| Literature DB >> 28051101 |
Liang-Yuan Zhao1,2, Zhen-Qiang Yin1,2, Wei Chen1,2, Yong-Jun Qian1,2, Chun-Mei Zhang1,2, Guang-Can Guo1,2, Zheng-Fu Han1,2.
Abstract
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.Entities:
Year: 2017 PMID: 28051101 PMCID: PMC5209688 DOI: 10.1038/srep39733
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1Relationship between the optical power of the pulse reaching the two detectors and the value of θ when Alice chooses a different basis with Bob.
The dotted box indicates the range of θ that fulfils equation (2), which implies that dishonest Bob can launch a perfect detector-blinding attack.
Figure 2Schematic diagram of loss-tolerant MDI-QPQ for the honest parties.
The BS represents 50:50 beam splitter, and PBS stands for polarization beam splitter. Alice and Bob prepare honest polarization states randomly with single-photon sources. Alice makes the BSMs. A joint click on D1H and D2V or D1V and D2H implies a projection into Bell state |Ψ−〉 and will be recorded by Alice. The red dotted box means that the classical information of Alice’s state preparation is not leaked to the BSM and Bob. The grey dotted box represents that Alice needs not to trust the BSM device.
Theoretical probabilities of obtaining Bell state |Ψ−〉 for different combinations of the honest states.
| (Combinations) | |Ψ−〉 | |||
|---|---|---|---|---|
| |0〉 | |1〉 | |||
| |0〉 | 0 | |||
| |1〉 | 0 | |||
These can be calculated by the interferences of the honest states at the beam splitter.
Theoretical probabilities of obtaining Bell state |Ψ−〉 for Δθ = 0 and in the honest protocol.
| (Δ | |Ψ−〉 | |Ψ−〉 | |||||||
|---|---|---|---|---|---|---|---|---|---|
| |0〉 | |1〉 | ( | |0〉 | |1〉 | |||||
| |0〉 | 0 | |0〉 | 0 | ||||||
| |1〉 | 0 | |1〉 | 0 | ||||||
| 0 | 0 | ||||||||
| 0 | 0 | ||||||||
Figure 3Relationships between the error rates e of the query key without error correction and e of the conclusive raw key for k = 4, k = 7 and k = 10 (from right to left).
Theoretical probabilities of obtaining Bell state |Ψ−〉 for different combinations of Bob’s cheating states and Alice’s honest states in the first middle-state attack.
| (Δ | |Ψ−〉 | |Ψ−〉 | |||||||
|---|---|---|---|---|---|---|---|---|---|
| |0〉 | |1〉 | ( | |0〉 | |1〉 | |||||
Figure 4The probabilities of Alice acquiring a conclusive raw key in the honest protocol and in the first middle-state attack for different θ.
The curves represent , p and from up to down.
Theoretical probabilities of obtaining Bell state |Ψ−〉 for different combinations of Bob’s cheating states and Alice’s honest states in the second middle-state attack.
| (Δ | |Ψ−〉 | |Ψ−〉 | |||||||
|---|---|---|---|---|---|---|---|---|---|
| |0〉 | |1〉 | ( | |0〉 | |1〉 | |||||
The operator ‘+’ in ‘±’ stands for the case , while the operator ‘−’ in ‘±’ represents the case .
Figure 5The relationship between the error rate of Bob’s raw key and θ in the second middle-state attack for.