Towards communication-efficient quantum oblivious key distribution

被引:56
作者
Rao, M. V. Panduranga [1 ]
Jakobi, M. [2 ]
机构
[1] Indian Inst Technol Hyderabad, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[2] Univ Geneva, Appl Phys Grp, CH-1211 Geneva, Switzerland
关键词
Database systems;
D O I
10.1103/PhysRevA.87.012331
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Symmetrically private information retrieval, a fundamental problem in the field of secure multiparty computation, is defined as follows: A database D of N bits held by Bob is queried by a user Alice who is interested in the bit D-b in such a way that (1) Alice learns D-b and only D-b and (2) Bob does not learn anything about Alice's choice b. While solutions to this problem in the classical domain rely largely on unproven computational complexity theoretic assumptions, it is also known that perfect solutions that guarantee both database and user privacy are impossible in the quantum domain. Jakobi et al. [Phys. Rev. A 83, 022301 (2011)] proposed a protocol for oblivious transfer using well-known quantum key device (QKD) techniques to establish an oblivious key to solve this problem. Their solution provided a good degree of database and user privacy (using physical principles like the impossibility of perfectly distinguishing nonorthogonal quantum states and the impossibility of superluminal communication) while being loss-resistant and implementable with commercial QKDdevices (due to the use of the Scarani-Acin-Ribordy-Gisin 2004 protocol). However, their quantum oblivious key distribution (QOKD) protocol requires a communication complexity of O(N log N). Since modern databases can be extremely large, it is important to reduce this communication as much as possible. In this paper, we first suggest a modification of their protocol wherein the number of qubits that need to be exchanged is reduced to O(N). A subsequent generalization reduces the quantum communication complexity even further in such a way that only a few hundred qubits are needed to be transferred even for very large databases. DOI: 10.1103/PhysRevA.87.012331
引用
收藏
页数:6
相关论文
共 15 条
  • [1] Beaver D, 1995, LECT NOTES COMPUT SC, V963, P97
  • [2] Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
  • [3] Bennett C. H., 1992, P ANN INT CRYPT C CR, P351
  • [4] Brassard G., 1991, P 10 ANN INT CRYPT C, P49
  • [5] Private information retrieval
    Chor, B
    Goldreich, O
    Kushilevitz, E
    Sudan, M
    [J]. JOURNAL OF THE ACM, 1998, 45 (06) : 965 - 982
  • [6] Cormen T., 2001, Introduction to Algorithms
  • [7] CREPEAU C, 1988, LECT NOTES COMPUT SC, V293, P350
  • [8] Crepeau C., 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science, P42
  • [9] A RANDOMIZED PROTOCOL FOR SIGNING CONTRACTS
    EVEN, S
    GOLDREICH, O
    LEMPEL, A
    [J]. COMMUNICATIONS OF THE ACM, 1985, 28 (06) : 637 - 647
  • [10] Quantum Private Queries: Security Analysis
    Giovannetti, Vittorio
    Lloyd, Seth
    Maccone, Lorenzo
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (07) : 3465 - 3477