CHANG Yan, XIONG Jinxin, GAO Xiang, ZHANG Shibin, YAN Lili. Quantum Private Query Protocol Based on EPR Pairs[J]. Chinese Journal of Electronics, 2018, 27(2): 256-262. doi: 10.1049/cje.2018.01.016
Citation: CHANG Yan, XIONG Jinxin, GAO Xiang, ZHANG Shibin, YAN Lili. Quantum Private Query Protocol Based on EPR Pairs[J]. Chinese Journal of Electronics, 2018, 27(2): 256-262. doi: 10.1049/cje.2018.01.016

Quantum Private Query Protocol Based on EPR Pairs

doi: 10.1049/cje.2018.01.016
Funds:  This work is supported by the National Natural Science Foundation of China (No.U1636106, No.61402058, No.61572086), the Application Foundation Project of Sichuan Province of China (No.2017JY0168), the National Key Research and Development Program (No.2017YFB0802302), Sichuan Innovation Team of Quantum Security Communication (No.17TD0009), Sichuan Academic and Technical Leaders Training Funding Support Projects (No.2016120080102643), and the Fund for Middle and Young Academic Leaders of CUIT (No.J201511).
  • Received Date: 2017-02-24
  • Rev Recd Date: 2017-07-29
  • Publish Date: 2018-03-10
  • We propose a Quantum private query (QPQ) protocol based on device-independent Quantum key distribution (QKD) by using Einstein-Podolsky-Rosen (EPR) pairs. We analyze coherent attacks by a third party in a weaker constraints (non-signaling condition) compared with the formalism of quantum physics. We deduce the relationship between the raw key bits of Alice and the third party's attack factor. Compared with existing QPQ protocols, our protocol is secure even when the source and measuring equipment used to distribute oblivious secret key can not be trusted. Quantum register is not needed in our protocol.
  • loading
  • S.B. Zhang, Z.H. Xie, Y.F. Yin, et al., "Study on quantum trust model based on node trust evaluation", Chinese Journal of Electronics, Vol.26, No.3, pp.608-613, 2017.
    J. Li, Z. Pan, J. Zheng, et al., "The security analysis of quantum SAGR04 protocol in collective-rotation noise channel", Chinese Journal of Electronics, Vol.24, No.4, pp.689-693, 2015.
    Y. Gertner, Y. Ishai, E. Kushilevitz, et al., "Protecting data privacy in private information retrieval schemes", Journal of Computer and System Sciences, Vol.60, No.3, pp.592-629, 2000.
    H.K. Lo, "Insecurity of quantum secure", Physical Review A, Vol.56, No.2, pp.1154-1162, 1998.
    C.H. Bennett, G. Brassard, C. Crépeau, et al., "Practical quantum oblivious transfer", Proceedings of Advances in Cryptology-Crypto'91, Lecture Notes in Computer Science, Santa Barbara, CA, USA, Vol.576, No.12, pp.351-366, 1992.
    G. Brassard, C. Crepeau, R. Jozsa, et al., "A quantum bit commitment scheme provably unbreakable by both parties", Proceedings of the 34th Annual Symposium on Foundations of Computer Science (IEEE), Palo Alto, CA, USA, pp.362-371, 1993.
    V. Giovannetti, S. Lloyd and L. Maccone, "Quantum private queries", Physical Review Letters, Vol.100, No.23, pp.230502(1-4), 2008.
    F.D. Martini, V. Giovannetti, S. Lloyd, et al., "Experimental quantum private queries with linear optics", Physical Review A, Vol.80, No.1, pp.010302(1-4), 2009.
    V. Giovannetti, S. Lloyd and L. Maccone, "Quantum private queries:Security analysis", IEEE Transactions on Information Theory, Vol.56, No.7, pp.3465-3477, 2010.
    L. Olejnik, "Secure quantum private information retrieval using phase-encoded queries", Physical Review A, Vol.84, No.2, pp.022313(1-4), 2011.
    M. Jakobi, C. Simon, N. Gisin, et al., "Practical private database queries based on a quantum-key-distribution protocol", Physical Review A, Vol.83, No.2, pp.022301(1-6), 2011.
    F. Gao, B. Liu, Q.Y. Wen, et al., "Flexible quantum private queries based on quantum key distribution", Optics Express, Vol.20, No.16, pp.17411-17420, 2012.
    Y.G. Yang, S.J. Sun, P. Xu, et al., "Flexible protocol for quantum private query based on B92 protocol", Quantum Information Processing, Vol.13, No.3, pp.805-813, 2014.
    J.L. Zhang, F.Z. Guo, F. Gao, et al., "Private database queries based on counterfactual quantum key distribution", Physical Review A, Vol.88, No.2, pp.022334(1-8), 2013.
    P. Chan, I. Lucio-Martinez, X. Mo, et al., "Performing private database queries in a real-world environment using a quantum protocol", Scientific Reports, Vol.4, No.23, pp.5233(1-7), 2014.
    C.Y. Wei, F. Gao, Q.Y. Wen, et al., "Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol", Scientific Reports, Vol.4, No.4, pp.7537(1-7), 2014.
    Y.G. Yang, S.J. Sun, J. Tian, et al., "Secure quantum private query with real-time security", Optik-International Journal for Light and Electron Optics, Vol.125, No.19, pp.5538-5541, 2014.
    H. Lai, M.A. Orgun, J. Pieprzyk, et al., "Controllable quantum private queries using an entangled Fibonacci-sequence spiral source", Physical Review A, Vol.379, No.40-41, pp.2561-2568, 2015.
    F. Yu, D. Qiu, H. Situ, et al., "Enhancing user privacy in SARG04-based private", Quantum Information Processing, Vol.14, No.11, pp.4201-4210, 2015.
    Y.G. Yang, M.O. Zhang and R. Yang, "Private database queries using one quantum state", Quantum Information Processing, Vol.14, No.3, pp.1017-1024, 2015.
    B. Liu, F. Gao, W. Huang, et al., "QKD-based quantum private query without a failure probability", Science China Physics Mechanics and Astronomy, Vol.58, No.10, pp.100301(1-6), 2015.
    S.J. Sun, Y.G. Yang and M.O. Zhang, "Relativistic quantum private database queries", Quantum Information Processing, Vol.14, No.4, pp.1443-1450, 2015.
    C.Y. Wei, T.Y. Wang and F. Gao, "Practical quantum private query with better performance in resisting joint-measurement attack", Physical Review A, Vol.93, No.4, pp.042318(1-7), 2016.
    V. Scarani, N. Gisin, N. Brunner, et al., "Secrecy extraction from no-signaling correlations", Physical Review A, Vol.74, No.4, pp.042339(1-21), 2006.
    S. Pironio, A. Acin, N. Brunner, et al., "Device-independent quantum key distribution secure against collective attacks", New Journal of Physics, Vol.11, No.4, pp.045021(1-26), 2009.
    L. Masanes, S. Pironio and A. Acin, "Secure device-independent quantum key distribution with causally independent measurement devices", Nature Communications, Vol.2, No.1, pp.238(1-7), 2011.
    V. Umesh and V. Thomas, "Fully device-independent quantum key distribution", Physical Review Letters, Vol.113, No.14, pp.140501(1-6), 2014.
    J. Barrett, N. Linden, S. Massar, et al., "Nonlocal correlations as an information-theoretic resource", Physical Review A, Vol.71, No.14, pp.022101(1-11), 2005.
    L. Masanes, A. Acin and N. Gisin, "General properties of nonsignaling theories", Physical Review A, Vol.73, No.1, pp.012112(1-9), 2006.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (143) PDF downloads(390) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint