Skip to main content
Log in

Robust High Capability QKD-Based Database Private Query

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Quantum private query provides a contemporary solution to protect both user privacy and database security for the classical database administration and maintenance. A novel protocol of database private query based on high capability quantum key distribution is proposed, which examines if the inconsistent orthogonal basis usage and the error rate beyond the threshold for providing the high security among the key sender, carrier and verifier. The presented protocol could not only guarantees the query privacy and database security but also stand against the external eavesdropper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Yang, Y., Zhang, M., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017–1024 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  2. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592–629 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  3. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theory 57(7), 3465–3477 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  4. Long, G.L., Liu, X.S.: Theoretical efficient high capacity quantum key distribution scheme. Phys. Rev. A 65, 032302 (2002)

    Article  ADS  Google Scholar 

  5. Yang, Y., Liu, Z., Chen, X., Zhou, Y., Shi, W.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58(10), 100301–100306 (2015)

    Article  Google Scholar 

  6. Liu, B., Gao, F., Huang, W., Wen, Q.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. China Phys. Mech. Astron. 60(12), 120311–120316 (2017)

    Article  Google Scholar 

  7. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  8. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, pp. 175–179 (1984)

  9. Ekert, A.K.: Quantum cryptography based on Bells theorem. Phys. Rev. Lett. 67(6), 661 (1991)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  10. Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  11. Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648 (1999)

    Article  ADS  Google Scholar 

  12. Liu, Z.H., Chen, H.W., Liu, W.J.: Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Int. J. Theor. Phys. 55(10), 4564–4576 (2016)

    Article  MATH  Google Scholar 

  13. Liu, Z.H., Chen, H.W., Liu, W.J.: Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 55(11), 4681–4686 (2016)

    Article  MATH  Google Scholar 

  14. Liu, W.J., Liu, C., Chen, H.W., Li, Z.Q., Liu, Z.H.: Cryptanalysis and improvement of quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 62(2), 210–214 (2014)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  15. Liu, W.J., Liu, C., Wang, H.B., Liu, J.F., Wang, F., Yuan, X.M.: Secure quantum private comparison of equality based on asymmetric W state. Int. J. Theor. Phys. 53(6), 1804–1813 (2014)

    Article  MATH  Google Scholar 

  16. Liu, W.J., Wang, F., Ji, S., Qu, Z.G., Wang, X.J.: Attacks and improvement of quantum sealed-bid auction with EPR pairs. Commun. Theor. Phys. 61(6), 686–690 (2014)

    Article  ADS  Google Scholar 

  17. Cabello, A.: Quantum key distribution in the Holevo limit. 85(26), 5635–5638 (2000)

  18. Nicolas, G., Gregoire, R., Wolfgang, T., Hugo, Z.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)

    Article  MATH  Google Scholar 

  19. Valerio, S., Helle, B.-P., Nicolas, J.C., Miloslav, D., Norbert, L.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)

    Article  Google Scholar 

  20. Wang, L., Zhao, S.: Round-robin differential phase shift quantum key distribution with heralded pair-coherent sources. Quantum Inf. Process. 16(4), 100 (2017)

    Article  ADS  MATH  Google Scholar 

  21. Wang, L., Zhao, S.-M., Gong, L.-Y., Cheng, W.-W.: Free-space measurement device independent quantum-key-distribution protocol using decoy states with orbital angular momentum. Chin. Phys. B 24(12), 120307 (2015)

    Article  ADS  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant NO. 61672279).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenlong Du.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Du, Z., Li, X. Robust High Capability QKD-Based Database Private Query. Int J Theor Phys 58, 391–398 (2019). https://doi.org/10.1007/s10773-018-3940-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-018-3940-y

Keywords

Navigation