Quantum Wireless Network Private Query With Multiple Third Parties
With the development of quantum wireless networks, the practical application of quantum private query (QPQ) should conform to the features of quantum wireless networks to achieve any-to-any query, and QPQ requires a new query mechanism. We first propose a scheme for a network private query in a quan...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8667625/ |
_version_ | 1819276292324851712 |
---|---|
author | Na Li Jian Li Xiubo Chen Yuguang Yang |
author_facet | Na Li Jian Li Xiubo Chen Yuguang Yang |
author_sort | Na Li |
collection | DOAJ |
description | With the development of quantum wireless networks, the practical application of quantum private query (QPQ) should conform to the features of quantum wireless networks to achieve any-to-any query, and QPQ requires a new query mechanism. We first propose a scheme for a network private query in a quantum wireless network with multiple third parties, in which any user can query any database with the assistance of the third parties, by measuring each of the distant nodes that initially share entanglement with each other. The required entanglement among these nodes is established by the third-party intermediate node equipped with GHZ generator using multi-qubit GHZ states. A bilayer network topology, as well as the corresponding private query protocol, ensures the rapid and secure private query. Under the protection of the multi-qubit GHZ state's quantum correlation, the privacy of Alice and Bob is protected from the third parties' fake entangled attack and external attack, and they cannot obtain the privacy of each other by taking quantum memory attack. The performance parameters of the proposed scheme are described based on the analysis of classical wireless communication cost and communication delay. |
first_indexed | 2024-12-23T23:37:54Z |
format | Article |
id | doaj.art-961a3a9592fe4340a7116514f02874c0 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-23T23:37:54Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-961a3a9592fe4340a7116514f02874c02022-12-21T17:25:50ZengIEEEIEEE Access2169-35362019-01-017339643396910.1109/ACCESS.2019.29038238667625Quantum Wireless Network Private Query With Multiple Third PartiesNa Li0https://orcid.org/0000-0003-3361-1652Jian Li1Xiubo Chen2Yuguang Yang3School of Computer, Beijing University of Posts and Telecommunications, Beijing, ChinaSchool of Computer, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Information Security Center, Beijing University of Posts and Telecommunications, Beijing, ChinaCollege of Computer Science and Technology, Beijing University of Technology, Beijing, ChinaWith the development of quantum wireless networks, the practical application of quantum private query (QPQ) should conform to the features of quantum wireless networks to achieve any-to-any query, and QPQ requires a new query mechanism. We first propose a scheme for a network private query in a quantum wireless network with multiple third parties, in which any user can query any database with the assistance of the third parties, by measuring each of the distant nodes that initially share entanglement with each other. The required entanglement among these nodes is established by the third-party intermediate node equipped with GHZ generator using multi-qubit GHZ states. A bilayer network topology, as well as the corresponding private query protocol, ensures the rapid and secure private query. Under the protection of the multi-qubit GHZ state's quantum correlation, the privacy of Alice and Bob is protected from the third parties' fake entangled attack and external attack, and they cannot obtain the privacy of each other by taking quantum memory attack. The performance parameters of the proposed scheme are described based on the analysis of classical wireless communication cost and communication delay.https://ieeexplore.ieee.org/document/8667625/Quantum private queryquantum wireless networksecurity |
spellingShingle | Na Li Jian Li Xiubo Chen Yuguang Yang Quantum Wireless Network Private Query With Multiple Third Parties IEEE Access Quantum private query quantum wireless network security |
title | Quantum Wireless Network Private Query With Multiple Third Parties |
title_full | Quantum Wireless Network Private Query With Multiple Third Parties |
title_fullStr | Quantum Wireless Network Private Query With Multiple Third Parties |
title_full_unstemmed | Quantum Wireless Network Private Query With Multiple Third Parties |
title_short | Quantum Wireless Network Private Query With Multiple Third Parties |
title_sort | quantum wireless network private query with multiple third parties |
topic | Quantum private query quantum wireless network security |
url | https://ieeexplore.ieee.org/document/8667625/ |
work_keys_str_mv | AT nali quantumwirelessnetworkprivatequerywithmultiplethirdparties AT jianli quantumwirelessnetworkprivatequerywithmultiplethirdparties AT xiubochen quantumwirelessnetworkprivatequerywithmultiplethirdparties AT yuguangyang quantumwirelessnetworkprivatequerywithmultiplethirdparties |