Literature DB >> 36100587

Experimental symmetric private information retrieval with measurement-device-independent quantum network.

Chao Wang1, Wen Yu Kon2, Hong Jie Ng2, Charles C-W Lim3,4.   

Abstract

Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and database content's security are enforced. For these settings, symmetric private information retrieval (SPIR) could be employed, but its implementation is known to be demanding, requiring a private key-exchange network as the base layer. Here, we report for the first time a realisation of provably-secure SPIR supported by a quantum-secure key-exchange network. The SPIR scheme looks at biometric security, offering secure retrieval of 582-byte fingerprint files from a database with 800 entries. Our experimental results clearly demonstrate the feasibility of SPIR with quantum secure communications, thereby opening up new possibilities in secure distributed data storage and cloud computing over the future Quantum Internet.
© 2022. The Author(s).

Entities:  

Year:  2022        PMID: 36100587      PMCID: PMC9470568          DOI: 10.1038/s41377-022-00959-6

Source DB:  PubMed          Journal:  Light Sci Appl        ISSN: 2047-7538            Impact factor:   20.257


Introduction

Streaming a video on streaming platforms, checking a patient’s health records, and verifying one’s banking statements—these are all examples of information retrieval (IR), where the goal is to retrieve an entry of interest from an online database. While IR tasks are straightforward to implement, with users sending queries for their desired entries and the data centre responding with the correct information, it becomes challenging when there are privacy concerns. Indeed, from the user’s perspective, he/she may not want the data centre to learn about the query of interest for privacy reasons. For instance, the user may not want his/her video preferences to be known by the streaming platform, which can use such information for targeted advertisements. On the other hand, the data managed by the data centre could be sensitive or require long-term security, such as health records or bank account details. As such, these data centres would ideally want other entries of their database to be private from the user. For tasks requiring both user privacy and database privacy, one can turn to symmetric private information retrieval (SPIR), which was first proposed by Gertner et al.[1]. SPIR guarantees that while performing IR, we have that (1) the data centre cannot learn about the user’s query and (2) the user cannot learn more about the database other than the requested information. However, while SPIR can provide strong security guarantees, its implementation is not straightforward. If there is only a single data centre for the user to communicate with, it is known that information-theoretically secure SPIR is impossible even with quantum resources[2,3]. As such, computationally secure SPIR protocols[4-7] and cheat-sensitive quantum private query (QPQ) protocols[8-13] have been proposed. However, computationally secure protocols may suffer from future advances in technology and QPQ does not provide the same strong security guaranteed by SPIR. Therefore, they may not be preferable choices for IR tasks aiming for an information-theoretic security, which is ideal for providing long-term security. Towards achieving an information-theoretic secure SPIR, one can adopt the so-called multi-database scheme proposed by ref. [1]. In this scheme, the user communicates separately with two or more data centres which holds the same database in order to successfully perform the IR task. If we assume that these data centres are non-communicating, it can be shown that the resulting SPIR scheme is information-theoretically secure[1]. For practical implementation of the proposed scheme, we require additionally that (1) information-theoretic secure communication channels exist between the user and data centres and (2) a random string is securely shared between the data centres. Both requirements can be satisfied with a secure key distribution scheme, since this key can be used directly as a shared random string or together with one-time pad (OTP) encryption for secure communication. However, classical key distribution schemes based on asymmetric cryptography rely on unproven assumptions, which could be weakened by theoretical or experimental advances[14] and may not be preferable for SPIR aiming for an information-theoretic security. To allow for practical implementation of SPIR, we turn to quantum key distribution (QKD), an information-theoretically secure method allowing network users to exchange secret keys. By exchanging quantum states and classical communication, QKD allows distant parties to securely generate shared keys which can be later utilised for the SPIR protocol. Since QKD is a relatively mature technology, with commercially available components, extensively-studied security analysis and well-developed post-processing algorithms[15,16], it provides a basis on which SPIR can be built for practical implementation.

Results

Two-database SPIR

We consider here an IR scenario, where a user is interested in accessing the x-th entry of a database w, which contains n different entries w (), of L bits each. In the corresponding two-database SPIR protocol, the user has to interact with two non-communicating data centres, D and D, which each holds a copy of the database w. The protocol can be described as follows (also summarised in Fig. 1 with QKD as the key distribution protocol).
Fig. 1

Two-database SPIR protocol, with QKD as the key distribution protocol

Two-database SPIR protocol, with QKD as the key distribution protocol

Key distribution

Secret keys are pre-distributed among the various parties in the SPIR protocol. We denote (K, K) as the key pair shared between the user and D, (K, K) for the user and D, and (K, K) for D and D.

Query

The user prepares queries , for data centre D (), where R is a random string that is generated by the user locally. Subsequently, the user sends Q and Q to the respective data centres via OTP encryption with the secret keys K and K, respectively.

Answer

After receiving the encrypted message, D and D first decode the transmitted information using keys K and K. We note that the decrypted queries, , may differ from Q if the key pairs are not identical. Thereafter, data centres D and D generate answers and , respectively. The answers A and A are then encrypted with keys K and K and sent to the user.

Retrieval

Upon receiving the answers from D and D, the user decrypt the answers and recovers the desired database entry value with . At the end of the SPIR protocol, four conditions should ideally be satisfied. (1) Correctness: The user should correctly recover his desired database entry, i.e. . (2) User privacy: The data centres should not be able to determine the index of the database entry x which the user is interested in. (3) Database privacy: The user should not be able to gain any information beyond a single entry of the database. (4) Protocol secrecy: To protect the security of the data communicated, any external eavesdropper should neither be able to recover x nor any entry of the database w. To achieve the aforementioned security conditions, the use of keys K to K are essential. Keys K to K serve as secret keys to encrypt communication between the user and the data centres, preventing any leakage of information to an external eavesdropper or the other data centre that may compromise user privacy and protocol secrecy. Keys K and K shared between the data centres are used by the data centres to implement private simultaneous message (PSM) and conditional disclosure of secrets (CDS) protocol[1]. The PSM protocol reveals the result of a function computation () while masking the bits of the inputs to the function ( and ). The CDS protocol reveals a secret (), only if certain conditions are met (valid queries). Therefore, CDS forces a dishonest to provide honest queries while PSM prevents the user from gaining information about the database from the replies directly by forcing them to implement the appropriate f. When combined, both ensure that the user is only able to retrieve at most one entry of the database, even if the user is dishonest[1]. In this paper, we focus on having an information-theoretic SPIR protocol, which requires the keys to be distributed with information-theoretic security. Having an information-theoretic secure protocol is ideal for data requiring long-term security, such as biometrics and health records, because it hedges against the threat posed by technological advancement. As computing power increases, quantum computers become more powerful, and novel algorithms are developed, many computationally secure protocols are at risk of being broken, which leads to leakage of information to external eavesdroppers. Hence, we require an information-theoretic key distribution protocol to maintain the security of SPIR.

SPIR with MDI QKD

Since information-theoretic secure key distribution is impractical in the classical regime, we propose using QKD to distribute the necessary keys in an information-theoretic secure manner for use in SPIR. The overall SPIR scheme involves running SPIR with the aid of QKD generated keys, as presented in Fig. 2a. In this scheme, there is a QKD layer responsible for secure key distribution among distant parties with quantum transmitters and receivers. This QKD layer would supply the keys into an application layer upon which the SPIR protocol is implemented. Having this modular structure allows us to not only be flexible in the choice of QKD and SPIR protocols, but also allows other applications, such as secure communication channels, to be built upon the same QKD layer. The formal security proof of the SPIR protocol with QKD keys can be found in ref. [17].
Fig. 2

Schematic of our proposed SPIR system.

a The SPIR system comprises two layers, the QKD layer and the application layer, which operate independently except for the transfer of secret keys. In the QKD layer, quantum transmitters are paired for key distribution, which includes procedures of quantum state preparation, quantum state measurement, and classical post-processing. In the application layer, each party obtains and manages the generated secret keys for the implementation of the SPIR protocol. The black dashed arrows represent the direction of the classical communication, while the orange solid lines represent quantum channels for QKD. b Schematic of the MDI QKD implementation. LD laser diode, IM intensity modulator, PM phase modulator, BS beam splitter, AMZI asymmetric Mach–Zehnder interferometer, ATT optical attenuator, PL optical power limiter, OS Optical switch, PC polarisation controller, PBS polarising beam splitter, SNSPD superconducting nanowire single-photon detector

Schematic of our proposed SPIR system.

a The SPIR system comprises two layers, the QKD layer and the application layer, which operate independently except for the transfer of secret keys. In the QKD layer, quantum transmitters are paired for key distribution, which includes procedures of quantum state preparation, quantum state measurement, and classical post-processing. In the application layer, each party obtains and manages the generated secret keys for the implementation of the SPIR protocol. The black dashed arrows represent the direction of the classical communication, while the orange solid lines represent quantum channels for QKD. b Schematic of the MDI QKD implementation. LD laser diode, IM intensity modulator, PM phase modulator, BS beam splitter, AMZI asymmetric Mach–Zehnder interferometer, ATT optical attenuator, PL optical power limiter, OS Optical switch, PC polarisation controller, PBS polarising beam splitter, SNSPD superconducting nanowire single-photon detector In such a SPIR scheme, the final system performance depends on the design for both the SPIR layer and the QKD layer, with two main considerations: practicability and implementation security. Practicability is linked to the resources required for implementation. Factors such as the key length and the number of data centres required for SPIR, or the key rate and the topology of the QKD scheme, has to been considered when choosing suitable protocols for the desired application. For instance, the keys required for the SPIR protocol proposed in ref. [1]. for an n-entry database with k data centres scales as . Therefore, for applications with large database sizes, having more data centres can be preferable as it can reduce the key requirements. Implementation security is closely related to the design and deployment of the QKD layer. Although QKD promises an information-theoretic security for key distribution based on quantum physics, its practical implementation may not be able to fulfil the security conditions perfectly. For example, a finite optical isolation of the quantum transmitter from the outside environment may result in vulnerability to Trojan-horse attacks[18,19]. As such, we choose to deploy MDI QKD with decoy states for the QKD layer as it provides a great balance between practicability and implementation security[20,21]. In MDI QKD, each party (user and data centres) holds a quantum transmitter, which needs to be secured. The parties can then communicate via a central quantum receiver, which need not be secure and can be managed by external parties. This gives MDI QKD an appealing feature of immunity against any potential side-channel attacks on the quantum receiver, which is typically regarded as the most vulnerable part in practical QKD implementation[16,20]. As an added advantage, MDI QKD provides a natural star topology, making it suitable for network extension. The MDI QKD protocol used has a key rate of[21]where h(x) is the binary entropy of x, n is the number of events where either party sends zero photons, n is the number of events where both parties send one photon each, e is the error rate of these one-photon events, leakEC is the number of leaked bits from error correction, and the various ε values are security parameters. For the SPIR layer, we consider the two-database SPIR protocol proposed in ref. [1] (detailed also in Appendix B of ref. [17]). For a database with n entries of length L, the protocol requires bits of key for secure communication between the user and each data centre, and () bits of key for use as shared random bits between the data centres, where .

SPIR demonstration on fingerprint database

Here, we built up a MDI QKD system, and demonstrate the SPIR scheme with MDI QKD keys using a fingerprint minutiae database (containing only key features of the fingerprint) stored in the ISO 19794-2 standard format[22]. The database chosen is DB1A of the Fingerprint Verification Competition 2002[23], which is converted into minutiae data by Kayaoglu et al.[24]. It contains 800 entries (n = 800) and the maximum file size is 582 bytes (L = 4656). As such, bits of secret keys is required between the user and each data centre and shared random bits is required between the two data centres. To verify the feasibility of the application, we first study its performance using a key rate simulation[21,25-27]. Using realistic parameters obtained from the MDI QKD system, with security parameters and , we optimise l in Eq. (1) over the intensities , , , the probability of choosing an intensity and basis combination, the number of bits used for parameter estimation, and various security parameters. The performance of two cases are simulated. In the first case, we study our current MDI QKD system with a working frequency of 125 MHz and a run time of 13 h, generating signal pulses in total. We also take the SNSPD counting rate saturation into consideration, which limits the value of to a maximum value that varies with transmission distance. In the second case, we study our current MDI QKD system, but set at a working frequency of 1.25 GHz[28] and a run time of 0.5 min, generating signal pulses. In addition, high counting rate single-photon detectors are assumed for quantum state measurement[29,30]. In this case, the photon counting saturation issue is negligible, and there is no constraint on the value of . The simulation results are shown as the blue and red curve in Fig. 3a for the two cases. In both cases, the final key length generated is sufficient to meet the key requirement of the SPIR protocol (labelled by dotted lines) at a 50 km transmission distance.
Fig. 3

Simulation and experimental result of the MDI QKD system.

a The blue curve is the simulated secure key length with signal pulses (13 h operation of 125 MHz system) and with detector saturation under consideration. The red curve is the simulated secure key length with signal pulses (0.5 min operation of 1.25 GHz system) and with no intensity limitation for quantum state preparation. The dotted lines indicate the number of keys required for the fingerprint database ( shared bits of randomness between data centres and shared secret bits between the user and each data centre). b Demonstration of the fingerprint retrieval

Simulation and experimental result of the MDI QKD system.

a The blue curve is the simulated secure key length with signal pulses (13 h operation of 125 MHz system) and with detector saturation under consideration. The red curve is the simulated secure key length with signal pulses (0.5 min operation of 1.25 GHz system) and with no intensity limitation for quantum state preparation. The dotted lines indicate the number of keys required for the fingerprint database ( shared bits of randomness between data centres and shared secret bits between the user and each data centre). b Demonstration of the fingerprint retrieval We use the optimised parameters in the first case for our MDI QKD system to perform the experiment. After the quantum state preparation and quantum state measurement stated in Sec. Experimental details of MDI QKD, we first obtain raw keys as well as all the necessary statistics for key rate calculation. Subsequently, we perform post-processing on the raw key, including basis sifting, error correction, and privacy amplification to obtain the final secure keys required for SPIR. After basis sifting, 10.34% of the sifted keys are used for parameter estimation, where it was found that the average bit error rate when transmitting states in the Z basis ( and ) is 0.83%. Error correction is performed on the remaining sifted keys by using symmetric blind low-density parity-check (LDPC) code[31]. This error correction code achieves an average correction efficiency of . We note here that a better efficiency performance could be achieved by utilising other LDPC schemes such as the one in ref. [32], or using interactive protocols, e.g. Cascade, which generally provides a higher efficiency in the low error rate region[31,32]. However, for the latter case, a finite-key analysis with two-way protocols is desired for a rigorous security proof[33]. Subsequently, the corrected keys undergo privacy amplification via Toeplitz hashing[34] accelerated by fast Fourier transform to generate final keys that are secret and uniformly distributed. After post-processing, bits of final secure keys are extracted. Here, for our proof-of-concept demonstration, only two quantum transmitters are actually implemented and the same pair of generated keys are re-used for all three QKD links. Finally, we implement the SPIR protocol, and successfully retrieve a target fingerprint file (4656 bits) from the database.

Discussion

We have demonstrated experimentally that the overall SPIR scheme is feasible. However, it is important to note the necessary assumptions and conditions required for a proper implementation of the protocol. Firstly, to ensure the security of the SPIR protocol, we assume that the data centres are non-communicating[1,17]. If the two data centres are allowed to communicate, they are then able to behave like a single entity, which renders the SPIR protocol insecure. To enforce this assumption in practice, we could expect that administrative network management and access controls be utilised to prevent unauthorised communications[35,36]. Secondly, we assume that the QKD system operates independently from the application layer. More specifically, none of the parties involved in SPIR (user or data centres), should be allowed access to the internal components of the quantum transmitter, or control its operations. To enforce this, one can reasonably imagine that the quantum transmitters are properly sealed and shielded by the service provider. Finally, we have to also consider additional assumptions related to the QKD implementation security. For instance, in MDI QKD, the quantum transmitters are assumed to be secure and inaccessible to the eavesdropper. As such, any attacks from the quantum communication channel should be kept under control. Fortunately, such problems have been studied as source-related attacks in the practical QKD security analysis, such as the Trojan-horse attack[18,19], laser seeding attack[37,38] and laser damage attack[39]. Since the eavesdropping light is injected into the quantum transmitter via the quantum channel, a countermeasure based on optical power control can be expected, such as optical power limiter[40] and optical fibre isolators[41].

Methods

Experimental details of MDI QKD

The experimental setup of the MDI QKD is shown in Fig. 2b. The quantum transmitter held by each party consists of a laser source section and a quantum state preparation section. In the laser source section, a distributed feedback laser diode is operated in the gain-switching mode to generate laser pulses with a repetition rate of 125 MHz. This allows each optical pulse to inherit an intrinsically random and independent phase[42,43] required for decoy-state analysis[44]. An intensity modulator (IM) is used for further pulse carving, which generates optical pulses with 220 ps width. In the quantum state preparation section, the phase randomised optical pulses are split into earlier and later time-bins by an asymmetric Mach–Zehnder interferometer. Thereafter, the pulses are modulated by an IM, a phase modulator (PM) and optical attenuators to generate time-bin phase-encoded quantum states: , , , , where and represent the early and late time-bin temporal modes, and , , represents three different intensities for the purpose of decoy-state analysis. Finally, an optical power limiter[40] (or optical isolators[41]) is used to limit the information leakage from the transmitter to the outside environment. The central wavelength of the laser diodes are fine-tuned with a precision of around 0.1 pm (corresponding to a frequency uncertainty of 12.5 MHz), which guarantees the indistinguishability in the spectral mode of the two quantum states. Moreover, as the quantum states are required to arrive simultaneously at the receiver, the laser pulse generation and signal modulations in each transmitter are all synchronised to the same master clock, with a timing delay configuration precision of 10 ps. After going through a 25 km spooled optical fibre, the quantum states from each quantum transmitter arrive at the quantum receiver. In the quantum receiver, an optical switch works in a time-division multiplexing way to connect two of the three parties to the quantum receiver. After successfully linking two legitimate parties to the quantum receiver, the fibre optical polarisation controllers and polarising beam splitters in each path calibrate the state of polarisation of the incoming photons. Thereafter, a 50:50 fibre beam splitter and two superconducting nanowire single-photon detectors perform Bell-state measurement (BSM) on the input quantum states. Including the insertion losses of optical components and fibre connectors, the final effective quantum efficiency of the measurement devices is 70.73% on average. After the BSM, the quantum receiver publicly announces the measurement results. The paired transmitters then perform the necessary data processing and negotiation over an authenticated classical communication channel, including basis sifting, error correction and privacy amplification, etc., to obtain the final identical secure keys. After calibrating all the degrees of freedom of the independent quantum transmitters, the Hong-Ou-Mandel interference visibility is measured to be 0.48 (±0.015). The slight deviation from the theoretical value of 0.5 with coherent state inputs and perfect mode overlapping indicates a good indistinguishability of the generated quantum states, which is a prerequisite for high efficiency BSM and determines the performance of the MDI QKD system.

Conclusion

In this paper, we experimentally demonstrated a two-database SPIR scheme utilising keys from a MDI QKD system on a fingerprint database with 800 entries and a maximum of 582 bytes per entry. In this two-layered scheme, the QKD layer generates the necessary keys for the SPIR protocol in the application layer, where they are used for secure communication and as shared random bit strings. This allows for SPIR with a provable security, which satisfies the strong security guarantees that certain IR problems may require, especially ones that involves sensitive data or data requiring long-term security. Our proposed scheme, along with its demonstration here, thus illustrates the feasibility of the practical implementation of SPIR for tacking IR problems.
  5 in total

1.  Measurement-device-independent quantum key distribution.

Authors:  Hoi-Kwong Lo; Marcos Curty; Bing Qi
Journal:  Phys Rev Lett       Date:  2012-03-30       Impact factor: 9.161

2.  Quantum private queries.

Authors:  Vittorio Giovannetti; Seth Lloyd; Lorenzo Maccone
Journal:  Phys Rev Lett       Date:  2008-06-10       Impact factor: 9.161

3.  Finite-key analysis for measurement-device-independent quantum key distribution.

Authors:  Marcos Curty; Feihu Xu; Wei Cui; Charles Ci Wen Lim; Kiyoshi Tamaki; Hoi-Kwong Lo
Journal:  Nat Commun       Date:  2014-04-29       Impact factor: 14.919

4.  Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution.

Authors:  Jian Li; Yu-Guang Yang; Xiu-Bo Chen; Yi-Hua Zhou; Wei-Min Shi
Journal:  Sci Rep       Date:  2016-08-19       Impact factor: 4.379

5.  Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.

Authors:  Wen Yu Kon; Charles Ci Wen Lim
Journal:  Entropy (Basel)       Date:  2020-12-31       Impact factor: 2.524

  5 in total
  1 in total

1.  Symmetric private information retrieval supported by quantum-secure key-exchange network.

Authors:  Shuang Wang
Journal:  Light Sci Appl       Date:  2022-10-14       Impact factor: 20.257

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.