Non-interactive XOR quantum oblivious transfer: optimal protocols and
their experimental implementations
- URL: http://arxiv.org/abs/2209.11300v2
- Date: Thu, 11 May 2023 18:00:34 GMT
- Title: Non-interactive XOR quantum oblivious transfer: optimal protocols and
their experimental implementations
- Authors: Lara Stroh, Nikola Horov\'a, Robert St\'arek, Ittoop V. Puthoor,
Michal Mi\v{c}uda, Miloslav Du\v{s}ek, and Erika Andersson
- Abstract summary: Oblivious transfer (OT) is an important cryptographic primitive.
We present an optimal protocol, which outperforms classical protocols.
We optically implement both the unreversed and the reversed protocols, and cheating strategies, noting that the reversed protocol is easier to implement.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Oblivious transfer (OT) is an important cryptographic primitive. Any
multi-party computation can be realised with OT as building block. XOR
oblivious transfer (XOT) is a variant where the sender Alice has two bits, and
a receiver Bob obtains either the first bit, the second bit, or their XOR. Bob
should not learn anything more than this, and Alice should not learn what Bob
has learnt. Perfect quantum OT with information-theoretic security is known to
be impossible. We determine the smallest possible cheating probabilities for
unrestricted dishonest parties in non-interactive quantum XOT protocols using
symmetric pure states, and present an optimal protocol, which outperforms
classical protocols. We also "reverse" this protocol, so that Bob becomes
sender of a quantum state and Alice the receiver who measures it, while still
implementing oblivious transfer from Alice to Bob. Cheating probabilities for
both parties stay the same as for the unreversed protocol. We optically
implemented both the unreversed and the reversed protocols, and cheating
strategies, noting that the reversed protocol is easier to implement.
Related papers
- Incomplete quantum oblivious transfer with perfect one-sided security [0.0]
We consider 1 out of 2 oblivious transfer, where a sender sends two bits of information to a receiver.
We aim to find the lowest possible cheating probabilities.
We show that non-interactive quantum protocols can outperform non-interactive classical protocols.
arXiv Detail & Related papers (2024-09-26T06:35:36Z) - Quantum Rabin oblivious transfer using two pure states [0.0]
In oblivious transfer, the sender Alice holds a bit, and the receiver Bob either obtains the bit, or obtains no information with probability $p_?$.
We examine a quantum Rabin oblivious transfer protocol that uses two pure states. Investigating different cheating scenarios for the sender and for the receiver, we determine optimal cheating probabilities in each case.
arXiv Detail & Related papers (2024-05-07T16:54:16Z) - Quantum advantage in a unified scenario and secure detection of
resources [55.2480439325792]
We consider a single task to study different approaches of having quantum advantage.
We show that the optimal success probability in the overall process for a qubit communication might be higher than that for a cbit communication.
arXiv Detail & Related papers (2023-09-22T23:06:20Z) - Identifying the value of a random variable unambiguously: Quantum versus classical approaches [44.99833362998488]
Quantum resources may provide advantage over their classical counterparts.
We construct such a task based on a game, mediated by Referee and played between Alice and Bob.
We show that if Alice sends limited amount of classical information then the game cannot be won while the quantum analogue of the limited amount of classical information' is sufficient for winning the game.
arXiv Detail & Related papers (2022-11-16T20:28:49Z) - Quantum cryptography with classical communication: parallel remote state
preparation for copy-protection, verification, and more [125.99533416395765]
Many cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob.
We show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem.
This means that all communication between (classical) Alice and (quantum) Bob is classical, yet they can still make use of cryptographic primitives that would be impossible if both parties were classical.
arXiv Detail & Related papers (2022-01-31T18:56:31Z) - Dense Coding with Locality Restriction for Decoder: Quantum Encoders vs.
Super-Quantum Encoders [67.12391801199688]
We investigate dense coding by imposing various locality restrictions to our decoder.
In this task, the sender Alice and the receiver Bob share an entangled state.
arXiv Detail & Related papers (2021-09-26T07:29:54Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Imperfect 1-out-of-2 quantum oblivious transfer: bounds, a protocol, and
its experimental implementation [0.0]
We introduce a theoretical framework for studying semirandom quantum oblivious transfer.
We then use it to derive bounds on cheating.
We show that a lower bound of 2/3 on the minimum achievable cheating probability can be directly derived for semirandom protocols.
arXiv Detail & Related papers (2020-07-09T11:17:27Z) - Gaussian conversion protocols for cubic phase state generation [104.23865519192793]
Universal quantum computing with continuous variables requires non-Gaussian resources.
The cubic phase state is a non-Gaussian state whose experimental implementation has so far remained elusive.
We introduce two protocols that allow for the conversion of a non-Gaussian state to a cubic phase state.
arXiv Detail & Related papers (2020-07-07T09:19:49Z) - A device-independent protocol for XOR oblivious transfer [0.0]
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn some function of them.
In this work we give a fully device-independent quantum protocol for XOR oblivious transfer.
arXiv Detail & Related papers (2020-06-11T17:59:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.