<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marine</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marine"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/Marine"/>
	<updated>2026-04-17T16:09:44Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Multi-Database_Quantum_Symmetric_Private_Information_Retrieval_without_Shared_Randomness&amp;diff=4373</id>
		<title>Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Multi-Database_Quantum_Symmetric_Private_Information_Retrieval_without_Shared_Randomness&amp;diff=4373"/>
		<updated>2021-07-28T09:03:17Z</updated>

		<summary type="html">&lt;p&gt;Marine: Created a new page for Multi-Database QSPIR without Shared Randomness&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
This [https://arxiv.org/pdf/quant-ph/0307076.pdf example protocol] by Kerenidis and de Wolf (2003) performs the task of [[(Symmetric) Private Information Retrieval|symmetric private information retrieval]] (SPIR) and has information-theoretic security. It is a multi-database scheme that works on top of a classical multi-database PIR scheme by [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.549&amp;amp;rep=rep1&amp;amp;type=pdf Beimel et al (2002)]. The main feature of this protocol is that is does not require any shared randomness between servers which is the main assumptions of most SPIR protocols; however, this is achieved in the honest user model only. Moreover, it satisfies the correctness, user privacy and data privacy conditions, hence, it is a perfectly secure SPIR scheme.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; &lt;br /&gt;
[[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]],&lt;br /&gt;
[[:Category:Specific Task|Specific Task]],&lt;br /&gt;
[[:Category:Multi Party Protocols|Multi Party Protocol]],&lt;br /&gt;
[[(Symmetric) Private Information Retrieval|Symmetric Private Information Retrieval]],&lt;br /&gt;
[[Information-Theoretic Security]],&lt;br /&gt;
[[Multi-Database]],&lt;br /&gt;
[[One-Round Protocol]],&lt;br /&gt;
[[Entanglement]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
*	Honest user&lt;br /&gt;
*	No communication assumption (between servers)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
&#039;&#039;A user wants to privately retrieve an element from a classical database that has been replicated and distributed among &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; servers. Servers do not want the user to get any information on the database beyond the desired database item.&#039;&#039;&lt;br /&gt;
*&#039;&#039;&#039;Query:&#039;&#039;&#039; First, the user hides the index of the desired database element in several classical queries (one per server) and using some randomness. Then, the user prepares one quantum register (‘query register’) per server that depends on the classical query, on some new randomness (one per server) and on some function of the index of the desired database element and the randomness of the classical queries (which will be useful in the retrieval phase). Those quantum registers are entangled with another qubit kept by the user, and then sent to the user.&lt;br /&gt;
*&#039;&#039;&#039;Answer:&#039;&#039;&#039; Each server applies some unitary map on the received query register and sends the resulting register (‘answer register’) back to the client. The classical answer of a given server is encoded in the corresponding answer register.&lt;br /&gt;
*&#039;&#039;&#039;Retrieval:&#039;&#039;&#039; From all the received answer registers, the user can retrieve the desired database element: the user disentangles the answer registers from his qubit, then applies a Hadamard transform to his qubit and measures it in the computational basis. The outcome of the measurement is the desired database element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
*	&amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;: number of servers involved in the protocol.&lt;br /&gt;
*	&amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;: number of database elements.&lt;br /&gt;
*	&amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;: database; this is an &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; bit string.&lt;br /&gt;
*	&amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;: index of the desired database element, &amp;lt;math&amp;gt;x_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;r&amp;lt;/math&amp;gt;: random string.&lt;br /&gt;
*	&amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;: length of a query bit string (sent by the user to one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; servers).&lt;br /&gt;
*	&amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt;: length of an answer bit string (sent by one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; servers to the user).&lt;br /&gt;
*	&amp;lt;math&amp;gt;a_j&amp;lt;/math&amp;gt;: classical answer of the &amp;lt;math&amp;gt;j^\text{th}&amp;lt;/math&amp;gt; server in [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.549&amp;amp;rep=rep1&amp;amp;type=pdf Beimel et al classical PIR scheme].&lt;br /&gt;
*	&amp;lt;math&amp;gt;b_j&amp;lt;/math&amp;gt;: combined with the &amp;lt;math&amp;gt;a_j&amp;lt;/math&amp;gt;’s, the &amp;lt;math&amp;gt;b_j&amp;lt;/math&amp;gt;’s (which are known only to the user) allow the user to reconstruct the desired database element at the end of [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.549&amp;amp;rep=rep1&amp;amp;type=pdf Beimel et al protocol].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Knowledge Graph==--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}}--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&#039;&#039;&#039;User&#039;&#039;&#039;: &lt;br /&gt;
*	Has a random number generator.&lt;br /&gt;
*	Can prepare, measure, and apply quantum gates to quantum registers.&lt;br /&gt;
&#039;&#039;&#039;Servers&#039;&#039;&#039;:&lt;br /&gt;
*	Can apply gates to quantum registers.&lt;br /&gt;
&#039;&#039;&#039;Communication&#039;&#039;&#039;:&lt;br /&gt;
*	A quantum channel.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
===Security===&lt;br /&gt;
Precise security definitions for correctness, user privacy and data privacy that are used in this protocol are the following:&lt;br /&gt;
*&#039;&#039;&#039;Correctness&#039;&#039;&#039; (or &#039;&#039;&#039;Recovery&#039;&#039;&#039;): For all choices of database &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;, the probability that the output (bit) of the protocol on the user&#039;s side is the desired database element equals &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&#039;&#039;&#039;User privacy&#039;&#039;&#039;: the density matrix of each server is independent of the index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt; of the desired database item throughout the protocol.&lt;br /&gt;
*&#039;&#039;&#039;Data privacy&#039;&#039;&#039;: the concatenation of the density matrices of the user is independent of other database items than the desired one (&amp;lt;math&amp;gt;x_j \forall j \neq i&amp;lt;/math&amp;gt;) throughout the protocol.&lt;br /&gt;
 &lt;br /&gt;
This protocol ensures perfect user and data privacy and satisfies the correctness condition. Hence, it is secure.&lt;br /&gt;
&lt;br /&gt;
===Communication Complexity===&lt;br /&gt;
This protocol uses &amp;lt;math&amp;gt;n^{O(\log \log (k) / k \log (k))}&amp;lt;/math&amp;gt; qubits of communication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Inputs:&#039;&#039;&#039;&lt;br /&gt;
*	User: index of the desired database element &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	Each of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; servers: database &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; (an &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; bit string).&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039;&lt;br /&gt;
*	User: desired database element &amp;lt;math&amp;gt;x_i&amp;lt;/math&amp;gt; (a single bit of &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;).&lt;br /&gt;
&#039;&#039;&#039;Protocol:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;This protocol works on top of [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.549&amp;amp;rep=rep1&amp;amp;type=pdf Beimel et al classical PIR scheme], which involves the following steps:&#039;&#039;&lt;br /&gt;
*	&#039;&#039;&#039;Query:&#039;&#039;&#039; The user generates a random string &amp;lt;math&amp;gt;r&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; queries &amp;lt;math&amp;gt;q_1 (i,r),...,q_k (i,r)\in &lt;br /&gt;
 \{0,1\}^t&amp;lt;/math&amp;gt;. The user sends each query to the corresponding server.&lt;br /&gt;
*	&#039;&#039;&#039;Answer:&#039;&#039;&#039; Each server answers the user: the &amp;lt;math&amp;gt;j^\text{th}&amp;lt;/math&amp;gt; server answers with classical answer &amp;lt;math&amp;gt;a_j \in \{0,1\}^{a}&amp;lt;/math&amp;gt;. &lt;br /&gt;
*	&#039;&#039;&#039;Retrieval:&#039;&#039;&#039; The user outputs the desired database element &amp;lt;math&amp;gt;x_i = \sum_{j=1}^k a_j \cdot b_j&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;b_j=b_j(i,r) \in \{0,1\}^{a}&amp;lt;/math&amp;gt;, and all operations are modulo 2.&lt;br /&gt;
&#039;&#039;Kerenidis and de Wolf quantum SPIR scheme works as follows:&#039;&#039;&lt;br /&gt;
*	&#039;&#039;&#039;Query:&#039;&#039;&#039;&lt;br /&gt;
**	The user generates a random string &amp;lt;math&amp;gt;r&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; queries &amp;lt;math&amp;gt;q_1 (i,r),...,q_k (i,r)\in &lt;br /&gt;
 \{0,1\}^t&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; random strings &amp;lt;math&amp;gt;r_1,...,r_k\in \{0,1\}^a&amp;lt;/math&amp;gt;.&lt;br /&gt;
**	The user prepares a &amp;lt;math&amp;gt;(k+1)&amp;lt;/math&amp;gt;-register state: &amp;lt;math&amp;gt;\frac{1}{\sqrt{2}} |0\rangle|q_1,r_1 \rangle ...|q_k,r_k \rangle+\frac{1}{\sqrt{2}} |1\rangle|q_1,r&#039;_1 \rangle ...|q_k,r&#039;_k\rangle&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;r&#039;_j := r_j+b_j&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;b_j=b_j (i,r)\in \{0,1\}^a&amp;lt;/math&amp;gt; is the part known only to the user that, together with the answers of the server, allows the user to reconstruct the desired database element at the end of [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.549&amp;amp;rep=rep1&amp;amp;type=pdf Beimel et al PIR protocol]: &amp;lt;math&amp;gt;\sum_{j=1}^k a_j \cdot b_j = x_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
**	The user keeps the first &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt;-qubit register and sends the other &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; registers to the corresponding server.&lt;br /&gt;
*	&#039;&#039;&#039;Answer:&#039;&#039;&#039;&lt;br /&gt;
**	Each server applies a unitary map to the received quantum register: &amp;lt;math&amp;gt;|q_j,r \rangle \rightarrow (-1)^{a_j \cdot r} |q_j,r\rangle&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;a_j=a_j (q_j,x)\in \{0,1 \}^a&amp;lt;/math&amp;gt; is the classical answer of the &amp;lt;math&amp;gt;j^\text{th}&amp;lt;/math&amp;gt; server to the user in [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.549&amp;amp;rep=rep1&amp;amp;type=pdf Beimel et al PIR protocol]. The transformed quantum register is then sent back to the user.&lt;br /&gt;
*	&#039;&#039;&#039;Retrieval:&#039;&#039;&#039;&lt;br /&gt;
**	The complete state owned by the user is now of the form: &amp;lt;math&amp;gt;\frac{1}{\sqrt{2}} |0\rangle (-1)^{a_1 \cdot r_1} |q_1,r_1\rangle ... (-1)^{a_k \cdot r_k} |q_k,r_k\rangle + \frac{1}{\sqrt{2}} |1\rangle (-1)^{a_1 \cdot r&#039;_1} |q_1,r&#039;_1\rangle ... (-1)^{a_k \cdot r&#039;_k} |q_k,r&#039;_k\rangle&amp;lt;/math&amp;gt; &amp;lt;math&amp;gt;= \frac{1}{\sqrt{2}} |0\rangle (-1)^{\sum_{j=1}^k a_j \cdot r_j} |q_1,r_1\rangle ... |q_k,r_k\rangle + \frac{1}{\sqrt{2}} |1\rangle (-1)^{\sum_{j=1}^k a_j \cdot r&#039;_j} |q_1,r&#039;_1\rangle ... |q_k,r&#039;_k\rangle&amp;lt;/math&amp;gt; &amp;lt;math&amp;gt;= \frac{1}{\sqrt{2}} |0\rangle (-1)^{\sum_{j=1}^k a_j \cdot r_j} |q_1,r_1\rangle ... |q_k,r_k\rangle + \frac{1}{\sqrt{2}} |1\rangle (-1)^{\sum_{j=1}^k a_j \cdot (r_j + b_j)}  |q_1,r&#039;_1\rangle ... |q_k,r&#039;_k\rangle&amp;lt;/math&amp;gt; &amp;lt;math&amp;gt;= (-1)^{\sum_{j=1}^k a_j \cdot r_j} \left( \frac{1}{\sqrt{2}} |0\rangle |q_1,r_1\rangle ... |q_k,r_k\rangle + \frac{1}{\sqrt{2}} |1\rangle (-1)^{\sum_{j=1}^k a_j \cdot b_j} |q_1,r&#039;_1\rangle ... |q_k,r&#039;_k\rangle \right)&amp;lt;/math&amp;gt; Hence, up to a global phase &amp;lt;math&amp;gt;(-1)^{\sum_{j=1}^k a_j \cdot r_j} &amp;lt;/math&amp;gt;, this state is: &amp;lt;math&amp;gt;\frac{1}{\sqrt{2}} |0\rangle |q_1,r_1\rangle ... |q_k,r_k\rangle + \frac{1}{\sqrt{2}} |1\rangle (-1)^{x_i} |q_1,r&#039;_1\rangle ... |q_k,r&#039;_k\rangle &amp;lt;/math&amp;gt;.&lt;br /&gt;
** To retrieve the desired database element &amp;lt;math&amp;gt;x_i&amp;lt;/math&amp;gt;, the user then maps the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; quantum registers to the ground state – this way, entanglement is destroyed, and the first qubit is in state &amp;lt;math&amp;gt;\frac{1}{\sqrt{2}}(|0\rangle+(-1)^{x_i} |1\rangle)&amp;lt;/math&amp;gt;.&lt;br /&gt;
**Lastly, the user applies a Hadamard transform to the first qubit, which is now in state &amp;lt;math&amp;gt;|x_i\rangle&amp;lt;/math&amp;gt;. Measuring in the computational basis &amp;lt;math&amp;gt;\{|0\rangle,|1\rangle\}&amp;lt;/math&amp;gt; has classical outcome the desired bit &amp;lt;math&amp;gt;x_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
*	This quantum protocol can be based on other classical PIR schemes with the same structure as this of [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.549&amp;amp;rep=rep1&amp;amp;type=pdf Beimel et al]. The authors chose this specific PIR protocol as this was the best available information theoretically secure PIR scheme in terms of communication complexity at the time of publication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==References==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Marine Demarty&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=(Symmetric)_Private_Information_Retrieval&amp;diff=4372</id>
		<title>(Symmetric) Private Information Retrieval</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=(Symmetric)_Private_Information_Retrieval&amp;diff=4372"/>
		<updated>2021-07-27T14:01:57Z</updated>

		<summary type="html">&lt;p&gt;Marine: Added a &amp;quot;Optimal communication complexity of the (Q)(S)PIR problem&amp;quot; subsection in &amp;quot;Further Information&amp;quot; section + some minor edit on OT&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Functionality page describes a general task which can be realised in a quantum network --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;!-- Description: A lucid definition of functionality in discussion.--&amp;gt;&lt;br /&gt;
Private information retrieval (PIR) is a classical cryptographic functionality that allows one party (user) to privately retrieve an element from a classical database owned by another party (server), i.e., without revealing to the other party which element is being retrieved (user privacy).&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
Symmetric private information (SPIR) retrieval is PIR with the additional requirement that throughout and after the protocol, the user remains oblivious to other database elements, i.e., apart from the queried one (data privacy).&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
In the quantum setting, the use of quantum systems is allowed to achieve (S)PIR: this may imply the use of a quantum channel between the user and the server, and the capability to prepare quantum states, apply quantum gates or measure quantum systems by one or both parties. (S)PIR in this setting is known as quantum (symmetric) private information retrieval (Q(S)PIR).&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
In the classical or quantum setting, (Q)SPIR and one-out-of-n (quantum) [[Oblivious Transfer|oblivious transfer]] (OT) are similar cryptographic tasks; the only minor difference between those functionalities is that protocols for OT are two-party protocols, while attempts at achieving SPIR have considered both two-party and multi-party protocols where the user communicates with several servers, each holding a copy of the database.&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
Apart from using quantum techniques to enhance the classical (S)PIR functionality (i.e., design better protocols than their classical counterparts in terms of different metrics like e.g., communication complexity), there has also been a recent interest in a ‘fully’ quantum (S)PIR where a user wants to query a quantum database (items are quantum states)[[#References|[1]]].&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; &lt;br /&gt;
[[:Category:Two Party Protocols|Two Party Protocol]],[[Category:Two Party Protocols]] &lt;br /&gt;
[[:Category:Specific Task|Specific Task]], [[Category:Specific Task]] &lt;br /&gt;
[[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]].[[Category:Quantum Enhanced Classical Functionality]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Tags Any related page or list of protocols is connected by this section--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security definitions===&lt;br /&gt;
(Quantum) private information retrieval protocols are said to be secure if they satisfy the following conditions:&lt;br /&gt;
*&#039;&#039;&#039;Correctness&#039;&#039;&#039;: assuming that all the parties in the protocol are honest, then the output of the protocol on the user’s side must be the queried database element.&lt;br /&gt;
*&#039;&#039;&#039;User privacy&#039;&#039;&#039;: assuming that the user is honest, then, throughout the protocol, any query of the user to a server leaks no information about the desired database item.&lt;br /&gt;
In addition to the above requirements, symmetric (quantum) private information retrieval protocols must also satisfy the following condition:&lt;br /&gt;
*&#039;&#039;&#039;Data(base) privacy&#039;&#039;&#039;: assuming that the server(s) is (are) honest(s), then, throughout the protocol, the user is unable to obtain any information beyond a single database element.&lt;br /&gt;
&lt;br /&gt;
===Cost parameters===&lt;br /&gt;
The most common cost parameter used to characterise a given (Q)(S)PIR protocol is:&lt;br /&gt;
*&#039;&#039;&#039;Communication complexity&#039;&#039;&#039;: total number of (qu)bits exchanged between the user and the server(s) throughout the protocol.&lt;br /&gt;
For (Q)(S)PIR protocols in general:&lt;br /&gt;
*&#039;&#039;&#039;(Q)(S)PIR capacity&#039;&#039;&#039;: maximal achievable ratio of the retrieved database element size to the total download size.&lt;br /&gt;
Some less common cost parameters include:&lt;br /&gt;
*&#039;&#039;&#039;Storage overhead&#039;&#039;&#039; (for multi-database (Q)(S)PIR protocols): ratio between the total number of (qu)bits stored on all servers and the number of (qu)bits in the (resp. quantum) classical database. &lt;br /&gt;
*&#039;&#039;&#039;Access complexity&#039;&#039;&#039;: total amount of data to be accessed by the server(s) for answering queries throughout a (Q)(S)PIR protocol.&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&amp;lt;!-- List of different types of example protocol achieving the functionality--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Classical database===&lt;br /&gt;
In the quantum setting, protocols aiming at achieving (S)PIR for a &#039;&#039;classical&#039;&#039; database fall into two main categories:&lt;br /&gt;
====Single-database protocols====&lt;br /&gt;
As in the classical setting, in the case of the database being owned by a &#039;&#039;single&#039;&#039; server, the trivial solution (downloading the whole database) is the only way to achieve information-theoretically secure PIR – even in the case of a specious (may deviate from the protocol if its malicious operations are unknown to the user) server [[#References|[2]]]. &amp;lt;br&amp;gt;&lt;br /&gt;
As for (quantum or classical) SPIR, it is impossible to achieve information-theoretic security with a single-server; this result was proved in the quantum setting by Lo [[#References|[3]]]. Intuitively, this comes from the fact that the (unique) trivial solution of information-theoretically secure PIR is the worst in terms of data privacy. Therefore, to design efficient PIR protocols or to achieve SPIR, several assumptions have been considered; they include:&lt;br /&gt;
* Hardness assumptions: PIR protocols with computational security.&lt;br /&gt;
* Assumptions on the adversarial model:&lt;br /&gt;
** to achieve SPIR: cheat-sensitive protocols (also known as quantum private queries (QPQ) protocols) where it is assumed that the server will not cheat if there is a non-zero probability that he will be caught cheating. &lt;br /&gt;
***[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution|QPQ protocols based on quantum oblivious key distribution]]&lt;br /&gt;
***[[Quantum Private Queries Protocol Based on Quantum Random Access Memory|QPQ protocols based on quantum random access memory]]&lt;br /&gt;
** to achieve efficient PIR: assuming an honest server.&lt;br /&gt;
***[[Single-Database Quantum Private Information Retrieval in the Honest Server Model|QPIR protocols in the honest server model]]&lt;br /&gt;
* Prior shared entanglement between server and user: in the honest server model, efficient PIR protocols exist, however for a specious or malicious server, the trivial solution is optimal for PIR[[#References|[4]]].&lt;br /&gt;
**[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model|QPIR protocols with prior shared entanglement in the honest server model]]&lt;br /&gt;
* Relativistic assumptions: quantum SPIR protocols whose security uses properties from special relativity.&lt;br /&gt;
**[[Relativistic Quantum Oblivious Transfer|Relativistic QOT protocols]]&lt;br /&gt;
&lt;br /&gt;
====Multi-database protocols====&lt;br /&gt;
It is possible to achieve information-theoretic (S)PIR with reduced communication complexity (i.e., compared to this of the trivial solution) by considering several servers instead of one, each holding a copy of the database, and with the help of extra assumptions. Usually, to achieve (S)PIR, it is assumed that the servers cannot communicate with each other during and after the protocol ended (no-communication assumption), and that servers share randomness (in the symmetric case only). Examples of such protocols are:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness|Quantum multi-database SPIR protocols without shared randomness]] (replaced by prior shared entanglement between servers)&lt;br /&gt;
* [[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution|Classical multi-database SPIR protocols with QKD secured classical channels]]&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers|Multi-database quantum (S)PIR protocols for communicating and colluding servers]] – to do without the no-communication assumption&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers|Multi-database quantum (S)PIR protocols for coded servers]]&lt;br /&gt;
&lt;br /&gt;
===Quantum database===&lt;br /&gt;
For the case of a &#039;&#039;quantum&#039;&#039; database, the trivial solution of downloading the whole database is proved to be optimal for one-round QPIR, and for multi-round QPIR in the blind setting (i.e., the servers do not have a classical description of the quantum states of the database) and for the honest server model (and any other attack model)[[#References|[1]]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prior shared entanglement between the user and the server allows for efficient one-server QPIR protocols in the honest server model and in the blind setting. Multi-database QSPIR protocols for a quantum database with pure states, in the visible setting (servers know a classical description of the quantum database elements) exist as shown by Song and Hayashi [[#References|[1]]].&lt;br /&gt;
&lt;br /&gt;
* [[Single-Database Quantum Private Information Retrieval for a Quantum Database|Single-database quantum PIR protocols in the honest server model and in the blind setting for a quantum database]]&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for a Quantum Database|Multi-database quantum SPIR protocols in the visible setting for a quantum database]]&lt;br /&gt;
&lt;br /&gt;
==Use-cases==&lt;br /&gt;
&amp;lt;!-- Use Case (if available) analyses how practical the protocol is--&amp;gt;&lt;br /&gt;
===Classical database===&lt;br /&gt;
*Location-based services (to protect user location privacy).&lt;br /&gt;
*Queries of electronic medical records (these require decades of information confidentiality; hence security against quantum computing based attacks is necessary) or medical test reports.&lt;br /&gt;
*Music and film streaming (user does not want his/her tastes to be revealed to the server).&lt;br /&gt;
*Pay-per-view services, where the user should pay a fee to access every single database element.&lt;br /&gt;
&lt;br /&gt;
Quantum (S)PIR protocols may be preferred to their classical counterparts to:&lt;br /&gt;
*Achieve (S)PIR with better communication complexity: this is convenient in the case of large databases.&lt;br /&gt;
*Achieve (S)PIR with better security: for instance, to secure classical channels as in [[#References|[5]]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. --&amp;gt;&lt;br /&gt;
===Optimal communication complexity of the (Q)(S)PIR problem===&lt;br /&gt;
Below are summarised known bounds for the communication complexity of information-theoretically secure (S)PIR protocols in the classical and quantum settings, for a quantum or classical database.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;math&amp;gt;f&amp;lt;/math&amp;gt; : number of database elements (quantum states in the &#039;fully&#039; quantum setting)&lt;br /&gt;
*&amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; : total size of database elements (i.e., the sum of the sizes, in bits, of each database element)&lt;br /&gt;
*&amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; : dimension of the quantum states stored in the quantum database (&amp;lt;math&amp;gt;d=2&amp;lt;/math&amp;gt; if they are qubits)&lt;br /&gt;
*&amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; : number of servers (or equivalently of replicated databases)&lt;br /&gt;
&lt;br /&gt;
====Single-database case====&lt;br /&gt;
{| class=&amp;quot;wikitable plainrowheaders&amp;quot;&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Problem&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Additional assumptions&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Optimal communication complexity&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Reference&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; | Classical PIR&lt;br /&gt;
 |  || &amp;lt;math&amp;gt;\Theta(m)&amp;lt;/math&amp;gt; || [http://www.wisdom.weizmann.ac.il/~oded/PSX/pir2.pdf Chor et al (1995)]&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; | Classical SPIR&lt;br /&gt;
 |  || NA (impossible) ||&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; rowspan=&amp;quot;4&amp;quot; | Quantum PIR (Classical database)&lt;br /&gt;
 | Specious server || &amp;lt;math&amp;gt;\Theta(m)&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/1304.5490.pdf Baumeler and Broadbent (2015)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Specious server &amp;amp; prior entanglement || &amp;lt;math&amp;gt;\Theta(m)&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/1902.09768.pdf Aharonov et al (2019)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Honest server || &amp;lt;math&amp;gt;O(poly \log (m))&amp;lt;/math&amp;gt; || [https://repository.ubn.ru.nl/bitstream/handle/2066/155747/155747.pdf Kerenidis et al (2016)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Honest server &amp;amp; prior entanglement || &amp;lt;math&amp;gt;O(\log (m))&amp;lt;/math&amp;gt; || [https://repository.ubn.ru.nl/bitstream/handle/2066/155747/155747.pdf Kerenidis et al (2016)]&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; rowspan=&amp;quot;2&amp;quot; | Quantum SPIR (Classical database)&lt;br /&gt;
 |  || NA (impossible) || [https://arxiv.org/pdf/quant-ph/9611031.pdf Lo (1997)]&lt;br /&gt;
 |-&lt;br /&gt;
 | The server will not cheat if there is a non-zero probability of being caught cheating &amp;amp; imperfect data privacy (the user should get at most two database items) || &amp;lt;math&amp;gt;O(\log (m))&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/0708.2992.pdf Giovannetti et al (2008)]&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; rowspan=&amp;quot;3&amp;quot; | Quantum PIR (Quantum database)&lt;br /&gt;
 | Honest server &amp;amp; blind setting || &amp;lt;math&amp;gt;\Theta(m)&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Honest server &amp;amp; visible setting || &amp;lt;math&amp;gt;\Theta(m)&amp;lt;/math&amp;gt; (for one-round) || [https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Honest server &amp;amp; prior entanglement || &amp;lt;math&amp;gt;O(\log (m))&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; | Quantum SPIR (Quantum database)&lt;br /&gt;
 |  ||  || &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Multi-database case====&lt;br /&gt;
{| class=&amp;quot;wikitable plainrowheaders&amp;quot;&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Problem&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Additional assumptions&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Optimal communication complexity&lt;br /&gt;
 ! scope=&amp;quot;col&amp;quot; | Reference&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; | Classical PIR&lt;br /&gt;
 |  ||  || &lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; | Classical SPIR&lt;br /&gt;
 | Servers do not communicate with each other &amp;amp; secure classical channels || &amp;lt;math&amp;gt;O(m^{\frac{1}{2k-1}}) \text{ bits}&amp;lt;/math&amp;gt; || [https://dl.acm.org/doi/abs/10.1145/276698.276723 Gertner et al (2000)]&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; | Quantum PIR (Classical database)&lt;br /&gt;
 |  ||  || &lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; rowspan=&amp;quot;2&amp;quot; | Quantum SPIR (Classical database)&lt;br /&gt;
 | Servers do not communicate with each other || &amp;lt;math&amp;gt;O(m^{\frac{1}{2k-1}}) \text{ bits}+ \text{ comm. complexity of QKD}&amp;lt;/math&amp;gt; || [https://www.mdpi.com/1099-4300/23/1/54/htm Kon and Lim (2021)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Servers do not communicate with each other &amp;amp; honest user &amp;amp; prior entanglement || &amp;lt;math&amp;gt;m^{O(\log \log (k)/k \log(k))}&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/quant-ph/0307076.pdf Kerenidis and de Wolf (2004)]&lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; | Quantum PIR (Quantum database)&lt;br /&gt;
 |  ||  || &lt;br /&gt;
 |-&lt;br /&gt;
 ! scope=&amp;quot;row&amp;quot; rowspan=&amp;quot;3&amp;quot; | Quantum SPIR (Quantum database)&lt;br /&gt;
 | Servers do not communicate with each other &amp;amp; prior entanglement &amp;amp; visible setting &amp;amp; database contains pure qubit states || &amp;lt;math&amp;gt;O(f) \text{ bits} + O(1) \text{ qubits} + O(1) \text{ ebits}&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Servers do not communicate with each other &amp;amp; prior entanglement &amp;amp; visible setting &amp;amp; database contains pure qudit states || &amp;lt;math&amp;gt;O(f) \text{ bits} + O(d^d \log (d)) \text{ qubits} + O(d^d \log (d)) \text{ ebits}&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
 |-&lt;br /&gt;
 | Servers do not communicate with each other &amp;amp; prior entanglement &amp;amp; visible setting &amp;amp; database contains commutative unitaries || &amp;lt;math&amp;gt;O(f) \text{ bits} + O(\log (d)) \text{ qubits} + O(\log (d)) \text{ ebits}&amp;lt;/math&amp;gt; || [https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
#[https://arxiv.org/pdf/1304.5490.pdf Baumeler and Broadbent (2015)]&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/9611031.pdf Lo (1997)]&lt;br /&gt;
#[https://arxiv.org/pdf/1902.09768.pdf Aharonov et al (2019)]&lt;br /&gt;
#[https://www.mdpi.com/1099-4300/23/1/54/htm Kon and Lim (2021)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Marine Demarty&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4371</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4371"/>
		<updated>2021-07-27T12:09:51Z</updated>

		<summary type="html">&lt;p&gt;Marine: Added links to pages related to (Symmetric) Private Information Retrieval&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Authentication of Classical Messages]]||[[]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Authentication of Quantum Messages]]||[[]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Universal Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Private_Queries_Protocol_Based_on_Quantum_Random_Access_Memory&amp;diff=4370</id>
		<title>Quantum Private Queries Protocol Based on Quantum Random Access Memory</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Private_Queries_Protocol_Based_on_Quantum_Random_Access_Memory&amp;diff=4370"/>
		<updated>2021-07-26T15:49:15Z</updated>

		<summary type="html">&lt;p&gt;Marine: Created a new page for QPQ Based on Quantum Random Access Memory&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
This [https://arxiv.org/pdf/0708.2992.pdf example protocol] performs the task of [[(Symmetric) Private Information Retrieval|symmetric private information retrieval]] (SPIR) and has information-theoretic security. It is a single-database two-round quantum SPIR protocol for a classical database, which is based on a [[Quantum Random Access Memory|quantum random access memory]] (qRAM) algorithm. Its security, and more precisely user privacy, is based on a cheat-sensitive strategy: if the malicious server tries to learn the user’s queries, then the user has a non-zero probability of detecting it. As for data privacy, a dishonest user can recover at most two database elements.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], [[:Category:Two Party Protocols|Two Party Protocol]], [[Two Round Protocol]], [[Information-Theoretic Security]], [[(Symmetric) Private Information Retrieval|Symmetric Private Information Retrieval]], [[Quantum Private Queries]], [[Quantum Random Access Memory]], [[Single-Database]].&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
*	Cheat-sensitive protocol: the server (Bob) will not cheat if there is a non-zero probability of being caught cheating.&lt;br /&gt;
*	Each index in the database maps to a unique database element.&lt;br /&gt;
*	Index &amp;lt;math&amp;gt;0&amp;lt;/math&amp;gt; in the database maps to a ‘dummy’ database element, &amp;lt;math&amp;gt;A_0&amp;lt;/math&amp;gt;, known to the user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
&#039;&#039;A user, Alice, wants to retrieve an element from a database owned by a server, Bob, without revealing to Bob which element was retrieved (user privacy). Bob wants the amount of information that Alice can get on other database elements than the desired one to be bounded (data privacy).&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Choice of scenario:&#039;&#039;&#039;&lt;br /&gt;
**	Alice chooses randomly between two scenarios ❶ and ❷.&lt;br /&gt;
* &#039;&#039;&#039;Query:&#039;&#039;&#039;&lt;br /&gt;
**	Alice prepares two quantum registers: a quantum register corresponding to the index of her desired database element, as well as a superposition of a quantum register corresponding to the index of her desired database element with a quantum register corresponding to the index of a dummy database element known by Alice (&#039;rhetoric query&#039;).&lt;br /&gt;
**	Scenario ❶: Alice sends the first quantum register to Bob. Scenario ❷: Alice sends the second quantum register (superposition) to Bob.&lt;br /&gt;
* &#039;&#039;&#039;Answer:&#039;&#039;&#039;&lt;br /&gt;
**	Bob interrogates the database with the received quantum register (&#039;query register&#039;) using a qRAM algorithm. The output of the qRAM algorithm is another quantum register (&#039;answer register&#039;).&lt;br /&gt;
**	Bob sends to Alice both the received query register and the answer register.&lt;br /&gt;
* &#039;&#039;&#039;Query:&#039;&#039;&#039;&lt;br /&gt;
**	Scenario ❶: Alice sends the second quantum register (superposition) to Bob. Scenario ❷: Alice sends the first quantum register to Bob.&lt;br /&gt;
* &#039;&#039;&#039;Answer:&#039;&#039;&#039;&lt;br /&gt;
**	Bob interrogates the database with the received quantum register (&#039;query register&#039;) using a qRAM algorithm. The output of the qRAM algorithm is another quantum register (&#039;answer register&#039;).&lt;br /&gt;
**	Bob sends to Alice both the received query register and the answer register.&lt;br /&gt;
* &#039;&#039;&#039;Retrieval &amp;amp; Honesty test:&#039;&#039;&#039;&lt;br /&gt;
**	Alice performs a test on the received quantum registers to check if the server cheated. First, she measures the answer register corresponding to the non-superposed query register to obtain the desired database element. Based on this first measurement outcome, she tailors the measurement that she performs on the other answer register (corresponding to the superposed query) in such a way that if the measurement outcome is not a certain outcome, Alice knows for sure that Bob cheated. Otherwise, Alice assumes that Bob is honest (which is not guaranteed).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
*	&amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;: size of quantum registers.&lt;br /&gt;
*	&amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: number of entries in the database (&amp;lt;math&amp;gt;N=2^n&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;j&amp;lt;/math&amp;gt;: index of the desired database element.&lt;br /&gt;
*	&amp;lt;math&amp;gt;A_j&amp;lt;/math&amp;gt;: classical database entry (bit string) corresponding to index &amp;lt;math&amp;gt;j&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Knowledge Graph==--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}}--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&#039;&#039;&#039;User&#039;&#039;&#039; (Alice):&lt;br /&gt;
*	Can prepare &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubit memory registers (for a database of &amp;lt;math&amp;gt;N=2^n&amp;lt;/math&amp;gt; or less elements).&lt;br /&gt;
*	Can measure quantum registers.&lt;br /&gt;
&#039;&#039;&#039;Server&#039;&#039;&#039; (Bob) :&lt;br /&gt;
*	A quantum random access memory (qRAM).&lt;br /&gt;
&#039;&#039;&#039;Communication&#039;&#039;&#039;:&lt;br /&gt;
*	A quantum channel.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
*	&#039;&#039;&#039;User privacy&#039;&#039;&#039;: &lt;br /&gt;
**	A malicious server trying to learn the user’s queries has a non-zero probability of being caught cheating by the user. Hence, assuming that the server will not cheat if cheat may be detected, this protocol ensures perfect user privacy.&lt;br /&gt;
**	For a cheating strategy where the server performs projective measurements on the user’s queries, the server will learn with certainty the index of the desired database element, and he has probability &amp;lt;math&amp;gt;1/4&amp;lt;/math&amp;gt; of being caught cheating by the user via the honesty test.&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Data privacy&#039;&#039;&#039;: This protocol does not ensure perfect data privacy; however, a dishonest user (Alice) should be able to get at most two database entries (i.e., one extra database entry compared to a secure SPIR protocol that satisfies the data privacy condition).&lt;br /&gt;
*	&#039;&#039;&#039;Communication complexity&#039;&#039;&#039;: &amp;lt;math&amp;gt; O(\log(N)) &amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Inputs:&#039;&#039;&#039; &lt;br /&gt;
*	User (Alice): index &amp;lt;math&amp;gt;j&amp;lt;/math&amp;gt; of the desired database element; Alice knows the &amp;lt;math&amp;gt;0^\text{th}&amp;lt;/math&amp;gt; database element, &amp;lt;math&amp;gt;A_0&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	Server (Bob): classical database with &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; elements &amp;lt;math&amp;gt;A_0,...,A_{N-1}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039;&lt;br /&gt;
*	User (Alice): desired database entry &amp;lt;math&amp;gt;A_j&amp;lt;/math&amp;gt; (in the case of honest parties).&lt;br /&gt;
&#039;&#039;&#039;Protocol:&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Choice of scenario:&#039;&#039;&#039; &lt;br /&gt;
**	Alice chooses randomly between two scenarios ❶ and ❷.&lt;br /&gt;
* &#039;&#039;&#039;Query:&#039;&#039;&#039;&lt;br /&gt;
**	Alice prepares two n qubit registers: &amp;lt;math&amp;gt;|j\rangle_Q&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(|j\rangle_Q+|0\rangle_Q)/\sqrt{2}&amp;lt;/math&amp;gt;.&lt;br /&gt;
**	Scenario ❶: Alice sends &amp;lt;math&amp;gt;|j\rangle_Q&amp;lt;/math&amp;gt; to Bob. Scenario ❷: Alice sends &amp;lt;math&amp;gt;(|j\rangle_Q+|0\rangle_Q)/\sqrt{2}&amp;lt;/math&amp;gt; to Bob.&lt;br /&gt;
* &#039;&#039;&#039;Answer:&#039;&#039;&#039;&lt;br /&gt;
**	Bob interrogates the database with the received quantum register (&#039;query register&#039;) using a qRAM algorithm &amp;lt;math&amp;gt;\sum_j \alpha_j |j\rangle_Q \rightarrow  \sum_j \alpha_j |j\rangle_Q |A_j\rangle_R&amp;lt;/math&amp;gt;. The output of the qRAM algorithm is another quantum register: &amp;lt;math&amp;gt;|j\rangle_Q |A_j\rangle_R&amp;lt;/math&amp;gt; in scenario ❶ or &amp;lt;math&amp;gt;(|j\rangle_Q |A_j \rangle_R+|0\rangle_Q |A_0 \rangle_R)/\sqrt{2}&amp;lt;/math&amp;gt; in scenario ❷.&lt;br /&gt;
**	Bob sends to Alice the output of the qRAM algorithm: &amp;lt;math&amp;gt;|j\rangle_Q |A_j\rangle_R&amp;lt;/math&amp;gt; in scenario ❶ or &amp;lt;math&amp;gt;(|j\rangle_Q |A_j \rangle_R+|0\rangle_Q |A_0 \rangle_R)/\sqrt{2}&amp;lt;/math&amp;gt; in scenario ❷&lt;br /&gt;
* &#039;&#039;&#039;Query:&#039;&#039;&#039;&lt;br /&gt;
**	Scenario ❶: Alice sends &amp;lt;math&amp;gt;(|j\rangle_Q+|0\rangle_Q)/\sqrt{2}&amp;lt;/math&amp;gt; to Bob. Scenario ❷: Alice sends &amp;lt;math&amp;gt;|j\rangle_Q&amp;lt;/math&amp;gt; to Bob.&lt;br /&gt;
* &#039;&#039;&#039;Answer:&#039;&#039;&#039;&lt;br /&gt;
**	Bob interrogates the database with the received quantum register (&#039;query register&#039;) using the qRAM algorithm &amp;lt;math&amp;gt;\sum_j \alpha_j |j\rangle_Q \rightarrow  \sum_j \alpha_j |j\rangle_Q |A_j\rangle_R&amp;lt;/math&amp;gt;. The output of the qRAM algorithm is another quantum register: &amp;lt;math&amp;gt;(|j\rangle_Q |A_j \rangle_R+|0\rangle_Q |A_0 \rangle_R)/\sqrt{2}&amp;lt;/math&amp;gt; in scenario ❶ or &amp;lt;math&amp;gt;|j\rangle_Q |A_j\rangle_R&amp;lt;/math&amp;gt; in scenario ❷.&lt;br /&gt;
**	Bob sends to Alice the output of the qRAM algorithm: &amp;lt;math&amp;gt;(|j\rangle_Q |A_j \rangle_R+|0\rangle_Q |A_0 \rangle_R)/\sqrt{2}&amp;lt;/math&amp;gt; in scenario ❶ or &amp;lt;math&amp;gt;|j\rangle_Q |A_j\rangle_R&amp;lt;/math&amp;gt; in scenario ❷.&lt;br /&gt;
* &#039;&#039;&#039;Retrieval &amp;amp; Honesty test:&#039;&#039;&#039; &lt;br /&gt;
**      Alice performs a test on the received quantum registers to check if the server cheated. First, she measures &amp;lt;math&amp;gt;|j\rangle_Q |A_j\rangle_R&amp;lt;/math&amp;gt; to obtain the desired database element &amp;lt;math&amp;gt;A_j&amp;lt;/math&amp;gt;. Based on this first measurement outcome, she tailors the measurement that she performs on &amp;lt;math&amp;gt;(|j\rangle_Q |A_j \rangle_R+|0\rangle_Q |A_0 \rangle_R)/\sqrt{2}&amp;lt;/math&amp;gt; in such a way that if the measurement outcome is not a certain outcome, Alice knows for sure that Bob cheated. Otherwise, Alice assumes that Bob is honest (which is not guaranteed).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
*	The authors of this protocol suggest using [https://arxiv.org/pdf/0708.1879.pdf their qRAM design] in which each call of the qRAM corresponds to &amp;lt;math&amp;gt;O(n)&amp;lt;/math&amp;gt; quantum logic operations.&lt;br /&gt;
*	The authors published a [https://arxiv.org/pdf/0809.1934.pdf security analysis of their protocol] in 2010. This paper also discusses variants of the protocol to improve its security.&lt;br /&gt;
* A practical implementation of this protocol using linear optics was published by [https://arxiv.org/pdf/0902.0222.pdf De Martini et al (2009)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==References==--&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Marine Demarty&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Private_Queries_Protocol_Based_on_Quantum_Oblivious_Key_Distribution&amp;diff=4369</id>
		<title>Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Private_Queries_Protocol_Based_on_Quantum_Oblivious_Key_Distribution&amp;diff=4369"/>
		<updated>2021-07-26T13:53:07Z</updated>

		<summary type="html">&lt;p&gt;Marine: Creating a new page for QPQ Based on Quantum Oblivious Key Distribution&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
This [https://arxiv.org/pdf/1002.4360.pdf example protocol] performs the task of [[(Symmetric) Private Information Retrieval|symmetric private information retrieval]] (SPIR) and has information-theoretic security. It is based on a [[Quantum Oblivious Key Distribution|quantum oblivious key distribution]] scheme. Like any quantum private queries protocol, it is cheat-sensitive, in the sense that user privacy relies on the non-zero probability for a cheating server to be detected. As for data privacy, the amount of information accessed by the user about the database is bounded.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], [[:Category:Two Party Protocols|Two Party Protocol]], [[Information-Theoretic Security]], [[(Symmetric) Private Information Retrieval|Symmetric Private Information Retrieval]], [[Quantum Private Queries]], [[Quantum Key Distribution]], [[Quantum Oblivious Key Distribution]], [[Single-Database]].&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The security of this protocol relies on fundamental physics principles:&lt;br /&gt;
*	Impossibility of superluminal communication (for user privacy).&lt;br /&gt;
*	Impossibility to deterministically discriminate non-orthogonal states (for database privacy).&lt;br /&gt;
To achieve &#039;&#039;perfect&#039;&#039; user privacy, one must make the following assumption:&lt;br /&gt;
*	The server (Bob) will not cheat if he has a non-zero probability of being caught cheating.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
&#039;&#039;A user, Alice, wants to retrieve an element from a database owned by a server, Bob, without revealing to Bob which element was retrieved (user privacy). Bob wants the amount of information that Alice can get on other database elements than the desired one to be bounded (data privacy).&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Quantum oblivious key distribution:&#039;&#039;&#039; Alice and Bob perform a [[Quantum Key Distribution|quantum key distribution]] (QKD) protocol in such a way that at the end of the protocol, Alice and Bob share a bit string known entirely to Bob and in a quarter to Alice: such a protocol is referred to as [[Quantum Oblivious Key Distribution|quantum &#039;&#039;oblivious&#039;&#039; key distribution]]. Then the key length is reduced to match the size of the database, while ensuring that Alice knows approximately one bit of the new key (the position of the known bit is unknown to Bob).&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Query:&#039;&#039;&#039; Alice announces to Bob a (classical) shift corresponding to the difference between the index of the known bit of the key and the index of the desired database element.&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Answer:&#039;&#039;&#039; Bob encodes the database by bitwise adding the key, shifted by Alice’s shift. Then Bob announces the encoded database.&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Retrieval:&#039;&#039;&#039; By adding bitwise the shifted key to the encoded database, Alice can recover each database element for which she knew the corresponding (shifted) bit of the key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
*	&amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: number of elements in the database.&lt;br /&gt;
*	&amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt;: database; &amp;lt;math&amp;gt;X_n&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;n^\text{th}&amp;lt;/math&amp;gt; database element.&lt;br /&gt;
*	&amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;: index of the desired database element&lt;br /&gt;
*	&amp;lt;math&amp;gt;j&amp;lt;/math&amp;gt;: index of a bit of the QKD key known to Alice.&lt;br /&gt;
*	&amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;: a security parameter for the QKD key.&lt;br /&gt;
*	&amp;lt;math&amp;gt;|\uparrow\rangle,|\downarrow\rangle,|\leftarrow\rangle,|\rightarrow\rangle&amp;lt;/math&amp;gt;: [[BB84 Quantum Key Distribution|BB84]] states.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\updownarrow&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;\{|\uparrow\rangle,|\downarrow\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\leftrightarrow&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;\{|\leftarrow\rangle,|\rightarrow\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
*	&amp;lt;math&amp;gt;K^f&amp;lt;/math&amp;gt;: key used to encode the database; it is a random bit string of length &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;C&amp;lt;/math&amp;gt;: encoded database (by bitwise adding the shifted QKD key).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Knowledge Graph==--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}}--&amp;gt;&lt;br /&gt;
==Requirements==&lt;br /&gt;
&#039;&#039;&#039;User&#039;&#039;&#039; (Alice):&lt;br /&gt;
*	Can measure single qubits.&lt;br /&gt;
&#039;&#039;&#039;Server&#039;&#039;&#039; (Bob):&lt;br /&gt;
*	Can prepare single qubits.&lt;br /&gt;
&#039;&#039;&#039;Communication&#039;&#039;&#039;:&lt;br /&gt;
*	A quantum channel.&lt;br /&gt;
*	A classical authenticated channel.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
*	&#039;&#039;&#039;User privacy&#039;&#039;&#039;: In the case of an honest server (Bob), there is perfect user privacy as Alice never communicates about the index of her known bit of the key. However, there are strategies that allow a malicious server to infer which bit of the key is known to Alice; but any such strategy implies a loss of knowledge on the bit value of this specific key element, and so Bob may introduce errors in the encoding of the database that would automatically be detected by Alice. Hence, assuming that the server will not cheat if there is a non-zero probability of being caught cheating, this protocol ensures perfect user privacy.&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
*	&#039;&#039;&#039;Data privacy&#039;&#039;&#039;: An honest Alice may know more than one bit of the final QKD key as the number of bits known to her is probabilistic; this means she could access as many extra database elements with certainty as the number of extra bits of the key that she knows. Moreover, for any other database elements whose encoding is unknown to an honest Alice, she has a 50% chance of guessing correctly the corresponding key element. There are some cheating strategies that increase this probability; however, its increase is constrained by the choice of the security parameter &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;. Lastly, it is important to note that a cheating Alice cannot be detected by Bob.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Inputs:&#039;&#039;&#039;&lt;br /&gt;
*	User (Alice): index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt; of the desired database element.&lt;br /&gt;
*	Server (Bob): classical database &amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; elements: &amp;lt;math&amp;gt;X_1,...,X_N&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	Both (Alice &amp;amp; Bob): a security parameter &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;.&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039;&lt;br /&gt;
*	User (Alice): desired database element &amp;lt;math&amp;gt;X_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
&#039;&#039;&#039;Protocol:&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Quantum oblivious key distribution:&#039;&#039;&#039;&lt;br /&gt;
#	Bob generates a random bit string of length &amp;lt;math&amp;gt;k\times N&amp;lt;/math&amp;gt;.&lt;br /&gt;
#	Bob encodes each bit of the string in the state of a qubit belonging to one of two bases &amp;lt;math&amp;gt;\updownarrow := \{|\uparrow\rangle ,|\downarrow \rangle \}&amp;lt;/math&amp;gt; or &amp;lt;math&amp;gt;\leftrightarrow :=\{|\leftarrow\rangle,|\rightarrow\rangle\}&amp;lt;/math&amp;gt;: for each bit, if it is &amp;lt;math&amp;gt;0&amp;lt;/math&amp;gt;, Bob chooses between &amp;lt;math&amp;gt;|\uparrow\rangle&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|\downarrow\rangle&amp;lt;/math&amp;gt;, if it is &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt;, Bob chooses between &amp;lt;math&amp;gt;|\leftarrow\rangle&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|\rightarrow\rangle&amp;lt;/math&amp;gt;.&lt;br /&gt;
#	Bob sends the prepared qubits to Alice.&lt;br /&gt;
#	Alice measures each state in the &amp;lt;math&amp;gt;\updownarrow &amp;lt;/math&amp;gt; basis or &amp;lt;math&amp;gt;\leftrightarrow &amp;lt;/math&amp;gt; basis at random.&lt;br /&gt;
#	Alice announces to Bob in which instances she detected the sent qubit.&lt;br /&gt;
#	For each qubit that Alice successfully detected, Bob announces a pair of two states including the state that was sent. The other state is chosen at random in the other basis.&lt;br /&gt;
#	Partial reconstruction of the key: Using her measurement outcomes and Bob’s announced pairs of qubits, Alice can deduce the bit value of part of the key (&amp;lt;math&amp;gt;1/4&amp;lt;/math&amp;gt; of conclusive results). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;At this stage, Alice and Bob share a secret key of length &amp;lt;math&amp;gt;k\times N&amp;lt;/math&amp;gt; which is known partially (&amp;lt;math&amp;gt;{1/4}^\text{th}&amp;lt;/math&amp;gt;) to Alice and entirely to Bob. Bob does not know which bits of the key are known to Alice.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
#	Reduction of the key length: The key is cut into &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; substrings of length &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;.  Then pieces of the key are added bitwise to create a new key of length &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;K^f&amp;lt;/math&amp;gt;. This reduces the number of bits of the new key that Alice knows to roughly one bit (ideally, Alice should know exactly one bit of the new key).&lt;br /&gt;
*&#039;&#039;&#039;Query:&#039;&#039;&#039; Alice announces to Bob a shift &amp;lt;math&amp;gt;s=j-i&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt; is the index of the desired database element and &amp;lt;math&amp;gt;j&amp;lt;/math&amp;gt; is the index of a bit of the key known to Alice.&lt;br /&gt;
*&#039;&#039;&#039;Answer:&#039;&#039;&#039; Bob announces to Alice &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; bits &amp;lt;math&amp;gt;C_n=X_n\oplus K_{n+s}^f&amp;lt;/math&amp;gt; corresponding to the encoded database.&lt;br /&gt;
*&#039;&#039;&#039;Retrieval:&#039;&#039;&#039; Alice recovers the desired database element &amp;lt;math&amp;gt;X_i&amp;lt;/math&amp;gt; by adding her known bit of the key, &amp;lt;math&amp;gt;K_j^f&amp;lt;/math&amp;gt; to the &amp;lt;math&amp;gt;i^\text{th}&amp;lt;/math&amp;gt; received bit &amp;lt;math&amp;gt;C_i&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;C_i\oplus K_j^f=X_i\oplus K_{i+s}^f\oplus K_j^f=X_i\oplus K_{i+j-i}^f\oplus K_j^f=X_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
*	The QKD part of this quantum private queries protocol is based on the [https://arxiv.org/pdf/quant-ph/0211131.pdf SARG04 QKD scheme]. However, any QKD protocol that is compatible with the SARG04 scheme would work.&lt;br /&gt;
*	This protocol is loss resistant and scalable to large databases.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==References==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Marine Demarty&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Multi-Database_Classical_Symmetric_Private_Information_Retrieval_with_Quantum_Key_Distribution&amp;diff=4368</id>
		<title>Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Multi-Database_Classical_Symmetric_Private_Information_Retrieval_with_Quantum_Key_Distribution&amp;diff=4368"/>
		<updated>2021-07-26T10:31:46Z</updated>

		<summary type="html">&lt;p&gt;Marine: Minor edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
This [https://www.mdpi.com/1099-4300/23/1/54/htm example protocol] performs the task of [[(Symmetric) Private Information Retrieval|symmetric private information retrieval]] (SPIR) and has unconditional security (a.k.a. information-theoretic security). It is a quantum multi-database one-round protocol, based on a classical multi-database SPIR protocol, that uses [[Quantum Key Distribution|quantum key distribution]] (QKD) to share randomness between servers and to secure classical channels between the user and the servers, and thus do without the assumption of perfectly secured channels of classical multi-database SPIR protocols.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], [[Quantum Key Distribution]], [[Information-Theoretic Security]], [[(Symmetric) Private Information Retrieval|Symmetric Private Information Retrieval]], [[Multi-Database]], [[One-Round Protocol]].&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;All parties:&#039;&#039;&#039; All parties have a trusted random number generator and all QKD devices are honest. All messages sent through the classical channels are encrypted with a classical one-time pad.&lt;br /&gt;
*&#039;&#039;&#039;Data centres:&#039;&#039;&#039; Data centres are not allowed to communicate after the key exchange step. They do not leak QKD keys intentionally to other parties.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
Outline for a generic one-round two-database SPIR protocol with QKD:&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;There are three parties, a user and two data centres. Each data centre has a copy of the database. In symmetric private information retrieval, the user wants to retrieve an element from a database owned by another party (here, two other parties: data centres 1 and 2) without revealing which element is retrieved; the user should not have access to other database elements.&#039;&#039;&lt;br /&gt;
*	&#039;&#039;&#039;Sharing secret keys between parties:&#039;&#039;&#039; At the beginning of the protocol, for each pair of parties (i.e., user and data centre 1, data centre 1 and data centre 2, user and data centre 2), shared secret keys are established via a single round of [[Quantum Key Distribution|quantum key distribution]]. If any of the key distribution protocols abort, then the whole SPIR protocol aborts.&lt;br /&gt;
&lt;br /&gt;
The next steps are the same as these of a generic one-round two-database classical SPIR protocol.&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Query:&#039;&#039;&#039;  Then, the user generates two queries; one for each data centre. Queries are some encryptions of the index of the desired database element using some local randomness.&lt;br /&gt;
*	&#039;&#039;&#039;Answer:&#039;&#039;&#039; From the queries received, their copy of the database, and their secret key shared with the user, each data centre generates an answer and sends it to the user.&lt;br /&gt;
*	&#039;&#039;&#039;Retrieval:&#039;&#039;&#039; Lastly, the user can reconstruct the desired database element from the answers of each datacentre and his own inputs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
*	&amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: user.&lt;br /&gt;
*	&amp;lt;math&amp;gt;D_i&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre.&lt;br /&gt;
*	&amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt;: Eve, an eavesdropper.&lt;br /&gt;
*	&amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;: user’s local randomness (random variable); &amp;lt;math&amp;gt;r&amp;lt;/math&amp;gt;: given randomness (&amp;lt;math&amp;gt;R=r&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt;: input random variable; &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;: given input (&amp;lt;math&amp;gt;X=x&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;: database random variable; &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;: given database (&amp;lt;math&amp;gt;W=w&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;W_X&amp;lt;/math&amp;gt;: random variable which represents the database entry that the user wants to retrieve; &amp;lt;math&amp;gt;w_x&amp;lt;/math&amp;gt;: given desired database entry (&amp;lt;math&amp;gt;W_X=w_x&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;f_{\text{query},i}&amp;lt;/math&amp;gt;: query function, used by the user to generate his query to the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre. Input and output are random variables. &lt;br /&gt;
*	&amp;lt;math&amp;gt;f_{\text{ans},i}&amp;lt;/math&amp;gt;: answer function, used by the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre to generate his answer to the user’s query. Input and output are random variables.&lt;br /&gt;
*	&amp;lt;math&amp;gt;f_{\text{dec}}&amp;lt;/math&amp;gt;: decoding function, used by the user to decode the desired database element. Input and output are random variables.&lt;br /&gt;
*	&amp;lt;math&amp;gt;S_i&amp;lt;/math&amp;gt;: QKD key random variable (the user has &amp;lt;math&amp;gt;S_2&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;S_4&amp;lt;/math&amp;gt; to communicate with data centres 1 and 2 respectively; data centre 1 has &amp;lt;math&amp;gt;S_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;S_5&amp;lt;/math&amp;gt; to communicate with the user and data centre 2 respectively; data centre 2 has &amp;lt;math&amp;gt;S_3&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;S_6&amp;lt;/math&amp;gt; to communicate with the user and data centre 1 respectively); &amp;lt;math&amp;gt;s_i&amp;lt;/math&amp;gt;: given QKD key (&amp;lt;math&amp;gt;S_i=s_i&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;S_i^\text{enc}&amp;lt;/math&amp;gt;: half of the key &amp;lt;math&amp;gt;S_i&amp;lt;/math&amp;gt; used for encryption (random variable); &amp;lt;math&amp;gt;s_i^\text{enc}&amp;lt;/math&amp;gt;: given key (&amp;lt;math&amp;gt;S_i^\text{enc}=s_i^\text{enc}&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;S_i^\text{dec}&amp;lt;/math&amp;gt;: half of the key &amp;lt;math&amp;gt;S_i&amp;lt;/math&amp;gt; used for decryption (random variable); &amp;lt;math&amp;gt;s_i^\text{dec}&amp;lt;/math&amp;gt;: given key (&amp;lt;math&amp;gt;S_i^\text{dec}=s_i^\text{dec}&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;Q_i&amp;lt;/math&amp;gt;: query generated by the user for the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\tilde{Q}_i&amp;lt;/math&amp;gt;: query received by the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre (may be different from &amp;lt;math&amp;gt;Q_i&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;C_{Ui}&amp;lt;/math&amp;gt;: secure channel connecting the user with the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre.&lt;br /&gt;
*	&amp;lt;math&amp;gt;A_i&amp;lt;/math&amp;gt;: reply generated by the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre for the user after receiving  &amp;lt;math&amp;gt;\tilde{Q}_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\tilde{A}_i&amp;lt;/math&amp;gt;: reply from the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre received by the client (may be different from &amp;lt;math&amp;gt;A_i&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;\hat{w}_x&amp;lt;/math&amp;gt;: database element retrieved by the user at the end of the protocol.&lt;br /&gt;
*	&amp;lt;math&amp;gt;p_\text{fail}&amp;lt;/math&amp;gt;: probability that at least one of the three QKD protocols aborted (&amp;lt;math&amp;gt;p_\text{fail}=1-(1-p_{\perp,U1})(1-p_{\perp,U2})(1-p_{\perp,12})&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;p_{\perp,AB}&amp;lt;/math&amp;gt;: probability that the QKD protocol between parties &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B&amp;lt;/math&amp;gt; aborts, where &amp;lt;math&amp;gt;A,B\in\{U,1,2\}&amp;lt;/math&amp;gt; (&amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: user; &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt;: data centre 1; &amp;lt;math&amp;gt;2&amp;lt;/math&amp;gt;: data centre 2).&lt;br /&gt;
*	&amp;lt;math&amp;gt;\text{pass}&amp;lt;/math&amp;gt;: this is the event “none of the three QKD protocols aborted”.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\Delta(.,.)&amp;lt;/math&amp;gt;: trace distance between two quantum systems (&amp;lt;math&amp;gt;\Delta(\rho,\sigma)=\frac{1}{2} ||\rho-\sigma||_1&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;||.||_1&amp;lt;/math&amp;gt; is the trace norm).&lt;br /&gt;
*	&amp;lt;math&amp;gt;\rho_{UE}^w&amp;lt;/math&amp;gt;: total view of the user &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt; and the eavesdropper &amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt; conditioned by &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\rho_{D_j E}^x&amp;lt;/math&amp;gt;: total view of data centre &amp;lt;math&amp;gt;D_j&amp;lt;/math&amp;gt; and the eavesdropper &amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt; conditioned by &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\rho_E^{x,w}&amp;lt;/math&amp;gt;: total view of the eavesdropper &amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt; conditioned by &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Knowledge Graph==--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}}--&amp;gt;&lt;br /&gt;
==Requirements==&lt;br /&gt;
*	Quantum channels to perform QKD between parties.&lt;br /&gt;
*	Classical authenticated channels.&lt;br /&gt;
*	QKD devices to prepare and measure qubits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
For this protocol, SPIR security definitions (see [[(Symmetric) Private Information Retrieval]]) are extended as follow:&lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_\text{cor}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;correctness&#039;&#039;&#039;: If the user and the data centres are honest, then for any index &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and database &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;(1-p_\text{fail})Pr[\hat{w}_x \neq w_x|\text{pass}]\leq\eta_\text{cor}&amp;lt;/math&amp;gt;. &lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_{UP}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;user privacy&#039;&#039;&#039;: If the user is honest, then for any database &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; and shared secret keys between the data centres &amp;lt;math&amp;gt;(s_5,s_6)&amp;lt;/math&amp;gt;, and for any data centre &amp;lt;math&amp;gt;D_j&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\Delta(\rho_{D_{j} E}^x,\rho_{D_{j} E}^{x&#039;}) \leq \eta_{UP}&amp;lt;/math&amp;gt; for all indexes &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;x&#039;&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_{DP}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;database privacy&#039;&#039;&#039;: If the data centres are honest, then for any index &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;, randomness &amp;lt;math&amp;gt;r&amp;lt;/math&amp;gt; and keys &amp;lt;math&amp;gt;(s_1^\text{dec},s_2^\text{enc},s_3^\text{dec},s_4^\text{enc})&amp;lt;/math&amp;gt;, then there exists an index &amp;lt;math&amp;gt;x&#039;&amp;lt;/math&amp;gt; such that for all databases &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&#039;&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;w_{x&#039;}={w&#039;}_{x&#039;}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\Delta(\rho_{UE}^w,\rho_{UE}^{w&#039;}) \leq \eta_{DP}&amp;lt;/math&amp;gt;.&lt;br /&gt;
In addition to the above extended SPIR security definitions, the notion of protocol secrecy is added which allows to bound the amount of information that an external eavesdropper may obtain on the database &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; or the index of the desired database element &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;. This extra definition is required for this protocol as it relies on practical QKD protocols, which means that there is a non-zero probability that an eavesdropper may learn part of the QKD keys.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_{PS}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;protocol secrecy&#039;&#039;&#039;: If the user and the data centres are honest, then for all index-database pairs &amp;lt;math&amp;gt;(x,w)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(x&#039;,w&#039;)&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\Delta(\rho_{E}^{x,w},\rho_{E}^{x&#039;,w&#039;}) \leq \eta_{PS}&amp;lt;/math&amp;gt;.&lt;br /&gt;
Those extended security definitions result from the possibility of unperfect QKD keys and the non-zero probability that one of the three QKD protocols may abort.&lt;br /&gt;
&lt;br /&gt;
	A SPIR protocol that satisfies the four above conditions is said to be &amp;lt;math&amp;gt;(\eta_\text{cor},\eta_{UP},\eta_{DP},\eta_{PS})&amp;lt;/math&amp;gt;-&#039;&#039;&#039;secure&#039;&#039;&#039;.&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
A two-database one-round &amp;lt;math&amp;gt;(0,0,0,0)&amp;lt;/math&amp;gt;-secure SPIR protocol with ideal keys replaced by &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt;-secure QKD keys, where &amp;lt;math&amp;gt;\epsilon=\epsilon_\text{corr}+\epsilon_\text{sec}&amp;lt;/math&amp;gt; (see [[Quantum Key Distribution#Properties|QKD security definitions]]), can be shown to be &amp;lt;math&amp;gt;(3\epsilon_\text{corr},2\epsilon,2\epsilon,4\epsilon)&amp;lt;/math&amp;gt;-secure (see [https://www.mdpi.com/1099-4300/23/1/54/htm Kon and Lim (2021)] for a proof).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Inputs:&#039;&#039;&#039; &lt;br /&gt;
*	User &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: index of desired database item, &amp;lt;math&amp;gt;X=x&amp;lt;/math&amp;gt;; randomness &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;; &amp;lt;math&amp;gt;f_{\text{query},1}&amp;lt;/math&amp;gt;,&amp;lt;math&amp;gt;f_{\text{query},2}&amp;lt;/math&amp;gt;,&amp;lt;math&amp;gt;f_\text{dec}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	Data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt;: database &amp;lt;math&amp;gt;W=w&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	Data centre &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt;: database &amp;lt;math&amp;gt;W=w&amp;lt;/math&amp;gt;.&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; &lt;br /&gt;
*	User &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: retrieved database element &amp;lt;math&amp;gt;\hat{w}_x&amp;lt;/math&amp;gt; (it may be different from the desired database element &amp;lt;math&amp;gt;w_x&amp;lt;/math&amp;gt; in the case of malicious parties).&lt;br /&gt;
&#039;&#039;&#039;Protocol:&#039;&#039;&#039;&lt;br /&gt;
*	&#039;&#039;&#039;Sharing secret keys between parties:&#039;&#039;&#039; each pair of parties perform a single-round [[Quantum Key Distribution|quantum key distribution]] protocol (see e.g., [[Measurement Device Independent Quantum Key Distribution (MDI-QKD)|MDI-QKD]] and [https://www.nature.com/articles/ncomms4732 this] specific protocol), so that at the end of the secret sharing phase, data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; and the user &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt; share secret key pair &amp;lt;math&amp;gt;(S_1,S_2)&amp;lt;/math&amp;gt;; data centre &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt; and the user &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt; share secret key pair &amp;lt;math&amp;gt;(S_3,S_4)&amp;lt;/math&amp;gt;; and data centres &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt; share secret key pair &amp;lt;math&amp;gt;(S_5,S_6)&amp;lt;/math&amp;gt;. If any of the key distribution protocols abort, then the whole SPIR protocol aborts.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The next steps are the same as for a generic one-round two-database classical SPIR protocol like this of [https://dl.acm.org/doi/abs/10.1145/276698.276723 Gertner et al (2000)].&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Query:&#039;&#039;&#039; Query &amp;lt;math&amp;gt;Q_1=f_{\text{query},1} (x,R)&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;Q_2=f_{\text{query},2} (x,R)&amp;lt;/math&amp;gt;) is generated by the user and sent via QKD-secured (one-time pad encryption with QKD shared secret keys) classical channel &amp;lt;math&amp;gt;C_{U1}&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;C_{U2}&amp;lt;/math&amp;gt;) to data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt;). &lt;br /&gt;
*	&#039;&#039;&#039;Answer:&#039;&#039;&#039; After receiving query &amp;lt;math&amp;gt;\tilde{Q}_1&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;\tilde{Q}_2&amp;lt;/math&amp;gt;), data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt;) generates answer &amp;lt;math&amp;gt;A_1=f_{\text{ans},1} (\tilde{Q}_1,w,S_5)&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;A_2=f_{\text{ans},2} (\tilde{Q}_2,w,S_6)&amp;lt;/math&amp;gt;) and sends it to the user via &amp;lt;math&amp;gt;C_{U1}&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;C_{U2}&amp;lt;/math&amp;gt;).&lt;br /&gt;
*       &#039;&#039;&#039;Retrieval:&#039;&#039;&#039; The user decodes the received database element  &amp;lt;math&amp;gt;\hat{w}_x&amp;lt;/math&amp;gt; using &amp;lt;math&amp;gt;f_{\text{dec}}&amp;lt;/math&amp;gt;:  &amp;lt;math&amp;gt;\hat{w}_x=f_\text{dec} (\tilde{A}_1,\tilde{A}_2,Q_1,Q_2,x,R)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
*	This protocol is a one-round protocol where there is a single round of query from the user to the data centres and a single round of answer from the data centres to the user. It can be extended to multi-round protocols by simply allowing several successive rounds of queries and answers.&lt;br /&gt;
*	Classical multi-database SPIR protocols require pre-shared secret keys between parties: to secure communication between user and data centres, and between data centres to achieve data privacy (private shared randomness between data centres is a key element to accomplish the task of conditional disclosure of secrets (CDS) as introduced by [https://dl.acm.org/doi/abs/10.1145/276698.276723 Gertner et al (2000)]).&lt;br /&gt;
*	With current QKD technology, this SPIR protocol is feasible, as shown by [https://www.mdpi.com/1099-4300/23/1/54/htm Kon and Lim (2021)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==References==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Marine Demarty&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Multi-Database_Classical_Symmetric_Private_Information_Retrieval_with_Quantum_Key_Distribution&amp;diff=4367</id>
		<title>Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Multi-Database_Classical_Symmetric_Private_Information_Retrieval_with_Quantum_Key_Distribution&amp;diff=4367"/>
		<updated>2021-07-26T10:27:43Z</updated>

		<summary type="html">&lt;p&gt;Marine: Creating a new page for Multi-Database Classical SPIR with QKD&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
This [https://www.mdpi.com/1099-4300/23/1/54/htm example protocol] performs the task of [[(Symmetric) Private Information Retrieval|symmetric private information retrieval]] (SPIR) and has unconditional security (a.k.a. information-theoretic security). It is a quantum multi-database one-round protocol, based on a classical multi-database SPIR protocol, that uses [[Quantum Key Distribution|quantum key distribution]] (QKD) to share randomness between servers and to secure classical channels between the user and the servers, and thus do without the assumption of perfectly secured channels of classical multi-database SPIR protocols.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], [[Quantum Key Distribution]], [[Information-Theoretic Security]], [[(Symmetric) Private Information Retrieval|Symmetric Private Information Retrieval]], [[Multi-Database]], [[One-Round Protocol]].&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;All parties:&#039;&#039;&#039; All parties have a trusted random number generator and all QKD devices are honest. All messages sent through the classical channels are encrypted with a classical one-time pad.&lt;br /&gt;
*&#039;&#039;&#039;Data centres:&#039;&#039;&#039; Data centres are not allowed to communicate after the key exchange step. They do not leak QKD keys intentionally to other parties.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
Outline for a generic one-round two-database SPIR protocol with QKD:&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;There are three parties, a user and two data centres. Each data centre has a copy of the database. In symmetric private information retrieval, the user wants to retrieve an element from a database owned by another party (here, two other parties: data centres 1 and 2) without revealing which element is retrieved; the user should not have access to other database elements.&#039;&#039;&lt;br /&gt;
*	&#039;&#039;&#039;Sharing secret keys between parties:&#039;&#039;&#039; At the beginning of the protocol, for each pair of parties (i.e., user and data centre 1, data centre 1 and data centre 2, user and data centre 2), shared secret keys are established via a single round of [[Quantum Key Distribution|quantum key distribution]]. If any of the key distribution protocols abort, then the whole SPIR protocol aborts.&lt;br /&gt;
&lt;br /&gt;
The next steps are the same as these of a generic one-round two-database classical SPIR protocol.&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Query:&#039;&#039;&#039;  Then, the user generates two queries; one for each data centre. Queries are some encryptions of the index of the desired database element using some local randomness.&lt;br /&gt;
*	&#039;&#039;&#039;Answer:&#039;&#039;&#039; From the queries received, their copy of the database, and their secret key shared with the user, each data centre generates an answer and sends it to the user.&lt;br /&gt;
*	&#039;&#039;&#039;Retrieval:&#039;&#039;&#039; Lastly, the user can reconstruct the desired database element from the answers of each datacentre and his own inputs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
*	&amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: user.&lt;br /&gt;
*	&amp;lt;math&amp;gt;D_i&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre.&lt;br /&gt;
*	&amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt;: Eve, an eavesdropper.&lt;br /&gt;
*	&amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;: user’s local randomness (random variable); &amp;lt;math&amp;gt;r&amp;lt;/math&amp;gt;: given randomness (&amp;lt;math&amp;gt;R=r&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt;: input random variable; &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;: given input (&amp;lt;math&amp;gt;X=x&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;: database random variable; &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;: given database (&amp;lt;math&amp;gt;W=w&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;W_X&amp;lt;/math&amp;gt;: random variable which represents the database entry that the user wants to retrieve; &amp;lt;math&amp;gt;w_x&amp;lt;/math&amp;gt;: given desired database entry (&amp;lt;math&amp;gt;W_X=w_x&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;f_{\text{query},i}&amp;lt;/math&amp;gt;: query function, used by the user to generate his query to the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre. Input and output are random variables. &lt;br /&gt;
*	&amp;lt;math&amp;gt;f_{\text{ans},i}&amp;lt;/math&amp;gt;: answer function, used by the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre to generate his answer to the user’s query. Input and output are random variables.&lt;br /&gt;
*	&amp;lt;math&amp;gt;f_{\text{dec}}&amp;lt;/math&amp;gt;: decoding function, used by the user to decode the desired database element. Input and output are random variables.&lt;br /&gt;
*	&amp;lt;math&amp;gt;S_i&amp;lt;/math&amp;gt;: QKD key random variable (the user has &amp;lt;math&amp;gt;S_2&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;S_4&amp;lt;/math&amp;gt; to communicate with data centres 1 and 2 respectively; data centre 1 has &amp;lt;math&amp;gt;S_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;S_5&amp;lt;/math&amp;gt; to communicate with the user and data centre 2 respectively; data centre 2 has &amp;lt;math&amp;gt;S_3&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;S_6&amp;lt;/math&amp;gt; to communicate with the user and data centre 1 respectively); &amp;lt;math&amp;gt;s_i&amp;lt;/math&amp;gt;: given QKD key (&amp;lt;math&amp;gt;S_i=s_i&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;S_i^\text{enc}&amp;lt;/math&amp;gt;: half of the key &amp;lt;math&amp;gt;S_i&amp;lt;/math&amp;gt; used for encryption (random variable); &amp;lt;math&amp;gt;s_i^\text{enc}&amp;lt;/math&amp;gt;: given key (&amp;lt;math&amp;gt;S_i^\text{enc}=s_i^\text{enc}&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;S_i^\text{dec}&amp;lt;/math&amp;gt;: half of the key &amp;lt;math&amp;gt;S_i&amp;lt;/math&amp;gt; used for decryption (random variable); &amp;lt;math&amp;gt;s_i^\text{dec}&amp;lt;/math&amp;gt;: given key (&amp;lt;math&amp;gt;S_i^\text{dec}=s_i^\text{dec}&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;Q_i&amp;lt;/math&amp;gt;: query generated by the user for the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\tilde{Q}_i&amp;lt;/math&amp;gt;: query received by the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre (may be different from &amp;lt;math&amp;gt;Q_i&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;C_{Ui}&amp;lt;/math&amp;gt;: secure channel connecting the user with the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre.&lt;br /&gt;
*	&amp;lt;math&amp;gt;A_i&amp;lt;/math&amp;gt;: reply generated by the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre for the user after receiving  &amp;lt;math&amp;gt;\tilde{Q}_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\tilde{A}_i&amp;lt;/math&amp;gt;: reply from the &amp;lt;math&amp;gt;i^{\text{th}}&amp;lt;/math&amp;gt; data centre received by the client (may be different from &amp;lt;math&amp;gt;A_i&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;\hat{w}_x&amp;lt;/math&amp;gt;: database element retrieved by the user at the end of the protocol.&lt;br /&gt;
*	&amp;lt;math&amp;gt;p_\text{fail}&amp;lt;/math&amp;gt;: probability that at least one of the three QKD protocols aborted (&amp;lt;math&amp;gt;p_\text{fail}=1-(1-p_{\perp,U1})(1-p_{\perp,U2})(1-p_{\perp,12})&amp;lt;/math&amp;gt;).&lt;br /&gt;
*	&amp;lt;math&amp;gt;p_{\perp,AB}&amp;lt;/math&amp;gt;: probability that the QKD protocol between parties &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B&amp;lt;/math&amp;gt; aborts, where &amp;lt;math&amp;gt;A,B\in\{U,1,2\}&amp;lt;/math&amp;gt; (&amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: user; &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt;: data centre 1; &amp;lt;math&amp;gt;2&amp;lt;/math&amp;gt;: data centre 2).&lt;br /&gt;
*	&amp;lt;math&amp;gt;\text{pass}&amp;lt;/math&amp;gt;: this is the event “none of the three QKD protocols aborted”.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\Delta(.,.)&amp;lt;/math&amp;gt;: trace distance between two quantum systems (&amp;lt;math&amp;gt;\Delta(\rho,\sigma)=\frac{1}{2} ||\rho-\sigma||_1&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;||.||_1&amp;lt;/math&amp;gt; is the trace norm).&lt;br /&gt;
*	&amp;lt;math&amp;gt;\rho_{UE}^w&amp;lt;/math&amp;gt;: total view of the user &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt; and the eavesdropper &amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt; conditioned by &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\rho_{D_j E}^x&amp;lt;/math&amp;gt;: total view of data centre &amp;lt;math&amp;gt;D_j&amp;lt;/math&amp;gt; and the eavesdropper &amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt; conditioned by &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\rho_E^{x,w}&amp;lt;/math&amp;gt;: total view of the eavesdropper &amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt; conditioned by &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Knowledge Graph==--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}}--&amp;gt;&lt;br /&gt;
==Requirements==&lt;br /&gt;
*	Quantum channels to perform QKD between parties.&lt;br /&gt;
*	Classical authenticated channels.&lt;br /&gt;
*	QKD devices to prepare and measure qubits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
For this protocol, SPIR security definitions (see [[(Symmetric) Private Information Retrieval]]) are extended as follow:&lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_\text{cor}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;correctness&#039;&#039;&#039;: If the user and the data centres are honest, then for any index &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and database &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;(1-p_\text{fail})Pr[\hat{w}_x \neq w_x|\text{pass}]\leq\eta_\text{cor}&amp;lt;/math&amp;gt;. &lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_{UP}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;user privacy&#039;&#039;&#039;: If the user is honest, then for any database &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; and shared secret keys between the data centres &amp;lt;math&amp;gt;(s_5,s_6)&amp;lt;/math&amp;gt;, and for any data centre &amp;lt;math&amp;gt;D_j&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\Delta(\rho_{D_{j} E}^x,\rho_{D_{j} E}^{x&#039;}) \leq \eta_{UP}&amp;lt;/math&amp;gt; for all indexes &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;x&#039;&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_{DP}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;database privacy&#039;&#039;&#039;: If the data centres are honest, then for any index &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;, randomness &amp;lt;math&amp;gt;r&amp;lt;/math&amp;gt; and keys &amp;lt;math&amp;gt;(s_1^\text{dec},s_2^\text{enc},s_3^\text{dec},s_4^\text{enc})&amp;lt;/math&amp;gt;, then there exists an index &amp;lt;math&amp;gt;x&#039;&amp;lt;/math&amp;gt; such that for all databases &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&#039;&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;w_{x&#039;}={w&#039;}_{x&#039;}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\Delta(\rho_{UE}^w,\rho_{UE}^{w&#039;}) \leq \eta_{DP}&amp;lt;/math&amp;gt;.&lt;br /&gt;
In addition to the above extended SPIR security definitions, the notion of protocol secrecy is added which allows to bound the amount of information that an external eavesdropper may obtain on the database &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; or the index of the desired database element &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;. This extra definition is required for this protocol as it relies on practical QKD protocols, which means that there is a non-zero probability that an eavesdropper may learn part of the QKD keys.&lt;br /&gt;
*	&amp;lt;math&amp;gt;\eta_{PS}&amp;lt;/math&amp;gt;-&#039;&#039;&#039;protocol secrecy&#039;&#039;&#039;: If the user and the data centres are honest, then for all index-database pairs &amp;lt;math&amp;gt;(x,w)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(x&#039;,w&#039;)&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\Delta(\rho_{E}^{x,w},\rho_{E}^{x&#039;,w&#039;}) \leq \eta_{PS}&amp;lt;/math&amp;gt;.&lt;br /&gt;
Those extended security definitions result from the possibility of unperfect QKD keys and the non-zero probability that one of the three QKD protocols may abort.&lt;br /&gt;
&lt;br /&gt;
	A SPIR protocol that satisfies the four above conditions is said to be &amp;lt;math&amp;gt;(\eta_\text{cor},\eta_{UP},\eta_{DP},\eta_{PS})&amp;lt;/math&amp;gt;-&#039;&#039;&#039;secure&#039;&#039;&#039;.&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
A two-database one-round &amp;lt;math&amp;gt;(0,0,0,0)&amp;lt;/math&amp;gt;-secure SPIR protocol with ideal keys replaced by &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt;-secure QKD keys, where &amp;lt;math&amp;gt;\epsilon=\epsilon_\text{corr}+\epsilon_\text{sec}&amp;lt;/math&amp;gt; (see [[Quantum Key Distribution#Properties|QKD security definitions]]), can be shown to be &amp;lt;math&amp;gt;(3\epsilon_\text{corr},2\epsilon,2\epsilon,4\epsilon)&amp;lt;/math&amp;gt;-secure (see [https://www.mdpi.com/1099-4300/23/1/54/htm Kon and Lim (2021)] for a proof).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Inputs:&#039;&#039;&#039; &lt;br /&gt;
*	User &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: index of desired database item, &amp;lt;math&amp;gt;X=x&amp;lt;/math&amp;gt;; randomness &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;; &amp;lt;math&amp;gt;f_{\text{query},1}&amp;lt;/math&amp;gt;,&amp;lt;math&amp;gt;f_{\text{query},2}&amp;lt;/math&amp;gt;,&amp;lt;math&amp;gt;f_\text{dec}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	Data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt;: database &amp;lt;math&amp;gt;W=w&amp;lt;/math&amp;gt;.&lt;br /&gt;
*	Data centre &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt;: database &amp;lt;math&amp;gt;W=w&amp;lt;/math&amp;gt;.&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; &lt;br /&gt;
*	User &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt;: retrieved database element &amp;lt;math&amp;gt;\hat{w}_x&amp;lt;/math&amp;gt; (it may be different from the desired database element &amp;lt;math&amp;gt;w_x&amp;lt;/math&amp;gt; in the case of malicious parties).&lt;br /&gt;
&#039;&#039;&#039;Protocol:&#039;&#039;&#039;&lt;br /&gt;
*	&#039;&#039;&#039;Sharing secret keys between parties:&#039;&#039;&#039; each pair of parties perform a single-round [[Quantum Key Distribution|quantum key distribution]] protocol (see e.g., [[Measurement Device Independent Quantum Key Distribution (MDI-QKD)|MDI-QKD]] and [https://www.nature.com/articles/ncomms4732 this] specific protocol), so that at the end of the secret sharing phase, data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; and the user &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt; share secret key pair &amp;lt;math&amp;gt;(S_1,S_2)&amp;lt;/math&amp;gt;; data centre &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt; and the user &amp;lt;math&amp;gt;U&amp;lt;/math&amp;gt; share secret key pair &amp;lt;math&amp;gt;(S_3,S_4)&amp;lt;/math&amp;gt;; and data centres &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt; share secret key pair &amp;lt;math&amp;gt;(S_5,S_6)&amp;lt;/math&amp;gt;. If any of the key distribution protocols abort, then the whole SPIR protocol aborts.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The next steps are the same as for a generic one-round two-database classical SPIR protocol like this of [https://dl.acm.org/doi/abs/10.1145/276698.276723 Gertner et al (2000)].&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Query:&#039;&#039;&#039; Query &amp;lt;math&amp;gt;Q_1=f_{\text{query},1} (x,R)&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;Q_2=f_{\text{query},2} (x,R)&amp;lt;/math&amp;gt;) is generated by the user and sent via QKD-secured (one-time pad encryption with QKD shared secret keys) classical channel &amp;lt;math&amp;gt;C_{U1}&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;C_{U2}&amp;lt;/math&amp;gt;) to data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt;). &lt;br /&gt;
*	&#039;&#039;&#039;Answer:&#039;&#039;&#039; After receiving query &amp;lt;math&amp;gt;\tilde{Q}_1&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;\tilde{Q}_2&amp;lt;/math&amp;gt;), data centre &amp;lt;math&amp;gt;D_1&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;D_2&amp;lt;/math&amp;gt;) generates answer &amp;lt;math&amp;gt;A_1=f_{\text{ans},1} (\tilde{Q}_1,w,S_5)&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;A_2=f_{\text{ans},2} (\tilde{Q}_2,w,S_6)&amp;lt;/math&amp;gt;) and sends it to the user via &amp;lt;math&amp;gt;C_{U1}&amp;lt;/math&amp;gt; (resp. &amp;lt;math&amp;gt;C_{U2}&amp;lt;/math&amp;gt;).&lt;br /&gt;
*       &#039;&#039;&#039;Retrieval:&#039;&#039;&#039; The user decodes the received database element  &amp;lt;math&amp;gt;\hat{w}_x&amp;lt;/math&amp;gt; using &amp;lt;math&amp;gt;f_{\text{dec}}&amp;lt;/math&amp;gt;:  &amp;lt;math&amp;gt;\hat{w}_x=f_\text{dec} (\tilde{A}_1,\tilde{A}_2,Q_1,Q_2,x,R)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
*	This protocol is a one-round protocol where there is a single round of query from the user to the data centres and a single round of answer from the data centres to the user. It can be extended to multi-round protocols by simply allowing several successive rounds of queries and answers.&lt;br /&gt;
*	Classical multi-database SPIR protocols require pre-shared secret keys between parties: to secure communication between user and data centres, and between data centres to achieve data privacy (private shared randomness between data centres is a key element to accomplish the task of conditional disclosure of secrets (CDS) as introduced by [https://dl.acm.org/doi/abs/10.1145/276698.276723 Gertner et al (2000)]).&lt;br /&gt;
*	With current QKD technology, this SPIR protocol is feasible, as shown by [https://www.mdpi.com/1099-4300/23/1/54/htm Kon and Lim (2021)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==References==--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=(Symmetric)_Private_Information_Retrieval&amp;diff=4366</id>
		<title>(Symmetric) Private Information Retrieval</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=(Symmetric)_Private_Information_Retrieval&amp;diff=4366"/>
		<updated>2021-07-25T15:26:54Z</updated>

		<summary type="html">&lt;p&gt;Marine: Adding some use-cases&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Functionality page describes a general task which can be realised in a quantum network --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;!-- Description: A lucid definition of functionality in discussion.--&amp;gt;&lt;br /&gt;
Private information retrieval (PIR) is a classical cryptographic functionality that allows one party (user) to privately retrieve an element from a classical database owned by another party (server), i.e., without revealing to the other party which element is being retrieved (user privacy).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Symmetric private information (SPIR) retrieval is PIR with the additional requirement that throughout and after the protocol, the user remains oblivious to other database elements, i.e., apart from the queried one (data privacy).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
In the quantum setting, the use of quantum systems is allowed to achieve (S)PIR: this may imply the use of a quantum channel between the user and the server, and the capability to prepare quantum states, apply quantum gates or measure quantum systems by one or both parties. (S)PIR in this setting is known as quantum (symmetric) private information retrieval (Q(S)PIR).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Apart from using quantum techniques to enhance the classical functionality (i.e., design better protocols than their classical counterparts in terms of different metrics like e.g., communication complexity), there has also been a recent interest in a ‘fully’ quantum (S)PIR where a user wants to query a quantum database (items are quantum states)[[#References|[1]]].&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; &lt;br /&gt;
[[:Category:Two Party Protocols|Two Party Protocol]],[[Category:Two Party Protocols]] &lt;br /&gt;
[[:Category:Specific Task|Specific Task]], [[Category:Specific Task]] &lt;br /&gt;
[[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]].[[Category:Quantum Enhanced Classical Functionality]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Tags Any related page or list of protocols is connected by this section--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security definitions===&lt;br /&gt;
(Quantum) private information retrieval protocols are said to be secure if they satisfy the following conditions:&lt;br /&gt;
*&#039;&#039;&#039;Correctness&#039;&#039;&#039;: assuming that all the parties in the protocol are honest, then the output of the protocol on the user’s side must be the queried database element.&lt;br /&gt;
*&#039;&#039;&#039;User privacy&#039;&#039;&#039;: assuming that the user is honest, then, throughout the protocol, any query of the user to a server leaks no information about the desired database item.&lt;br /&gt;
In addition to the above requirements, symmetric (quantum) private information retrieval protocols must also satisfy the following condition:&lt;br /&gt;
*&#039;&#039;&#039;Data(base) privacy&#039;&#039;&#039;: assuming that the server(s) is (are) honest(s), then, throughout the protocol, the user is unable to obtain any information beyond a single database element.&lt;br /&gt;
&lt;br /&gt;
===Cost parameters===&lt;br /&gt;
The most common cost parameter used to characterise a given (Q)(S)PIR protocol is:&lt;br /&gt;
*&#039;&#039;&#039;Communication complexity&#039;&#039;&#039;: total number of (qu)bits exchanged between the user and the server(s) throughout the protocol.&lt;br /&gt;
For (Q)(S)PIR protocols in general:&lt;br /&gt;
*&#039;&#039;&#039;(Q)(S)PIR capacity&#039;&#039;&#039;: maximal achievable ratio of the retrieved database element size to the total download size.&lt;br /&gt;
Some less common cost parameters include:&lt;br /&gt;
*&#039;&#039;&#039;Storage overhead&#039;&#039;&#039; (for multi-database (Q)(S)PIR protocols): ratio between the total number of (qu)bits stored on all servers and the number of (qu)bits in the (resp. quantum) classical database. &lt;br /&gt;
*&#039;&#039;&#039;Access complexity&#039;&#039;&#039;: total amount of data to be accessed by the server(s) for answering queries throughout a (Q)(S)PIR protocol.&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&amp;lt;!-- List of different types of example protocol achieving the functionality--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Classical database===&lt;br /&gt;
In the quantum setting, protocols aiming at achieving (S)PIR for a &#039;&#039;classical&#039;&#039; database fall into two main categories:&lt;br /&gt;
====Single-database protocols====&lt;br /&gt;
As in the classical setting, in the case of the database being owned by a &#039;&#039;single&#039;&#039; server, the trivial solution (downloading the whole database) is the only way to achieve information-theoretically secure PIR – even in the case of a specious (may deviate from the protocol if its malicious operations are unknown to the user) server [[#References|[2]]]. &amp;lt;br&amp;gt;&lt;br /&gt;
As for (quantum or classical) SPIR, it is impossible to achieve information-theoretic security with a single-server; this result was proved in the quantum setting by Lo [[#References|[3]]]. Therefore, to design efficient PIR protocols or to achieve SPIR, several assumptions have been considered; they include:&lt;br /&gt;
* Hardness assumptions: PIR protocols with computational security.&lt;br /&gt;
* Assumptions on the adversarial model:&lt;br /&gt;
** to achieve SPIR: cheat-sensitive protocols (also known as quantum private queries (QPQ) protocols) where it is assumed that the server will not cheat if there is a non-zero probability that he will be caught cheating. &lt;br /&gt;
***[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution|QPQ protocols based on quantum oblivious key distribution]]&lt;br /&gt;
***[[Quantum Private Queries Protocol Based on Sending Quantum States to an Oracle|QPQ protocols based on sending quantum states to an oracle]]&lt;br /&gt;
** to achieve efficient PIR: assuming an honest server.&lt;br /&gt;
***[[Single-Database Quantum Private Information Retrieval in the Honest Server Model|QPIR protocols in the honest server model]]&lt;br /&gt;
* Prior shared entanglement between server and user: in the honest server model, efficient PIR protocols exist, however for a specious or malicious server, the trivial solution is optimal for PIR[[#References|[4]]].&lt;br /&gt;
**[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model|QPIR protocols with prior shared entanglement in the honest server model]]&lt;br /&gt;
* Relativistic assumptions: quantum SPIR protocols whose security uses properties from special relativity.&lt;br /&gt;
**[[Relativistic Quantum Oblivious Transfer|Relativistic QOT protocols]]&lt;br /&gt;
&lt;br /&gt;
Nota bene: single-database (Q)SPIR and one-out-of-n (quantum) [[Oblivious Transfer|oblivious transfer]] ((Q)OT) are similar cryptographic tasks.&lt;br /&gt;
&lt;br /&gt;
====Multi-database protocols====&lt;br /&gt;
It is possible to achieve information-theoretic (S)PIR with reduced communication complexity (i.e., compared to this of the trivial solution) by considering several servers instead of one, each holding a copy of the database, and with the help of extra assumptions. Usually, to achieve (S)PIR, it is assumed that the servers cannot communicate with each other during and after the protocol ended (no-communication assumption), and that servers share randomness (in the symmetric case only). Examples of such protocols are:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness|Quantum multi-database SPIR protocols without shared randomness]] (replaced by prior shared entanglement between servers)&lt;br /&gt;
* [[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution|Classical multi-database SPIR protocols with QKD secured classical channels]]&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers|Multi-database quantum (S)PIR protocols for communicating and colluding servers]] – to do without the no-communication assumption&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers|Multi-database quantum (S)PIR protocols for coded servers]]&lt;br /&gt;
&lt;br /&gt;
===Quantum database===&lt;br /&gt;
For the case of a &#039;&#039;quantum&#039;&#039; database, the trivial solution of downloading the whole database is proved to be optimal for one-round QPIR, and for multi-round QPIR in the blind setting (i.e., the servers do not have a classical description of the quantum states of the database) and for the honest server model (and any other attack model)[[#References|[1]]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prior shared entanglement between the user and the server allows for efficient one-server QPIR protocols in the honest server model and in the blind setting. Multi-database QSPIR protocols for a quantum database with pure states, in the visible setting (servers know a classical description of the quantum database elements) exist as shown by Song and Hayashi [[#References|[1]]].&lt;br /&gt;
&lt;br /&gt;
* [[Single-Database Quantum Private Information Retrieval for a Quantum Database|Single-database quantum PIR protocols in the honest server model and in the blind setting for a quantum database]]&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for a Quantum Database|Multi-database quantum SPIR protocols in the visible setting for a quantum database]]&lt;br /&gt;
&lt;br /&gt;
==Use-cases==&lt;br /&gt;
&amp;lt;!-- Use Case (if available) analyses how practical the protocol is--&amp;gt;&lt;br /&gt;
===Classical database===&lt;br /&gt;
*Location-based services (to protect user location privacy).&lt;br /&gt;
*Queries of electronic medical records (these require decades of information confidentiality; hence security against quantum computing based attacks is necessary) or medical test reports.&lt;br /&gt;
*Music and film streaming (user does not want his/her tastes to be revealed to the server).&lt;br /&gt;
*Pay-per-view services, where the user should pay a fee to access every single database element.&lt;br /&gt;
&lt;br /&gt;
Quantum (S)PIR protocols may be preferred to their classical counterparts to:&lt;br /&gt;
*Achieve (S)PIR with better communication complexity: this is convenient in the case of large databases.&lt;br /&gt;
*Achieve (S)PIR with better security: for instance, to secure classical channels as in [[#References|[5]]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Further Information== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
#[https://arxiv.org/pdf/1304.5490.pdf Baumeler and Broadbent (2015)]&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/9611031.pdf Lo (1997)]&lt;br /&gt;
#[https://arxiv.org/pdf/1902.09768.pdf Aharonov et al (2019)]&lt;br /&gt;
#[https://www.mdpi.com/1099-4300/23/1/54/htm Kon and Lim (2021)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Marine Demarty&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=(Symmetric)_Private_Information_Retrieval&amp;diff=4365</id>
		<title>(Symmetric) Private Information Retrieval</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=(Symmetric)_Private_Information_Retrieval&amp;diff=4365"/>
		<updated>2021-07-13T12:42:28Z</updated>

		<summary type="html">&lt;p&gt;Marine: Creating a new page for Private Information Retrieval&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Functionality page describes a general task which can be realised in a quantum network --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;!-- Description: A lucid definition of functionality in discussion.--&amp;gt;&lt;br /&gt;
Private information retrieval (PIR) is a classical cryptographic functionality that allows one party (user) to privately retrieve an element from a classical database owned by another party (server), i.e., without revealing to the other party which element is being retrieved (user privacy).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Symmetric private information (SPIR) retrieval is PIR with the additional requirement that throughout and after the protocol, the user remains oblivious to other database elements, i.e., apart from the queried one (data privacy).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
In the quantum setting, the use of quantum systems is allowed to achieve (S)PIR: this may imply the use of a quantum channel between the user and the server, and the capability to prepare quantum states, apply quantum gates or measure quantum systems by one or both parties. (S)PIR in this setting is known as quantum (symmetric) private information retrieval (Q(S)PIR).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Apart from using quantum techniques to enhance the classical functionality (i.e., design better protocols than their classical counterparts in terms of different metrics like e.g., communication complexity), there has also been a recent interest in a ‘fully’ quantum (S)PIR where a user wants to query a quantum database (items are quantum states)[[#References|[1]]].&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; &lt;br /&gt;
[[:Category:Two Party Protocols|Two Party Protocol]],[[Category:Two Party Protocols]] &lt;br /&gt;
[[:Category:Specific Task|Specific Task]], [[Category:Specific Task]] &lt;br /&gt;
[[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]].[[Category:Quantum Enhanced Classical Functionality]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Tags Any related page or list of protocols is connected by this section--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security definitions===&lt;br /&gt;
(Quantum) private information retrieval protocols are said to be secure if they satisfy the following conditions:&lt;br /&gt;
*&#039;&#039;&#039;Correctness&#039;&#039;&#039;: assuming that all the parties in the protocol are honest, then the output of the protocol on the user’s side must be the queried database element.&lt;br /&gt;
*&#039;&#039;&#039;User privacy&#039;&#039;&#039;: assuming that the user is honest, then, throughout the protocol, any query of the user to a server leaks no information about the desired database item.&lt;br /&gt;
In addition to the above requirements, symmetric (quantum) private information retrieval protocols must also satisfy the following condition:&lt;br /&gt;
*&#039;&#039;&#039;Data(base) privacy&#039;&#039;&#039;: assuming that the server(s) is (are) honest(s), then, throughout the protocol, the user is unable to obtain any information beyond a single database element.&lt;br /&gt;
&lt;br /&gt;
===Cost parameters===&lt;br /&gt;
The most common cost parameter used to characterise a given (Q)(S)PIR protocol is:&lt;br /&gt;
*&#039;&#039;&#039;Communication complexity&#039;&#039;&#039;: total number of (qu)bits exchanged between the user and the server(s) throughout the protocol.&lt;br /&gt;
For (Q)(S)PIR protocols in general:&lt;br /&gt;
*&#039;&#039;&#039;(Q)(S)PIR capacity&#039;&#039;&#039;: maximal achievable ratio of the retrieved database element size to the total download size.&lt;br /&gt;
Some less common cost parameters include:&lt;br /&gt;
*&#039;&#039;&#039;Storage overhead&#039;&#039;&#039; (for multi-database (Q)(S)PIR protocols): ratio between the total number of (qu)bits stored on all servers and the number of (qu)bits in the (resp. quantum) classical database. &lt;br /&gt;
*&#039;&#039;&#039;Access complexity&#039;&#039;&#039;: total amount of data to be accessed by the server(s) for answering queries throughout a (Q)(S)PIR protocol.&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&amp;lt;!-- List of different types of example protocol achieving the functionality--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Classical database===&lt;br /&gt;
In the quantum setting, protocols aiming at achieving (S)PIR for a &#039;&#039;classical&#039;&#039; database fall into two main categories:&lt;br /&gt;
====Single-database protocols====&lt;br /&gt;
As in the classical setting, in the case of the database being owned by a &#039;&#039;single&#039;&#039; server, the trivial solution (downloading the whole database) is the only way to achieve information-theoretically secure PIR – even in the case of a specious (may deviate from the protocol if its malicious operations are unknown to the user) server [[#References|[2]]]. &amp;lt;br&amp;gt;&lt;br /&gt;
As for (quantum or classical) SPIR, it is impossible to achieve information-theoretic security with a single-server; this result was proved in the quantum setting by Lo [[#References|[3]]]. Therefore, to design efficient PIR protocols or to achieve SPIR, several assumptions have been considered; they include:&lt;br /&gt;
* Hardness assumptions: PIR protocols with computational security.&lt;br /&gt;
* Assumptions on the adversarial model:&lt;br /&gt;
** to achieve SPIR: cheat-sensitive protocols (also known as quantum private queries (QPQ) protocols) where it is assumed that the server will not cheat if there is a non-zero probability that he will be caught cheating. &lt;br /&gt;
***[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution|QPQ protocols based on quantum oblivious key distribution]]&lt;br /&gt;
***[[Quantum Private Queries Protocol Based on Sending Quantum States to an Oracle|QPQ protocols based on sending quantum states to an oracle]]&lt;br /&gt;
** to achieve efficient PIR: assuming an honest server.&lt;br /&gt;
***[[Single-Database Quantum Private Information Retrieval in the Honest Server Model|QPIR protocols in the honest server model]]&lt;br /&gt;
* Prior shared entanglement between server and user: in the honest server model, efficient PIR protocols exist, however for a specious or malicious server, the trivial solution is optimal for PIR[[#References|[4]]].&lt;br /&gt;
**[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model|QPIR protocols with prior shared entanglement in the honest server model]]&lt;br /&gt;
* Relativistic assumptions: quantum SPIR protocols whose security uses properties from special relativity.&lt;br /&gt;
**[[Relativistic Quantum Oblivious Transfer|Relativistic QOT protocols]]&lt;br /&gt;
&lt;br /&gt;
Nota bene: single-database (Q)SPIR and one-out-of-n (quantum) [[Oblivious Transfer|oblivious transfer]] ((Q)OT) are similar cryptographic tasks.&lt;br /&gt;
&lt;br /&gt;
====Multi-database protocols====&lt;br /&gt;
It is possible to achieve information-theoretic (S)PIR with reduced communication complexity (i.e., compared to this of the trivial solution) by considering several servers instead of one, each holding a copy of the database, and with the help of extra assumptions. Usually, to achieve (S)PIR, it is assumed that the servers cannot communicate with each other during and after the protocol ended (no-communication assumption), and that servers share randomness (in the symmetric case only). Examples of such protocols are:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness|Quantum multi-database SPIR protocols without shared randomness]] (replaced by prior shared entanglement between servers)&lt;br /&gt;
* [[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution|Classical multi-database SPIR protocols with QKD secured classical channels]]&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers|Multi-database quantum (S)PIR protocols for communicating and colluding servers]] – to do without the no-communication assumption&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers|Multi-database quantum (S)PIR protocols for coded servers]]&lt;br /&gt;
&lt;br /&gt;
===Quantum database===&lt;br /&gt;
For the case of a &#039;&#039;quantum&#039;&#039; database, the trivial solution of downloading the whole database is proved to be optimal for one-round QPIR, and for multi-round QPIR in the blind setting (i.e., the servers do not have a classical description of the quantum states of the database) and for the honest server model (and any other attack model)[[#References|[1]]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prior shared entanglement between the user and the server allows for efficient one-server QPIR protocols in the honest server model and in the blind setting. Multi-database QSPIR protocols for a quantum database with pure states, in the visible setting (servers know a classical description of the quantum database elements) exist as shown by Song and Hayashi [[#References|[1]]].&lt;br /&gt;
&lt;br /&gt;
* [[Single-Database Quantum Private Information Retrieval for a Quantum Database|Single-database quantum PIR protocols in the honest server model and in the blind setting for a quantum database]]&lt;br /&gt;
* [[Multi-Database Quantum Symmetric Private Information Retrieval for a Quantum Database|Multi-database quantum SPIR protocols in the visible setting for a quantum database]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Use Case (if available) analyses how practical the protocol is--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Further Information== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/2101.09041.pdf Song and Hayashi (2021)]&lt;br /&gt;
#[https://arxiv.org/pdf/1304.5490.pdf Baumeler and Broadbent (2015)]&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/9611031.pdf Lo (1997)]&lt;br /&gt;
#[https://arxiv.org/pdf/1902.09768.pdf Aharonov et al (2019)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Marine Demarty&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marine</name></author>
	</entry>
</feed>