Relativistic quantum private database queries
详细信息    查看全文
  • 作者:Si-Jia Sun (1)
    Yu-Guang Yang (1) (2)
    Ming-Ou Zhang (1)

    1. College of Computer Science and Technology
    ; Beijing University of Technology ; Beijing ; 100124 ; China
    2. State Key Laboratory of Information Security
    ; Institute of Information Engineering ; Chinese Academy of Sciences ; Beijing ; 100093 ; China
  • 关键词:Quantum private database query ; Quantum key distribution ; Quantum bit commitment ; User privacy ; Database privacy
  • 刊名:Quantum Information Processing
  • 出版年:2015
  • 出版时间:April 2015
  • 年:2015
  • 卷:14
  • 期:4
  • 页码:1443-1450
  • 全文大小:297 KB
  • 参考文献:1. Gertner, Y, Ishai, Y, Kushilevitz, E, Malkin, T (2000) Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60: pp. 592-629 CrossRef
    2. Kerenidis, I, Wolf, R (2004) Quantum symmetrically-private information retrieval. Inf. Process. Lett. 90: pp. 109-114 CrossRef
    3. Giovannetti, V, Lloyd, S, Maccone, L (2008) Quantum private queries. Phys. Rev. Lett. 100: pp. 230502 CrossRef
    4. Giovannetti, V, Lloyd, S, Maccone, L (2010) Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56: pp. 3465-3477 CrossRef
    5. Martini, FD, Giovannetti, V, Lloyd, S, Maccone, L, Nagali, E, Sansoni, L, Sciarrino, F (2009) Experimental quantum private queries with linear optics. Phys. Rev. A 80: pp. 010302 CrossRef
    6. Olejnik, L (2011) Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84: pp. 022313 CrossRef
    7. Jakobi, M, Simon, C, Gisin, N, Bancal, JD, Branciard, C, Walenta, N, Zbinden, H (2011) Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83: pp. 022301 CrossRef
    8. Scarani, V, Acin, A, Ribordy, G, Gisin, N (2004) Quantum cryptography protocols robust against photon number splitting attacks for. Phys. Rev. Lett. 92: pp. 057901 CrossRef
    9. Gao, F, Liu, B, Wen, Q-Y (2012) Flexible quantum private queries based on quantum key distribution. Opt. Express 20: pp. 17411-17420 CrossRef
    10. Zhang, J-L, Guo, F-Z, Gao, F, Liu, B, Wen, Q-Y (2013) Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88: pp. 022334 CrossRef
    11. Yang, Y-G, Sun, S-J, Xu, P, Tian, J (2014) Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13: pp. 805-813 CrossRef
    12. Yang, Y-G, Sun, S-J, Tian, J, Xu, P (2014) Secure quantum private query with real-time security check. Optik 125: pp. 5538-5541 CrossRef
    13. Wang, C, Hao, L, Zhao, LJ (2011) Implementation of quantum private queries using nuclear magnetic resonance. Chin. Phys. Lett. 28: pp. 080302 CrossRef
    14. Chan, P, Lucio-Martinez, I, Mo, XF, Simon, C, Tittel, W (2014) Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4: pp. 05233
    15. Yang, Y-G, Zhang, MO, Yang, R (2014) Private database queries using one quantum state. Quantum Inf. Process..
    16. Yu, F, Qiu, DW (2014) Coding-based quantum private database query using entanglement. Quantum Inf. Comput. 14: pp. 91-106
    17. Mayers, D.: Unconditionally secure quantum bit commitment is impossible. In: Proceedings of the Fourth Workshop on Physics and Computation, PhysComp鈥?6, pp. 226鈥?28 (1993)
    18. Mayers, D (1997) Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78: pp. 3414-3417 CrossRef
    19. Lo, H.-K., Chau, H.F.: Why quantum bit commitment and ideal quantum coin toss-ing are impossible. In: Proceedings of the Fourth Workshop on Physics and Computation, PhysComp鈥?6, p. 76 (1996)
    20. Lo, H-K, Chau, HF (1997) Is quantum bit commitment really possible?. Phys. Rev. Lett. 78: pp. 3410-3413 CrossRef
    21. Kitaev, A, Mayers, D, Preskill, J (2004) Superselection rules and quantum protocols. Phys. Rev. A 69: pp. 052326 CrossRef
    22. D鈥橝riano, GM, Kretschmann, D, Schlingemann, D, Werner, RF (2007) Reexamination of quantum bit commitment: the possible and the impossible. Phys. Rev. A 76: pp. 032328 CrossRef
    23. Kent, A (1999) Unconditionally secure bit commitment. Phys. Rev. Lett. 83: pp. 1447-1450 CrossRef
    24. Kent, A (2005) Secure classical bit commitment using fixed capacity communication channels. J. Cryptol. 18: pp. 313-335 CrossRef
    25. Kent, A (2011) Unconditionally secure bit commitment with flying qudits. New J. Phys. 13: pp. 113015 CrossRef
    26. Kent, A (2012) Unconditionally secure bit commitment by transmitting measurement outcomes. Phys. Rev. Lett. 109: pp. 130501 CrossRef
    27. Liu, Y, Cao, Y, Curty, M (2014) Experimental unconditionally secure bit commitment. Phys. Rev. Lett. 112: pp. 010504 CrossRef
    28. Lunghi, T, Kaniewski, J, Bussieres, F (2013) Experimental bit commitment based on quantum communication and special relativity. Phys. Rev. Lett. 111: pp. 180504 CrossRef
    29. Long, GL, Liu, XS (2002) Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65: pp. 032302 CrossRef
    30. Deng, FG, Long, GL, Liu, XS (2003) Two-step quantum direct communication protocol using the Einstein鈥揚odolsky鈥揜osen pair block. Phys. Rev. A 68: pp. 042317 CrossRef
    31. Bennett, H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems and Signal Processing, pp. 175鈥?79. IEEE, New York (1984)
  • 刊物类别:Physics and Astronomy
  • 刊物主题:Physics
    Physics
    Mathematics
    Engineering, general
    Computer Science, general
    Characterization and Evaluation Materials
  • 出版者:Springer Netherlands
  • ISSN:1573-1332
文摘
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700