Oblivious transfer using quantum entanglement

被引:15
作者
He, GP
Wang, ZD
机构
[1] Univ Hong Kong, Dept Phys, Hong Kong, Hong Kong, Peoples R China
[2] Zhongshan Univ, Dept Phys, Guangzhou 510275, Peoples R China
[3] Zhongshan Univ, Adv Res Ctr, Guangzhou 510275, Peoples R China
[4] Univ Hong Kong, Ctr Theoret & Computat Phys, Hong Kong, Hong Kong, Peoples R China
[5] Nanjing Univ, Natl Lab Solid State Microstruct, Nanjing 210093, Peoples R China
来源
PHYSICAL REVIEW A | 2006年 / 73卷 / 01期
关键词
D O I
10.1103/PhysRevA.73.012331
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Based on quantum entanglement, an all-or-nothing oblivious transfer (OT) protocol is proposed and is proven to be secure. The distinct merit of the present protocol lies in that it is not based on quantum bit commitment. More intriguingly, this OT protocol does not belong to a class of protocols denied by Lo's no-go theorem of one-sided two-party secure computation, and thus its security can be achieved.Based on quantum entanglement, an all-or-nothing oblivious transfer (OT) protocol is proposed and is proven to be secure. The distinct merit of the present protocol lies in that it is not based on quantum bit commitment. More intriguingly, this OT protocol does not belong to a class of protocols denied by Lo's no-go theorem of one-sided two-party secure computation, and thus its security can be achieved.
引用
收藏
页数:9
相关论文
共 36 条
[1]  
Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[2]  
BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]  
Brassard G., 1993, Proceedings. 34th Annual Symposium on Foundations of Computer Science (Cat. No.93CH3368-8), P362, DOI 10.1109/SFCS.1993.366851
[5]  
Brassard G., QUANTPH9712023
[6]  
Chau HF, 1998, FORTSCHR PHYS, V46, P507, DOI 10.1002/(SICI)1521-3978(199806)46:4/5<507::AID-PROP507>3.0.CO
[7]  
2-4
[8]   Characterizing quantum theory in terms of information-theoretic constraints [J].
Clifton, R ;
Bub, J ;
Halvorson, H .
FOUNDATIONS OF PHYSICS, 2003, 33 (11) :1561-1591
[9]  
Crepeau C., 1995, Advances in Cryptology - EUROCRYPT '95. International Conference on the Theory and Application of Cryptographic Techniques. Proceedings, P133
[10]  
Crepeau C, 1995, LECT NOTES COMPUT SC, V963, P110