt it, respectively. Upon receiving the data, the server homomorphically operates on the encrypted data and returns the encrypted results, which contain the information for model optimization, to the client. After decrypting the results, the client could then update the model parameters. On the right side, the protocol is extended to the multi-party federated learning scenario, where different clients, each holding their private data, can collaboratively train a shared model.

Figure 1

Algorithm 1. Quantum federated learning

Author Comment: Quantum delegated and federated learning via quantum homomorphic encryption — R0/PR1

Comments

No accompanying comment.

Decision: Quantum delegated and federated learning via quantum homomorphic encryption — R0/PR2

Comments

No accompanying comment.