Experimental symmetric private information retrieval with measurement-device-independent quantum network

09/27/2021
by   Chao Wang, et al.
0

Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and database content's security are enforced. For these settings, symmetric private information retrieval (SPIR) could be employed, but its implementation is known to be demanding, requiring a private key-exchange network as the base layer. Here, we report for the first time a realisation of provably-secure SPIR supported by a quantum-secure key-exchange network. The SPIR scheme looks at biometric security, offering secure retrieval of 582-byte fingerprint files from a database with 800 entries. Our experimental results clearly demonstrate the feasibility of SPIR with quantum secure communications, thereby opening up new possibilities in secure distributed data storage and cloud computing over the future Quantum Internet.

READ FULL TEXT
research
04/29/2020

Provably-secure symmetric private information retrieval with quantum cryptography

Private information retrieval (PIR) is a database query protocol that pr...
research
08/21/2023

Quantum Symmetric Private Information Retrieval with Secure Storage and Eavesdroppers

We consider both the classical and quantum variations of X-secure, E-eav...
research
08/22/2018

Cross Subspace Alignment and the Asymptotic Capacity of X-Secure T-Private Information Retrieval

X-secure and T-private information retrieval (XSTPIR) is a form of priva...
research
05/29/2022

Unified Approach to Secret Sharing and Symmetric Private Information Retrieval with Colluding Servers in Quantum Systems

This paper unifiedly addresses two kinds of key quantum secure tasks, i....
research
02/27/2020

Almost Public Quantum Coins

In a quantum money scheme, a bank can issue money that users cannot coun...
research
05/09/2023

Asymmetric X-Secure T-Private Information Retrieval: More Databases is Not Always Better

We consider a special case of X-secure T-private information retrieval (...
research
05/28/2020

Mitigating TLS compromise with ECDHE and SRP

The paper reviews an implementation of an additional encrypted tunnel wi...

Please sign up or login with your details

Forgot password? Click here to reset