Sequence rearrangement-based quantum database privacy query method with better user privacy performance

A query method and database technology, applied in the direction of digital data protection, electronic digital data processing, special data processing applications, etc., can solve the problems of secret information leakage, user loss, fatal blow, etc., to resist Trojan horse attacks and reduce space complexity The effect of reducing the difficulty and cost of implementation

Active Publication Date: 2018-08-03
哈尔滨同创普润科技有限公司
View PDF13 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

More importantly, although the user can discover the dishonest behavior of the database owner after a transaction, the user's secret information has been leaked in this transaction, which is likely to bring huge losses to the user. even fatal blow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sequence rearrangement-based quantum database privacy query method with better user privacy performance
  • Sequence rearrangement-based quantum database privacy query method with better user privacy performance
  • Sequence rearrangement-based quantum database privacy query method with better user privacy performance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0033]In the existing technology, multiple database copies are required to provide perfect user privacy protection. Not only is the space complexity high, but also it is difficult to manage multiple database copies in a unified manner. Therefore, most of the existing technologies believe that user privacy is not required in some cases. Perfect protection is only safe under a certain premise. Therefore, the requirements for user privacy protection are relaxed. In the existing quantum database privacy query protocols, the protection of user privacy is only sensitive to deception, that is, it is impossible for the database own...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of database privacy query, and discloses a sequence rearrangement-based quantum database privacy query method with better user privacy performance. A database owner Bob sends a quantum sequence to a user Alice; for each received particle, the Alice measures the particle by selecting and using Z base according to a probability eta, or by selecting and using X base according to a probability 1-eta; the Alice rearranges a particle sequence and then sends rearranged particles to the Bob; and meanwhile, the Alice tells the Bob about the measurement baseselected and used for the particle in each position after sequence rearrangement and a measurement result. Through a quantum database privacy query protocol proposed by the method, the user privacy performance better than cheat sensitivity can be obtained; and Trojan horse attack can be resisted in the absence of a wavelength filter and a photon number distributor with an auxiliary monitoring detector.

Description

technical field [0001] The invention belongs to the technical field of database privacy query, and in particular relates to a quantum database privacy query method based on sequence rearrangement and better user privacy. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Privacy is a major security issue involved in many applications, especially communication between untrusted users. Both public privacy and personal privacy need to be protected. Database privacy query is a very typical application in this area. In this type of task: (1) User Alice wants to obtain a record she has purchased in the database, but the database owner Bob should not know which item Alice purchased. (2) Alice should not know other records except her purchase records, that is, to protect the privacy of the database. Quantum database privacy query (QPQ) is a quantum scheme for database privacy query. It was first studied by V...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F17/30
CPCG06F21/602G06F21/6227G06F16/245
Inventor 昌燕张仕斌
Owner 哈尔滨同创普润科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products