Symmetric private information retrieval supported by quantum-secure key-exchange network

被引:0
|
作者
Wang, Shuang [1 ,2 ,3 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Quantum Informat, Hefei 230026, Peoples R China
[2] Univ Sci & Technol China, CAS Ctr Excellence Quantum Informat & Quantum Phy, Hefei 230026, Peoples R China
[3] Univ Sci & Technol China, Hefei Natl Lab, Hefei 230088, Peoples R China
关键词
ROBUST;
D O I
10.1038/s41377-022-00996-1
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum key distribution provides a provably secure way for private key distribution, which enables the practical implementation of information retrieval that preserves both the user privacy and database security.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Symmetric private information retrieval supported by quantum-secure key-exchange network
    Shuang Wang
    [J]. Light: Science & Applications, 11
  • [2] Symmetric private information retrieval supported by quantum-secure key-exchange network
    Wang, Shuang
    [J]. Light: Science and Applications, 2022, 11 (01):
  • [3] Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
    Kon, Wen Yu
    Lim, Charles Ci Wen
    [J]. ENTROPY, 2021, 23 (01) : 1 - 27
  • [4] Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
    Alagic, Gorjan
    Russell, Alexander
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 65 - 93
  • [5] Secure interaction with piggybacked key-exchange
    Apolinarski, Wolfgang
    Handte, Marcus
    Iqbal, Muhammad Umer
    Marron, Pedro Jose
    [J]. PERVASIVE AND MOBILE COMPUTING, 2014, 10 : 22 - 33
  • [6] Quantum-secure authentication of a physical unclonable key
    Goorden, Sebastianus A.
    Horstmann, Marcel
    Mosk, Allard P.
    Skoric, Boris
    Pinkse, Pepijn W. H.
    [J]. OPTICA, 2014, 1 (06): : 421 - 424
  • [7] Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
    Bos, Joppe
    Costello, Craig
    Ducas, Leo
    Mironov, Ilya
    Naehrig, Michael
    Nikolaenko, Valeria
    Raghunathan, Ananth
    Stebila, Douglas
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1006 - 1018
  • [8] Secure key-exchange protocol with an absence of injective functions
    Mislovaty, R
    Perchenok, Y
    Kanter, I
    Kinzel, W
    [J]. PHYSICAL REVIEW E, 2002, 66 (06): : 5
  • [9] Secure Key-Exchange Protocol for Implants Using Heartbeats
    Seepers, Robert M.
    Weber, Jos H.
    Erkin, Zekeriya
    Sourdis, Ioannis
    Strydis, Christos
    [J]. PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 119 - 126
  • [10] PIKE: Enabling Secure Interaction with PIggybacked Key-Exchange
    Apolinarski, Wolfgang
    Handte, Marcus
    Iqbal, Muhammad Umer
    Marron, Pedro Jose
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2013, : 94 - 102