Postprocessing of the Oblivious Key in Quantum Private Query

Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know wh...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE journal of selected topics in quantum electronics 2015-05, Vol.21 (3), p.98-108
Hauptverfasser: Gao, Fei, Liu, Bin, Huang, Wei, Wen, Qiao-Yan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 108
container_issue 3
container_start_page 98
container_title IEEE journal of selected topics in quantum electronics
container_volume 21
creator Gao, Fei
Liu, Bin
Huang, Wei
Wen, Qiao-Yan
description Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical.
doi_str_mv 10.1109/JSTQE.2014.2358192
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_6899610</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6899610</ieee_id><sourcerecordid>3623035171</sourcerecordid><originalsourceid>FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhoMoWKt_QC8LXrxsTbL5BC9S6mehLVbwtqTZWU3Z7tZkt9B_b2qLB08zA887vDwIXRI8IATr25e3-Ww0oJiwAc24IpoeoR7hXKWMM3ocdyxlSgX-OEVnISwxxoop3EN30ya0a99YCMHVn0lTJu0XJJNF5Tau6ULyCtvE1cmsM3XbrZKpdxvTQrzBb8_RSWmqABeH2UfvD6P58CkdTx6fh_fj1DJK2pSbTOiCSsMl4bZgqpDWFAsrrSj5wjJbSm0lxUJqZTMDLGNgCNelpQrAlFkf3ez_xqLfHYQ2X7lgoapMDbFjToQkAnOmeESv_6HLpvN1bBcpQSVjgtFI0T1lfROChzJfe7cyfpsTnO-E5r9C853Q_CA0hq72IQcAfwGhtBYEZz-wqXGe</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1662744642</pqid></control><display><type>article</type><title>Postprocessing of the Oblivious Key in Quantum Private Query</title><source>IEEE Electronic Library (IEL)</source><creator>Gao, Fei ; Liu, Bin ; Huang, Wei ; Wen, Qiao-Yan</creator><creatorcontrib>Gao, Fei ; Liu, Bin ; Huang, Wei ; Wen, Qiao-Yan</creatorcontrib><description>Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical.</description><identifier>ISSN: 1077-260X</identifier><identifier>EISSN: 1558-4542</identifier><identifier>DOI: 10.1109/JSTQE.2014.2358192</identifier><identifier>CODEN: IJSQEN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Channel noise ; Complexity theory ; Computer information security ; Cryptography ; Error correction ; Privacy ; Protocols ; Quantum electronics ; Queries ; Query processing ; Security</subject><ispartof>IEEE journal of selected topics in quantum electronics, 2015-05, Vol.21 (3), p.98-108</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</citedby><cites>FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6899610$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6899610$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gao, Fei</creatorcontrib><creatorcontrib>Liu, Bin</creatorcontrib><creatorcontrib>Huang, Wei</creatorcontrib><creatorcontrib>Wen, Qiao-Yan</creatorcontrib><title>Postprocessing of the Oblivious Key in Quantum Private Query</title><title>IEEE journal of selected topics in quantum electronics</title><addtitle>JSTQE</addtitle><description>Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical.</description><subject>Channel noise</subject><subject>Complexity theory</subject><subject>Computer information security</subject><subject>Cryptography</subject><subject>Error correction</subject><subject>Privacy</subject><subject>Protocols</subject><subject>Quantum electronics</subject><subject>Queries</subject><subject>Query processing</subject><subject>Security</subject><issn>1077-260X</issn><issn>1558-4542</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhoMoWKt_QC8LXrxsTbL5BC9S6mehLVbwtqTZWU3Z7tZkt9B_b2qLB08zA887vDwIXRI8IATr25e3-Ww0oJiwAc24IpoeoR7hXKWMM3ocdyxlSgX-OEVnISwxxoop3EN30ya0a99YCMHVn0lTJu0XJJNF5Tau6ULyCtvE1cmsM3XbrZKpdxvTQrzBb8_RSWmqABeH2UfvD6P58CkdTx6fh_fj1DJK2pSbTOiCSsMl4bZgqpDWFAsrrSj5wjJbSm0lxUJqZTMDLGNgCNelpQrAlFkf3ez_xqLfHYQ2X7lgoapMDbFjToQkAnOmeESv_6HLpvN1bBcpQSVjgtFI0T1lfROChzJfe7cyfpsTnO-E5r9C853Q_CA0hq72IQcAfwGhtBYEZz-wqXGe</recordid><startdate>201505</startdate><enddate>201505</enddate><creator>Gao, Fei</creator><creator>Liu, Bin</creator><creator>Huang, Wei</creator><creator>Wen, Qiao-Yan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>L7M</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>201505</creationdate><title>Postprocessing of the Oblivious Key in Quantum Private Query</title><author>Gao, Fei ; Liu, Bin ; Huang, Wei ; Wen, Qiao-Yan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c421t-5a369d27a5715cd48d7cadbc7c6f5bc4cf79c7206798c3ae434ea159fc28eeaf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Channel noise</topic><topic>Complexity theory</topic><topic>Computer information security</topic><topic>Cryptography</topic><topic>Error correction</topic><topic>Privacy</topic><topic>Protocols</topic><topic>Quantum electronics</topic><topic>Queries</topic><topic>Query processing</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gao, Fei</creatorcontrib><creatorcontrib>Liu, Bin</creatorcontrib><creatorcontrib>Huang, Wei</creatorcontrib><creatorcontrib>Wen, Qiao-Yan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE journal of selected topics in quantum electronics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gao, Fei</au><au>Liu, Bin</au><au>Huang, Wei</au><au>Wen, Qiao-Yan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Postprocessing of the Oblivious Key in Quantum Private Query</atitle><jtitle>IEEE journal of selected topics in quantum electronics</jtitle><stitle>JSTQE</stitle><date>2015-05</date><risdate>2015</risdate><volume>21</volume><issue>3</issue><spage>98</spage><epage>108</epage><pages>98-108</pages><issn>1077-260X</issn><eissn>1558-4542</eissn><coden>IJSQEN</coden><abstract>Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 10 4 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSTQE.2014.2358192</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1077-260X
ispartof IEEE journal of selected topics in quantum electronics, 2015-05, Vol.21 (3), p.98-108
issn 1077-260X
1558-4542
language eng
recordid cdi_ieee_primary_6899610
source IEEE Electronic Library (IEL)
subjects Channel noise
Complexity theory
Computer information security
Cryptography
Error correction
Privacy
Protocols
Quantum electronics
Queries
Query processing
Security
title Postprocessing of the Oblivious Key in Quantum Private Query
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T19%3A15%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Postprocessing%20of%20the%20Oblivious%20Key%20in%20Quantum%20Private%20Query&rft.jtitle=IEEE%20journal%20of%20selected%20topics%20in%20quantum%20electronics&rft.au=Gao,%20Fei&rft.date=2015-05&rft.volume=21&rft.issue=3&rft.spage=98&rft.epage=108&rft.pages=98-108&rft.issn=1077-260X&rft.eissn=1558-4542&rft.coden=IJSQEN&rft_id=info:doi/10.1109/JSTQE.2014.2358192&rft_dat=%3Cproquest_RIE%3E3623035171%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1662744642&rft_id=info:pmid/&rft_ieee_id=6899610&rfr_iscdi=true