4.7 Article

Practical Quantum Anonymous Private Information Retrieval Based on Quantum Key Distribution

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2023.3288989

Keywords

Symmetric private information retrieval; quantum private information retrieval; anonymity; privacy; multipartite entanglement

Ask authors/readers for more resources

This paper points out the symbol coincidence error in Khan et al.'s QAPIR protocol and provides an improvement on it. Finally, a practical QAPIR protocol based on quantum key distribution is proposed, and its performance under certain types of noise is analyzed. The security of the protocol is also proved in an active adversary scenario. Compared with Khan et al.'s protocol, our protocol is easier to implement under current technologies and can work over the noisy quantum channel, providing a practical way for QAPIR protocol designs.
Quantum Anonymous Private Information Retrieval (QAPIR) allows a user to retrieve an item from a database anonymously thus achieving better user privacy. Recently, Khan et al. proposed the first QAPIR protocol (IEEE Trans. Commun., 2022), which is the only known QAPIR protocol. However, a symbol coincidence error occurs when the main ingredients are combined to form this QAPIR protocol. Furthermore, it requires perfect (n + 1)-partite d-dimensional Greenberger-Horne-Zeilinger (GHZ) states to be pre-shared among the nodes where d >= N and N is the size of the database. However, the difficulties in implementing the preparation of high-dimensional GHZ states and the quantum-computing-based queries under current technologies lead to the impracticability of this QAPIR protocol due to the extremely high dimensionalities of GHZ states and oracle operations when large databases are involved. To address these issues, we first point out the symbol coincidence error in Khan et al.'s QAPIR protocol and then give an improvement on it. Finally, we propose a practical QAPIR protocol based on quantum key distribution. We analyze its performance under certain types of noise. We also prove the security of our QAPIR protocol in an active adversary scenario where active dishonest users and database owner are taken into account. Compared with Khan et al.'s protocol, our protocol is easier to implement under current technologies, and can work over the noisy quantum channel. It provides a practical way for the design of QAPIR protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available