Quantum Oblivious Transfer: A Short Review

被引:8
作者
Santos, Manuel B. [1 ,2 ]
Mateus, Paulo [1 ,2 ]
Pinto, Armando N. [3 ,4 ]
机构
[1] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[2] Univ Lisbon, Inst Super Tecn, Dept Matemat, P-1049001 Lisbon, Portugal
[3] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[4] Univ Aveiro, Dept Eletron Telecomunicacoes & Informat, P-3810193 Aveiro, Portugal
基金
欧盟地平线“2020”;
关键词
quantum cryptography; oblivious transfer; secure multiparty computation; private database query; PRIVATE INFORMATION-RETRIEVAL; BIT COMMITMENT; KEY DISTRIBUTION; CRYPTOGRAPHY; PROTOCOL; SECURITY; QUERY; USER; QKD;
D O I
10.3390/e24070945
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations. Although much of the work in this field covers quantum key distribution (QKD), there have been some crucial steps towards the understanding and development of quantum oblivious transfer (QOT). One can show the similarity between the application structure of both QKD and QOT primitives. Just as QKD protocols allow quantum-safe communication, QOT protocols allow quantum-safe computation. However, the conditions under which QOT is fully quantum-safe have been subject to intense scrutiny and study. In this review article, we survey the work developed around the concept of oblivious transfer within theoretical quantum cryptography. We focus on some proposed protocols and their security requirements. We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
引用
收藏
页数:35
相关论文
共 174 条
  • [1] Aaronson S., 2002, P 34 ANN ACM S THEOR, P635, DOI 10.1145/509907.509999
  • [2] From Bell's theorem to secure quantum key distribution
    Acin, Antonio
    Gisin, Nicolas
    Masanes, Lluis
    [J]. PHYSICAL REVIEW LETTERS, 2006, 97 (12)
  • [3] Imperfect 1-Out-of-2 Quantum Oblivious Transfer: Bounds, a Protocol, and its Experimental Implementation
    Amiri, Ryan
    Starek, Robert
    Reichmuth, David
    Puthoor, Ittoop, V
    Micuda, Michal
    Mista, Ladislav, Jr.
    Dusek, Miloslav
    Wallden, Petros
    Andersson, Erika
    [J]. PRX QUANTUM, 2021, 2 (01):
  • [4] [Anonymous], 2007, THESIS MCGILL U MONT
  • [5] More Efficient Oblivious Transfer Extensions
    Asharov, Gilad
    Lindell, Yehuda
    Schneider, Thomas
    Zohner, Michael
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (03) : 805 - 858
  • [6] One-Way Functions Imply Secure Computation in a Quantum World
    Bartusek, James
    Coladangelo, Andrea
    Khurana, Dakshita
    Ma, Fermi
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 467 - 496
  • [7] Beaver D, 1995, LECT NOTES COMPUT SC, V963, P97
  • [8] Ben-Or M., 2004, ARXIV
  • [9] Bennett C. H., 1983, Advances in Cryptology, Proceedings of Crypto 82, P267
  • [10] BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351