Show simple item record

dc.contributor.authorGiovannetti, Vittorio
dc.contributor.authorLloyd, Seth
dc.contributor.authorMaccone, Lorenzo
dc.date.accessioned2012-02-03T19:09:53Z
dc.date.available2012-02-03T19:09:53Z
dc.date.issued2010-07
dc.date.submitted2009-08
dc.identifier.issn0018-9448
dc.identifier.issn1557-9654
dc.identifier.otherINSPEC Accession Number: 11392260
dc.identifier.urihttp://hdl.handle.net/1721.1/69027
dc.description.abstractA security analysis of the recently introduced Quantum Private Query (QPQ) protocol is presented. The latter is a cheat sensitive quantum protocol to perform a private search on a classical database. It allows a user to retrieve an item from the database without revealing which item was retrieved, and at the same time it ensures data privacy of the database (the information that the user retrieves in a query is bounded). The security analysis is based on information-disturbance tradeoffs which show that whenever the provider tries to obtain information on the query, the query (encoded into a quantum system) is disturbed so that the person querying the database can detect the privacy violation. The security bounds are derived under the assumption that a unique answer corresponds to each query. To remove this assumption, some simple variants of the protocol are illustrated, and it is conjectured that analogous security bounds apply to them.en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/tit.2010.2048446en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceIEEEen_US
dc.titleQuantum Private Queries: Security Analysisen_US
dc.typeArticleen_US
dc.identifier.citationGiovannetti, Vittorio, Seth Lloyd, and Lorenzo Maccone. “Quantum Private Queries: Security Analysis.” IEEE Transactions on Information Theory 56.7 (2010): 3465-3477. Web. 3 Feb. 2012. © 2010 Institute of Electrical and Electronics Engineersen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Mechanical Engineeringen_US
dc.contributor.departmentMassachusetts Institute of Technology. Research Laboratory of Electronicsen_US
dc.contributor.approverLloyd, Seth
dc.contributor.mitauthorLloyd, Seth
dc.contributor.mitauthorMaccone, Lorenzo
dc.relation.journalIEEE Transactions on Information Theoryen_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dspace.orderedauthorsGiovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzoen
mit.licensePUBLISHER_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record