Improved and Formal Proposal for Device Independent Quantum Private Query

Recently, Maitra et al (Phys. Rev. A, 2017) proposed a protocol towards Device Independent Quantum Private Query (DI-QPQ) by exploiting a local CHSH game on top of the QPQ protocol proposed by Yang et al (Quant. Inf. Process., 2014). However, their test doesn't provide any certification for the devices in client's side. In the present draft, we propose a novel device independent QPQ scheme. Our technique exploits a tilted version of original CHSH game and proper testing of POVM devices and hence it guarantees device independence. Further, we provide formal security proofs and obtain an upper bound in information leakage to both dishonest client as well as dishonest server.

[1]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[2]  I. D. Ivanović How to differentiate between non-orthogonal states , 1987 .

[3]  Sanjeev Kumar Mishra On Symmetrically Private Information Retrieval , 2000, IACR Cryptol. ePrint Arch..

[4]  Peng Xu,et al.  Flexible protocol for quantum private query based on B92 protocol , 2014, Quantum Inf. Process..

[5]  Jkedrzej Kaniewski,et al.  Self-testing of binary observables based on commutation , 2017, 1702.06845.

[6]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[7]  Christoph Simon,et al.  Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.

[8]  Christoph Simon,et al.  Performing private database queries in a real-world environment using a quantum protocol , 2013, Scientific Reports.

[9]  Rafail Ostrovsky,et al.  Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[10]  Iordanis Kerenidis,et al.  Lower bounds for quantum oblivious transfer , 2010, Quantum Inf. Comput..

[11]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[12]  Umesh V. Vazirani,et al.  A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games , 2012, ITCS '13.

[13]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[14]  M. V. Panduranga Rao,et al.  Towards communication-efficient quantum oblivious key distribution , 2012, 1208.2501.

[15]  Seth Lloyd,et al.  Quantum private queries. , 2007, Physical review letters.

[16]  Moni Naor,et al.  Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.

[17]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[18]  Silvio Micali,et al.  Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.

[19]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[20]  Subhamoy Maitra,et al.  Clauser–Horne–Shimony–Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query , 2018, Quantum Inf. Process..

[21]  Seth Lloyd,et al.  Quantum random access memory. , 2007, Physical review letters.

[22]  Jeffrey Scott Vitter,et al.  Proceedings of the thirtieth annual ACM symposium on Theory of computing , 1998, STOC 1998.

[23]  Hui Chen,et al.  Flexible quantum private queries based on quantum key distribution. , 2011, Optics express.

[24]  Benjamin J. Keele,et al.  Cambridge University Press v. Georgia State University , 2016 .

[25]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[26]  T. Noh Counterfactual quantum cryptography. , 2008, Physical review letters.

[27]  Seth Lloyd,et al.  Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.

[28]  Rafail Ostrovsky,et al.  Single Database Private Information Retrieval Implies Oblivious Transfer , 2000, EUROCRYPT.

[29]  Dan Suciu,et al.  Journal of the ACM , 2006 .

[30]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[31]  Craig Gentry,et al.  Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.

[32]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[33]  Louis Salvail,et al.  On the Power of Two-Party Quantum Cryptography , 2009, ASIACRYPT.

[34]  Jeroen van de Graaf,et al.  Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.

[35]  Guang-Can Guo,et al.  Quantum strategies of quantum measurements , 2001 .

[36]  Fei Gao,et al.  Private database queries based on counterfactual quantum key distribution , 2013 .

[37]  C. Helstrom Quantum detection and estimation theory , 1969 .

[38]  Zach DeVito,et al.  Opt , 2017 .

[39]  Rafail Ostrovsky,et al.  A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.

[40]  Lukasz Olejnik,et al.  Secure quantum private information retrieval using phase-encoded queries , 2011 .

[41]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[42]  Fei Gao,et al.  Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol , 2014, Scientific Reports.

[43]  G. Paul,et al.  Device Independent Quantum Private Query , 2017, 1701.01087.