Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness


This example protocol by Kerenidis and de Wolf (2003) performs the task of symmetric private information retrieval (SPIR) and has information-theoretic security. It is a multi-database scheme that works on top of a classical multi-database PIR scheme by Beimel et al (2002). The main feature of this protocol is that is does not require any shared randomness between servers which is the main assumptions of most SPIR protocols; however, this is achieved in the honest user model only. Moreover, it satisfies the correctness, user privacy and data privacy conditions, hence, it is a perfectly secure SPIR scheme.

Tags: Quantum Enhanced Classical Functionality, Specific Task, Multi Party Protocol, Symmetric Private Information Retrieval, Information-Theoretic Security, Multi-Database, One-Round Protocol, Entanglement.



AssumptionsEdit

  • Honest user
  • No communication assumption (between servers)


OutlineEdit

A user wants to privately retrieve an element from a classical database that has been replicated and distributed among   servers. Servers do not want the user to get any information on the database beyond the desired database item.

  • Query: First, the user hides the index of the desired database element in several classical queries (one per server) and using some randomness. Then, the user prepares one quantum register (‘query register’) per server that depends on the classical query, on some new randomness (one per server) and on some function of the index of the desired database element and the randomness of the classical queries (which will be useful in the retrieval phase). Those quantum registers are entangled with another qubit kept by the user, and then sent to the user.
  • Answer: Each server applies some unitary map on the received query register and sends the resulting register (‘answer register’) back to the client. The classical answer of a given server is encoded in the corresponding answer register.
  • Retrieval: From all the received answer registers, the user can retrieve the desired database element: the user disentangles the answer registers from his qubit, then applies a Hadamard transform to his qubit and measures it in the computational basis. The outcome of the measurement is the desired database element.


NotationEdit

  •  : number of servers involved in the protocol.
  •  : number of database elements.
  •  : database; this is an   bit string.
  •  : index of the desired database element,  .
  •  : random string.
  •  : length of a query bit string (sent by the user to one of the   servers).
  •  : length of an answer bit string (sent by one of the   servers to the user).
  •  : classical answer of the   server in Beimel et al classical PIR scheme.
  •  : combined with the  ’s, the  ’s (which are known only to the user) allow the user to reconstruct the desired database element at the end of Beimel et al protocol.



RequirementsEdit

User:

  • Has a random number generator.
  • Can prepare, measure, and apply quantum gates to quantum registers.

Servers:

  • Can apply gates to quantum registers.

Communication:

  • A quantum channel.


PropertiesEdit

SecurityEdit

Precise security definitions for correctness, user privacy and data privacy that are used in this protocol are the following:

  • Correctness (or Recovery): For all choices of database   and index  , the probability that the output (bit) of the protocol on the user's side is the desired database element equals  .
  • User privacy: the density matrix of each server is independent of the index   of the desired database item throughout the protocol.
  • Data privacy: the concatenation of the density matrices of the user is independent of other database items than the desired one ( ) throughout the protocol.

This protocol ensures perfect user and data privacy and satisfies the correctness condition. Hence, it is secure.

Communication ComplexityEdit

This protocol uses   qubits of communication.


Protocol DescriptionEdit

Inputs:

  • User: index of the desired database element  .
  • Each of the   servers: database   (an   bit string).

Output:

  • User: desired database element   (a single bit of  ).

Protocol:

This protocol works on top of Beimel et al classical PIR scheme, which involves the following steps:

  • Query: The user generates a random string   and   queries  . The user sends each query to the corresponding server.
  • Answer: Each server answers the user: the   server answers with classical answer  .
  • Retrieval: The user outputs the desired database element   where  , and all operations are modulo 2.

Kerenidis and de Wolf quantum SPIR scheme works as follows:

  • Query:
    • The user generates a random string  ,   queries   and   random strings  .
    • The user prepares a  -register state:   where   and   is the part known only to the user that, together with the answers of the server, allows the user to reconstruct the desired database element at the end of Beimel et al PIR protocol:  .
    • The user keeps the first  -qubit register and sends the other   registers to the corresponding server.
  • Answer:
    • Each server applies a unitary map to the received quantum register:   where   is the classical answer of the   server to the user in Beimel et al PIR protocol. The transformed quantum register is then sent back to the user.
  • Retrieval:
    • The complete state owned by the user is now of the form:         Hence, up to a global phase  , this state is:  .
    • To retrieve the desired database element  , the user then maps the   quantum registers to the ground state – this way, entanglement is destroyed, and the first qubit is in state  .
    • Lastly, the user applies a Hadamard transform to the first qubit, which is now in state  . Measuring in the computational basis   has classical outcome the desired bit  .


Further InformationEdit

  • This quantum protocol can be based on other classical PIR schemes with the same structure as this of Beimel et al. The authors chose this specific PIR protocol as this was the best available information theoretically secure PIR scheme in terms of communication complexity at the time of publication.


*contributed by Marine Demarty