Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography

被引:15
作者
Kon, Wen Yu [1 ]
Lim, Charles Ci Wen [1 ,2 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 119077, Singapore
[2] Natl Univ Singapore, Ctr Quantum Technol, Singapore 119077, Singapore
基金
新加坡国家研究基金会;
关键词
quantum key distribution; symmetric private information retrieval; quantum cryptography; information theoretic security;
D O I
10.3390/e23010054
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and shared randomness in the protocol. Here, we propose using quantum key distribution (QKD) instead for a practical implementation, which can realise both the secure communication and shared randomness requirements. We prove that QKD maintains the security of the SPIR protocol and that it is also secure against any external eavesdropper. We also show how such a classical-quantum system could be implemented practically, using the example of a two-database SPIR protocol with keys generated by measurement device-independent QKD. Through key rate calculations, we show that such an implementation is feasible at the metropolitan level with current QKD technology.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 46 条
[1]  
[Anonymous], 2019, STESASERA426 DEP EC, VI
[2]  
[Anonymous], 2011, 1979422011 ISOIEC
[3]  
[Anonymous], 2011, Quantum Computation and Quantum Information: 10th Anniversary Edition
[4]  
[Anonymous], 2010, 5 OBI HEALTHC BROADB
[5]  
[Anonymous], 2019, POP TRENDS
[6]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[7]  
Bringer J, 2007, LECT NOTES COMPUT SC, V4856, P175
[8]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[9]   The Simplest Protocol for Oblivious Transfer [J].
Chou, Tung ;
Orlandi, Claudio .
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 :40-58
[10]   Finite-key analysis for measurement-device-independent quantum key distribution [J].
Curty, Marcos ;
Xu, Feihu ;
Cui, Wei ;
Lim, Charles Ci Wen ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
NATURE COMMUNICATIONS, 2014, 5