Quantum Private Queries
From MaRDI portal
Publication:3107670
DOI10.1103/PhysRevLett.100.230502zbMath1228.81143arXiv1102.2318WikidataQ59472652 ScholiaQ59472652MaRDI QIDQ3107670
Seth Lloyd, Lorenzo Maccone, Vittorio Giovannetti
Publication date: 26 December 2011
Published in: Physical Review Letters (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1102.2318
Quantum computation (81P68) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (71)
An efficient quantum scheme for private set intersection ⋮ Quantum private query with perfect user privacy against a joint-measurement attack ⋮ Effective agent quantum private data query against malicious joint attack with blind quantum computing ⋮ Controlling the key by choosing the detection bits in quantum cryptographic protocols ⋮ Authenticated QKD based on orthogonal states ⋮ A novel quantum solution to privacy-preserving nearest neighbor query in location-based services ⋮ Novel classical post-processing for quantum key distribution-based quantum private query ⋮ Quantum private query based on single-photon interference ⋮ Speeding up the spatial adiabatic passage of matter waves in optical microtraps by optimal control ⋮ Quantum algorithms for anomaly detection using amplitude estimation ⋮ Quantum private comparison employing single-photon interference ⋮ Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query ⋮ Efficient semi-quantum private comparison without using entanglement resource and pre-shared key ⋮ Quantum private query based on quantum homomorphic encryption with qubit rotation ⋮ Memory-free quantum secret sharing protocol with collective detection ⋮ Multi-user quantum private query ⋮ Improved multiparty quantum private comparison based on quantum homomorphic encryption ⋮ Enhancing user privacy in SARG04-based private database query protocols ⋮ Decoy-state quantum private query protocol with two-way communication ⋮ A novel quantum anonymous ranking protocol ⋮ Semi-quantum private query protocol without invoking the measurement capability of classical user ⋮ Quantum algorithm for unsupervised anomaly detection ⋮ A proposal for device independent probabilistic quantum oblivious transfer ⋮ Security loophole and improvement of quantum private query protocol based on W state ⋮ Multi-user semi-device independent quantum private query ⋮ Nearest private query based on quantum oblivious key distribution ⋮ A novel quantum scheme for secure two-party distance computation ⋮ Improved and formal proposal for device-independent quantum private query * ⋮ Quantum private query with authentication ⋮ Quantum solution to a class of two-party private summation problems ⋮ A robust and efficient quantum private comparison of equality based on the entangled swapping of GHZ-like state and \(\chi^+\) state ⋮ Quantum cryptography beyond quantum key distribution ⋮ Flexible quantum oblivious transfer ⋮ Multi-user quantum private query protocol ⋮ Practical quantum database private query protocol with classical database owner ⋮ Measurement-device-independent quantum private query with qutrits ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ Quantum homomorphic encryption scheme with flexible number of evaluator based on \((k, n)\)-threshold quantum state sharing ⋮ Symmetric quantum fully homomorphic encryption with perfect security ⋮ Secure quantum network coding based on quantum homomorphic message authentication ⋮ Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation ⋮ Privacy-enhanced multi-user quantum private data query using partial quantum homomorphic encryption ⋮ Quantum private query using W state ⋮ Cryptanalysis of multi-user quantum private query protocol ⋮ Authenticated quantum key distribution with collective detection using single photons ⋮ Robust quantum private queries ⋮ A novel quantum solution to secure two-party distance computation ⋮ Quantum-enhanced feature selection with forward selection and backward elimination ⋮ Controllable quantum private queries using an entangled Fibonacci-sequence spiral source ⋮ Comparison between the Cramer-Rao and the mini-max approaches in quantum channel estimation ⋮ Private database queries using one quantum state ⋮ Quantum private information retrieval has linear communication complexity ⋮ Quantum private query based on stable error correcting code in the case of noise ⋮ Quantum private query based on Bell state and single photons ⋮ Cryptanalysis of the quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and Bell state ⋮ Security improvements of several basic quantum private query protocols with \(O(\log N)\) communication complexity ⋮ Two quantum private query protocols based on Bell states and single photons ⋮ Quantum secure multi-party summation based on Grover's search algorithm ⋮ Practical quantum private query based on Bell state ⋮ Practical two-way QKD-based quantum private query with better performance in user privacy ⋮ An efficient quantum private query protocol based on oracle and Grover iteration ⋮ A new protocol for quantum private query against joint-measurement attack ⋮ Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources ⋮ Secure two-party integer comparison protocol without any third party ⋮ Quantum identity authentication in the orthogonal-state-encoding QKD system ⋮ Afterpulse analysis for reference-frame-independent quantum key distribution ⋮ Efficient semi-quantum private comparison using single photons ⋮ Relativistic quantum private database queries ⋮ Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol ⋮ Quantum identity authentication based on round robin differencial phase shift communication line ⋮ Multi-user quantum private query using symmetric multi-particle W state
Cites Work
- Unnamed Item
- Unnamed Item
- The transition probability in the state space of a \(^*\)-algebra
- Protecting data privacy in private information retrieval schemes
- Quantum Random Access Memory
- Private information retrieval
- Uncertainty, Monogamy, and Locking of Quantum Correlations
- A single quantum cannot be cloned
This page was built for publication: Quantum Private Queries