Dongmei Liu, Jian Li, Xiubo Chen, Chongqiang Ye, Zhuo Wang
{"title":"Quantum private query protocol based on counterfactual quantum key distribution with noiseless attack","authors":"Dongmei Liu, Jian Li, Xiubo Chen, Chongqiang Ye, Zhuo Wang","doi":"10.1007/s11128-024-04539-y","DOIUrl":null,"url":null,"abstract":"<div><p>Most of the previous quantum private query protocols are based on the BB84 key distribution type and generally use a method that wastes most quantum resources to complete security detection. In order to save resources, this paper proposes a noiseless counterfactual quantum private query protocol with high efficiency. This protocol improves the counterfactual quantum key distribution protocol proposed by Rao and Srikanth (Phys Rev A 104:022424, 2021. https://doi.org/10.1103/PhysRevA.104.022424). The communicating parties randomly select quantum bits with probability <i>f</i> to perform flipping to complete the quantum private query. The detector at the sending end receives the counterfactual bit, which we use for security detection; the detector at the receiving end is called a non-counterfactual bit, which is combined with random bit flipping to realize key transmission, followed by traditional post-processing and private query. Finally, when <span>\\(f=0.5\\)</span>, the response probability (keys rate) of the non-counterfactual detector at the receiving end can reach a minimum value of 0.5.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Information Processing","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s11128-024-04539-y","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PHYSICS, MATHEMATICAL","Score":null,"Total":0}
引用次数: 0
Abstract
Most of the previous quantum private query protocols are based on the BB84 key distribution type and generally use a method that wastes most quantum resources to complete security detection. In order to save resources, this paper proposes a noiseless counterfactual quantum private query protocol with high efficiency. This protocol improves the counterfactual quantum key distribution protocol proposed by Rao and Srikanth (Phys Rev A 104:022424, 2021. https://doi.org/10.1103/PhysRevA.104.022424). The communicating parties randomly select quantum bits with probability f to perform flipping to complete the quantum private query. The detector at the sending end receives the counterfactual bit, which we use for security detection; the detector at the receiving end is called a non-counterfactual bit, which is combined with random bit flipping to realize key transmission, followed by traditional post-processing and private query. Finally, when \(f=0.5\), the response probability (keys rate) of the non-counterfactual detector at the receiving end can reach a minimum value of 0.5.
期刊介绍:
Quantum Information Processing is a high-impact, international journal publishing cutting-edge experimental and theoretical research in all areas of Quantum Information Science. Topics of interest include quantum cryptography and communications, entanglement and discord, quantum algorithms, quantum error correction and fault tolerance, quantum computer science, quantum imaging and sensing, and experimental platforms for quantum information. Quantum Information Processing supports and inspires research by providing a comprehensive peer review process, and broadcasting high quality results in a range of formats. These include original papers, letters, broadly focused perspectives, comprehensive review articles, book reviews, and special topical issues. The journal is particularly interested in papers detailing and demonstrating quantum information protocols for cryptography, communications, computation, and sensing.