Multi-user quantum private query
- PDF / 344,556 Bytes
- 13 Pages / 439.37 x 666.142 pts Page_size
- 19 Downloads / 192 Views
Multi-user quantum private query Hao Yang1 · Min Xiao2 Received: 15 August 2019 / Accepted: 16 June 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Quantum private query (QPQ) is a kind of secure information retrieve protocol, in which both user and database privacy can be protected. Previous QPQ protocols generally consider one user retrieving and need to be performed repeatedly between each user and the database provider when multiple users want to retrieve information from a database. This work focuses on a particular scenario, where multiple users work together to accomplish a task and need to securely query the same item from a database, and proposes a multi-user QPQ protocol using entanglement swapping technology of multi-particle GHZ state. The security analysis shows that the user and database privacy are both guaranteed by real-time security detection. Keywords Quantum private query · Multi-user retrieving · Multi-particle GHZ state
1 Introduction Private information retrieval (PIR) [1] was proposed to solve the case, in which a user wants to retrieve an item from a database provider while hiding the position of this item she is interested in. Symmetrically private retrieval (SPIR) [2] concerns not only user privacy, but also database privacy, that is, the user cannot get any other items except for the one retrieved. With the development of quantum computing, quantum private query (QPQ) has attracted a lot attention. However, unconditional secure SPIR does not exist [3]. Thus, the existing QPQ protocols relax the security requirements of SPIR. It allows the user to extract a few items instead of the ideal one for the database
B
Min Xiao [email protected] Hao Yang [email protected]
1
College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2
School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China 0123456789().: V,-vol
123
253
Page 2 of 13
H. Yang, M. Xiao
privacy and it is cheat-sensitive for the user privacy, that is, if the database provider tries to infer the retrieval position of the user, his dishonest behaviors will be detected with a nonzero probability. In 2008, Giovannetti et al. [4] proposed the first QPQ scheme(GLM protocol), where the database is coded into unitary operations(i.e., oracle operations) performed on the query states. In this protocol, the user uses two query states to query information, one is for getting the wanted item, the other is for checking potential attacks from the database. After that, the proof-of-principle experiments and the security analysis for the GLM protocol were reported by Martini et al. [5] and Giovannetti et al. [6]. In 2011, Olejnik et al. [7] improved the GLM protocol by phase-encode, called O-protocol, in which only one quantum state is needed to accomplish the private retrieval and thus the communication complexity is reduced. Although the above-mentioned oracle-based protoco
Data Loading...