Quantum X-Secure E-Eavesdropped T-Colluding Symmetric Private Information Retrieval

IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Alptug Aytekin;Mohamed Nomeir;Sajani Vithana;Sennur Ulukus
{"title":"Quantum X-Secure E-Eavesdropped T-Colluding Symmetric Private Information Retrieval","authors":"Alptug Aytekin;Mohamed Nomeir;Sajani Vithana;Sennur Ulukus","doi":"10.1109/TIT.2025.3551697","DOIUrl":null,"url":null,"abstract":"We consider both classical and quantum variations of <italic>X</i>-secure, <italic>E</i>-eavesdropped and <italic>T</i>-colluding symmetric private information retrieval (SPIR). This is the first work to study SPIR with <italic>X</i>-security in classical or quantum variations. We first develop a scheme for classical <italic>X</i>-secure, <italic>E</i>-eavesdropped and <italic>T</i>-colluding SPIR (XSETSPIR) based on a modified version of cross subspace alignment (CSA), which achieves a rate of <inline-formula> <tex-math>$R= 1 - \\frac {X+\\max (T,E)}{N}$ </tex-math></inline-formula>. The modified scheme achieves the same rate as the scheme used for <italic>X</i>-secure PIR with the extra benefit of symmetric privacy, i.e., user-privacy as well as database-privacy. Next, we extend this scheme to its quantum counterpart based on the <italic>N</i>-sum box abstraction. This is the first work to consider the presence of eavesdroppers in quantum private information retrieval (QPIR). In the quantum variation, the eavesdroppers have better access to information over the quantum channel compared to the classical channel due to the over-the-air decodability. To that end, we develop two different schemes for quantum <italic>X</i>-secure, <italic>E</i>-eavesdropped and <italic>T</i>-colluding SPIR (QXSETSPIR) with secure over-the-air decoding. The first scheme achieves the highest possible super-dense coding gain, i.e., <inline-formula> <tex-math>$R_{Q} = \\min \\left \\{{{ 1, 2\\left ({{1-\\frac {X+\\max (T,E)}{N}}}\\right)}}\\right \\}$ </tex-math></inline-formula>, which requires additional uploads from the user. The second scheme on the other hand requires no extra uploads. However, it does not achieve the super-dense coding gain in some cases based on the relation between the number of eavesdropped links and the number of interference terms. The second scheme is based on the idea that there exist some special entanglement states that can be used to hide the contents of the user-required messages from the eavesdroppers using the interference symbols.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 5","pages":"3974-3988"},"PeriodicalIF":2.2000,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Theory","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10929727/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

We consider both classical and quantum variations of X-secure, E-eavesdropped and T-colluding symmetric private information retrieval (SPIR). This is the first work to study SPIR with X-security in classical or quantum variations. We first develop a scheme for classical X-secure, E-eavesdropped and T-colluding SPIR (XSETSPIR) based on a modified version of cross subspace alignment (CSA), which achieves a rate of $R= 1 - \frac {X+\max (T,E)}{N}$ . The modified scheme achieves the same rate as the scheme used for X-secure PIR with the extra benefit of symmetric privacy, i.e., user-privacy as well as database-privacy. Next, we extend this scheme to its quantum counterpart based on the N-sum box abstraction. This is the first work to consider the presence of eavesdroppers in quantum private information retrieval (QPIR). In the quantum variation, the eavesdroppers have better access to information over the quantum channel compared to the classical channel due to the over-the-air decodability. To that end, we develop two different schemes for quantum X-secure, E-eavesdropped and T-colluding SPIR (QXSETSPIR) with secure over-the-air decoding. The first scheme achieves the highest possible super-dense coding gain, i.e., $R_{Q} = \min \left \{{{ 1, 2\left ({{1-\frac {X+\max (T,E)}{N}}}\right)}}\right \}$ , which requires additional uploads from the user. The second scheme on the other hand requires no extra uploads. However, it does not achieve the super-dense coding gain in some cases based on the relation between the number of eavesdropped links and the number of interference terms. The second scheme is based on the idea that there exist some special entanglement states that can be used to hide the contents of the user-required messages from the eavesdroppers using the interference symbols.
量子x -安全e -窃听t -串通对称私有信息检索
我们考虑了X-secure, e -窃听和t -串通对称私有信息检索(SPIR)的经典和量子变化。这是首次在经典或量子变化中研究具有x -安全性的SPIR。本文首先提出了一种基于改进的交叉子空间对齐(cross - subspace alignment, CSA)的经典X-secure, e -窃听和t -串通SPIR (XSETSPIR)方案,该方案实现了$R= 1 - \frac {X+\max (T,E)}{N}$的速率。修改后的方案实现了与X-secure PIR方案相同的速率,并具有对称隐私的额外好处,即用户隐私和数据库隐私。接下来,我们将该方案扩展到基于n和盒抽象的量子对应物。本文首次在量子私有信息检索(QPIR)中考虑了窃听者的存在。在量子变化中,由于量子信道具有空中可解码性,窃听者可以通过量子信道比经典信道更好地获取信息。为此,我们开发了两种不同的量子x安全方案,即具有安全无线解码的e-窃听和t -串通SPIR (QXSETSPIR)。第一种方案实现了最高可能的超密集编码增益,即$R_{Q} = \min \left \{{{ 1, 2\left ({{1-\frac {X+\max (T,E)}{N}}}\right)}}\right \}$,这需要用户进行额外的上传。另一方面,第二种方案不需要额外的上传。然而,基于窃听链路数与干扰项数之间的关系,在某些情况下无法实现超密集编码增益。第二种方案是基于存在一些特殊的纠缠状态的思想,这些纠缠状态可以用来隐藏用户需要的消息的内容,通过使用干扰符号对窃听者隐藏。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory 工程技术-工程:电子与电气
CiteScore
5.70
自引率
20.00%
发文量
514
审稿时长
12 months
期刊介绍: The IEEE Transactions on Information Theory is a journal that publishes theoretical and experimental papers concerned with the transmission, processing, and utilization of information. The boundaries of acceptable subject matter are intentionally not sharply delimited. Rather, it is hoped that as the focus of research activity changes, a flexible policy will permit this Transactions to follow suit. Current appropriate topics are best reflected by recent Tables of Contents; they are summarized in the titles of editorial areas that appear on the inside front cover.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信