A Quantum Database Privacy Query Method Based on Order Rearrangement for Better User Privacy

A query method and database technology, applied in digital data protection, electronic digital data processing, digital data information retrieval, etc., can solve problems such as fatal blow, secret information leakage, user loss, etc., to resist Trojan horse attacks and reduce space complexity The effect of reducing the difficulty and cost of implementation

Active Publication Date: 2021-08-27
哈尔滨同创普润科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

More importantly, although the user can discover the dishonest behavior of the database owner after a transaction, the user's secret information has been leaked in this transaction, which is likely to bring huge losses to the user. even fatal blow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quantum Database Privacy Query Method Based on Order Rearrangement for Better User Privacy
  • A Quantum Database Privacy Query Method Based on Order Rearrangement for Better User Privacy
  • A Quantum Database Privacy Query Method Based on Order Rearrangement for Better User Privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0033]In the existing technology, multiple database copies are required to provide perfect user privacy protection. Not only is the space complexity high, but also it is difficult to manage multiple database copies in a unified manner. Therefore, most of the existing technologies believe that user privacy is not required in some cases. Perfect protection is only safe under a certain premise. Therefore, the requirements for user privacy protection are relaxed. In the existing quantum database privacy query protocols, the protection of user privacy is only sensitive to deception, that is, it is impossible for the database own...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of database privacy query, and discloses a quantum database privacy query method based on sequence rearrangement for better user privacy. The database owner Bob sends a quantum sequence to user Alice; for each received particle, Alice Choose to measure the particles with the Z-base with probability η, or choose to measure the particles with the X-base with probability 1-η; Alice rearranges the order of these particles and then sends the rearranged particles to Bob; at the same time, Alice tells The measurement basis and measurement results selected by the particles at each position after Bob's rearrangement order; etc. The quantum database privacy query protocol proposed by the invention can obtain better user privacy performance than spoofing sensitivity, and can also resist Trojan attacks without a wavelength filter and a photon number distributor with an auxiliary monitoring detector.

Description

technical field [0001] The invention belongs to the technical field of database privacy query, and in particular relates to a quantum database privacy query method based on sequence rearrangement and better user privacy. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Privacy is a major security issue involved in many applications, especially communication between untrusted users. Both public privacy and personal privacy need to be protected. Database privacy query is a very typical application in this area. In this type of task: (1) User Alice wants to obtain a record she has purchased in the database, but the database owner Bob should not know which item Alice purchased. (2) Alice should not know other records except her purchase records, that is, to protect the privacy of the database. Quantum database privacy query (QPQ) is a quantum scheme for database privacy query. It was first studied by V...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/245
CPCG06F21/602G06F21/6227G06F16/245
Inventor 昌燕张仕斌
Owner 哈尔滨同创普润科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products