Skip to main content
Erschienen in: Quantum Information Processing 3/2015

01.03.2015

Private database queries using one quantum state

verfasst von: Yu-Guang Yang, Ming-Ou Zhang, Rui Yang

Erschienen in: Quantum Information Processing | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A novel private database query protocol with only one quantum state is proposed. The database owner Bob sends only one quantum state to the user Alice. The proposed protocol combines the idea of semiquantum key distribution and private query. It can be implemented in the situation where not all the parties can afford expensive quantum resources and operations. So our proposal is more practical in use. We also prove that the proposed protocol is secure in terms of the user security and the database security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)CrossRefMATHMathSciNet Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)CrossRefMATHMathSciNet
2.
Zurück zum Zitat Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1995), pp. 41–51 (1995) Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1995), pp. 41–51 (1995)
3.
Zurück zum Zitat Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154–1162 (1997)CrossRefADS Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154–1162 (1997)CrossRefADS
4.
Zurück zum Zitat Kerenidis, I., de Wolf, R.: Quantum symmetrically-private information retrieval. Inf. Process. Lett. 90, 109–114 (2004)CrossRefMATH Kerenidis, I., de Wolf, R.: Quantum symmetrically-private information retrieval. Inf. Process. Lett. 90, 109–114 (2004)CrossRefMATH
6.
Zurück zum Zitat Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theor. 56, 3465–3477 (2010)CrossRefMathSciNet Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theor. 56, 3465–3477 (2010)CrossRefMathSciNet
7.
Zurück zum Zitat Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80, 010302 (2009)CrossRef Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80, 010302 (2009)CrossRef
8.
Zurück zum Zitat Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011)CrossRefADS Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011)CrossRefADS
9.
Zurück zum Zitat Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)CrossRefADS Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)CrossRefADS
10.
Zurück zum Zitat Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20, 17411–17420 (2012)CrossRefADS Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20, 17411–17420 (2012)CrossRefADS
11.
Zurück zum Zitat Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805–813 (2014)CrossRefMathSciNet Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805–813 (2014)CrossRefMathSciNet
12.
Zurück zum Zitat Zhang, J.-L., Guo, F.-Z., Gao, F., Liu, B., Wen, Q.-Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013)CrossRefADS Zhang, J.-L., Guo, F.-Z., Gao, F., Liu, B., Wen, Q.-Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013)CrossRefADS
13.
Zurück zum Zitat Chan, P., Lucio-Martinez, I., Mo, X.F., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 05233 (2014)ADS Chan, P., Lucio-Martinez, I., Mo, X.F., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 05233 (2014)ADS
14.
Zurück zum Zitat Scarani, V., Ac’ın, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)CrossRefADS Scarani, V., Ac’ın, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)CrossRefADS
15.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York), pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York), pp. 175–179 (1984)
17.
Zurück zum Zitat Tamaki, K., Lütkenhaus, N.: Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69, 032316 (2004)CrossRefADS Tamaki, K., Lütkenhaus, N.: Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69, 032316 (2004)CrossRefADS
18.
Zurück zum Zitat Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90, 167904 (2003)CrossRefADS Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90, 167904 (2003)CrossRefADS
20.
Zurück zum Zitat Boileau, J.-C., Tamaki, K., Batuwantudawe, J., Laflamme, R., Renes, J.M.: Unconditional security of a three state quantum key distribution protocol. Phys. Rev. Lett. 94, 040503 (2005)CrossRefADSMathSciNet Boileau, J.-C., Tamaki, K., Batuwantudawe, J., Laflamme, R., Renes, J.M.: Unconditional security of a three state quantum key distribution protocol. Phys. Rev. Lett. 94, 040503 (2005)CrossRefADSMathSciNet
21.
Zurück zum Zitat Mor, T.: No cloning of orthogonal states in composite systems. Phys. Rev. Lett. 80, 3137–3140 (1998)CrossRefADS Mor, T.: No cloning of orthogonal states in composite systems. Phys. Rev. Lett. 80, 3137–3140 (1998)CrossRefADS
22.
Zurück zum Zitat Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)CrossRefADS Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)CrossRefADS
23.
Zurück zum Zitat Gisin, N., Fasel, S., Kraus, B., Zbinden, Z., Ribordy, G.: Trojan horse attacks on quantum key distribution systems. Phys. Rev. A 73, 022320 (2006) Gisin, N., Fasel, S., Kraus, B., Zbinden, Z., Ribordy, G.: Trojan horse attacks on quantum key distribution systems. Phys. Rev. A 73, 022320 (2006)
24.
Zurück zum Zitat Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)CrossRefADSMATH Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)CrossRefADSMATH
25.
Zurück zum Zitat Deng, F.G., Zhou, P., Li, X.H., et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv: quant-ph/0508168 Deng, F.G., Zhou, P., Li, X.H., et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv: quant-ph/​0508168
26.
Zurück zum Zitat Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976)MATH Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976)MATH
27.
Zurück zum Zitat Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on “Secure direct communication with a quantum one-time pad”. Phys. Rev. A 72, 016301 (2005)CrossRefADS Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on “Secure direct communication with a quantum one-time pad”. Phys. Rev. A 72, 016301 (2005)CrossRefADS
28.
Zurück zum Zitat Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79, 054303 (2009)CrossRefADS Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79, 054303 (2009)CrossRefADS
29.
Zurück zum Zitat Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)CrossRefADS Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)CrossRefADS
30.
Zurück zum Zitat Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)CrossRefADS Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)CrossRefADS
Metadaten
Titel
Private database queries using one quantum state
verfasst von
Yu-Guang Yang
Ming-Ou Zhang
Rui Yang
Publikationsdatum
01.03.2015
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 3/2015
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-014-0902-z

Weitere Artikel der Ausgabe 3/2015

Quantum Information Processing 3/2015 Zur Ausgabe

Neuer Inhalt