Private database queries using one quantum state
详细信息    查看全文
  • 作者:Yu-Guang Yang (1) (2)
    Ming-Ou Zhang (1)
    Rui Yang (1)

    1. College of Computer Science and Technology
    ; Beijing University of Technology ; Beijing ; 100124 ; China
    2. State Key Laboratory of Information Security Institute of Information Engineering
    ; Chinese Academy of Sciences ; Beijing ; 100093 ; China
  • 关键词:Quantum private query ; Semiquantum key distribution ; User security ; Database security
  • 刊名:Quantum Information Processing
  • 出版年:2015
  • 出版时间:March 2015
  • 年:2015
  • 卷:14
  • 期:3
  • 页码:1017-1024
  • 全文大小:131 KB
  • 参考文献:1. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592鈥?29 (2000) CrossRef
    2. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1995), pp. 41鈥?1 (1995)
    3. Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154鈥?162 (1997) CrossRef
    4. Kerenidis, I., de Wolf, R.: Quantum symmetrically-private information retrieval. Inf. Process. Lett. 90, 109鈥?14 (2004) CrossRef
    5. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008) CrossRef
    6. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theor. 56, 3465鈥?477 (2010) CrossRef
    7. Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80, 010302 (2009) CrossRef
    8. Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011) CrossRef
    9. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011) CrossRef
    10. Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20, 17411鈥?7420 (2012) CrossRef
    11. Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805鈥?13 (2014) CrossRef
    12. Zhang, J.-L., Guo, F.-Z., Gao, F., Liu, B., Wen, Q.-Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013) CrossRef
    13. Chan, P., Lucio-Martinez, I., Mo, X.F., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 05233 (2014)
    14. Scarani, V., Ac鈥櫮眓, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004) CrossRef
    15. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York), pp. 175鈥?79 (1984)
    16. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121鈥?124 (1992) CrossRef
    17. Tamaki, K., L眉tkenhaus, N.: Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69, 032316 (2004) CrossRef
    18. Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90, 167904 (2003) CrossRef
    19. Phoenix, S.J.D., Barnett, S.M., Chefles, A.: Three-state quantum cryptography. J. Mod. Opt. 47, 507 (2000) CrossRef
    20. Boileau, J.-C., Tamaki, K., Batuwantudawe, J., Laflamme, R., Renes, J.M.: Unconditional security of a three state quantum key distribution protocol. Phys. Rev. Lett. 94, 040503 (2005) CrossRef
    21. Mor, T.: No cloning of orthogonal states in composite systems. Phys. Rev. Lett. 80, 3137鈥?140 (1998) CrossRef
    22. Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009) CrossRef
    23. Gisin, N., Fasel, S., Kraus, B., Zbinden, Z., Ribordy, G.: Trojan horse attacks on quantum key distribution systems. Phys. Rev. A 73, 022320 (2006)
    24. Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23鈥?5 (2006) CrossRef
    25. Deng, F.G., Zhou, P., Li, X.H., et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv: quant-ph/0508168
    26. Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976)
    27. Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on 鈥淪ecure direct communication with a quantum one-time pad鈥? Phys. Rev. A 72, 016301 (2005) CrossRef
    28. Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79, 054303 (2009) CrossRef
    29. Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999) science.283.5410.2050" target="_blank" title="It opens in new window">CrossRef
    30. Brassard, G., L眉tkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000) CrossRef
  • 刊物类别:Physics and Astronomy
  • 刊物主题:Physics
    Physics
    Mathematics
    Engineering, general
    Computer Science, general
    Characterization and Evaluation Materials
  • 出版者:Springer Netherlands
  • ISSN:1573-1332
文摘
A novel private database query protocol with only one quantum state is proposed. The database owner Bob sends only one quantum state to the user Alice. The proposed protocol combines the idea of semiquantum key distribution and private query. It can be implemented in the situation where not all the parties can afford expensive quantum resources and operations. So our proposal is more practical in use. We also prove that the proposed protocol is secure in terms of the user security and the database security.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700