Skip to main content
Erschienen in: Quantum Information Processing 5/2021

01.05.2021

Quantum private query with authentication

Erschienen in: Quantum Information Processing | Ausgabe 5/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The quantum privacy query (QPQ) is the quantum version of private query, which refers to that a user (Alice) to purchase data from a database owner (Bob) under the condition of ensuring the privacy of both parties. Specifically, Alice should not access data other than those she bought, and Bob cannot know what data Alice has obtained. The existing QPQ protocols focus on privacy protection and ignore other attacks from outside attackers, such as impersonation, man-in-the-middle and tampering. Undoubtedly, these attacks can destroy the QPQ process. In this paper, we present a secure QPQ protocol that can resist external active attacks. By designing an identity authentication mechanism and integrating it into the existing quantum key distribution-based QPQ protocol, the proposed protocol implements mutual identity authentication in the oblivious key agreement phase to resist impersonation and “man-in-the-middle” attacks. Besides, the mutual authentication process also generates a shared key between Alice and Bob to achieve the data source authentication and integrity protection against tampering attack in the data retrieval phase. The security analysis demonstrates that the proposed protocol not only retains the privacy protection strength of the original QPQ protocol, but also has strong resistance to external attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592–629 (2000)MathSciNetCrossRef Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592–629 (2000)MathSciNetCrossRef
2.
Zurück zum Zitat Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of Foundations of Computer Science, pp. 41–50 (1995) Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of Foundations of Computer Science, pp. 41–50 (1995)
3.
Zurück zum Zitat Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A. 56(2), 1154–1162 (1997)ADSCrossRef Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A. 56(2), 1154–1162 (1997)ADSCrossRef
5.
Zurück zum Zitat Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A. 80(1), 010302 (2009)CrossRef Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A. 80(1), 010302 (2009)CrossRef
6.
Zurück zum Zitat Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56(7), 3465–3477 (2010)MathSciNetCrossRef Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56(7), 3465–3477 (2010)MathSciNetCrossRef
7.
Zurück zum Zitat Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A. 84(2), 022313 (2011)ADSCrossRef Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A. 84(2), 022313 (2011)ADSCrossRef
8.
Zurück zum Zitat Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A. 83(2), 773–781 (2011)CrossRef Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A. 83(2), 773–781 (2011)CrossRef
9.
Zurück zum Zitat Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92(5), 057901 (2004)ADSCrossRef Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92(5), 057901 (2004)ADSCrossRef
10.
Zurück zum Zitat Gao, F., Liu, B., Wen, Q.Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express. 20(16), 17411–17420 (2012)ADSCrossRef Gao, F., Liu, B., Wen, Q.Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express. 20(16), 17411–17420 (2012)ADSCrossRef
11.
Zurück zum Zitat Panduranga Rao, M.V., Jakobi, M.: Towards communication-efficient quantum oblivious key distribution. Phys. Rev. A. 87(1), 012331 (2013)ADSCrossRef Panduranga Rao, M.V., Jakobi, M.: Towards communication-efficient quantum oblivious key distribution. Phys. Rev. A. 87(1), 012331 (2013)ADSCrossRef
12.
Zurück zum Zitat Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private queries. IEEE. J. Sel. Top. Quant. 21(3), 6600111 (2015)CrossRef Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private queries. IEEE. J. Sel. Top. Quant. 21(3), 6600111 (2015)CrossRef
13.
Zurück zum Zitat Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58(10), 100301 (2015)CrossRef Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58(10), 100301 (2015)CrossRef
14.
Zurück zum Zitat Maitra, A., Goutam, P., Sarbani, R.: Device-independent quantum private query. Phys. Rev. A. 95(4), 042344 (2017)ADSCrossRef Maitra, A., Goutam, P., Sarbani, R.: Device-independent quantum private query. Phys. Rev. A. 95(4), 042344 (2017)ADSCrossRef
15.
Zurück zum Zitat Wei, C., Cai, X., Liu, B.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef Wei, C., Cai, X., Liu, B.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef
16.
Zurück zum Zitat Chan, P., Lucio-Martinez, I., Mo, X.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4(23), 5233 (2014) Chan, P., Lucio-Martinez, I., Mo, X.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4(23), 5233 (2014)
17.
Zurück zum Zitat Yang, Y., Liu, Z., Chen, X., Zhou, Y., Shi, W.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. China Phys. Mech. Astron. 60(12), 120311 (2017)ADSCrossRef Yang, Y., Liu, Z., Chen, X., Zhou, Y., Shi, W.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. China Phys. Mech. Astron. 60(12), 120311 (2017)ADSCrossRef
18.
Zurück zum Zitat Wei, C.Y., Cai, X.Q., Wang, T.Y., Qin, S.J., Gao, F., Wen, Q.Y.: Error tolerance bound in QKD-based quantum private query. IEEE J. Sel. Areas Commun. 38(3), 517–527 (2020)CrossRef Wei, C.Y., Cai, X.Q., Wang, T.Y., Qin, S.J., Gao, F., Wen, Q.Y.: Error tolerance bound in QKD-based quantum private query. IEEE J. Sel. Areas Commun. 38(3), 517–527 (2020)CrossRef
19.
Zurück zum Zitat Yang, Y.G., Sun, S.J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Opt. Int. J. Light Electron Opt. 125(19), 5538–5541 (2014)CrossRef Yang, Y.G., Sun, S.J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Opt. Int. J. Light Electron Opt. 125(19), 5538–5541 (2014)CrossRef
20.
Zurück zum Zitat Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A. 93(4), 042318 (2016)ADSCrossRef Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A. 93(4), 042318 (2016)ADSCrossRef
21.
Zurück zum Zitat Xiao, M., Zhang, D.F.: Practical quantum private query with classical participants. Chin. Phys. Lett. 36(3), 030301 (2019)ADSMathSciNetCrossRef Xiao, M., Zhang, D.F.: Practical quantum private query with classical participants. Chin. Phys. Lett. 36(3), 030301 (2019)ADSMathSciNetCrossRef
22.
Zurück zum Zitat Gao, X., Chang, Y., Zhang, S.: Quantum private query based on bell state and single photons. Int. J. Theor. Phys. 57(7), 1983–1989 (2018)MathSciNetCrossRef Gao, X., Chang, Y., Zhang, S.: Quantum private query based on bell state and single photons. Int. J. Theor. Phys. 57(7), 1983–1989 (2018)MathSciNetCrossRef
23.
Zurück zum Zitat Zheng, T., Zhang, S., Gao, X.: Practical quantum private query based on Bell state. Mod. Phys. Lett. A 34(24), 1950196 (2019)ADSMathSciNetCrossRef Zheng, T., Zhang, S., Gao, X.: Practical quantum private query based on Bell state. Mod. Phys. Lett. A 34(24), 1950196 (2019)ADSMathSciNetCrossRef
25.
Zurück zum Zitat Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)ADSCrossRef Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)ADSCrossRef
26.
Zurück zum Zitat Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A. 61(2), 022303 (2000)ADSCrossRef Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A. 61(2), 022303 (2000)ADSCrossRef
27.
Zurück zum Zitat Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A. 62(2), 022305 (2000)ADSCrossRef Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A. 62(2), 022305 (2000)ADSCrossRef
28.
Zurück zum Zitat Lee, H., Yang, H.J., Lim, J.: Quantum direct communication with authentication. Phys. Rev. A. 73(4), 042305 (2005)ADSCrossRef Lee, H., Yang, H.J., Lim, J.: Quantum direct communication with authentication. Phys. Rev. A. 73(4), 042305 (2005)ADSCrossRef
29.
Zurück zum Zitat Li, Q., Li, Z., Chan, W.H.: Blind quantum computation with identity authentication. Phys. Lett. A 382(14), 938–941 (2018)ADSMathSciNetCrossRef Li, Q., Li, Z., Chan, W.H.: Blind quantum computation with identity authentication. Phys. Lett. A 382(14), 938–941 (2018)ADSMathSciNetCrossRef
30.
Zurück zum Zitat Marcos, C., David, J.S.: Quantum authentication of classical messages. Phys. Rev. A. 64(6), 062309 (2001)CrossRef Marcos, C., David, J.S.: Quantum authentication of classical messages. Phys. Rev. A. 64(6), 062309 (2001)CrossRef
31.
Zurück zum Zitat Xin, X., Li, F.: Quantum authentication of classical messages without entangled state as authentication key. Int. J. Multimed. Ubiquitous Eng. 10(8), 199–206 (2015)CrossRef Xin, X., Li, F.: Quantum authentication of classical messages without entangled state as authentication key. Int. J. Multimed. Ubiquitous Eng. 10(8), 199–206 (2015)CrossRef
32.
Zurück zum Zitat Slutsky, B.A., Rao, R.R., Sun, P.C., Fainman, Y.: Security of quantum cryptography against individual attacks. Phys. Rev. A. 57(4), 2383–2398 (1998)ADSCrossRef Slutsky, B.A., Rao, R.R., Sun, P.C., Fainman, Y.: Security of quantum cryptography against individual attacks. Phys. Rev. A. 57(4), 2383–2398 (1998)ADSCrossRef
Metadaten
Titel
Quantum private query with authentication
Publikationsdatum
01.05.2021
Erschienen in
Quantum Information Processing / Ausgabe 5/2021
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03099-9

Weitere Artikel der Ausgabe 5/2021

Quantum Information Processing 5/2021 Zur Ausgabe

Neuer Inhalt