Quantum Private Query Protocol Based on Two Non-Orthogonal States

We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement. By analyzing a two-point attack by a third party, we find that our protocol has a stronger ability to resist external attacks than G-protocol and Y-protocol. Our protocol requires a smaller number of compressions than that in G-protocol (Gao et al., Opt. Exp. 2012, 20, 17411–17420) and Y-protocol (Yan et al. Quant. Inf. Process. 2014, 13, 805–813), which means less post-processing. Our protocol shows better database security and user privacy compared with G-protocol.

[1]  Peng Xu,et al.  Flexible protocol for quantum private query based on B92 protocol , 2014, Quantum Inf. Process..

[2]  Hui Chen,et al.  Flexible quantum private queries based on quantum key distribution. , 2011, Optics express.

[3]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[4]  Neil J. A. Sloane,et al.  The theory of error-correcting codes (north-holland , 1977 .

[5]  Philippe Raynal Unambiguous State Discrimination of two density matrices in Quantum Information Theory , 2006 .

[6]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[7]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[8]  Christoph Simon,et al.  Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.

[9]  Seth Lloyd,et al.  Quantum private queries. , 2007, Physical review letters.

[10]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[11]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[12]  S. Lloyd,et al.  Experimental quantum private queries with linear optics , 2009 .

[13]  Fei Gao,et al.  Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[14]  Seth Lloyd,et al.  Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.

[15]  Gilles Brassard,et al.  Practical Quantum Oblivious Transfer , 1991, CRYPTO.

[16]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[17]  C. Helstrom Quantum detection and estimation theory , 1969 .

[18]  Lukasz Olejnik,et al.  Secure quantum private information retrieval using phase-encoded queries , 2011 .

[19]  Ling-An Wu,et al.  Two-point attack on the two nonorthogonal states QKD protocol over a fiber optic channel , 2005, SPIE/COS Photonics Asia.