[1] Chor B, Goldreich O, Kushilevitz E, et al. Private Information Retrieval [C]//Proceedings of IEEE 36th Annual Symposium on Foundations of Computer Science. Los Alamitos:IEEE,1995: 41-50.
[2] Gertner Y, Ishai Y, Kushilevitz E, et al. Protecting Data Privacy In Private Information Retrieval Schemes [C]//Proceedings of 13th Annual ACM Sytnposium on Theory of Computing. New York:ACM,1998:151-160.
[3] Giovannetti V, Lloyd S, Maccone L. Quantum Private Queries [J]. Physical Review Letter, 2008, 100(23): 230502.
[4] Giovannetti V, Lloyd S, Maccone L.Quantum Private Queries: Security Analysis [J]. IEEE Transactions on Information Theory, 2010, 56(7): 3465-3477.
[5] Olejnik L. Secure Quantum Private Information Retrieval Using Phase-encoded Queries [J]. Physical Review A, 2011, 84(2): 022313-022316.
[6] De Martini F, Giovannetti V, Lloyd S, et al. Experimental Quantum Private Queries with Linear Optics [J]. Physical Review A, 2009, 80(1): 010302-010305.
[7] Jakobi M, Simon C, Gisin N, et al. Practical Private Database Queries Based on a Quantum Key Distribution Protocol [J]. Physical Review A, 2011, 83(2): 2301-2306.
[8] Dixon A R, Yuan Z L, Dynes J F, et al. Continuous Operation of High Bit Rate Quantum Key Distribution[J]. Applied Physics Letters, 2010, 96(16): 1102-1104.
[9] Gao F, Liu B, Wen Q Y. Flexible Quantum Private Queries Based on Quantum Key Distribution [J]. Optics Express, 2012, 20(16): 17411-17420.
[10] Brassard G. Quantum Communication Complexity [J]. Foundations of Physics, 2003, 33(11): 1593-1616. |