TY - GEN
T1 - Detailed Cryptanalysis of “Privacy-Preserving Quantum Federated Learning via Gradient Hiding”
AU - Iqbal, Zafar
AU - Hassan, Syed Zohaib
AU - Zhao, Jie
AU - Umme, Shafiya Mubeen
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
PY - 2026
Y1 - 2026
N2 - Quantum Federated Learning (QFL) has crystallized as a formidable paradigm that aspires to reconcile distributed intelligence with uncompromised privacy. Notably, the protocol articulated by Changhao Li et al. [1], which harnesses gradient concealment through Blind Quantum Bipartite Correlators and GHZ-entangled states, epitomizes this ambition. However, its ostensible guarantees remain largely untested against sophisticated adversarial models capable of subverting quantum safeguards. In this study, we undertake a rigorous cryptographic dissection of the protocol, constructing formal threat models encompassing twelve distinct attack vectors, from phase manipulation and amplitude distortion to entanglement erosion and replay amplification. Through meticulous mathematical scrutiny, we demonstrate that these vectors can precipitate the disclosure of private gradients and compromise aggregation fidelity. To remediate these deficiencies, we propose a cohesive set of countermeasures, including randomized phase obfuscation, authenticated quantum encodings, and temporal binding strategies. These contributions collectively advance a resilient architectural framework, charting a credible path toward quantum-secure federated learning in adversarial settings.
AB - Quantum Federated Learning (QFL) has crystallized as a formidable paradigm that aspires to reconcile distributed intelligence with uncompromised privacy. Notably, the protocol articulated by Changhao Li et al. [1], which harnesses gradient concealment through Blind Quantum Bipartite Correlators and GHZ-entangled states, epitomizes this ambition. However, its ostensible guarantees remain largely untested against sophisticated adversarial models capable of subverting quantum safeguards. In this study, we undertake a rigorous cryptographic dissection of the protocol, constructing formal threat models encompassing twelve distinct attack vectors, from phase manipulation and amplitude distortion to entanglement erosion and replay amplification. Through meticulous mathematical scrutiny, we demonstrate that these vectors can precipitate the disclosure of private gradients and compromise aggregation fidelity. To remediate these deficiencies, we propose a cohesive set of countermeasures, including randomized phase obfuscation, authenticated quantum encodings, and temporal binding strategies. These contributions collectively advance a resilient architectural framework, charting a credible path toward quantum-secure federated learning in adversarial settings.
UR - https://www.scopus.com/pages/publications/105027172319
UR - https://www.scopus.com/pages/publications/105027172319#tab=citedBy
U2 - 10.1007/978-3-032-08977-9_30
DO - 10.1007/978-3-032-08977-9_30
M3 - Conference contribution
AN - SCOPUS:105027172319
SN - 9783032089762
T3 - Communications in Computer and Information Science
SP - 481
EP - 499
BT - SEET - Software Engineering for Emerging Technologies - 1st International Conference, SEET 2025, Proceedings
A2 - Hussain, Shahid
A2 - Khan, Arif Ali
A2 - Abdul Basit Ur Rahim, Muhammad
A2 - Khan, Saif Ur Rehman
PB - Springer Science and Business Media Deutschland GmbH
T2 - 1st International Conference on Software Engineering of Emerging Technologies, SEET 2025
Y2 - 11 August 2025 through 12 August 2025
ER -