Cargando…
Performing private database queries in a real-world environment using a quantum protocol
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is imposs...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5381472/ https://www.ncbi.nlm.nih.gov/pubmed/24913129 http://dx.doi.org/10.1038/srep05233 |
_version_ | 1782519941173346304 |
---|---|
author | Chan, Philip Lucio-Martinez, Itzel Mo, Xiaofan Simon, Christoph Tittel, Wolfgang |
author_facet | Chan, Philip Lucio-Martinez, Itzel Mo, Xiaofan Simon, Christoph Tittel, Wolfgang |
author_sort | Chan, Philip |
collection | PubMed |
description | In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. |
format | Online Article Text |
id | pubmed-5381472 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Nature Publishing Group |
record_format | MEDLINE/PubMed |
spelling | pubmed-53814722017-04-11 Performing private database queries in a real-world environment using a quantum protocol Chan, Philip Lucio-Martinez, Itzel Mo, Xiaofan Simon, Christoph Tittel, Wolfgang Sci Rep Article In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. Nature Publishing Group 2014-06-10 /pmc/articles/PMC5381472/ /pubmed/24913129 http://dx.doi.org/10.1038/srep05233 Text en Copyright © 2014, Macmillan Publishers Limited. All rights reserved http://creativecommons.org/licenses/by/4.0/ This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article's Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder in order to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ |
spellingShingle | Article Chan, Philip Lucio-Martinez, Itzel Mo, Xiaofan Simon, Christoph Tittel, Wolfgang Performing private database queries in a real-world environment using a quantum protocol |
title | Performing private database queries in a real-world environment using a quantum protocol |
title_full | Performing private database queries in a real-world environment using a quantum protocol |
title_fullStr | Performing private database queries in a real-world environment using a quantum protocol |
title_full_unstemmed | Performing private database queries in a real-world environment using a quantum protocol |
title_short | Performing private database queries in a real-world environment using a quantum protocol |
title_sort | performing private database queries in a real-world environment using a quantum protocol |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5381472/ https://www.ncbi.nlm.nih.gov/pubmed/24913129 http://dx.doi.org/10.1038/srep05233 |
work_keys_str_mv | AT chanphilip performingprivatedatabasequeriesinarealworldenvironmentusingaquantumprotocol AT luciomartinezitzel performingprivatedatabasequeriesinarealworldenvironmentusingaquantumprotocol AT moxiaofan performingprivatedatabasequeriesinarealworldenvironmentusingaquantumprotocol AT simonchristoph performingprivatedatabasequeriesinarealworldenvironmentusingaquantumprotocol AT tittelwolfgang performingprivatedatabasequeriesinarealworldenvironmentusingaquantumprotocol |