Quantum Private Information Retrieval has Linear Communication Complexity

@article{Baumeler2014QuantumPI,
  title={Quantum Private Information Retrieval has Linear Communication Complexity},
  author={{\"A}min Baumeler and Anne Broadbent},
  journal={Journal of Cryptology},
  year={2014},
  volume={28},
  pages={161-175}
}
In private information retrieval (PIR), a client queries an $$n$$n-bit database in order to retrieve an entry of her choice, while maintaining privacy of her query value. Chor et al. [J ACM 45(6):965–981, 1998] showed that, in the information-theoretical setting, a linear amount of communication is required for classical PIR protocols (thus the trivial protocol is optimal). This linear lower bound was shown by Nayak [FOCS 1999, pp. 369–376, 1999] to hold also in the quantum setting. Here, we… 
Privacy in Quantum Communication Complexity
TLDR
It is argued that the right notion of privacy of a communication protocol is the one assuming classical input registers, since otherwise the players can deviate considerably from the protocol.
Quantum Private Information Retrieval
TLDR
The goal is to minimise the amount of communication which takes place between the user and the database and allowing quantum bits as communication yields better Private Information Retrieval Schemes.
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers
TLDR
The (n-1)-private QPIR capacity is strictly greater than the classical counterpart and it is proved that the capacity is upper bounded by $2/n$.
Comment on "secure quantum private information retrieval using phase-encoded queries"
TLDR
The security of phase-encoded quantum private query (QPQ) is found to be vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database, and how to overcome this security loophole is discussed.
On Quantum Advantage in Information Theoretic Single-Server PIR
TLDR
In (single-server) Private Information Retrieval (PIR), a server holds a large database of size n, and a client holds an index \(i \in [n]\) and wishes to retrieve i without revealing i to the server.
Quantum Private Information Retrieval for Quantum Messages
TLDR
In the visible setting, it is proved that it is possible to construct symmetric QPIR protocols in which the user obtains no information of the non-targeted messages, and three two-server symmetric PIR protocols for pure states are constructed.
Capacity of QuantumPrivate InformationRetrieval with Colluding Servers
TLDR
The paper proved that the symmetric and non-symmetric QPIR capacities are 1.
Information cost of quantum communication protocols
TLDR
This work studies two different notions of quantum information cost and analyzes their relation, and provides new quantum protocols for the Inner Product function and for Private Information Retrieval, and shows that protocols for private information retrieval can have exponentially different information cost for the server.
Quantum Homomorphic Encryption for Polynomial-Sized Circuits
TLDR
A new scheme for quantum homomorphic encryption which is compact and allows for efficient evaluation of arbitrary polynomial-sized quantum circuits, and a three-round scheme for blind delegated quantum computation which puts only very limited demands on the quantum abilities of the client.
...
1
2
3
...

References

SHOWING 1-10 OF 25 REFERENCES
Quantum private queries.
TLDR
A cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity and in running-time computational complexity is proposed.
Practical private database queries based on a quantum-key-distribution protocol
TLDR
This work proposes to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key, which makes the scheme both easy to implement and loss tolerant.
Optimal Bounds for Quantum Bit Commitment
TLDR
This paper presents an optimal quantum bit commitment protocol which has cheating probability arbitrarily close to 0.739, improving Kitaev's lower bound and presents some generic cheating strategies for Alice and Bob and concludes by proving a new relation between the trace distance and fidelity of two quantum states.
Is Quantum Bit Commitment Really Possible?
TLDR
At the heart of such optimism has been the widespread belief that unconditionally secure quantum bit commitment (QBC) schemes exist, which is put into very serious doubt by showing.
Quantum symmetrically-private information retrieval
Quantum Private Information Retrieval with Sublinear Communication Complexity
  • F. Gall
  • Computer Science
    Theory Comput.
  • 2012
This note presents a quantum protocol for private information retrieval, in the single-server case and with information-theoretical privacy, that has O(\sqrt{n})-qubit communication complexity, where
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of
Quantum cryptography: Public key distribution and coin tossing
Exponential lower bound for 2-query locally decodable codes via a quantum argument
TLDR
This work proves that LDCs with 2 classical queries need exponential length, and shows that a 2-query LDC can be decoded with only 1 quantum query, and proves an exponential lower bound for such 1-query locally quantum-decodable codes.
Unconditionally secure quantum bit commitment is impossible
TLDR
It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.
...
1
2
3
...