TY - JOUR
T1 - Authenticated sublinear quantum private information retrieval
AU - Liu, Fengxia
AU - Zheng, Zhiyong
AU - Zhedanov, Oleksiy
AU - Zhang, Yi
AU - Guo, Heng
AU - Zheng, Zhiming
AU - Tian, Kun
AU - Gong, Zixian
N1 - Publisher Copyright:
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.
PY - 2025/12
Y1 - 2025/12
N2 - This paper introduces a novel lower bound on communication complexity using quantum relative entropy and mutual information, refining previous classical entropy-based results. By leveraging Uhlmann’s lemma and quantum Pinsker inequalities, the authors establish tighter bounds for information-theoretic security, demonstrating that quantum protocols inherently outperform classical counterparts in balancing privacy and efficiency. This paper also explores several symmetric Quantum Private Information Retrieval (QPIR) protocols that achieve sublinear communication complexity while ensuring robustness against specious adversaries: (i) a post-quantum cryptography-based protocol that can be authenticated for the specious server; (ii) a homomorphic encryption-based protocol in a single-server setting, ensuring robustness against quantum attacks; (iii) a multi-server protocol optimized for hardware practicality, reducing implementation overhead while maintaining sublinear efficiency. These protocols address critical gaps in secure database queries, offering exponential communication improvements over classical linear complexity methods. The work also analyzes security trade-offs under quantum specious adversaries, providing theoretical guarantees for privacy and correctness.
AB - This paper introduces a novel lower bound on communication complexity using quantum relative entropy and mutual information, refining previous classical entropy-based results. By leveraging Uhlmann’s lemma and quantum Pinsker inequalities, the authors establish tighter bounds for information-theoretic security, demonstrating that quantum protocols inherently outperform classical counterparts in balancing privacy and efficiency. This paper also explores several symmetric Quantum Private Information Retrieval (QPIR) protocols that achieve sublinear communication complexity while ensuring robustness against specious adversaries: (i) a post-quantum cryptography-based protocol that can be authenticated for the specious server; (ii) a homomorphic encryption-based protocol in a single-server setting, ensuring robustness against quantum attacks; (iii) a multi-server protocol optimized for hardware practicality, reducing implementation overhead while maintaining sublinear efficiency. These protocols address critical gaps in secure database queries, offering exponential communication improvements over classical linear complexity methods. The work also analyzes security trade-offs under quantum specious adversaries, providing theoretical guarantees for privacy and correctness.
KW - Homomorphic encryption
KW - Information-theoretic security
KW - Post-quantum cryptography
KW - Quantum private information retrieval
KW - Sublinear complexity
UR - https://www.scopus.com/pages/publications/105024751011
U2 - 10.1007/s11128-025-05015-x
DO - 10.1007/s11128-025-05015-x
M3 - 文章
AN - SCOPUS:105024751011
SN - 1570-0755
VL - 24
JO - Quantum Information Processing
JF - Quantum Information Processing
IS - 12
M1 - 398
ER -