Quantum Private Queries: Security Analysis
نویسندگان
چکیده
منابع مشابه
Experimental quantum private queries with linear optics
Francesco De Martini, Vittorio Giovannetti, Seth Lloyd, Lorenzo Maccone, Eleonora Nagali, Linda Sansoni, and Fabio Sciarrino Dipartimento di Fisica, dell’Università “La Sapienza,” Roma 00185, Italy Accademia Nazionale dei Lincei, via della Lungara 10, Roma 00165, Italy NEST-CNR-INFM and Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa, Italy MIT, RLE, and Department of Mechanical En...
متن کاملSecurity of the private quantum channel
We extensively discuss the problem of encryption of quantum information. We present an attack on the private quantum channel which applies when partial classical description of the cipher text is known (the known-ciphertext attack) and show how to avoid this situation. The quantum analogue of the known-plaintext attack is also discussed.
متن کاملPost-processing of the oblivious key in quantum private queries
Quantum private query (QPQ) is a kind of quantum protocols to protect both users’ privacy in their communication. There is an interesting example, that is, Alice wants to buy one item from Bob’s database, which is composed of a quantity of valuable messages. QPQ protocol is the communication procedure ensuring that Alice can get only one item from Bob, and at the same time, Bob cannot know whic...
متن کاملLoss-tolerant measurement-device-independent quantum private queries
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by...
متن کاملSecure quantum private information retrieval using phase-encoded queries
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2010
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2010.2048446