Skip to main content
Log in

Practical quantum private query of blocks based on the two-dimensional QKD system

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Quantum private query of blocks (QPQB) allow user to obtain meaningful multiple consecutive bits in one query, which has certain advantages in improving communication efficiency and protecting user privacy. However, previous QPQB protocols generally show poor practicability for the use of high-dimensional quantum system (which is difficult to implement) or the ignorance of error correction (as a result, user may pay for a false database item). To solve this problem, we proposed a new fault-tolerant quantum protocol for private query of blocks based on the two-dimensional quantum system, by using a special reorder-shift-addition technique. This technology can not only compress user’s additional information obtained in error correction, but also can reduce the user’s advantage obtained from the alignment of the key bits in bitwise adding, solving an inherent security problem in postprocessing. Moreover, our protocol is loss tolerant and can resist the quantum memory attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Yao, A.C.: Protocols for secure computations. In: FOCS, vol. 82, pp. 160–164 (1982)

  2. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of Foundations of Computer Science, pp. 41–50 (1995)

  3. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592–629 (2000)

    Article  MathSciNet  Google Scholar 

  4. Rabin, M. O.: How to exchange secrets by oblivious transfer. Technical Report, Tech Memo TR-81, Aiken Computation Laboratory (1981)

  5. Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 122–138 (2000)

  6. Grover, L. K.: A fast quantum mechanical algorithm for database search. In: Twenty-Eighth ACM Symposium on Theory of Computing, pp. 212–219 (1996)

  7. Shor, P. W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of Annual Symposium on the Foundations of Computer Science, IEEE Computer Society Press Los Alamitos CA, pp. 124–134 (1994)

  8. Kilian, J.: Founding crytpography on oblivious transfer. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, ACM, pp. 20–31 (1988)

  9. Sun, Z.W., Yu, J.P., Wang, P., Xu, L.L.: Symmetrically private information retrieval based on blind quantum computing. Phys. Rev. A 91(5), 052303 (2015)

    Article  ADS  Google Scholar 

  10. Yang, Y.G., Sun, S.J., Wang, Y.: Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol. Int. J. Theor. Phys. 54(3), 910–916 (2015)

    Article  MathSciNet  Google Scholar 

  11. Yang, Y.G., Yang, R., Cao, W.F., Chen, X.B., Zhou, Y.H., Shi, W.M.: Flexible quantum oblivious transfer. Int. J. Theor. Phys. 56(4), 1286–1297 (2017)

    Article  Google Scholar 

  12. Shi, R.H., Mu, Y., Zhong, H., Jie, C., Zhang, S.: Two quantum protocols for oblivious set-member decision problem. Sci. Rep. 5, 15914 (2015)

    Article  ADS  Google Scholar 

  13. Xu, M., Shi, R.H., Luo, Z.Y., Peng, Z.W.: Nearest private query based on quantum oblivious key distribution. Quantum Inf. Process. 16(12), 286 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  14. Luo, Z.Y., Shi, R.H., Xu, M., Zhang, S.: A novel quantum solution to privacy-preserving nearest neighbor query in location-based services. Int. J. Theor. Phys. 57(4), 1049–1059 (2018)

    Article  Google Scholar 

  15. Peng, Z.W., Shi, R.H., Zhong, H., Cui, J., Zhang, S.: A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 16(12), 316 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  16. Peng, Z.W., Shi, R.H., Wang, P.H., Zhang, S.: A novel quantum solution to secure two-party distance computation. Quantum Inf. Process. 17(6), 145 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  17. Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154–1162 (1997)

    Article  ADS  Google Scholar 

  18. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100(23), 230502 (2008)

    Article  ADS  MathSciNet  Google Scholar 

  19. Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84(2), 3242–3244 (2011)

    Article  Google Scholar 

  20. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83(2), 773–781 (2012)

    Google Scholar 

  21. Gao, F., Liu, B., Wen, Q.Y., Chen, H.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20(16), 17411–20 (2012)

    Article  ADS  Google Scholar 

  22. Zhang, J.L., Guo, F.Z., Gao, F., Liu, B., Wen, Q.Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88(2), 195–201 (2013)

    Google Scholar 

  23. Panduranga Rao, M .V., Jakobi, M.: Towards communication-efficient quantum oblivious key distribution. Phys. Rev. A 87(1), 012331 (2013)

    Article  ADS  Google Scholar 

  24. Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private query. IEEE J. Sel. Top. Quantum Electron. 21(3), 98–108 (2014)

    ADS  Google Scholar 

  25. Chan, P., Lucio-Martinez, I., Mo, X., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4(23), 5233 (2013)

    Google Scholar 

  26. Yang, Y.G., Sun, S.J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Opt. Int. J. Light Electron Opt. 125(19), 5538–5541 (2014)

    Article  Google Scholar 

  27. Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probabilitybased quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58(10), 100301 (2015)

    Article  Google Scholar 

  28. Li, J., Yang, Y.G., Chen, X.B., Zhou, Y.H., Shi, W.M.: Practical quantum private database queries based on passive round-robin differential phase-shift quantum key distribution. Sci. Rep. 6, 31738 (2016)

    Article  ADS  Google Scholar 

  29. Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93(4), 042318 (2016)

    Article  ADS  Google Scholar 

  30. Yang, Y.G., Liu, Z.C., Li, J., Chen, X.B., Zuo, H.J., Zhou, Y.H., Shi, W.M.: Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 380(48), 4033–4038 (2016)

    Article  ADS  Google Scholar 

  31. Zhao, L.Y., Yin, Z.Q., Chen, W., Qian, Y.J., Zhang, C.M., Guo, G.C., Han, Z.F.: Loss-tolerant measurement-device-independent quantum private queries. Sci. Rep. 7, 39733 (2017)

    Article  ADS  Google Scholar 

  32. Wei, C.Y., Cai, X.Q., Liu, B., Wang, T.Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67, 2–8 (2017)

    Article  MathSciNet  Google Scholar 

  33. Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)

    Article  ADS  Google Scholar 

  34. Wei, C.Y., Gao, F., Wen, Q.Y., Wang, T.Y.: Practical quantum private query of blocks based on unbalanced-state bennett–brassard-1984 quantum-key-distribution protocol. Sci. Rep. 4(4), 7537 (2014)

    Google Scholar 

  35. Shi, W.X., Liu, X.T., Wang, J., Tang, C.J.: Multi-bit quantum private query. Commun. Theor. Phys. 64(9), 299–304 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  36. Yang, Y.G., Liu, Z.C., Chen, X.B., Cao, W.F., Zhou, Y.H., Shi, W.M.: Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15(9), 3833–3840 (2016)

    Article  ADS  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61672447, 61602398, 61711540306) and the Key Science and Technology Program of Henan Province, China (Grant No. 182102310930).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Fei Gao or Qing-yong Deng.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pei, Tr., Meng, Xl., Wei, Cy. et al. Practical quantum private query of blocks based on the two-dimensional QKD system. Quantum Inf Process 18, 240 (2019). https://doi.org/10.1007/s11128-019-2354-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-019-2354-y

Keywords

Navigation