Security Improvements of Several Basic Quantum Private Query Protocols with O(log N) Communication Complexity

by   Fang Yu, et al.

New quantum private database (with N elements) query protocols are presented and analyzed. Protocols preserve O(logN) communication complexity of known protocols for the same task, but achieve several significant improvements in security, especially concerning user privacy. For example, the randomized form of our protocol has a cheat-sensitive property - it allows the user to detect a dishonest database with a nonzero probability, while the phase-encoded private query protocols for the same task do not have such a property. Moreover, when the database performs the computational basis measurement, a particular projective measurement which can cause a significant loss of user privacy in the previous private query protocols with O(logN) communication complexity, at most half of the user privacy could leak to such a database in our protocol, while in the QPQ protocol, the entire user privacy could leak out. In addition, it is proved here that for large N, the user could detect a cheating via the computational basis measurement, with a probability close to 1/2 using O(√(N)) special queries. Finally, it is shown here, for both forms of our protocol, basic and randomized, how a dishonest database has to act in case it could not learn user's queries.


page 1

page 2

page 3

page 4


Provably-secure symmetric private information retrieval with quantum cryptography

Private information retrieval (PIR) is a database query protocol that pr...

Private Proximity Retrieval Codes

A private proximity retrieval (PPR) scheme is a protocol which allows a ...

Secure multiparty quantum computations for greatest common divisor and private set intersection

We present a secure multiparty quantum computation (MPQC) for computing ...

Two Efficient Device Independent Quantum Dialogue Protocols

Quantum dialogue is a process of two way secure and simultaneous communi...

Security and Performance Considerations in ROS 2: A Balancing Act

Robot Operating System (ROS) 2 is a ground-up re-design of ROS 1 to supp...

Privacy and Data Balkanization: Circumventing the Barriers

The rapid growth in digital data forms the basis for a wide range of new...

Lost and Found: Stopping Bluetooth Finders from Leaking Private Information

A Bluetooth finder is a small battery-powered device that can be attache...

Please sign up or login with your details

Forgot password? Click here to reset