Abstract
Quantum private query of blocks (QPQB) allow user to obtain meaningful multiple consecutive bits in one query, which has certain advantages in improving communication efficiency and protecting user privacy. However, previous QPQB protocols generally show poor practicability for the use of high-dimensional quantum system (which is difficult to implement) or the ignorance of error correction (as a result, user may pay for a false database item). To solve this problem, we proposed a new fault-tolerant quantum protocol for private query of blocks based on the two-dimensional quantum system, by using a special reorder-shift-addition technique. This technology can not only compress user’s additional information obtained in error correction, but also can reduce the user’s advantage obtained from the alignment of the key bits in bitwise adding, solving an inherent security problem in postprocessing. Moreover, our protocol is loss tolerant and can resist the quantum memory attack.
Similar content being viewed by others
References
Yao, A.C.: Protocols for secure computations. In: FOCS, vol. 82, pp. 160–164 (1982)
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of Foundations of Computer Science, pp. 41–50 (1995)
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592–629 (2000)
Rabin, M. O.: How to exchange secrets by oblivious transfer. Technical Report, Tech Memo TR-81, Aiken Computation Laboratory (1981)
Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 122–138 (2000)
Grover, L. K.: A fast quantum mechanical algorithm for database search. In: Twenty-Eighth ACM Symposium on Theory of Computing, pp. 212–219 (1996)
Shor, P. W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of Annual Symposium on the Foundations of Computer Science, IEEE Computer Society Press Los Alamitos CA, pp. 124–134 (1994)
Kilian, J.: Founding crytpography on oblivious transfer. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, ACM, pp. 20–31 (1988)
Sun, Z.W., Yu, J.P., Wang, P., Xu, L.L.: Symmetrically private information retrieval based on blind quantum computing. Phys. Rev. A 91(5), 052303 (2015)
Yang, Y.G., Sun, S.J., Wang, Y.: Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol. Int. J. Theor. Phys. 54(3), 910–916 (2015)
Yang, Y.G., Yang, R., Cao, W.F., Chen, X.B., Zhou, Y.H., Shi, W.M.: Flexible quantum oblivious transfer. Int. J. Theor. Phys. 56(4), 1286–1297 (2017)
Shi, R.H., Mu, Y., Zhong, H., Jie, C., Zhang, S.: Two quantum protocols for oblivious set-member decision problem. Sci. Rep. 5, 15914 (2015)
Xu, M., Shi, R.H., Luo, Z.Y., Peng, Z.W.: Nearest private query based on quantum oblivious key distribution. Quantum Inf. Process. 16(12), 286 (2017)
Luo, Z.Y., Shi, R.H., Xu, M., Zhang, S.: A novel quantum solution to privacy-preserving nearest neighbor query in location-based services. Int. J. Theor. Phys. 57(4), 1049–1059 (2018)
Peng, Z.W., Shi, R.H., Zhong, H., Cui, J., Zhang, S.: A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 16(12), 316 (2017)
Peng, Z.W., Shi, R.H., Wang, P.H., Zhang, S.: A novel quantum solution to secure two-party distance computation. Quantum Inf. Process. 17(6), 145 (2018)
Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154–1162 (1997)
Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100(23), 230502 (2008)
Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84(2), 3242–3244 (2011)
Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83(2), 773–781 (2012)
Gao, F., Liu, B., Wen, Q.Y., Chen, H.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20(16), 17411–20 (2012)
Zhang, J.L., Guo, F.Z., Gao, F., Liu, B., Wen, Q.Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88(2), 195–201 (2013)
Panduranga Rao, M .V., Jakobi, M.: Towards communication-efficient quantum oblivious key distribution. Phys. Rev. A 87(1), 012331 (2013)
Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private query. IEEE J. Sel. Top. Quantum Electron. 21(3), 98–108 (2014)
Chan, P., Lucio-Martinez, I., Mo, X., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4(23), 5233 (2013)
Yang, Y.G., Sun, S.J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Opt. Int. J. Light Electron Opt. 125(19), 5538–5541 (2014)
Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probabilitybased quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58(10), 100301 (2015)
Li, J., Yang, Y.G., Chen, X.B., Zhou, Y.H., Shi, W.M.: Practical quantum private database queries based on passive round-robin differential phase-shift quantum key distribution. Sci. Rep. 6, 31738 (2016)
Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93(4), 042318 (2016)
Yang, Y.G., Liu, Z.C., Li, J., Chen, X.B., Zuo, H.J., Zhou, Y.H., Shi, W.M.: Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 380(48), 4033–4038 (2016)
Zhao, L.Y., Yin, Z.Q., Chen, W., Qian, Y.J., Zhang, C.M., Guo, G.C., Han, Z.F.: Loss-tolerant measurement-device-independent quantum private queries. Sci. Rep. 7, 39733 (2017)
Wei, C.Y., Cai, X.Q., Liu, B., Wang, T.Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67, 2–8 (2017)
Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)
Wei, C.Y., Gao, F., Wen, Q.Y., Wang, T.Y.: Practical quantum private query of blocks based on unbalanced-state bennett–brassard-1984 quantum-key-distribution protocol. Sci. Rep. 4(4), 7537 (2014)
Shi, W.X., Liu, X.T., Wang, J., Tang, C.J.: Multi-bit quantum private query. Commun. Theor. Phys. 64(9), 299–304 (2015)
Yang, Y.G., Liu, Z.C., Chen, X.B., Cao, W.F., Zhou, Y.H., Shi, W.M.: Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15(9), 3833–3840 (2016)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61672447, 61602398, 61711540306) and the Key Science and Technology Program of Henan Province, China (Grant No. 182102310930).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pei, Tr., Meng, Xl., Wei, Cy. et al. Practical quantum private query of blocks based on the two-dimensional QKD system. Quantum Inf Process 18, 240 (2019). https://doi.org/10.1007/s11128-019-2354-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-019-2354-y