参考文献:1. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592鈥?29 (2000) CrossRef 2. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1995), pp. 41鈥?1 (1995) 3. Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154鈥?162 (1997) CrossRef 4. Kerenidis, I., de Wolf, R.: Quantum symmetrically-private information retrieval. Inf. Process. Lett. 90, 109鈥?14 (2004) CrossRef 5. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008) CrossRef 6. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theor. 56, 3465鈥?477 (2010) CrossRef 7. Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80, 010302 (2009) CrossRef 8. Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011) CrossRef 9. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011) CrossRef 10. Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20, 17411鈥?7420 (2012) CrossRef 11. Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805鈥?13 (2014) CrossRef 12. Zhang, J.-L., Guo, F.-Z., Gao, F., Liu, B., Wen, Q.-Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013) CrossRef 13. Chan, P., Lucio-Martinez, I., Mo, X.F., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 05233 (2014) 14. Scarani, V., Ac鈥櫮眓, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004) CrossRef 15. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York), pp. 175鈥?79 (1984) 16. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121鈥?124 (1992) CrossRef 17. Tamaki, K., L眉tkenhaus, N.: Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69, 032316 (2004) CrossRef 18. Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90, 167904 (2003) CrossRef 19. Phoenix, S.J.D., Barnett, S.M., Chefles, A.: Three-state quantum cryptography. J. Mod. Opt. 47, 507 (2000) CrossRef 20. Boileau, J.-C., Tamaki, K., Batuwantudawe, J., Laflamme, R., Renes, J.M.: Unconditional security of a three state quantum key distribution protocol. Phys. Rev. Lett. 94, 040503 (2005) CrossRef 21. Mor, T.: No cloning of orthogonal states in composite systems. Phys. Rev. Lett. 80, 3137鈥?140 (1998) CrossRef 22. Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009) CrossRef 23. Gisin, N., Fasel, S., Kraus, B., Zbinden, Z., Ribordy, G.: Trojan horse attacks on quantum key distribution systems. Phys. Rev. A 73, 022320 (2006) 24. Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23鈥?5 (2006) CrossRef 25. Deng, F.G., Zhou, P., Li, X.H., et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv: quant-ph/0508168 26. Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976) 27. Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on 鈥淪ecure direct communication with a quantum one-time pad鈥? Phys. Rev. A 72, 016301 (2005) CrossRef 28. Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79, 054303 (2009) CrossRef 29. Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999) science.283.5410.2050" target="_blank" title="It opens in new window">CrossRef 30. Brassard, G., L眉tkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000) CrossRef
刊物类别:Physics and Astronomy
刊物主题:Physics Physics Mathematics Engineering, general Computer Science, general Characterization and Evaluation Materials
出版者:Springer Netherlands
ISSN:1573-1332
文摘
A novel private database query protocol with only one quantum state is proposed. The database owner Bob sends only one quantum state to the user Alice. The proposed protocol combines the idea of semiquantum key distribution and private query. It can be implemented in the situation where not all the parties can afford expensive quantum resources and operations. So our proposal is more practical in use. We also prove that the proposed protocol is secure in terms of the user security and the database security.