Impossibility of Quantum Private Queries
- URL: http://arxiv.org/abs/2501.12842v1
- Date: Wed, 22 Jan 2025 12:42:28 GMT
- Title: Impossibility of Quantum Private Queries
- Authors: Esther Hänggi, Severin Winkler,
- Abstract summary: Symmetric private information retrieval is a cryptographic task allowing a user to query a database and obtain exactly one entry without revealing to the owner of the database which element was accessed.
We give an explicit attack against any cheat-sensitive symmetric private information retrieval protocol, showing that any protocol that is secure for the user cannot have non-trivial security guarantees for the owner of the database.
- Score: 0.0
- License:
- Abstract: Symmetric private information retrieval is a cryptographic task allowing a user to query a database and obtain exactly one entry without revealing to the owner of the database which element was accessed. The task is a variant of general two-party protocols called one-sided secure function evaluation and is closely related to oblivious transfer. Under the name quantum private queries, quantum protocols have been proposed to solve this problem in a cheat-sensitive way: In such protocols, it is not impossible for dishonest participants to cheat, but they risk detection [V. Giovannetti, S. Lloyd, and L. Maccone, Phys. Rev. Lett. 100, 230502 (2008)]. We give an explicit attack against any cheat-sensitive symmetric private information retrieval protocol, showing that any protocol that is secure for the user cannot have non-trivial security guarantees for the owner of the database.
Related papers
- Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Reexamination of the realtime protection for user privacy in practical quantum private query [0.24578723416255746]
Quantum private query (QPQ) is the quantum version for symmetrically private retrieval.
The user privacy in QPQ is generally guarded in the non-realtime and cheat sensitive way.
We show that honesty checking of inner participant should be dealt more carefully in for example the choosing of checking qubits.
arXiv Detail & Related papers (2024-07-27T02:19:35Z) - Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor [19.129363889273904]
We propose a novel multi-factor fuzzy extractor that integrates both a user's secret (e.g., a password) and a user's biometrics.
We then employ this multi-factor fuzzy extractor to construct personal identity credentials which can be used in a new multi-factor authenticated key exchange protocol.
arXiv Detail & Related papers (2024-05-19T05:50:28Z) - A Privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs [2.254434034390528]
Quantum Random Number Generators can provide high-quality keys for cryptographic algorithms.
Existing Entropy-as-a-Service solutions require users to trust the central authority distributing the key material.
We present a novel key transmission protocol that allows users to obtain cryptographic material generated by a QRNG in such a way that the server is unable to identify which user is receiving each key.
arXiv Detail & Related papers (2024-01-29T14:00:37Z) - An Improved Quantum Private Set Intersection Protocol Based on Hadamard
Gates [22.0983572289132]
We find the participant can deduce the other party's private information, which violates the security requirement of private set computation.
In order to solve this problem, an improved private set intersection protocol based on Hadamard gate is proposed.
arXiv Detail & Related papers (2023-10-01T16:21:44Z) - Secure Key from Quantum Discord [22.97866257572447]
We show how to make use of discord to analyze security in a specific quantum cryptography protocol.
Our method is robust against imperfections in qubit sources and qubit measurements as well as basis misalignment due to quantum channels.
arXiv Detail & Related papers (2023-04-12T14:21:49Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Measurement-Device-Independent Quantum Secure Direct Communication with
User Authentication [3.490038106567192]
Quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) are two important branches of quantum cryptography.
In the practical scenario, an adversary can apply detector-side-channel attacks to get some non-negligible amount of information about the secret message.
Measurement-device-independent (MDI) quantum protocols can remove this kind of detector-side-channel attack.
arXiv Detail & Related papers (2022-02-21T15:40:38Z) - BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data
Silos [73.84437456144994]
Contact tracing is an important method to control the spread of an infectious disease such as COVID-19.
Current solutions do not utilize the huge volume of data stored in business databases and individual digital devices.
We propose BeeTrace, a unified platform that breaks data silos and deploys state-of-the-art cryptographic protocols to guarantee privacy goals.
arXiv Detail & Related papers (2020-07-05T10:33:45Z) - Provably-secure symmetric private information retrieval with quantum
cryptography [0.0]
We propose using quantum key distribution (QKD) instead for a practical implementation, which can realise both the secure communication and shared randomness requirements.
We prove that QKD maintains the security of the SPIR protocol and that it is also secure against any external eavesdropper.
arXiv Detail & Related papers (2020-04-29T02:08:10Z) - Concerning Quantum Identification Without Entanglement [0.0]
We comment on a recent proposal for quantum identity authentication from Zawadzki.
We show that using a simple strategyan adversary may indeed obtain non-negligible information on the shared identification secret.
arXiv Detail & Related papers (2020-03-26T18:26:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.