June 27, 2008 feature
New Quantum Strategy Keeps Web Searches Private
When an Internet user types a word or phrase into a search engine, the Web server has the ability to find out that inquiry. As more people and businesses are becoming concerned about privacy, researchers are developing new ways to make online activity more secure for both users and servers.
Recently, physicists have created a cheat-sensitive protocol called quantum private queries (QPQ). The quantum-based system allows a user to search for and retrieve an item from a database without revealing that item to the server. If the server tries to find out the item, the user can tell, and modify their use accordingly.
The server is also protected because the user can only retrieve a limited amount of information in a single query, so the server doesn鈥檛 have to reveal its entire database. Compared with other strategies, the QPQ can provide a much simpler private information retrieval tool in terms of both communication and computation.
The QPQ developers, Vittorio Giovannetti from Scuola Normale Superiore in Pisa, Italy; Seth Lloyd from MIT in the US; and Lorenzo Maccone from Universita Pavia in Pavia, Italy, have published the details of the protocol in a recent issue of 麻豆淫院ical Review Letters.
鈥淚n simple terms, you may say that the main advantage of the protocol is that it allows us to perform a task that, as far as we know, would not be possible to achieve by classical means: that is, it guarantees both user and data privacy without requiring any costly communication and computational overheads,鈥 Giovannetti told 麻豆淫院Org.com. 鈥淔urthermore, QPQ does not require (at least in its basic implementation) Alice [the user] to use complex encoding of her queries (e.g. to send half of an entangled state to Bob [the server]) nor Bob to perform 鈥榯oo complex鈥 quantum data processing.
鈥淭he prototypical example is, of course, Internet Web search (say Alice wants to know the Internet addresses of the stores that sell cookies in her town, but she doesn't like Google guys to determine what she is really interested in). Other examples could be related to remote bank account checking.鈥
As the physicists explain, the QPQ strategy is designed to protect the user鈥檚 privacy and the server鈥檚 information. Normally, these two goals are in conflict, since complete privacy for one side means vulnerability for the other. But QPQ takes advantage of elements of quantum theory to provide a compromise.
In the QPQ strategy, the user Alice performs a search query, and receives a limited number of answers from the server Bob. If Alice suspects that Bob is trying to figure out her queries, she can perform a search query that is a quantum superposition of different queries. Her answer from Bob will reveal whether the superposition has been altered or not, and she will know if he has been trying to read her queries.
In order for the strategy to work, Alice must send her queries in random order, one at a time. This way, Bob doesn鈥檛 know if a query is a normal query or a superposition query intended to detect his attempts at cheating. Sending queries one at a time prevents Bob from making joint measurements, which might go unnoticed.
Although Bob may be lucky and successfully determine one of Alice鈥檚 queries by choosing to intercept the normal query instead of the superposition of queries, chances are that he will get caught sooner or later. In fact, the physicists showed that, no matter what sophisticated methods Bob might use to try to intercept Alice鈥檚 queries, she will likely discover his attempts.
The researchers explain that the QPQ strategy is similar to quantum cryptography, in that both methods provide privacy by enabling the user to perform actions to determine possible interception attempts. Then, the user can take measures to guarantee their privacy in the face of these attempts. Overall, the QPQ protocol provides the same degree of privacy as quantum key distribution, with greatly reduced complexity.
鈥淭here are several possibilities [that Alice might use to maintain her privacy when using a dishonest server],鈥 Giovannetti explained. 鈥淵ou can imagine, for instance, a scenario in which there are several providers (say Google, Altavista, etc.) which allow QPQ service at a certain cost per quantum message.
鈥淣ow suppose that the customers of a given provider are keeping it under control by posting its honesty rate on a public website: in order to stay on the market, a provider with a low honesty rate will be forced to lower the cost of its QPQ service, i.e. it will allow for more QPQ messages per query. This will allow the customers of the dishonest provider to maintain a sufficiently high privacy by protecting their queries by sending more complex quantum superpositions at the same price they query more honest providers.鈥
More information: Giovannetti, Vittorio; Lloyd, Seth; and Maccone, Lorenzo. 鈥淨uantum Private Queries.鈥 麻豆淫院ical Review Letters 100, 230502 (2008).
Copyright 2008 麻豆淫院Org.com.
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of 麻豆淫院Org.com.