2011
DOI: 10.1103/physreva.83.022301
|View full text |Cite
|
Sign up to set email alerts
|

Practical private database queries based on a quantum-key-distribution protocol

Abstract: Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
176
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 200 publications
(176 citation statements)
references
References 21 publications
0
176
0
Order By: Relevance
“…[11], there is a measurement called minimal error probability measurement [17], which distinguishes two equally likely qubits. If Alice measures the k qubits forming an element of the final key K with the efficient measurement, she obtains the bits of K directly.…”
Section: Database Securitymentioning
confidence: 99%
“…[11], there is a measurement called minimal error probability measurement [17], which distinguishes two equally likely qubits. If Alice measures the k qubits forming an element of the final key K with the efficient measurement, she obtains the bits of K directly.…”
Section: Database Securitymentioning
confidence: 99%
“…Furthermore, with the rapid development of the technologies of quantum communication and quantum computation, researchers began to consider quantum methods to solve privacy-preserving problems, such as blind quantum computing [1][2][3][4][5], quantum homornorphic encryption [6], quantum private query [7][8][9][10], quantum bit commitment [11][12][13][14], quantum oblivious transfer [15][16][17] and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, a cheating Alice has non-zero probability to be detected. These protocols are called cheat sensitive [4,57,118,119,132,137]. In this context, it is argued that one could set up a game-theoretic environment: a player caught cheating has to pay a huge fine (or undergo another punishment) and is therefore deterred from actually doing it.…”
Section: Quantum Protocols For Coin Flipping and Cheat-sensitive Primmentioning
confidence: 99%