2016
DOI: 10.1038/srep31738
|View full text |Cite
|
Sign up to set email alerts
|

Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution

Abstract: A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…When Eve successfully gets I (d SPP ) information transfer in 1 message qubit without being detected, the amount of probability is (s 1 ) 1/I (d SPP ) , and 1/I (d SPP ) is the expected times that Eve detects the communication. If Eve wants to gets nI (d SPP ) information from n message qubits, the successfully probability can be described as: (21) Suppose Alice and Bob have the probability of c = 0.5 to choose control mode, Eq. 21 describes the relationship in the amount of information that Eve gets n ∈ [0, 50], the probability d ∈ (0, 0.5) that Eve takes an eavesdropping operation.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…When Eve successfully gets I (d SPP ) information transfer in 1 message qubit without being detected, the amount of probability is (s 1 ) 1/I (d SPP ) , and 1/I (d SPP ) is the expected times that Eve detects the communication. If Eve wants to gets nI (d SPP ) information from n message qubits, the successfully probability can be described as: (21) Suppose Alice and Bob have the probability of c = 0.5 to choose control mode, Eq. 21 describes the relationship in the amount of information that Eve gets n ∈ [0, 50], the probability d ∈ (0, 0.5) that Eve takes an eavesdropping operation.…”
Section: Security Analysismentioning
confidence: 99%
“…In 1984, Bennett and Brassard [16] presented the first QKD protocol, which called the BB84 protocol. This protocol indicted that quantum qubits can replace classical bits in communication, the BB84 protocol and its improve protocols are still widely used in quantum communication [16]- [21].…”
Section: Introductionmentioning
confidence: 99%
“…In light of these negative results, protocols for SPIR have largely evolved to cheat-sensitive protocols, also known as quantum private query [ 11 ]. Examples of these protocols include those based on quantum oblivious key distribution [ 12 , 13 , 14 , 15 , 16 ], those based on sending states to a database oracle [ 17 , 18 ], and those based on round-robin QKD protocol [ 19 ]. In these protocols, the parties are averse to being caught cheating, so cheat-detection strategies allows one to construct protocols with more relaxed conditions as compared to those of SPIR [ 20 ].…”
Section: Introductionmentioning
confidence: 99%
“…But there is still a serious problem on how to distribute the key safely. [3][4][5] Different from the classical secure communication protocol, quantum secure communication (QSC) protocol is based on the fundamental laws of quantum physics rather than the complexity of computing. So QSC has much higher performance of security.…”
Section: Introductionmentioning
confidence: 99%