Next Article in Journal
Applicability of Squeezed- and Coherent-State Continuous-Variable Quantum Key Distribution over Satellite Links
Previous Article in Journal
Expectation-Maximization Algorithm for the Calibration of Complex Simulator Using a Gaussian Process Emulator
Article

Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography

1
Department of Electrical & Computer Engineering, National University of Singapore, Singapore 119077, Singapore
2
Centre for Quantum Technologies, National University of Singapore, Singapore 119077, Singapore
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(1), 54; https://doi.org/10.3390/e23010054
Received: 1 December 2020 / Revised: 27 December 2020 / Accepted: 28 December 2020 / Published: 31 December 2020
(This article belongs to the Section Quantum Information)
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and shared randomness in the protocol. Here, we propose using quantum key distribution (QKD) instead for a practical implementation, which can realise both the secure communication and shared randomness requirements. We prove that QKD maintains the security of the SPIR protocol and that it is also secure against any external eavesdropper. We also show how such a classical-quantum system could be implemented practically, using the example of a two-database SPIR protocol with keys generated by measurement device-independent QKD. Through key rate calculations, we show that such an implementation is feasible at the metropolitan level with current QKD technology. View Full-Text
Keywords: quantum key distribution; symmetric private information retrieval; quantum cryptography; information theoretic security quantum key distribution; symmetric private information retrieval; quantum cryptography; information theoretic security
Show Figures

Figure 1

MDPI and ACS Style

Kon, W.Y.; Lim, C.C.W. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. Entropy 2021, 23, 54. https://doi.org/10.3390/e23010054

AMA Style

Kon WY, Lim CCW. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. Entropy. 2021; 23(1):54. https://doi.org/10.3390/e23010054

Chicago/Turabian Style

Kon, Wen Y.; Lim, Charles C.W. 2021. "Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography" Entropy 23, no. 1: 54. https://doi.org/10.3390/e23010054

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop