| Recently,the technologies related to quantum computing develop rapidly.Quantum cryptographic protocols that can resist powerful computing capabilities have draw lots of attention.Quantum hash function is a hash function which is implemented by using quantum mechanical properties.Compared to a classical hash function,its security is based on the infinite possibilities of initial state and irreversibility of measuring modulus operator.Therefore,security can still be guaranteed under the powerful computing power of quantum computing.Quantum privacy query protocol is a quantum solution to SPIR problems.SPIR refers to symmetrically private information retrieval.Most classical SPIR schemes are based on computational complexity and mathematical difficulties.With the rapid development of quantum computing,their security will face more and more severe challenges.Unlike the traditional SPIR scheme,the quantum privacy query protocol is based on the principle of quantum mechanics and can guarantee unconditional security theoretically.It can be foreseen that with the development of quantum-related technologies,quantum secret query protocols are likely to be applied in commercial and military fields.Therefore,we examined the quantum secret query protocol which based on quantum key distribution and had certain achievements.This paper proposed several kinds of quantum security query protocols and carried out related analysis as follows.1)We proposed a quantum hash function that based on the upstream of a single quantum ring.We simulated the function and the results showed that the function had excellent statistical performance.2)We proposed a novel quantum private query protocol based on QKD.In the protocol,user Alice prepares the initial light quantum.According to the statement of the database Bob on the measurement method,the key position is inferred by comparing the original quantum state with the measurement state of the quantum which Bob return.In this way,the protocol will have better security.We analyzed the security of the protocol from the perspectives of the user Alice and the database Bob respectively,and proved that the protocol is secure and can resist internal attacks.Compared with previous protocol,it can be proved that the protocol has better security.3)To improve the above protocol,we proposed an anti-noise QPQ scheme.The scheme is based on the decoherence-free states technology,which solves some of the noise problems. |