Abstract
Quantum key distribution provides a provably secure way for private key distribution, which enables the practical implementation of information retrieval that preserves both the user privacy and database security.
Based on the fast-growing communication and networking techniques, retrieving information from a database is now a ubiquitous service that has a broad application prospect. For example, using a search engine to find out nearby restaurants, watching a movie on a streaming platform, etc. However, this task becomes non-trivial when there are privacy concerns, i.e., the user does not want to reveal his/her selection to either the data center or a third party, at the same time the data center does not want to reveal more information about the database other than the requested entry.
In 2000, Gertner and his colleagues proposed symmetric private information retrieval (SPIR) protocol that provides security guarantees to both the user and the database1. However, its practical implementation turns out to be experimentally demanding, requiring private random strings shared among parties. This is technically cumbersome with classical key distribution schemes based on computational complexity, and may not be suitable for applications requiring long-term security.
Quantum key distribution (QKD), whose security is based on the laws of quantum mechanics, is able to provide secret key distribution among distant parties with information-theoretic security. Since the first QKD protocol proposed by Bennet and Brassard in 1984, the field of QKD has developed extensively in both theory and experiment. With commercially available components and well-developed implementation techniques, QKD is now the most mature subfield of quantum cryptography2,3. Commercial QKD systems are also currently available on the market from several companies. Compared to its classical counterpart, the security of keys from QKD is independent of future advances in either hardware or algorithm, which is preferable for information retrieving tasks with data requiring long-term security.
Now, writing in this issue of Light: Science & Applications, Chao Wang and colleagues at the National University of Singapore report for the first time an experimental realization of SPIR supported by a measurement-device-independent (MDI) QKD network4. The SPIR demonstration looks at biometric security, and successfully retrieved a 582-byte fingerprint file from a database with 800 entries.
In the work presented here, the authors adopted a two-layered scheme for the system implementation, the SPIR application layer, and the MDI QKD layer (Fig. 1). The design of these two layers is based on the considerations of practicability and implementation security of the whole system. For the application layer, the authors adopted a two-database SPIR protocol5, since information-theoretically secure SPIR with a single data center is proven to be impossible1. For the QKD layer, they deployed MDI QKD6,7 with decoy states8,9. It has two main advantages. First, in MDI QKD, each party holds a quantum transmitter and communicates with each other via a central quantum receiver, which is operated by an untrusted third party. Thus, MDI QKD provides an appealing feature of immunity against any potential side-channel attacks on the quantum receiver, which is typically regarded as the most vulnerable part in practical QKD implementation. As such, each party only needs to secure their own transmitter and need not worry about the implementation of the quantum receiver. Second, MDI QKD holds a natural star topology, making it suitable for network expansion.
With the presented work, Chao Wang and co-authors set up a fiber-based MDI QKD system with a working frequency of 125 MHz. The quantum transmitter held by the user and data centers prepares time-bin phase encoding quantum states, where the information is coded on the intensities and the relative phase of the two successive temporal modes. Then, the quantum states are sent to the quantum receiver for measurement via an untrusted optical fiber channel with a length of 25 km. By carefully matching all the degree of freedoms of the incoming photonic quantum states, the authors obtained a Hong–Ou–Mandel interference visibility of 0.48 (±0.015), showing an efficient Bell-state measurement for the MDI QKD. They also measured the averaged bit error rate in the key generation basis to be 0.83%. After obtaining raw key bits, the authors performed classical post-processing, including error correction and privacy amplification, to obtain the final secure keys of 6.5 × 105 bits. Finally, with the final keys, SPIR over a fingerprint database is successfully demonstrated.
The successful realization of SPIR supported by MDI QKD demonstrates the feasibility of the proposed scheme, providing a promising approach for the practical implementation of SPIR with information-theoretic security. With the recent advances of QKD in terms of high-speed10,11, long-distance12,13,14,15, and network optimization16,17,18, we can expect that the performance of the proposed scheme can be further promoted, pushing its practicability to a higher level. This will open the door to many applications where long-term security is critical, such as medical record retrieval, biometric authentication, and pay-per-use online contents, that would remain secure against even quantum computing based attacks.
References
Gertner, Y. et al. Protecting data privacy in private information retrieval schemes. J. Computer Syst. Sci. 60, 592–629 (2000).
Pirandola, S. et al. Advances in quantum cryptography. Adv. Opt. Photonics 12, 1012–1236 (2020).
Xu, F. H. et al. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020).
Wang, C. et al. Experimental symmetric private information retrieval with measurement-device-independent quantum network. Light Sci. Appl. 11, 268 (2022).
Kon, W. Y. & Lim, C. C. W. Provably secure symmetric private information retrieval with quantum cryptography. Entropy 23, 54 (2021).
Braunstein, S. L. & Pirandola, S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012).
Lo, H. K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
Wang, X. B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).
Lo, H. K., Ma, X. F. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
Wang, S. et al. Practical gigahertz quantum key distribution robust against channel disturbance. Opt. Lett. 43, 2030–2033 (2018).
Wei, K. J. et al. High-speed measurement-device-independent quantum key distribution with integrated silicon photonics. Phys. Rev. X 10, 031030 (2020).
Lucamarini, M. et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 557, 400–403 (2018).
Wang, S. et al. Beating the Fundamental rate-distance limit in a proof-of-principle quantum key distribution system. Phys. Rev. X 9, 021046 (2019).
Pittaluga, M. et al. 600-km repeater-like quantum communications with dual-band stabilization. Nat. Photonics 15, 530–535 (2021).
Wang, S. et al. Twin-field quantum key distribution over 830-km fibre. Nat. Photonics 16, 154–161 (2022).
Fan-Yuan, G. J. et al. Measurement-device-independent quantum key distribution for nonstandalone networks. Photonics Res. 9, 1881–1891 (2021).
Park, C. H. et al. 2×N twin-field quantum key distribution network configuration based on polarization, wavelength, and time division multiplexing. npj Quantum Inf. 8, 48 (2022).
Fan-Yuan, G. J. et al. Robust and adaptable quantum key distribution network without trusted nodes. Optica 9, 812–823 (2022).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Wang, S. Symmetric private information retrieval supported by quantum-secure key-exchange network. Light Sci Appl 11, 301 (2022). https://doi.org/10.1038/s41377-022-00996-1
Published:
DOI: https://doi.org/10.1038/s41377-022-00996-1