Skip to main content
Log in

Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Quantum privacy query (QPQ) is a cryptographic application that protects the privacy of both users and databases while querying the database secretly. In most existing QPQ protocols, the protection of user privacy can only be cheat-sensitive. Cheat-sensitive means that Bob will be found later with a certain probability if he tries to get the address queried by Alice. On the premise of cheat-sensitive, although Alice can discover Bob’s malicious behavior after a query (transaction), the secret information of Alice was leaked in the completed query, which is likely to be a fatal blow to Alice. Or, to prevent Bob’s malicious behavior, Alice executes one or more additional queries to test Bob’s honesty. However, to bypass Alice’s honesty test, Bob can also provide several honest queries before performing dishonest queries. Therefore, cheat-sensitive should not be the ultimate goal of user privacy protection in QPQ. In this paper, we propose a two-way QKD-based QPQ protocol with better user privacy protection than cheat-sensitive based on order rearrangement of qubits. The proposed QPQ protocol can resist the Trojan horse attack even without wavelength filter and photon number splitter equipped with auxiliary monitoring detectors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Gentner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting Data Privacy in Private Information Retrieval Schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  2. Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A. 56, 1154–1162 (1997)

    Article  ADS  Google Scholar 

  3. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum Private Queries. Phys. Rev. Lett. 100, 230502 (2008)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  4. Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A. 80, 010302 (2009)

    Article  Google Scholar 

  5. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum Private Queries: Security Analysis. IEEE Trans. Inf. Theory. 56, 3465–3477 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  6. Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A. 84, 022313 (2011)

    Article  ADS  Google Scholar 

  7. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A. 83, 022301 (2011)

    Article  ADS  Google Scholar 

  8. Gao, F., Liu, B., Wen, Q.Y., Chen, H.: Flexible quantum private queries based on quantum key distribution. Opt. Express. 20, 17411–17420 (2012)

    Article  ADS  Google Scholar 

  9. Zhang, J.L., Guo, F.Z., Gao, F., Liu, B., Wen, Q.Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A. 88, 022334 (2013)

    Article  ADS  Google Scholar 

  10. Chan, P., Lucio-Martinez, I., Mo, X., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 5233 (2014)

  11. Wei, C.Y., Gao, F., Wen, Q.Y., Wang, T.Y.: Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol. Sci. Rep. 4, 7537 (2014)

  12. Yang, Y.G., Sun, S.J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Optik. 125, 5538–5541 (2014)

    Article  ADS  Google Scholar 

  13. Lai, H., Mehmet, A.O., Pieprzyk, J., Jing, H.X., Li, Y.X., Zhong, T.J.: Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Phys. Lett. A. 379, 2561–2568 (2015)

    Article  ADS  MATH  Google Scholar 

  14. Yu, F., Qiu, D.W., Situ, H.Z., Wang, X.M., Long, S.: Enhancing user privacy in SARG04-based private database query protocols. Quantum Inf. Process. 14, 4201–4210 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  15. Yang, Y.G., Zhang, M.O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017–1024 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  16. Liu, B., Gao, F., Huang, W.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58, 100301 (2015)

    Article  Google Scholar 

  17. Sun, S.J., Yang, Y.G., Zhang, M.O.: Relativistic quantum private database queries. Quantum Inf. Process. 14, 1443–1450 (2015)

    Article  ADS  MATH  Google Scholar 

  18. Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A. 93, 042318 (2016)

    Article  ADS  Google Scholar 

  19. Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private query. IEEE. J. Sel. Top. Quant. 21, 6600111 (2015)

  20. Wei, C.Y., Cai, X.Q., Liu, B., Wang, T.Y., Gao, F.: A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure. IEEE Trans. Comput. 67, 2–8 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  21. Li, J., Li, N., Zhang, Y., Wen, S., du, W., Chen, W., Ma, W.: A Survey on Quantum Cryptography. Chin. J. Electron. 27(2), 223–228 (2018)

    Article  Google Scholar 

  22. Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: A new kind of practical quantum cryptographic protocols. Sci. China Phys. Mech. Astron. 62, 070301 (2019)

Download references

Acknowledgments

This work is supported by NSFC (Grant Nos.61572086, 61402058), the Application Foundation Project of Sichuan Province of China (Grant No. 2017JY0168), the National Key Research and Development Program (No. 2017YFB0802302), Sichuan innovation team of quantum security communication (No.17TD0009), Sichuan academic and technical leaders training funding support projects (No. 2016120080102643) the Fund for Middle and Young Academic Leaders of CUIT (Grant No. J201511).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Chang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, Y., Zhang, SB., Wan, Gg. et al. Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy. Int J Theor Phys 58, 2069–2080 (2019). https://doi.org/10.1007/s10773-019-04062-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-019-04062-2

Keywords

PACS

Navigation