2022
DOI: 10.1109/tcomm.2022.3168079
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Anonymous Private Information Retrieval for Distributed Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 54 publications
0
6
0
Order By: Relevance
“…This change in the global state can be detected either by a global measurement or local measurements with partial announcement of results. This concept has been used to provide anonymity in several networking tasks including anonymous transmission of classical bits [119], qubits [120], [121], anonymous ranking [122], anonymous notification [123], anonymous collision detection [124], and anonymous private information retrieval [125]. One prominent feature of these protocols is the guarantee of anonymity even when all network messages are moni- tored by an adversary and/or a malicious agent controls a major part of the network.…”
Section: ) Beyond-qkd Applicationsmentioning
confidence: 99%
“…This change in the global state can be detected either by a global measurement or local measurements with partial announcement of results. This concept has been used to provide anonymity in several networking tasks including anonymous transmission of classical bits [119], qubits [120], [121], anonymous ranking [122], anonymous notification [123], anonymous collision detection [124], and anonymous private information retrieval [125]. One prominent feature of these protocols is the guarantee of anonymity even when all network messages are moni- tored by an adversary and/or a malicious agent controls a major part of the network.…”
Section: ) Beyond-qkd Applicationsmentioning
confidence: 99%
“…This change in the global state can be detected either by a global measurement or local measurements with partial announcement of results. This concept has been used to provide anonymity in several networking tasks including anonymous transmission of classical bits [44], qubits [45], [46], anonymous ranking [47], anonymous notification [48], anonymous collision detection [49], and anonymous private information retrieval [50]. One prominent feature of these protocols is the guarantee of anonymity even when all network messages are monitored by an adversary and/or a malicious agent controls a major part of the network.…”
Section: Beyond-qkd Applicationsmentioning
confidence: 99%
“…3) Quantum Communications for Healthcare: One of the sensitive issues in digital healthcare is encryption and security of data. Quantum communications provides methods of secure exchange of health records by QKD and anonymous private information retrieval systems [50]. Additionally, security of medical media is imperative for patient safety and confidentiality, and thus, recently the concept of quantum medical image encryption has attracted a significant attention from both scientists and healthcare system designers [122].…”
Section: Future Directions and Applicationsmentioning
confidence: 99%
“…With an increasing emphasis on personal privacy by communication users, the anonymity of user identities, and the confidentiality of information 1 , 2 , 3 , 4 should hold equal importance. There are various classical cryptographic applications emphasizing anonymity, such as anonymous voting, 5 , 6 anonymous key distribution, 7 , 8 and anonymous private information retrieval, 9 , 10 have been developed. The anonymous secret sharing (ASS) 11 technique, which we discuss, is also applicable across many cryptographic domains, such as secure key management, multiparty secure conferences, and more.…”
Section: Introductionmentioning
confidence: 99%