Practical private database queries based on a quantum-key-distribution protocol

被引:198
|
作者
Jakobi, Markus [1 ,2 ]
Simon, Christoph [1 ,3 ,4 ]
Gisin, Nicolas [1 ]
Bancal, Jean-Daniel [1 ]
Branciard, Cyril [1 ]
Walenta, Nino [1 ]
Zbinden, Hugo [1 ]
机构
[1] Univ Geneva, Appl Phys Grp, CH-1211 Geneva 4, Switzerland
[2] Humboldt Univ, D-10117 Berlin, Germany
[3] Univ Calgary, Dept Phys & Astron, Calgary, AB T2N 1N4, Canada
[4] Univ Calgary, Inst Quantum Informat Sci, Calgary, AB T2N 1N4, Canada
来源
PHYSICAL REVIEW A | 2011年 / 83卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
BIT COMMITMENT;
D O I
10.1103/PhysRevA.83.022301
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Performing private database queries in a real-world environment using a quantum protocol
    Philip Chan
    Itzel Lucio-Martinez
    Xiaofan Mo
    Christoph Simon
    Wolfgang Tittel
    Scientific Reports, 4
  • [42] Performing private database queries in a real-world environment using a quantum protocol
    Chan, Philip
    Lucio-Martinez, Itzel
    Mo, Xiaofan
    Simon, Christoph
    Tittel, Wolfgang
    SCIENTIFIC REPORTS, 2014, 4
  • [43] Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
    Zhao, Yi
    Fung, Chi-Hang Fred
    Qi, Bing
    Chen, Christine
    Lo, Hoi-Kwong
    PHYSICAL REVIEW A, 2008, 78 (04):
  • [44] Low complexity quantum private queries protocol
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 5 (33-37 and 74): : 33 - 37
  • [45] Finite-key-size security of the Phoenix-Barnett-Chefles 2000 quantum-key-distribution protocol
    Mafu, Mhlambululi
    Garapo, Kevin
    Petruccione, Francesco
    PHYSICAL REVIEW A, 2014, 90 (03):
  • [46] Long-distance quantum-key-distribution using concatenated entanglement swapping with practical resources
    Khalique, Aeysha
    Sanders, Barry C.
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING XIV, 2016, 9980
  • [47] Partially random phase attack to the practical two-way quantum-key-distribution system
    Sun, Shi-Hai
    Gao, Ming
    Jiang, Mu-Sheng
    Li, Chun-Yan
    Liang, Lin-Mei
    PHYSICAL REVIEW A, 2012, 85 (03):
  • [48] Differential-phase-shift quantum-key-distribution protocol with a small number of random delays
    Hatakeyama, Yuki
    Mizutani, Akihiro
    Kato, Go
    Imoto, Nobuyuki
    Tamaki, Kiyoshi
    PHYSICAL REVIEW A, 2017, 95 (04)
  • [49] Analysis of decoy state quantum-key-distribution system
    Jiao Rong-Zhen
    Zhang Wen-Han
    ACTA PHYSICA SINICA, 2009, 58 (04) : 2189 - 2192
  • [50] Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
    Fei, Yangyang
    Gao, Ming
    Wang, Weilong
    Li, Chaobo
    Ma, Zhi
    PHYSICAL REVIEW A, 2015, 91 (05):