implements (Symmetric) Private Information Retrieval
This protocol [1] implements symmetric private information retrieval (SPIR) and has unconditional security (a.k.a. information-theoretic security). It is a quantum multi-database one-round protocol, based on a classical multi-database SPIR protocol. It uses quantum key distribution (QKD) to share randomness between servers and to secure classical channels between the user and the servers, and thus does not need the assumption of perfectly secure channels that classical multi-database SPIR protocols rely on.
Outline for a generic one-round two-database SPIR protocol with QKD:
There are three parties, a user and two data centres. Each data centre has a copy of the database. In symmetric private information retrieval, the user wants to retrieve an element from a database owned by another party (here, from two other parties: data centres 1 and 2) without revealing which element is retrieved. The user should not have access to other database elements.
The next steps are the same as these of a generic one-round two-database classical SPIR protocol.
For this protocol, SPIR security definitions (see (Symmetric) Private Information Retrieval) are extended as follow:
A SPIR protocol that satisfies the four above conditions is said to be $(\\\eta_\\\text{cor},\\\eta_{UP},\\\eta_{DP},\\\eta_{PS})$-secure.
A two-database one-round $(0,0,0,0)$-secure SPIR protocol with ideal keys replaced by $\\\epsilon$-secure QKD keys, where $\\\epsilon=\\\epsilon_\\\text{corr}+\\\epsilon_\\\text{sec}$ (see Quantum Key Distribution), can be shown to be $(3\\\epsilon_\\\text{corr},2\\\epsilon,2\\\epsilon,4\\\epsilon)$-secure (see Kon and Lim (2021) [1] for a proof).
Inputs:
The next steps are the same as for a generic one-round two-database classical SPIR protocol like this of Gertner et al (2000)[3].
No content has been added to this section, yet!
implements (Symmetric) Private Information Retrieval
This protocol [1] implements symmetric private information retrieval (SPIR) and has unconditional security (a.k.a. information-theoretic security). It is a quantum multi-database one-round protocol, based on a classical multi-database SPIR protocol. It uses quantum key distribution (QKD) to share randomness between servers and to secure classical channels between the user and the servers, and thus does not need the assumption of perfectly secure channels that classical multi-database SPIR protocols rely on.
Outline for a generic one-round two-database SPIR protocol with QKD:
There are three parties, a user and two data centres. Each data centre has a copy of the database. In symmetric private information retrieval, the user wants to retrieve an element from a database owned by another party (here, from two other parties: data centres 1 and 2) without revealing which element is retrieved. The user should not have access to other database elements.
The next steps are the same as these of a generic one-round two-database classical SPIR protocol.
For this protocol, SPIR security definitions (see (Symmetric) Private Information Retrieval) are extended as follow:
A SPIR protocol that satisfies the four above conditions is said to be $(\\\eta_\\\text{cor},\\\eta_{UP},\\\eta_{DP},\\\eta_{PS})$-secure.
A two-database one-round $(0,0,0,0)$-secure SPIR protocol with ideal keys replaced by $\\\epsilon$-secure QKD keys, where $\\\epsilon=\\\epsilon_\\\text{corr}+\\\epsilon_\\\text{sec}$ (see Quantum Key Distribution), can be shown to be $(3\\\epsilon_\\\text{corr},2\\\epsilon,2\\\epsilon,4\\\epsilon)$-secure (see Kon and Lim (2021) [1] for a proof).
Inputs:
The next steps are the same as for a generic one-round two-database classical SPIR protocol like this of Gertner et al (2000)[3].
No content has been added to this section, yet!