期刊文献+

基于量子第三方的隐私数据库查询协议 被引量:2

Private Database Queries With a Quantum Third Party
下载PDF
导出
摘要 保障查询数据库时用户及数据库的隐私性具有重要意义。该文利用三光子GHZ(Greenberger-HorneZeilinger)态的量子关联性,提出一个基于量子第三方的隐私数据库查询协议。协议对于信道损耗具有很高的容忍度,并且能够有效地抵抗第三方发动伪造量子纠缠态和量子记忆存储攻击。在第三方的帮助下,协议能够确定地控制用户获得数据库隐私信息的数量。同时,利用Mermin-Bell不等式进行真正的三方纠缠验证保证协议的安全性,这一思想也拓展了设备无关纠缠验证的应用领域。 It is of great importance to guarantee the privacy of the database and users when the database is being queried. A private database queries protocol based on a quantum Third Party (TP) is proposed by utilizing the quantum correlation of three-photon Greenberger-Horne-Zeilinger (GHZ) states. The proposed protocol is highly tolerant of channel loss and robust against fake entangled state attack and quantum memory attack implemented by the third party. With the help of the TP, the amount of private information obtained by the users from the database is deterministically controllable in the proposed protocol. Furthermore, the true tripartite entanglement witness by using Mermin-Bell inequality can ensure the security of the protocol, which expands the application area of Device-Independent (DI) entanglement witnesses.
出处 《电子与信息学报》 EI CSCD 北大核心 2014年第7期1667-1672,共6页 Journal of Electronics & Information Technology
基金 国家863计划(2011AA010803)资助课题
关键词 密码术 数据库 隐私数据库查询 Greenberger-Horne-Zeilinger(GHZ)态 Mermin-Bell不等式 Cryptography Database Private database queries Greenberger-Horne-Zeilinger (GHZ) state Mermin-Bell inequality
  • 相关文献

参考文献16

  • 1Giovannetti V,Lloyd S,Maccone L. Quantum private queries[J].Physical Review Letters,2008,(230502):1-4.
  • 2Gertner Y,Ishai Y,Kushilevitz E. Protecting data privacy in private information retrieval schemes[J].Journal of Computer and Systems Sciences,2000,(03):592-629.
  • 3Chor B,Goldreich O,Kushilevitz E. Private information retrieval[J].Journal of the ACM,1998,(06):965-981.
  • 4Bennett C H,Brassard G. Quantum cryptography:public-key distribution and coin tossing[A].Bangalore,India,1984.175-179.
  • 5Barrett J,Hardy L,Kent A. No signaling and quantum key distribution[J].Physical Review Letters,2005,(010503):1-4.
  • 6Branciard C,Cavalcanti E G,Walborn S P. One-sided device-independent quantum key distribution:security,feasibility,and the connection with steering[J].Physical Review A,2012,(010301?):1-5.
  • 7Barrett J,Colbeck R,Kent A. Unconditionally secure device-independent quantum key distribution with only two devices[J].Physical Review A,2012,(062326):1-10.
  • 8Barrett J,Colbeck R,Kent A. Memory attacks on device-independent quantum cryptography[J].Physical Review Letters,2013,(010503):1-5.
  • 9Lo H K,Curty M,Qi Bing. Measurement-device-independent quantum key distribution[J].Physical Review Letters,2012,(130503):1-5.
  • 10Martini F D,Giovannetti V,Lloyd S. Experimental quantum private queries with linear optics[J].Physical Review A,2009,(010302):1-4.

同被引文献9

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部