Recent privacy query method based on random quantum key distribution

A technology of quantum key distribution and query method, which is applied in the fields of conditional query and quantum information processing to protect privacy, and achieves the effect of reducing computational complexity, being easy to implement, and improving security.

Inactive Publication Date: 2017-04-26
ANHUI UNIVERSITY
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the deficiency of privacy database query in the existing classical technology, and provide a recent privacy query method based on inadvertent quantum key distribution, in order to reduce the computational complexity of t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recent privacy query method based on random quantum key distribution
  • Recent privacy query method based on random quantum key distribution
  • Recent privacy query method based on random quantum key distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the embodiments.

[0032] In this embodiment, a recent privacy query method based on inadvertent quantum key distribution includes two parties: the data owner Bob and the user Alice, and the data owner Bob owns a privacy data set B={x 1 ,x 2 ,...,x i ,...,x m};x i Represents the i-th n-bit element, and x i ∈{0,1,2,…,N-1}; 1≤i≤m; N=2 n ; User Alice has a private data x, x∈{0,1,2,…,N-1}; Specifically, the recent private query method is as follows:

[0033] Step 1. The data owner Bob creates a database D with N data items, where any jth data item is denoted as D(j), and D(j)=x l Indicates that the closest element to j in the privacy data set B is x l , x l ∈B; 0≤j≤N-1;

[0034] In this embodiment, Bob’s private data set B={1,2,3,6,7,10,11,14}, that is, m=8; and all elements in B belong to the integer set Z 16 , th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a recent privacy query method based on random quantum key distribution. The method is characterized in that two participants of a data owner Bob and a user Alice are included; the data owner Bob owns one privacy data set B; the user Alice owns one piece of privacy data x; and under the condition of protecting respective privacy, after quantum method query, the Alice acquires an element xi which is closest to the x in the Bob privacy data set. In the invention, a calculating complexity of a database server during privacy query and a communication complexity between the two parties can be reduced, and according to a physical principle of quantum mechanics, safety is increased so that the method is practical and can be suitable for recent privacy query of a large-scale database.

Description

technical field [0001] The invention relates to the field of privacy-protecting conditional query and quantum information processing, in particular to a recent privacy query method based on inadvertent quantum key distribution. Background technique [0002] With the rapid development of big data, the scale of the database is getting larger and larger, and the application is becoming more and more extensive. From a security point of view, although today's databases already have some basic security measures, they still face many problems in some practical applications, the most important of which is the problem of privacy leakage. In order to solve the general privacy leakage problem, Chor et al. first proposed the concept and model of Private Information Retrieval (PIR) in 1995, and gave a standardized definition in 1998. This strategy can prevent data holders from obtaining Information related to user query statements, thereby protecting user privacy. However, since the da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/002H04L9/0852H04L9/0858
Inventor 石润华许敏罗振宇彭振皖
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products