Decoy-state quantum private query protocol with two-way communication

被引:22
作者
Qin, Lizhou [1 ]
Liu, Bin [1 ,2 ,3 ,4 ]
Gao, Fei [2 ]
Huang, Wei [3 ]
Xu, Bingjie [3 ]
Li, Yang [3 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Inst Southwestern Commun, Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[4] Shihezi Univ, Ctr Network & Informat, Shihezi 832003, Xinjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum private query; Weak coherent pulse; Decoy-state; INFORMATION-RETRIEVAL; SINGLE-DATABASE;
D O I
10.1016/j.physa.2023.129427
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum private query (QPQ) is a communication protocol established under the condition of mutual distrust between communication parties, which is used to solve the symmetrically private information retrieval problem in the quantum field. However, most of the existing QPQ protocols are based on the ideal light source. In practice, the multi-photon pulse generated by the transmitter will bring great security problems. We analyze the actual security of QPQ protocol in two-way communication, and find that database security and user privacy will be seriously threatened under multi-photon pulse. So we adopt the decoy state method to solve the actual security problem of QPQ protocol in view of the user side as the light source. The results show that the decoy state method is suitable for QPQ protocol of two-way communication, and can effectively defend against multi-photon pulse attacks.
引用
收藏
页数:11
相关论文
共 41 条
[1]   PIR with compressed queries and amortized query processing [J].
Angel, Sebastian ;
Chen, Hao ;
Laine, Kim ;
Setty, Srinath .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :962-979
[2]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[3]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[4]   Efficient mediated semi-quantum key distribution [J].
Chen, Lingli ;
Li, Qin ;
Liu, Chengdong ;
Peng, Yu ;
Yu, Fang .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2021, 582 (582)
[5]   Flexible quantum private queries based on quantum key distribution [J].
Gao, Fei ;
Liu, Bin ;
Wen, Qiao-Yan ;
Chen, Hui .
OPTICS EXPRESS, 2012, 20 (16) :17411-17420
[6]   Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols [J].
Gao, Fei ;
Qin, Su-Juan ;
Guo, Fen-Zhuo ;
Wen, Qiao-Yan .
IEEE JOURNAL OF QUANTUM ELECTRONICS, 2011, 47 (05) :630-635
[7]  
Gentry C, 2005, LECT NOTES COMPUT SC, V3580, P803
[8]  
Gertner Y., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P151, DOI 10.1145/276698.276723
[9]   Protecting data privacy in private information retrieval schemes [J].
Gertner, Y ;
Ishai, Y ;
Kushilevitz, E ;
Malkin, T .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 60 (03) :592-629
[10]   Quantum private queries [J].
Giovannetti, Vittorio ;
Lloyd, Seth ;
Maccone, Lorenzo .
PHYSICAL REVIEW LETTERS, 2008, 100 (23)