Postprocessing of the Oblivious Key in Quantum Private Query
Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know wh...
Gespeichert in:
Veröffentlicht in: | IEEE journal of selected topics in quantum electronics 2015-05, Vol.21 (3), p.98-108 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 108 |
---|---|
container_issue | 3 |
container_start_page | 98 |
container_title | IEEE journal of selected topics in quantum electronics |
container_volume | 21 |
creator | Gao, Fei Liu, Bin Huang, Wei Wen, Qiao-Yan |
description | Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical. |
doi_str_mv | 10.1109/JSTQE.2014.2358192 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_6899610</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6899610</ieee_id><sourcerecordid>3623035171</sourcerecordid><originalsourceid>FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhoMoWKt_QC8LXrxsTbL5BC9S6mehLVbwtqTZWU3Z7tZkt9B_b2qLB08zA887vDwIXRI8IATr25e3-Ww0oJiwAc24IpoeoR7hXKWMM3ocdyxlSgX-OEVnISwxxoop3EN30ya0a99YCMHVn0lTJu0XJJNF5Tau6ULyCtvE1cmsM3XbrZKpdxvTQrzBb8_RSWmqABeH2UfvD6P58CkdTx6fh_fj1DJK2pSbTOiCSsMl4bZgqpDWFAsrrSj5wjJbSm0lxUJqZTMDLGNgCNelpQrAlFkf3ez_xqLfHYQ2X7lgoapMDbFjToQkAnOmeESv_6HLpvN1bBcpQSVjgtFI0T1lfROChzJfe7cyfpsTnO-E5r9C853Q_CA0hq72IQcAfwGhtBYEZz-wqXGe</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1662744642</pqid></control><display><type>article</type><title>Postprocessing of the Oblivious Key in Quantum Private Query</title><source>IEEE Electronic Library (IEL)</source><creator>Gao, Fei ; Liu, Bin ; Huang, Wei ; Wen, Qiao-Yan</creator><creatorcontrib>Gao, Fei ; Liu, Bin ; Huang, Wei ; Wen, Qiao-Yan</creatorcontrib><description>Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical.</description><identifier>ISSN: 1077-260X</identifier><identifier>EISSN: 1558-4542</identifier><identifier>DOI: 10.1109/JSTQE.2014.2358192</identifier><identifier>CODEN: IJSQEN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Channel noise ; Complexity theory ; Computer information security ; Cryptography ; Error correction ; Privacy ; Protocols ; Quantum electronics ; Queries ; Query processing ; Security</subject><ispartof>IEEE journal of selected topics in quantum electronics, 2015-05, Vol.21 (3), p.98-108</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</citedby><cites>FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6899610$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6899610$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gao, Fei</creatorcontrib><creatorcontrib>Liu, Bin</creatorcontrib><creatorcontrib>Huang, Wei</creatorcontrib><creatorcontrib>Wen, Qiao-Yan</creatorcontrib><title>Postprocessing of the Oblivious Key in Quantum Private Query</title><title>IEEE journal of selected topics in quantum electronics</title><addtitle>JSTQE</addtitle><description>Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical.</description><subject>Channel noise</subject><subject>Complexity theory</subject><subject>Computer information security</subject><subject>Cryptography</subject><subject>Error correction</subject><subject>Privacy</subject><subject>Protocols</subject><subject>Quantum electronics</subject><subject>Queries</subject><subject>Query processing</subject><subject>Security</subject><issn>1077-260X</issn><issn>1558-4542</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhoMoWKt_QC8LXrxsTbL5BC9S6mehLVbwtqTZWU3Z7tZkt9B_b2qLB08zA887vDwIXRI8IATr25e3-Ww0oJiwAc24IpoeoR7hXKWMM3ocdyxlSgX-OEVnISwxxoop3EN30ya0a99YCMHVn0lTJu0XJJNF5Tau6ULyCtvE1cmsM3XbrZKpdxvTQrzBb8_RSWmqABeH2UfvD6P58CkdTx6fh_fj1DJK2pSbTOiCSsMl4bZgqpDWFAsrrSj5wjJbSm0lxUJqZTMDLGNgCNelpQrAlFkf3ez_xqLfHYQ2X7lgoapMDbFjToQkAnOmeESv_6HLpvN1bBcpQSVjgtFI0T1lfROChzJfe7cyfpsTnO-E5r9C853Q_CA0hq72IQcAfwGhtBYEZz-wqXGe</recordid><startdate>201505</startdate><enddate>201505</enddate><creator>Gao, Fei</creator><creator>Liu, Bin</creator><creator>Huang, Wei</creator><creator>Wen, Qiao-Yan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>L7M</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>201505</creationdate><title>Postprocessing of the Oblivious Key in Quantum Private Query</title><author>Gao, Fei ; Liu, Bin ; Huang, Wei ; Wen, Qiao-Yan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Channel noise</topic><topic>Complexity theory</topic><topic>Computer information security</topic><topic>Cryptography</topic><topic>Error correction</topic><topic>Privacy</topic><topic>Protocols</topic><topic>Quantum electronics</topic><topic>Queries</topic><topic>Query processing</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gao, Fei</creatorcontrib><creatorcontrib>Liu, Bin</creatorcontrib><creatorcontrib>Huang, Wei</creatorcontrib><creatorcontrib>Wen, Qiao-Yan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE journal of selected topics in quantum electronics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gao, Fei</au><au>Liu, Bin</au><au>Huang, Wei</au><au>Wen, Qiao-Yan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Postprocessing of the Oblivious Key in Quantum Private Query</atitle><jtitle>IEEE journal of selected topics in quantum electronics</jtitle><stitle>JSTQE</stitle><date>2015-05</date><risdate>2015</risdate><volume>21</volume><issue>3</issue><spage>98</spage><epage>108</epage><pages>98-108</pages><issn>1077-260X</issn><eissn>1558-4542</eissn><coden>IJSQEN</coden><abstract>Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSTQE.2014.2358192</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1077-260X |
ispartof | IEEE journal of selected topics in quantum electronics, 2015-05, Vol.21 (3), p.98-108 |
issn | 1077-260X 1558-4542 |
language | eng |
recordid | cdi_ieee_primary_6899610 |
source | IEEE Electronic Library (IEL) |
subjects | Channel noise Complexity theory Computer information security Cryptography Error correction Privacy Protocols Quantum electronics Queries Query processing Security |
title | Postprocessing of the Oblivious Key in Quantum Private Query |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T19%3A15%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Postprocessing%20of%20the%20Oblivious%20Key%20in%20Quantum%20Private%20Query&rft.jtitle=IEEE%20journal%20of%20selected%20topics%20in%20quantum%20electronics&rft.au=Gao,%20Fei&rft.date=2015-05&rft.volume=21&rft.issue=3&rft.spage=98&rft.epage=108&rft.pages=98-108&rft.issn=1077-260X&rft.eissn=1558-4542&rft.coden=IJSQEN&rft_id=info:doi/10.1109/JSTQE.2014.2358192&rft_dat=%3Cproquest_RIE%3E3623035171%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1662744642&rft_id=info:pmid/&rft_ieee_id=6899610&rfr_iscdi=true |