Skip to main content
Log in

Cryptanalysis of Multi-User Quantum Private Query Protocol

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Recently, Tian et al. proposed a multi-user quantum private query protocol. The protocol realizes the function of n users querying the database at the same time, which can well protect the privacy of users and databases, and has high efficiency of implementation. Unfortunately, it has security vulnerability in the process of sending quantum sequences. Based on this vulnerability, we propose a man-in-the-middle attack on multi-user quantum private query protocol. Firstly, this paper reviews the multi-user quantum private query protocol. Secondly, the implementation steps of multi-user private query protocol are reviewed concisely. Finally, we pointed that in the protocol, Eve, the eavesdropper, can pretend to be Bob and the identity of the user to obtain the key of query data and steal the database information without being discovered. Through analysis, we find that man in the middle attack is feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)

    Article  MathSciNet  Google Scholar 

  2. Diep, D.N., Nagata, K., Wong, R.: Continuous-variable quantum computing and its applications to cryptography. Int. J. Theor. Phys. 59, 3184–3188 (2020)

  3. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008)

    Article  ADS  MathSciNet  Google Scholar 

  4. Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. Lect. Notes Comput. Sci. 3378, 386–406 (2005)

    Article  MathSciNet  Google Scholar 

  5. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key- distribution protocol. Phys. Rev. A. 83, 022301 (2011)

    Article  ADS  Google Scholar 

  6. Gao, F., Liu, B., Wen, Q.Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express. 20(16), 17411–17420 (2012)

    Article  ADS  Google Scholar 

  7. Yang, Y.G., Zhang, M.O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017–1024 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  8. Zhu, H., Wang, X., Chen, C.M., Kumari, S.: Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput. Electr. Eng. 86, 106714 (2020)

    Article  Google Scholar 

  9. Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A. 79(3), 032341 (2009)

    Article  ADS  MathSciNet  Google Scholar 

  10. Pei, T.R., Meng, X.L., Wei, C.Y., Gao, F., Tian, S.J., Deng, Q.Y.: Practical quantum private query of blocks based on the two-dimensional QKD system. Quantum Inf. Process. 18, 240 (2019)

    Article  ADS  Google Scholar 

  11. Chang, Y., Zhang, S.B., Wan, G.G., Yan, L.L., Zhang, Y., Li, X.Y.: Practical two-way QKD-based quantum private query with better performance in user privacy. Int. J. Theor. Phys. 58, 2069–2080 (2019)

    Article  Google Scholar 

  12. Ma, H.Y., Xu, P.A., Shao, C.H., Chen, L.B., Li, J.X., Pan, Q.: Quantum private query based on stable error correcting code in the case of noise. Int. J. Theor. Phys. 58, 4241–4248 (2019)

    Article  MathSciNet  Google Scholar 

  13. Xiao, H., Huang, W.H., Zhou, M.: An efficient quantum private query protocol based on Oracle and Grover iteration. Int. J. Theor. Phys. 58, 3025–3035 (2019)

    Article  MathSciNet  Google Scholar 

  14. Ye, T.Y., Li, H.K., Hu, J.L.: Multi-user quantum private query protocol. Int. J. Theor. Phys. 59, 2867–2874 (2020). https://doi.org/10.1007/s10773-020-04546-6

    Article  MATH  Google Scholar 

  15. Akram, M.A., Ghaffar, Z., Mahmood, K., Kumari, S., Agarwal, K., Chen, C.M.: An anonymous authenticated key-agreement scheme for multi-server infrastructure Human-centric. Comput. Inf. Sci. 10(1), 1–18 (2020)

    Google Scholar 

  16. Wu, T.Y., Lee, Z., Obaidat, M.S., Kumari, S., Kumar, S., Chen, C.M.: An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access. 8, 28096–28108 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Liaoning Provincial Natural Science Foundation of China (Grant No. 2019-MS-286), and Basic Scientific Research Project of Liaoning Provincial Department of Education (Grant No. LJC202007), and Shenyang Jianzhu University’s educational science research project in 2019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongfeng Zhu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhu, D., Wang, L. & Zhu, H. Cryptanalysis of Multi-User Quantum Private Query Protocol. Int J Theor Phys 60, 284–292 (2021). https://doi.org/10.1007/s10773-020-04691-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-020-04691-y

Keywords

Navigation