Provably-secure symmetric private information retrieval with quantum cryptography

04/29/2020
by   Wen Yu Kon, et al.
0

Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and shared randomness in the protocol. Here, we propose using quantum key distribution (QKD) instead for a practical implementation, which can realise both the secure communication and shared randomness requirements. We prove that QKD maintains the security of the SPIR protocol and that it is also secure against any external eavesdropper. We also show how such a classical-quantum system could be implemented practically, using the example of a two-database SPIR protocol with keys generated by measurement device-independent QKD. Through key rate calculations, we show that such an implementation is feasible at the metropolitan level with current QKD technology.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/27/2021

Experimental symmetric private information retrieval with measurement-device-independent quantum network

Secure information retrieval is an essential task in today's highly digi...
research
05/27/2020

Security Improvements of Several Basic Quantum Private Query Protocols with O(log N) Communication Complexity

New quantum private database (with N elements) query protocols are prese...
research
05/05/2020

Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics

With the outbreak of the coronavirus, governments rely more and more on ...
research
08/27/2023

P3LI5: Practical and Confidential Lawful Interception on the 5G Core

Lawful Interception (LI) is a legal obligation of Communication Service ...
research
08/21/2023

Quantum Symmetric Private Information Retrieval with Secure Storage and Eavesdroppers

We consider both the classical and quantum variations of X-secure, E-eav...
research
02/15/2022

Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators

Equality operators are an essential building block in tasks over secure ...
research
01/28/2022

Communication Cost of Two-Database Symmetric Private Information Retrieval: A Conditional Disclosure of Multiple Secrets Perspective

We consider the total (upload plus download) communication cost of two-d...

Please sign up or login with your details

Forgot password? Click here to reset