Secure quantum weak oblivious transfer against individual measurements

被引:0
作者
Guang Ping He
机构
[1] Sun Yat-sen University,School of Physics and Engineering
来源
Quantum Information Processing | 2015年 / 14卷
关键词
Quantum cryptography; Communication security; Quantum communication; Quantum oblivious transfer;
D O I
暂无
中图分类号
学科分类号
摘要
In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by 2PAlice∗+PBob∗≥2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2P_{\mathrm{Alice}}^{*}+P_{\mathrm{Bob}}^{*}\ge 2$$\end{document}, where PAlice∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ P_{\mathrm{Alice}}^{*}$$\end{document} is the probability with which Alice can guess Bob’s choice, and PBob∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{\mathrm{Bob}}^{*}$$\end{document} is the probability with which Bob can guess both of Alice’s bits given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both PAlice∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{\mathrm{Alice}}^{*}$$\end{document} and PBob∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{\mathrm{Bob}}^{*}$$\end{document} can be made arbitrarily close to 1/2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1/2$$\end{document}, so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.
引用
收藏
页码:2153 / 2170
页数:17
相关论文
共 50 条
  • [31] Randomized quantum oblivious transfer with application in hacker-resistant computation
    Cheng, Xiaogang
    Guo, Ren
    Chen, Yonghong
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2018, 16 (04)
  • [32] Quantum information transfer using weak measurements and any non-product resource state
    Varad R. Pande
    Som Kanjilal
    Quantum Information Processing, 2022, 21
  • [33] Quantum information transfer using weak measurements and any non-product resource state
    Pande, Varad R.
    Kanjilal, Som
    QUANTUM INFORMATION PROCESSING, 2022, 21 (03)
  • [34] Post-Quantum based Oblivious Transfer for Authentication in Heterogeneous Internet of Everything
    Balaji, Ashwin
    Dhurandher, Sanjay Kumar
    Gupta, Karan
    Woungang, Isaac
    2023 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS, 2023, : 194 - 199
  • [35] Security of quantum cryptography against individual attacks
    Slutsky, BA
    Rao, R
    Sun, PC
    Fainman, Y
    MULITMEDIA NETWORKS: SECURITY, DISPLAYS, TERMINALS, AND GATEWAYS, 1998, 3228 : 310 - 321
  • [36] Fault tolerant quantum secure direct communication with quantum encryption against collective noise
    黄伟
    温巧燕
    贾恒越
    秦素娟
    高飞
    ChinesePhysicsB, 2012, 21 (10) : 105 - 113
  • [37] Fault tolerant quantum secure direct communication with quantum encryption against collective noise
    Huang Wei
    Wen Qiao-Yan
    Jia Heng-Yue
    Qin Su-Juan
    Gao Fei
    CHINESE PHYSICS B, 2012, 21 (10)
  • [38] Device-independent oblivious transfer from the bounded-quantum-storage-model and computational assumptions
    Broadbent, Anne
    Yuen, Peter
    NEW JOURNAL OF PHYSICS, 2023, 25 (05):
  • [39] Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
    Yang, Chun-Wei
    QUANTUM INFORMATION PROCESSING, 2020, 19 (02)
  • [40] Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
    Chun-Wei Yang
    Quantum Information Processing, 2020, 19