Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources

Li Liu,Fen-Zhuo Guo,Qiao-Yan Wen
DOI: https://doi.org/10.1007/s11128-021-03329-0
IF: 1.965
2021-11-19
Quantum Information Processing
Abstract:Quantum-key-distribution (QKD)-based quantum private queries (QPQs) are the most practical protocols for the symmetrically private information retrieval problem. But these protocols cannot resist joint-measurement (JM) attack. Recently, Wei et al. proposed a QPQ protocol with good performance in resisting JM attack (RJM-QPQ) (Phys. Rev. A 93, 042318 (2016)). However, due to the imperfections of ideal single-photon source, one has to consider the security of this protocol under weak coherent pulses sources (WCPS). In this paper, after analyzing the security loophole of RJM-QPQ protocol under WCPS, we propose a QPQ protocol with decoy-state method (DS-QPQ). Compared to the RJM-QPQ protocol, DS-QPQ has better performance under WCPS. It can also resist the JM attack. Furthermore, it improves database security, user privacy and efficiency. Moreover, DS-QPQ retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.
physics, multidisciplinary,quantum science & technology, mathematical
What problem does this paper attempt to address?