Novel classical post-processing for quantum key distribution-based quantum private query

Existing classical post-processing (CPP) schemes for quantum key distribution (QKD)-based quantum private queries (QPQs) including the $$kN\rightarrow N$$kN→N, $$N\rightarrow N$$N→N, and $$rM\rightarrow N$$rM→N ones have been found imperfect in terms of communication efficiency and security. In this paper, we propose a novel CPP scheme for QKD-based QPQs. The proposed CPP scheme reduces the communication complexity and improves the security of QKD-based QPQ protocols largely. Furthermore, the proposed CPP scheme can provide a multi-bit query efficiently.

[1]  Christoph Simon,et al.  Performing private database queries in a real-world environment using a quantum protocol , 2013, Scientific Reports.

[2]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[3]  Fei Gao,et al.  Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[4]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[5]  Christoph Simon,et al.  Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.

[6]  S. Lloyd,et al.  Experimental quantum private queries with linear optics , 2009 .

[7]  M. V. Panduranga Rao,et al.  Towards communication-efficient quantum oblivious key distribution , 2012, 1208.2501.

[8]  Lukasz Olejnik,et al.  Secure quantum private information retrieval using phase-encoded queries , 2011 .

[9]  Bin Liu,et al.  QKD-based quantum private query without a failure probability , 2015, Science China Physics, Mechanics & Astronomy.

[10]  Rui Yang,et al.  Private database queries using one quantum state , 2015, Quantum Inf. Process..

[11]  Li Zhang,et al.  Private Database Queries Using Quantum States with Limited Coherence Times , 2007, 0709.4502.

[12]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[13]  Seth Lloyd,et al.  Quantum private queries. , 2007, Physical review letters.

[14]  Philippe Raynal Unambiguous State Discrimination of two density matrices in Quantum Information Theory , 2006 .

[15]  Fei Gao,et al.  Practical quantum private query with better performance in resisting joint-measurement attack , 2016 .

[16]  Ronald de Wolf,et al.  Quantum symmetrically-private information retrieval , 2003, Inf. Process. Lett..

[17]  Shi Wei Multi-Bit Quantum Private Query , 2015 .

[18]  U. Herzog,et al.  Optimum unambiguous discrimination of two mixed quantum states , 2005, quant-ph/0502117.

[19]  Fei Gao,et al.  Private database queries based on counterfactual quantum key distribution , 2013 .

[20]  C. Helstrom Quantum detection and estimation theory , 1969 .

[21]  Tang Chao-jing,et al.  Multi-Bit Quantum Private Query , 2015 .

[22]  Yu-Guang Yang,et al.  Secure quantum private query with real-time security check , 2014 .

[23]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[24]  Fei Gao,et al.  Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol , 2014, Scientific Reports.

[25]  Mehmet A. Orgun,et al.  Controllable quantum private queries using an entangled Fibonacci-sequence spiral source , 2015 .

[26]  Yu-Guang Yang,et al.  Relativistic quantum private database queries , 2015, Quantum Information Processing.

[27]  Fang Yu,et al.  Coding-based quantum private database query using entanglement , 2014, Quantum Inf. Comput..

[28]  Hui Chen,et al.  Flexible quantum private queries based on quantum key distribution. , 2011, Optics express.

[29]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[30]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[31]  Chuan Wang,et al.  Implementation of Quantum Private Queries Using Nuclear Magnetic Resonance , 2011 .

[32]  Peng Xu,et al.  Flexible protocol for quantum private query based on B92 protocol , 2014, Quantum Inf. Process..

[33]  Seth Lloyd,et al.  Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.