Authenticated Sublinear Quantum Private Information Retrieval

📅 2025-04-05
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the challenge of simultaneously achieving privacy, efficiency, and quantum resistance in secure database querying under quantum adversaries. We propose the first authenticated symmetric quantum private information retrieval (QPIR) protocol with sublinear communication complexity. Methodologically, we establish the first tight lower bound on communication complexity via quantum relative entropy; integrate Uhlmann’s lemma, the quantum Pinsker inequality, and Ring-LWE–based post-quantum cryptography to construct a unified QPIR framework supporting both single- and multi-server settings; and introduce a quantum state authentication mechanism to withstand specious adversaries. Key contributions include: (i) exponential reduction in communication overhead (sublinear vs. classical linear); (ii) post-quantum secure authentication in the single-server setting; (iii) significantly reduced hardware requirements for multi-server deployment; and (iv) rigorous information-theoretic guarantees for both privacy and correctness.

Technology Category

Application Category

📝 Abstract
This paper introduces a novel lower bound on communication complexity using quantum relative entropy and mutual information, refining previous classical entropy-based results. By leveraging Uhlmann's lemma and quantum Pinsker inequalities, the authors establish tighter bounds for information-theoretic security, demonstrating that quantum protocols inherently outperform classical counterparts in balancing privacy and efficiency. Also explores symmetric Quantum Private Information Retrieval (QPIR) protocols that achieve sub-linear communication complexity while ensuring robustness against specious adversaries: A post-quantum cryptography based protocol that can be authenticated for the specious server; A ring-LWE-based protocol for post-quantum security in a single-server setting, ensuring robustness against quantum attacks; A multi-server protocol optimized for hardware practicality, reducing implementation overhead while maintaining sub-linear efficiency. These protocols address critical gaps in secure database queries, offering exponential communication improvements over classical linear-complexity methods. The work also analyzes security trade-offs under quantum specious adversaries, providing theoretical guarantees for privacy and correctness.
Problem

Research questions and friction points this paper is trying to address.

Establishes tighter quantum bounds for secure communication
Develops authenticated sublinear QPIR protocols
Addresses security gaps in quantum database queries
Innovation

Methods, ideas, or system contributions that make the work stand out.

Quantum relative entropy bounds communication complexity
Ring-LWE-based protocol ensures post-quantum security
Multi-server protocol reduces implementation overhead
🔎 Similar Papers
2024-08-13International Conferences on Information Science and SystemCitations: 0
F
Fengxia Liu
Great Bay University, Dongguan, 523830, China, Henan Academy of Sciences, Zhengzhou, 450046, China, and also with Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing, 100872, China
Z
Zhiyong Zheng
Great Bay University, Dongguan, 523830, China, Henan Academy of Sciences, Zhengzhou, 450046, China, and also with Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing, 100872, China
Kun Tian
Kun Tian
Intel
Y
Yi Zhang
Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing, 100872, China; Great Bay University, Dongguan, 523830, China, and also with Henan Academy of Sciences, Zhengzhou, 450046, China
H
Heng Guo
Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing, 100872, China; Great Bay University, Dongguan, 523830, China, and also with Henan Academy of Sciences, Zhengzhou, 450046, China
Z
Zhe Hu
Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing, 100872, China; Great Bay University, Dongguan, 523830, China, and also with Henan Academy of Sciences, Zhengzhou, 450046, China
O
Oleksiy Zhedanov
Great Bay University, Dongguan, 523830, China, Henan Academy of Sciences, Zhengzhou, 450046, China, and also with Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing, 100872, China
Z
Zixian Gong
Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing, 100872, China; Great Bay University, Dongguan, 523830, China, and also with Henan Academy of Sciences, Zhengzhou, 450046, China