Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments
Abstract
:1. Introduction
1.1. Motivation
- Given the rapidly increasing computational power, quantum cryptographic protocols have the potential to become a preferred solution for safeguarding the vast amounts of sensitive data generated by IoT devices. To the best of our knowledge, only Shi et al. [16,17] have proposed two relevant schemes suitable for IoT environments. This is clearly insufficient to meet the growing security demands. Thus, there is a clear need to explore further integration of quantum encryption technologies within IoT systems.
- Quantum homomorphic encryption (QHE) [18,19] is an advanced encryption technology that combines the principles of quantum computing with homomorphic encryption. Similar to classical homomorphic encryption, QHE allows computations to be performed directly on encrypted data without the need for decryption. In classical privacy-preserving range queries, homomorphic encryption is a key component. However, there is currently no solution that employs quantum homomorphic encryption to address privacy-preserving range queries.
1.2. Research Contributions
- (1)
- We propose a privacy set similarity comparison protocol based on quantum homomorphic encryption, which allows for the comparison of encrypted data.
- (2)
- Based on the proposed privacy set similarity comparison protocol, we further give a feasible quantum privacy-preserving range query protocol for IoT environments.
- (3)
- The quantum circuits corresponding to the proposed protocol are presented, and their feasibility is validated through simulation.
1.3. Organization
2. Preliminaries
2.1. Basic Quantum Gates
- (1)
- Pauli Gate (X, Y, Z Gate): Pauli gates form a set of fundamental single-qubit gates that correspond to classical bit flips and phase flips.X Gate (bit-flip gate): Similar to the classical NOT gate, it flips to and vice versa.Y Gate: It both performs a bit flip and introduces a phase change. It maps to and to .Z Gate (phase-flip gate): This gate only changes the phase of the qubit. It multiplies the state by , while leaving unchanged.
- (2)
- Hadamard Gate (H Gate): The Hadamard gate is one of the most commonly used single-qubit gates. It maps to , to and vice versa.
- (3)
- CNOT Gate (Controlled-NOT Gate): The CNOT gate is a two-qubit gate where one qubit acts as the control and the other as the target. If the control qubit is , the target qubit undergoes an X gate operation (bit flip); if the control qubit is , the target qubit remains unchanged.
2.2. Quantum Homomorphic Encryption
- Key Generation. QHE.KeyGen: →(). This process takes the unary representation of the security parameter as input and generates the classical keys and , along with a quantum evaluation key as output.
- Encryption. QHE.Encpk: . This process uses the key to transform the message space into the cipherspace .
- Evaluation. QHE.: . Based on the evaluation key , a quantum evaluation circuit is applied to the ciphertext , and then it produces a new quantum ciphertext state .
- Decryption. QHE.Decsk: . Using the private key , the ciphertext is decrypted to recover the plaintext state , where represents the output of the quantum evaluation circuit applied to the original plaintext .
3. Protocol Description
3.1. Quantum Privacy Set Similarity Comparison Protocol Based on QHE
3.2. Quantum Privacy-Preserving Range Query Protocol
4. Correctness Analysis and Simulation
4.1. Correctness of the Proposed Quantum Privacy Set Similarity Comparison Protocol
4.2. Correctness of the Proposed Quantum Privacy-Preserving Range Query Protocol
5. Security Analysis
5.1. Security Analysis for Quantum Privacy Set Similarity Comparison Protocol
5.2. Security Analysis for Quantum Privacy-Preserving Range Query Protocol
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Xing, L. Reliability in Internet of Things: Current status and future perspectives. IEEE Internet Things J. 2020, 7, 6704–6721. [Google Scholar] [CrossRef]
- HaddadPajouh, H.; Dehghantanha, A.; Parizi, R.M.; Aledhari, M.; Karimipour, H. A survey on internet of things security: Requirements, challenges, and solutions. Internet Things 2021, 14, 100129. [Google Scholar] [CrossRef]
- Li, D.S.; Cao, J.; Lu, X.C.; Chan, K.C. Efficient range query processing in peer-to-peer systems. IEEE Trans. Knowl. Data Eng. 2008, 21, 78–91. [Google Scholar] [CrossRef]
- Li, M.; Gao, J.; Zhang, Z.; Conti, M.; Alazab, M. Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets. In Proceedings of the ICC 2024-IEEE International Conference on Communications, Denver, CO, USA, 9–13 June 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1376–1381. [Google Scholar]
- Shi, E.; Bethencourt, J.; Chan, T.H.; Song, D.; Perrig, A. Multi-dimensional range query over encrypted data. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 20–23 May 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 350–364. [Google Scholar]
- Zheng, Y.; Lu, R.; Guan, Y.; Shao, J.; Zhu, H. Efficient and privacy-preserving similarity range query over encrypted time series data. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2501–2516. [Google Scholar] [CrossRef]
- Li, K.C.; Shi, R.H.; Guo, W.P.; Wang, P.B.; Shao, B.S. Dynamic range query privacy-preserving scheme for blockchain-enhanced smart grid based on lattice. IEEE Trans. Dependable Secur. Comput. 2023, 21, 1652–1664. [Google Scholar] [CrossRef]
- Lu, R. A new communication-efficient privacy-preserving range query scheme in fog-enhanced IoT. IEEE Internet Things J. 2018, 6, 2497–2505. [Google Scholar] [CrossRef]
- Sciancalepore, S.; Di Pietro, R. PPRQ: Privacy-preserving MAX/MIN range queries in IoT networks. IEEE Internet Things J. 2020, 8, 5075–5092. [Google Scholar] [CrossRef]
- Zhou, M.; Zheng, Y.; Guan, Y.; Peng, L.; Lu, R. Efficient and privacy-preserving range-max query in fog-based agricultural IoT. Peer-Peer Netw. Appl. 2021, 14, 2156–2170. [Google Scholar] [CrossRef]
- Min, Z.; Yang, G.; Wang, J.; Kim, G.J. A privacy-preserving BGN-type parallel homomorphic encryption algorithm based on LWE. J. Internet Technol. 2019, 20, 2189–2200. [Google Scholar]
- Monz, T.; Nigg, D.; Martinez, E.A.; Brandl, M.F.; Schindler, P.; Rines, R.; Wang, S.X.; Chuang, I.L.; Blatt, R. Realization of a scalable Shor algorithm. Science 2016, 351, 1068–1070. [Google Scholar] [CrossRef]
- Xu, F.; Ma, X.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
- Xu, D.; Yu, K.; Ritcey, J.A. Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0. IEEE Trans. Ind. Inform. 2021, 18, 6368–6378. [Google Scholar] [CrossRef]
- Xu, F.; Curty, M.; Qi, B.; Lo, H.K. Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 2013, 15, 113007. [Google Scholar] [CrossRef]
- Shi, R.H.; Yu, H. Privacy-preserving range query quantum scheme with single photons in edge-based Internet of Things. IEEE Trans. Netw. Serv. Manag. 2023, 20, 4923–4936. [Google Scholar] [CrossRef]
- Shi, R.H.; Fang, X.Q. Quantum scheme for privacy-preserving range max/min query in edge-based internet of things. IEEE Trans. Netw. Serv. Manag. 2024. [Google Scholar] [CrossRef]
- Broadbent, A.; Jeffery, S. Quantum homomorphic encryption for circuits of low T-gate complexity. In Proceedings of the Annual Cryptology Conference, Barbara, CA, USA, 16–20 August 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 609–629. [Google Scholar]
- Tan, S.H.; Kettlewell, J.A.; Ouyang, Y.; Chen, L.; Fitzsimons, J.F. A quantum approach to homomorphic encryption. Sci. Rep. 2016, 6, 33467. [Google Scholar] [CrossRef]
- Zhang, J.W.; Xu, G.; Chen, X.B.; Chang, Y.; Dong, Z.C. Improved multiparty quantum private comparison based on quantum homomorphic encryption. Phys. A Stat. Mech. Its Appl. 2023, 610, 128397. [Google Scholar] [CrossRef]
- Niwattanakul, S.; Singthongchai, J.; Naenudorn, E.; Wanapu, S. Using of Jaccard coefficient for keywords similarity. In Proceedings of the International Multiconference of Engineers and Computer Scientists, Kowloon, Hong Kong, 13–15 March 2013; Volume 1, pp. 380–384. [Google Scholar]
- Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef]
- Sheng, Y.B.; Zhou, L.; Long, G.L. One-step quantum secure direct communication. Sci. Bull. 2022, 67, 367–374. [Google Scholar] [CrossRef]
- Li, X.; Zhang, K.; Zhang, L.; Zhao, X. A new quantum multiparty simultaneous identity authentication protocol with the classical third-party. Entropy 2022, 24, 483. [Google Scholar] [CrossRef]
- Sutradhar, K. A quantum cryptographic protocol for secure vehicular communication. IEEE Trans. Intell. Transp. Syst. 2024, 25, 3513–3522. [Google Scholar] [CrossRef]
- Schiavon, M.; Vallone, G.; Ticozzi, F.; Villoresi, P. Heralded single-photon sources for quantum-key-distribution applications. Phys. Rev. A 2016, 93, 012331. [Google Scholar] [CrossRef]
- Zhou, L.; Xu, B.W.; Zhong, W.; Sheng, Y.B. Device-independent quantum secure direct communication with single-photon sources. Phys. Rev. Appl. 2023, 19, 014036. [Google Scholar] [CrossRef]
- Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [CrossRef] [PubMed]
- Fuguo, D.; Guilu, L. Secure direct communication with a quantum one-time pad. Phys. Rev. A 2004, 69, 052319. [Google Scholar]
Case | Bell State Type | Measurement Basis of Alice | Measurement Basis of Bob | Alice’s Results | Bob’s Results |
---|---|---|---|---|---|
1 | , | Z-basis | Z-basis | ||
2 | , | Z-basis | Z-basis | ||
3 | , | X-basis | X-basis | ||
4 | , | X-basis | X-basis | ||
5 | , | Z-basis | Z-basis | ||
6 | , | Z-basis | Z-basis | ||
7 | , | X-basis | X-basis | ||
8 | , | X-basis | X-basis |
Alice’ State | Bob’s State | Measurement Results | Set Relationships |
---|---|---|---|
, | , | ||
, | , | ||
, | , | ||
, | , |
Protocols | Method | Security Level | Long-Term Security | Query Range | QHE- Based |
---|---|---|---|---|---|
Ref. [8] | CHE | CS | No | Privacy | / |
Ref. [9] | XOR + hash-based authentication | CS | No | Public | / |
Ref. [10] | CHE + PC | CS | No | Public | / |
Ref. [16] | QSP + QSMCX + QPQ | QS | Yes | Privacy | No |
Ref. [17] | Quantum OSID + QPQ | QS | Yes | Privacy | No |
Our protocol | QPSSC + QKD + QSDC | QS | Yes | Privacy | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ye, C.-Q.; Li, J.; Chen, X.-Y. Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments. Sensors 2024, 24, 7405. https://doi.org/10.3390/s24227405
Ye C-Q, Li J, Chen X-Y. Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments. Sensors. 2024; 24(22):7405. https://doi.org/10.3390/s24227405
Chicago/Turabian StyleYe, Chong-Qiang, Jian Li, and Xiao-Yu Chen. 2024. "Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments" Sensors 24, no. 22: 7405. https://doi.org/10.3390/s24227405
APA StyleYe, C. -Q., Li, J., & Chen, X. -Y. (2024). Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments. Sensors, 24(22), 7405. https://doi.org/10.3390/s24227405