Secure quantum weak oblivious transfer against individual measurements

被引:0
作者
Guang Ping He
机构
[1] Sun Yat-sen University,School of Physics and Engineering
来源
Quantum Information Processing | 2015年 / 14卷
关键词
Quantum cryptography; Communication security; Quantum communication; Quantum oblivious transfer;
D O I
暂无
中图分类号
学科分类号
摘要
In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by 2PAlice∗+PBob∗≥2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2P_{\mathrm{Alice}}^{*}+P_{\mathrm{Bob}}^{*}\ge 2$$\end{document}, where PAlice∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ P_{\mathrm{Alice}}^{*}$$\end{document} is the probability with which Alice can guess Bob’s choice, and PBob∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{\mathrm{Bob}}^{*}$$\end{document} is the probability with which Bob can guess both of Alice’s bits given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both PAlice∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{\mathrm{Alice}}^{*}$$\end{document} and PBob∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{\mathrm{Bob}}^{*}$$\end{document} can be made arbitrarily close to 1/2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1/2$$\end{document}, so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.
引用
收藏
页码:2153 / 2170
页数:17
相关论文
共 50 条
  • [41] Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks
    Waseda, Atsushi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 166 - 170
  • [42] Three-party quantum secure direct communication against collective noise
    Ye-Feng He
    Wen-Ping Ma
    Quantum Information Processing, 2017, 16
  • [43] Device-independent quantum secure direct communication against collective attacks
    Zhou, Lan
    Sheng, Yu-Bo
    Long, Gui-Lu
    SCIENCE BULLETIN, 2020, 65 (01) : 12 - 20
  • [44] Three-party quantum secure direct communication against collective noise
    He, Ye-Feng
    Ma, Wen-Ping
    QUANTUM INFORMATION PROCESSING, 2017, 16 (10)
  • [45] Improving the security of secure quantum telephone against an attack with fake particles and local operations
    Sun, Ying
    Wen, Qiao-Yan
    Gao, Fei
    Zhu, Fu-Chen
    OPTICS COMMUNICATIONS, 2009, 282 (11) : 2278 - 2280
  • [46] Quantum Data Locking for Secure Communication against an Eavesdropper with Time-Limited Storage
    Lupo, Cosmo
    ENTROPY, 2015, 17 (05) : 3194 - 3204
  • [47] Efficient Multiparty Quantum Key Agreement With a Single d-Level Quantum System Secure Against Collusive Attack
    Sun, Zhiwei
    Wu, Chunhui
    Zheng, Shenggen
    Zhang, Cai
    IEEE ACCESS, 2019, 7 : 102377 - 102385
  • [48] SECURITY OF QUANTUM SECRET SHARING WITH TWO-PARTICLE ENTANGLEMENT AGAINST INDIVIDUAL ATTACKS
    Qin, Su-Juan
    Gao, Fei
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    QUANTUM INFORMATION & COMPUTATION, 2009, 9 (9-10) : 765 - 772
  • [49] Fault tolerant two-step quantum secure direct communication protocol against collective noises
    ChunWei Yang
    ChiaWei Tsai
    Tzonelih Hwang
    Science China Physics, Mechanics and Astronomy, 2011, 54 : 496 - 501
  • [50] Fault tolerant two-step quantum secure direct communication protocol against collective noises
    TSAI ChiaWei
    HWANG Tzonelih
    Science China(Physics,Mechanics & Astronomy), 2011, Mechanics & Astronomy)2011 (03) : 496 - 501