Bin Liu;Tiantian Yang;Wei Huang;Chunyan Wei;Nankun Mu;Bingjie Xu;Fei Gao
{"title":"Measurement-Device-Independent Quantum Private Query With Weak Coherent Source","authors":"Bin Liu;Tiantian Yang;Wei Huang;Chunyan Wei;Nankun Mu;Bingjie Xu;Fei Gao","doi":"10.1109/TIFS.2025.3607259","DOIUrl":null,"url":null,"abstract":"Quantum private query (QPQ) has emerged as a pivotal quantum cryptographic solution for symmetric private information retrieval, representing one of the most viable protocols for practical implementation following quantum key distribution. However, comprehensive practical security analysis remains imperative before deployment, particularly addressing concurrent vulnerabilities at both the optical source and detection components. This study makes dual fundamental contributions: 1) We unveil a sophisticated multiphoton attack strategy that enables malicious users to completely compromise database confidentiality by exploiting inherent multiphoton emissions from practical light sources across multiple established QPQ protocols; 2) We develop a novel decoy-state measurement-device-independent QPQ protocol specifically designed for weak coherent sources that simultaneously mitigates security vulnerabilities at both system endpoints. Our rigorous security analysis demonstrates that the proposed protocol achieves remarkable security enhancement - reducing an attacker’s information extraction capability from complete database access (100% items) to merely approximately 2.51 database items under standard operational parameters, while preserving practical implementability. This work establishes a critical framework for bridging theoretical security guarantees with practical implementation requirements, providing essential foundations for real-world QPQ deployment within existing quantum communication infrastructures.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"9454-9462"},"PeriodicalIF":8.0000,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11153501/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Quantum private query (QPQ) has emerged as a pivotal quantum cryptographic solution for symmetric private information retrieval, representing one of the most viable protocols for practical implementation following quantum key distribution. However, comprehensive practical security analysis remains imperative before deployment, particularly addressing concurrent vulnerabilities at both the optical source and detection components. This study makes dual fundamental contributions: 1) We unveil a sophisticated multiphoton attack strategy that enables malicious users to completely compromise database confidentiality by exploiting inherent multiphoton emissions from practical light sources across multiple established QPQ protocols; 2) We develop a novel decoy-state measurement-device-independent QPQ protocol specifically designed for weak coherent sources that simultaneously mitigates security vulnerabilities at both system endpoints. Our rigorous security analysis demonstrates that the proposed protocol achieves remarkable security enhancement - reducing an attacker’s information extraction capability from complete database access (100% items) to merely approximately 2.51 database items under standard operational parameters, while preserving practical implementability. This work establishes a critical framework for bridging theoretical security guarantees with practical implementation requirements, providing essential foundations for real-world QPQ deployment within existing quantum communication infrastructures.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features