Quantum private query based on single-photon interference

被引:14
作者
Xu, Sheng-Wei [1 ]
Sun, Ying [1 ]
Lin, Song [2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[2] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350007, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum private query; Quantum key distribution; Quantum cryptography; DATABASE QUERIES; KEY-DISTRIBUTION; BIT COMMITMENT; SECURITY;
D O I
10.1007/s11128-016-1326-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.
引用
收藏
页码:3301 / 3310
页数:10
相关论文
共 37 条
[1]   Quantum state discrimination [J].
Barnett, Stephen M. ;
Croke, Sarah .
ADVANCES IN OPTICS AND PHOTONICS, 2009, 1 (02) :238-278
[2]  
Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   Performing private database queries in a real-world environment using a quantum protocol [J].
Chan, Philip ;
Lucio-Martinez, Itzel ;
Mo, Xiaofan ;
Simon, Christoph ;
Tittel, Wolfgang .
SCIENTIFIC REPORTS, 2014, 4
[5]   Experimental quantum private queries with linear optics [J].
De Martini, Francesco ;
Giovannetti, Vittorio ;
Lloyd, Seth ;
Maccone, Lorenzo ;
Nagali, Eleonora ;
Sansoni, Linda ;
Sciarrino, Fabio .
PHYSICAL REVIEW A, 2009, 80 (01)
[6]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[7]   Postprocessing of the Oblivious Key in Quantum Private Query [J].
Gao, Fei ;
Liu, Bin ;
Huang, Wei ;
Wen, Qiao-Yan .
IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) :98-108
[8]   Flexible quantum private queries based on quantum key distribution [J].
Gao, Fei ;
Liu, Bin ;
Wen, Qiao-Yan ;
Chen, Hui .
OPTICS EXPRESS, 2012, 20 (16) :17411-17420
[9]   Protecting data privacy in private information retrieval schemes [J].
Gertner, Y ;
Ishai, Y ;
Kushilevitz, E ;
Malkin, T .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 60 (03) :592-629
[10]   Quantum Private Queries: Security Analysis [J].
Giovannetti, Vittorio ;
Lloyd, Seth ;
Maccone, Lorenzo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (07) :3465-3477