2013
DOI: 10.1103/physreva.88.022334
|View full text |Cite
|
Sign up to set email alerts
|

Private database queries based on counterfactual quantum key distribution

Abstract: Based on the fundamental concept of quantum counterfactuality, we propose a protocol to achieve quantum private database queries, which is a theoretical study of how counterfactuality can be employed beyond counterfactual quantum key distribution (QKD). By adding crucial detecting apparatus to the device of QKD, the privacy of both the distrustful user and the database owner can be guaranteed. Furthermore, the proposed private-database-query protocol makes full use of the low efficiency in the counterfactual Q… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
51
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(51 citation statements)
references
References 18 publications
(30 reference statements)
0
51
0
Order By: Relevance
“…Similar to existing QKD-based QPQ protocols [11,[13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28], our protocol is also cheatsensitive in terms of user privacy. The user privacy is based on the impossibility of perfectly distinguishing non-orthogonal quantum states and superluminal communication.…”
Section: User Privacymentioning
confidence: 64%
“…Similar to existing QKD-based QPQ protocols [11,[13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28], our protocol is also cheatsensitive in terms of user privacy. The user privacy is based on the impossibility of perfectly distinguishing non-orthogonal quantum states and superluminal communication.…”
Section: User Privacymentioning
confidence: 64%
“…where |ψ A1B1 (|ψ A2B2 ) indicate the optical channel between Alice 1 (Alice 2 ) and Bob, evolves under the partial propagator (16) to…”
Section: Extension To Cat Statesmentioning
confidence: 99%
“…Since the proposal of the counterfactual key distribution protocol Noh-2009 (N09) [8], there has been an upsurge of interest in this area, leading to contributions devoted to improving its efficiency [9,10], to security considerations under various attacks [11][12][13], to modified communication schemes [14,15], applications [16][17][18] and experimental proposals or realizations [19].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, there has been a growing interest in quantum private queries (QPQ) [1][2][3][4][5][6][7][8][9]. QPQ are quantum protocols that provide symmetrical private information retrieval (SPIR), which is designed for the user and data privacy.…”
Section: Introductionmentioning
confidence: 99%