Quantum Private Queries: Security Analysis

A security analysis of the recently introduced Quantum Private Query (QPQ) protocol is presented. The latter is a cheat sensitive quantum protocol to perform a private search on a classical database. It allows a user to retrieve an item from the database without revealing which item was retrieved, a...

Full description

Bibliographic Details
Main Authors: Giovannetti, Vittorio (Author), Lloyd, Seth (Contributor), Maccone, Lorenzo (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Mechanical Engineering (Contributor), Massachusetts Institute of Technology. Research Laboratory of Electronics (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2012-02-03T19:09:53Z.
Subjects:
Online Access:Get fulltext
LEADER 01815 am a22002293u 4500
001 69027
042 |a dc 
100 1 0 |a Giovannetti, Vittorio  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Mechanical Engineering  |e contributor 
100 1 0 |a Massachusetts Institute of Technology. Research Laboratory of Electronics  |e contributor 
100 1 0 |a Lloyd, Seth  |e contributor 
100 1 0 |a Lloyd, Seth  |e contributor 
100 1 0 |a Maccone, Lorenzo  |e contributor 
700 1 0 |a Lloyd, Seth  |e author 
700 1 0 |a Maccone, Lorenzo  |e author 
245 0 0 |a Quantum Private Queries: Security Analysis 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2012-02-03T19:09:53Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/69027 
520 |a A security analysis of the recently introduced Quantum Private Query (QPQ) protocol is presented. The latter is a cheat sensitive quantum protocol to perform a private search on a classical database. It allows a user to retrieve an item from the database without revealing which item was retrieved, and at the same time it ensures data privacy of the database (the information that the user retrieves in a query is bounded). The security analysis is based on information-disturbance tradeoffs which show that whenever the provider tries to obtain information on the query, the query (encoded into a quantum system) is disturbed so that the person querying the database can detect the privacy violation. The security bounds are derived under the assumption that a unique answer corresponds to each query. To remove this assumption, some simple variants of the protocol are illustrated, and it is conjectured that analogous security bounds apply to them. 
546 |a en_US 
655 7 |a Article 
773 |t IEEE Transactions on Information Theory