LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Cryptanalysis of Multi-User Quantum Private Query Protocol

Photo by anniespratt from unsplash

Recently, Tian et al. proposed a multi-user quantum private query protocol. The protocol realizes the function of n users querying the database at the same time, which can well protect… Click to show full abstract

Recently, Tian et al. proposed a multi-user quantum private query protocol. The protocol realizes the function of n users querying the database at the same time, which can well protect the privacy of users and databases, and has high efficiency of implementation. Unfortunately, it has security vulnerability in the process of sending quantum sequences. Based on this vulnerability, we propose a man-in-the-middle attack on multi-user quantum private query protocol. Firstly, this paper reviews the multi-user quantum private query protocol. Secondly, the implementation steps of multi-user private query protocol are reviewed concisely. Finally, we pointed that in the protocol, Eve, the eavesdropper, can pretend to be Bob and the identity of the user to obtain the key of query data and steal the database information without being discovered. Through analysis, we find that man in the middle attack is feasible.

Keywords: private query; protocol; multi user; query protocol; user quantum; query

Journal Title: International Journal of Theoretical Physics
Year Published: 2021

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.