Quantum Private Query Using W State
- PDF / 458,761 Bytes
- 12 Pages / 439.37 x 666.142 pts Page_size
- 13 Downloads / 169 Views
Quantum Private Query Using W State Ri-Gui Zhou 1 & Yun Hua 1 Received: 28 August 2020 / Accepted: 9 November 2020/ # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
With the rapid development of computer-related technology, how to realize privacy query between both parties becomes very important. In this paper, we propose a quantum privacy query protocol based on W state, compared with the GHZ state, the W state is more robust and easier to prepare, the quantum circuit for preparing W state is also given. The protocol makes use of the correlation after entangled state measurement, and enables the querying party to obtain only one secret key information with the assistance of a third party, thus compared with existing schemes, this scheme eliminates the need for classic post-processing operations and can resist joint measurement attacks. In addition, the proposed protocol has two security checks, which can well resist ancilla particle attacks and entanglement measurement attacks by third parties and external intruders participating in the protocol. Therefore, the proposal of this protocol is very necessary. Keywords Quantum private query . W state
1 Introduction With the rapid development of computer technology and network technology, the database is widely used in various industries. The complex, dynamic and open application environment makes the database face more and more security threats. Early research on database security focuses on ensuring data confidentiality, integrity, reliability and availability. Some existing security measures, such as access control mechanism, backup and recovery policy, role-based management, etc., have played a certain protective role, but still face many problems in practical application. Among them, a more important threat is the privacy issue, privacy disclosure has become one of the main obstacles of information sharing.
* Yun Hua [email protected] Ri-Gui Zhou [email protected]
1
College of Information Engineering, Shanghai Maritime University, Shanghai, China
International Journal of Theoretical Physics
For privacy protection, privacy information retrieval (PIR) is put forward first, which is a strategy adopted to ensure the privacy of users on the public platform [1–4]. When the user retrieves the database information, the relevant technology can be used to prevent the database owner from obtaining the relevant information of user query statement, therefore, the purpose of protecting user privacy is achieved. However, there is a lot of sensitive information in the database itself, thus it is become an important issue to ensure the privacy of the database when providing services. How to effectively protect private information, especially how to combine the convenience of database application services with the security of private information is a meaningful and challenging topic. In the classical world, this kind of problem is called symmetric privacy information retrieval [5] (SPIR), which is a generalization of PIR (PIR only considers th
Data Loading...