Quantum Oblivious Transfer: A Short Review

被引:8
|
作者
Santos, Manuel B. [1 ,2 ]
Mateus, Paulo [1 ,2 ]
Pinto, Armando N. [3 ,4 ]
机构
[1] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[2] Univ Lisbon, Inst Super Tecn, Dept Matemat, P-1049001 Lisbon, Portugal
[3] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[4] Univ Aveiro, Dept Eletron Telecomunicacoes & Informat, P-3810193 Aveiro, Portugal
基金
欧盟地平线“2020”;
关键词
quantum cryptography; oblivious transfer; secure multiparty computation; private database query; PRIVATE INFORMATION-RETRIEVAL; BIT COMMITMENT; KEY DISTRIBUTION; CRYPTOGRAPHY; PROTOCOL; SECURITY; QUERY; USER; QKD;
D O I
10.3390/e24070945
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations. Although much of the work in this field covers quantum key distribution (QKD), there have been some crucial steps towards the understanding and development of quantum oblivious transfer (QOT). One can show the similarity between the application structure of both QKD and QOT primitives. Just as QKD protocols allow quantum-safe communication, QOT protocols allow quantum-safe computation. However, the conditions under which QOT is fully quantum-safe have been subject to intense scrutiny and study. In this review article, we survey the work developed around the concept of oblivious transfer within theoretical quantum cryptography. We focus on some proposed protocols and their security requirements. We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
引用
收藏
页数:35
相关论文
共 50 条
  • [41] Quantum Bit Commitment Based on Qubit Oblivious Transfer
    Yang Wei
    Huang Liusheng
    Wang Qiyan
    Luo Yonglong
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03): : 422 - 426
  • [42] On the security of the quantum oblivious transfer and key distribution protocols
    Mayers, D
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 124 - 135
  • [43] Computational collapse of quantum state with application to oblivious transfer
    Crépeau, C
    Dumais, P
    Mayers, D
    Salvail, L
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 374 - 393
  • [44] Comment on “quantum oblivious transfer: a secure practical implementation”
    Guang Ping He
    Quantum Information Processing, 2017, 16
  • [45] Quantum m-out-of-n oblivious transfer
    Chen, Z
    Zhu, H
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 375 - 380
  • [46] Reducing oblivious string transfer to universal oblivious transfer
    Wolf, S
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 465 - 465
  • [47] Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol
    Yang, Yu-Guang
    Sun, Si-Jia
    Wang, Yan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (03) : 910 - 916
  • [48] Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol
    Yu-Guang Yang
    Si-Jia Sun
    Yan Wang
    International Journal of Theoretical Physics, 2015, 54 : 910 - 916
  • [49] Practical quantum all-or-nothing oblivious transfer protocol
    Yan-Bing Li
    Qiao-Yan Wen
    Su-Juan Qin
    Fen-Zhuo Guo
    Ying Sun
    Quantum Information Processing, 2014, 13 : 131 - 139
  • [50] ON THE EXISTENCE OF LOSS-TOLERANT QUANTUM OBLIVIOUS TRANSFER PROTOCOLS
    Sikora, Jamie
    QUANTUM INFORMATION & COMPUTATION, 2012, 12 (7-8) : 609 - 619