DeepAI AI Chat
Log In Sign Up

Provably-secure symmetric private information retrieval with quantum cryptography

by   Wen Yu Kon, et al.

Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and shared randomness in the protocol. Here, we propose using quantum key distribution (QKD) instead for a practical implementation, which can realise both the secure communication and shared randomness requirements. We prove that QKD maintains the security of the SPIR protocol and that it is also secure against any external eavesdropper. We also show how such a classical-quantum system could be implemented practically, using the example of a two-database SPIR protocol with keys generated by measurement device-independent QKD. Through key rate calculations, we show that such an implementation is feasible at the metropolitan level with current QKD technology.


page 1

page 2

page 3

page 4


Experimental symmetric private information retrieval with measurement-device-independent quantum network

Secure information retrieval is an essential task in today's highly digi...

Security Improvements of Several Basic Quantum Private Query Protocols with O(log N) Communication Complexity

New quantum private database (with N elements) query protocols are prese...

P3LI5: Practical and Confidential Lawful Interception on the 5G Core

Lawful Interception (LI) is a legal obligation of Communication Service ...

Quantum Symmetric Private Information Retrieval with Secure Storage and Eavesdroppers

We consider both the classical and quantum variations of X-secure, E-eav...

Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators

Equality operators are an essential building block in tasks over secure ...