Postprocessing of the Oblivious Key in Quantum Private Query
نویسندگان
چکیده
منابع مشابه
Post-processing of the oblivious key in quantum private queries
Quantum private query (QPQ) is a kind of quantum protocols to protect both users’ privacy in their communication. There is an interesting example, that is, Alice wants to buy one item from Bob’s database, which is composed of a quantity of valuable messages. QPQ protocol is the communication procedure ensuring that Alice can get only one item from Bob, and at the same time, Bob cannot know whic...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملTowards Communication-Efficient Quantum Oblivious Key Distribution
Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DBb in such a way that (1) Alice learns DBb and only DBb and (2) Bob does not learn anything about Alice’s choice b. While solutions to this problem in the classical domain rely largely on unpr...
متن کاملQuantum Key Distribution and String Oblivious Transfer in Noisy Channels
We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally security of this QKD protocol to a proof that a corresponding Quantum String Oblivious Transfer (String-QOT) protocol would be unconditionally secu...
متن کاملDifferentially Private Oblivious RAM
State-of-the-art mechanisms for oblivious RAM (ORAM) suffer from significant bandwidth overheads (greater than 100x) that impact the throughput and latency of memory accesses. This renders their deployment in high-performance and bandwidth-constrained applications difficult, motivating the design of lowoverhead approaches for memory access obfuscation. We introduce and formalize the notion of a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal of Selected Topics in Quantum Electronics
سال: 2015
ISSN: 1077-260X,1558-4542
DOI: 10.1109/jstqe.2014.2358192