Skip to main content
Log in

Private database queries using one quantum state

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

A novel private database query protocol with only one quantum state is proposed. The database owner Bob sends only one quantum state to the user Alice. The proposed protocol combines the idea of semiquantum key distribution and private query. It can be implemented in the situation where not all the parties can afford expensive quantum resources and operations. So our proposal is more practical in use. We also prove that the proposed protocol is secure in terms of the user security and the database security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  2. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1995), pp. 41–51 (1995)

  3. Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154–1162 (1997)

    Article  ADS  Google Scholar 

  4. Kerenidis, I., de Wolf, R.: Quantum symmetrically-private information retrieval. Inf. Process. Lett. 90, 109–114 (2004)

    Article  MATH  Google Scholar 

  5. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008)

    Article  ADS  MathSciNet  Google Scholar 

  6. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theor. 56, 3465–3477 (2010)

    Article  MathSciNet  Google Scholar 

  7. Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80, 010302 (2009)

    Article  Google Scholar 

  8. Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011)

    Article  ADS  Google Scholar 

  9. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)

    Article  ADS  Google Scholar 

  10. Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20, 17411–17420 (2012)

    Article  ADS  Google Scholar 

  11. Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805–813 (2014)

    Article  MathSciNet  Google Scholar 

  12. Zhang, J.-L., Guo, F.-Z., Gao, F., Liu, B., Wen, Q.-Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013)

    Article  ADS  Google Scholar 

  13. Chan, P., Lucio-Martinez, I., Mo, X.F., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 05233 (2014)

    ADS  Google Scholar 

  14. Scarani, V., Ac’ın, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)

    Article  ADS  Google Scholar 

  15. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York), pp. 175–179 (1984)

  16. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)

    Article  ADS  MATH  MathSciNet  Google Scholar 

  17. Tamaki, K., Lütkenhaus, N.: Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69, 032316 (2004)

    Article  ADS  Google Scholar 

  18. Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90, 167904 (2003)

    Article  ADS  Google Scholar 

  19. Phoenix, S.J.D., Barnett, S.M., Chefles, A.: Three-state quantum cryptography. J. Mod. Opt. 47, 507 (2000)

    Article  ADS  MathSciNet  Google Scholar 

  20. Boileau, J.-C., Tamaki, K., Batuwantudawe, J., Laflamme, R., Renes, J.M.: Unconditional security of a three state quantum key distribution protocol. Phys. Rev. Lett. 94, 040503 (2005)

    Article  ADS  MathSciNet  Google Scholar 

  21. Mor, T.: No cloning of orthogonal states in composite systems. Phys. Rev. Lett. 80, 3137–3140 (1998)

    Article  ADS  Google Scholar 

  22. Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)

    Article  ADS  Google Scholar 

  23. Gisin, N., Fasel, S., Kraus, B., Zbinden, Z., Ribordy, G.: Trojan horse attacks on quantum key distribution systems. Phys. Rev. A 73, 022320 (2006)

  24. Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)

    Article  ADS  MATH  Google Scholar 

  25. Deng, F.G., Zhou, P., Li, X.H., et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv: quant-ph/0508168

  26. Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976)

    MATH  Google Scholar 

  27. Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on “Secure direct communication with a quantum one-time pad”. Phys. Rev. A 72, 016301 (2005)

    Article  ADS  Google Scholar 

  28. Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79, 054303 (2009)

    Article  ADS  Google Scholar 

  29. Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)

    Article  ADS  Google Scholar 

  30. Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)

    Article  ADS  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for their helpful comments. This work is supported by the National Natural Science Foundation of China (Grant Nos. 61003290, 61202317); The Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions (No. CIT&TCD201304039); National Cipher Development Fund during the 12th Five-Year Plan Period (No. MMJJ201401006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Guang Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, YG., Zhang, MO. & Yang, R. Private database queries using one quantum state. Quantum Inf Process 14, 1017–1024 (2015). https://doi.org/10.1007/s11128-014-0902-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0902-z

Keywords

Navigation