Quantum Oblivious Transfer: A Short Review
Abstract
:1. Introduction
- improve the security requirements, rendering protocols that are information-theoretically secure or require fewer computational assumptions;
- achieve new primitives that were previously not possible just with classical techniques.
2. Definitions
- The sender inputs two messages and outputs nothing.
- The receiver inputs one bit choice and outputs the corresponding message, i.e., .
- Concealing: the sender knows nothing about the receiver bit choice b.
- Oblivious: the receiver knows nothing about the message .
- The sender inputs one message and outputs nothing.
- The receiver outputs with probability the message m.
- Concealing: the sender does not know whether the receiver obtained her message or not.
- Commitment phase: the sender inputs one message of the form (commit, m) and the receiver receives the confirmation that the sender has committed to some message.
- Opening phase: the receiver asks the sender to open the commitment who reveals the message m to the receiver.
- Concealing (or hiding): the receiver knows nothing about the sender’s message m until the sender agrees to reveal it.
- Binding: the sender is unable to change the message m after it is committed.
3. Impossibility Results
- Develop protocols under some assumptions (Section 4). These could be based on limiting the technological power of the adversary (e.g., noisy-storage model, relativistic protocols, isolated-qubit model) or assuming the existence of additional functionalities primitives (e.g., bit commitment).
4. Qot Protocols with Assumptions
4.1. Bbcs Protocol
- Computational basis: ;
- Hadamard basis: .
- Protocol [6]. The first proposal of a quantum oblivious transfer protocol (BBCS protocol) is presented in Figure 1 and builds on top of the quantum conjugate coding technique. The sender starts by using this coding to generate a set of qubits that are subsequently randomly measured by the receiver . These two steps make up the first phase of the protocol that is also common to the BB84 QKD protocol. For this reason, it is called the BB84 phase. Next, with the output bits obtained by and the random elements generated by , both parties are ready to share a special type of key, known as oblivious key. This is achieved when reveals her bases to . Using the oblivious key as a resource, can then obliviously send one of the messages to , ensuring that is only able to know one of the messages. This is achieved using a two-universal family of hash functions from to . In addition, we use the notation to describe a situation where an element s is drawn uniformly at random from the set S.
- Oblivious keys. The term oblivious key was used for the first time by Fehr and Schaffner [79] referring to a Random OT. However, under a subtle different concept, it was used by Jakobi et al. [80] as a way to implement Private Database Queries (PDQ), which we review in Section 6. In recent work, Lemus et al. [81] presented the concept of oblivious key applied to OT protocols. We can define it as follows.
- Security. Regarding security, the BBCS protocol is unconditionally secure against dishonest . Intuitively, this comes from the fact that does not receive any information from other than some set of indexes . However, the BBCS protocol is insecure against dishonest . In its original paper [6], the authors describe a memory attack that provides complete knowledge on both messages and without being detected. This can be achieved by having the receiver delay his measurements in step 2 to some moment after step 3. This procedure is commonly called the memory attack as it requires quantum memory to hold the states until step 3. The authors suggest that, for the protocol to be secure, the receiver has to be forced to measure the received states at step 2. In the following sections, we present two common approaches to tackle this issue. We may assume the existence of commitments or set physical assumptions that constrain from delaying his measurement.
4.2. BBCS in the –Hybrid Model
- Model. As mentioned in the previous section, a secure BBCS protocol requires the receiver to measure his qubits in step 2. In this section, we follow the suggestion from the original BBCS paper [6] and fix this loophole using a commitment scheme. Since we assume we have access to some commitment scheme, we call it –hybrid model. The notation is commonly used for ideal functionalities; however, here we abuse the notation by using to refer to any commitment scheme (including the ideal commitment functionality).
- Protocol. The modified BBCS (Figure 2) adds a cut and choose phase that makes use of a commitment scheme com to check whether measured his qubits in step 2 or not. It goes as follows. commits to the bases used to measure the qubits in the BB84 phase and the resulting output bits. Then, chooses a subset of qubits to be tested and asks to open the corresponding commitments of the bases and output elements. If no inconsistency is found, both parties can proceed with the protocol. Note that the size of the testing subset has to be proportional to n (security parameter), as this guarantees that the rest of the qubits were measured by with overwhelming probability in n.
- Security. Formally proving the security of this protocol led to a long line of research [6,9,31,32,42,79,82,83,84,85,86,87]. Earlier proofs from the 90s started by analyzing the security of the protocol against limited adversaries that were only able to do individual measurements [83]. Then, Yao [42] was able to prove its security against more general adversaries capable of doing fully coherent measurements. Although these initial works [42,83,84] were important to start developing a QOT security proof, they were based on unsatisfactory security definitions. At the time of these initial works, there was no composability framework [79,86] under which the security of the protocol could be considered. In modern quantum cryptography, these protocols are commonly proved in some quantum simulation-paradigm frameworks [9,70,79,86]. In this paradigm, the security is proved by showing that an adversary in a real execution of the protocol cannot cheat more than what he is allowed in an ideal execution, which is secure by definition. This is commonly proved by utilizing an entity, simulator, whose role is to guarantee that a real execution of the protocol is indistinguishable from an ideal execution. Moreover, they measured the adversary’s information through average-case measures (e.g., Collision Entropy, Mutual Information) which are proven to be weak security measures when applied to cryptography [88,89].
- Commitment scheme. The work by Aaronson [67] presented a non-constructive proof that “indicates that collision-resistant hashing might still be possible in a quantum setting”, giving confidence in the use of commitment schemes based on quantum-hard one-way functions in the protocol. Hopefully, it was shown that commitment schemes can be built from any one-way function [93,94,95], including quantum-hard one-way functions. Although it is intuitive to plug in into a commitment scheme derived from a quantum-hard one-way function, this does not necessarily render a simulation-based secure protocol. This happens because the nature of the commitment scheme can make the simulation-based proof difficult or even impossible. For a detailed discussion see [31].
- Composability. The integration of secure oblivious transfer executions in secure-multiparty protocols [11] should not lead to security breaches. Although it seems intuitive to assume that a secure OT protocol can be integrated within more complex protocols, proving this is highly non-trivial as it is not clear a priori under which circumstances protocols can be composed [98].
4.3. BBCS in the Limited-Quantum-Storage Model
4.3.1. Bounded-Quantum-Storage Model
- Model. In the bounded-quantum-storage model or BQS model for short, we assume that, during the waiting time , the adversaries are only able to store a fraction of the transmitted qubits, i.e., the adversary is only able to keep qubits. The parameter is commonly called the storage rate.
- Security. We just comment on the security against a dishonest receiver because the justification for the security against a dishonest sender is the same as in the original BBCS protocol, (see Section 4.1).
- Composability. The initial proofs given by Damgård et al. [68,91] were only developed under the stand-alone security model [104]. In this model the composability of the protocol is not guaranteed to be secure. These proofs were extended by Wehner and Wullschleger [104] to a simulation-based framework that guarantees sequential composition. In addition, in a parallel work, Fehr and Schaffner developed a sequential composability framework under which is secure considering the BQS model.
4.3.2. Noisy-Quantum-Storage Model
- Model. The noisy-quantum-storage model, or NQS model for short, is a generalization of the BQS model. In the NQS model, the adversaries are allowed to keep any fraction of the transmitted qubits (including the case ) but their quantum memory is assumed to be noisy [70], i.e., it is impossible to store qubits for some amount of time () without undergoing decoherence.
- Protocols. The protocol from BQS model is also considered to be secure in the NQS model [105]. However, the first proposed protocol analysed in this general NQS model was developed by König et al. [70]. This protocol draws inspiration from the research line initiated by Cachin, Crépeau and Marcil [106] about classical OT in the bounded-classical-storage model [107,108]. Similar to these works [106,107,108], the protocol presented by König et al. [70] uses the following two important techniques in its classical post-processing phase: encoding of sets and interactive hashing. The former is defined as an injective function , where T is a set of all subsets of with size . The latter is a two-party protocol between Alice and Bob with the following specifications. Bob inputs some message and both parties receive two messages and such that there exists some with . The index b is unknown to Alice, and Bob has little control over the choice of the other message , i.e., it is randomly chosen by the functionality.
- Security. Based on the original BQS protocol (Figure 3), the first proofs in the NQS model were developed by Schaffner, Wehner and Terhal [69,109]. However, in these initial works, the authors only considered individual-storage attacks, where the adversary treats all incoming qubits equally. Subsequently, Schaffner [105] was able to prove the security of against arbitrary attacks in the more general NQS model defined by König et al. [70].
4.4. Device-Independent QOT in the Limited-Quantum-Storage Model
- Kaniewski-Wehner DI protocol [113]. The first DI protocol of QOT was presented in a joint work by Kaniewski and Wehner [113] and its security proof was improved by Ribeiro et al. [114]. The protocol was proved to be secure in the noisy-quantum-storage (NQS) model as it uses the original NQS protocol (Figure 4) for trusted devices. It analyzes two cases leading to slightly different protocols.
- Broadbent-Yuen DI protocol [117]. More recently, Broadbent and Yuen [117] used the (Figure 3) to develop a DI protocol in the BQS model. Similar to Kaniewski and Wehner’s work, they the protocol to be secure under the memoryless assumption. However, they do not require non-communication assumptions that ensure security from Bell inequality violations. Instead of using the CSHS inequality, their work is based on a recent self-testing protocol [118,119] based on a post-quantum computational assumption (hardness of Learning with Errors (LWE) problem [120]).
- Ribeiro-Wehner MDI protocol [121]. Ribeiro and Wehner [121] developed an OT protocol in the measurement-device-independent (MDI) regime [122] to avoid the technological challenges in the implementation of DI protocols [123]. In addition, this work was motivated by the fact that, so far, there is no security proof in the DI setting. Furthermore, many attacks on the non device-independent protocols affect the measurement devices rather than the sources [124]. The presented protocol follows the research line of König et al. [70] and start by executing a weak string erasure in the MDI setting (MDI-WSE phase). For this reason, it is also proved to be secure in the NQS model.
4.5. Otm in the Isolated-Qubits Model
- One-Time Memory. A One-Time Memory (OTM) is a cryptographic device that allows more generic functionalities such as One-Time Programs [126]. Its definition is similar to 1-out-of-2 Oblivious Transfer: the sender writes two messages and into the OTM and sends the OTM to the receiver. The receiver can then run the OTM only once and choose one of the messages, , while staying oblivious about the other message, . The main difference between OT and OTM is that in OT the sender learns whether the receiver has received the message , while in OTM, the sender does not receive any confirmation about that. This difference comes from the identifying feature of one-way communication in OTM [39]: after the sender handles the OTM device to the receiver, there is no more communication between the parties.
- Model. In the isolated-qubits model, we assume that qubits cannot be entangled and can only be handled through single-qubit measurements. More specifically, this model only allows dishonest parties to perform local operations and classical communication while preparing the OTM device (sender) or reading it (receiver). As Liu [71] comments in his original article about quantum-based OTM, the isolated-qubits model complements the limited-quantum-storage models. Indeed, the isolated-qubits model does not allow the parties to perform entanglement and assumes the existence of long-term memories. On the other hand, the limited-quantum-storage models allow the existence of entanglement but assume qubits cannot be stored for a long time.
- Protocol [71]. Liu presented the first protocol [71] for quantum OTM, which is also based on the standard idea of conjugate coding. In this protocol, the sender uses the computational and hadamard bases to prepare the states (grey lines in Figure 5) and the receiver uses the bases and to measure the received qubits (red lines in Figure 5).
- Security. The LOCC assumption (local operations and classical communication) is crucial to ensure the security of the protocol because there is a joint measurement that allows recovering both messages and . In the original paper [71], Liu proved that the state prepared by the sender can be distinguished almost perfectly by a measurement that uses entanglement among the n qubits. This distinguishability is achieved using the common technique of “pretty good measurement” [127].
- Further work. In the original paper, [71], the leaky security of was only proved using a weaker entropy measure (Shannon entropy) and assuming only one-pass LOCC adversaries, i.e., adversaries that can only measure each qubit once. Subsequently, Liu [128] was able to improve on the previous work and proved a modified version of to be a leaky OTM, which is stated secure in terms in terms of the (smoothed) min-entropy. Finally, Liu [129] proposed a variant of privacy amplification which uses a fixed hash function F. This allows to building a protocol for (not leaky) single-bit OTM that is secure in the isolated qubits model.
4.6. Qot in a Relativistic Setting
- Model. In the relativistic setting, we consider protocols that take into account the causality of Minkowski space-time, limiting the maximum possible signalling speed (no-superluminal principle) [72].
4.6.1. Spacetime-Constrained Oblivious Transfer
- Definition. In SCOT, the sender inputs two messages and and the receiver one-bit choice b. The receiver obtains message within some space-time region (Figure 7) and the sender stays oblivious about his bit choice b. Furthermore, the receiver is not able to know anything about the other message at space-time region . The fundamental difference between the standard 1-out-of-2 OT and SCOT is related to the space-time regions in which the receiver is allowed to know messages and . In the standard OT, the receiver can never deduce the message , whether in SCOT the receiver is allowed to find the message outside region .
- Protocol [72]. In the first proposed SCOT protocol [72], both the sender and receiver have three representatives (called agents) who take part in the protocol at different spacetime locations. The sender’s agents are denoted by , and and the receiver’s agents by , and , which are located at , and , respectively (Figure 7). The protocol is also based on the standard idea of conjugate coding and it goes as follows. The agent prepares a string of qubits using conjugate coding and sends them to the receiver’s corresponding agent at spacetime point P. Then, sends the bases used to prepare these states and masked messages to the agents at , for (blue arrows in Figure 7). Then, the receiver’s agent sends the received qubits to the agent located at according to his bit choice b. In Figure 7, it is depicted the case where the receiver’s bit choice is , meaning sends the string of quibits to (yellow arrow) at . Upon receiving the tuple , the agent sends them to the corresponding receiver’s agent . At this stage, has all the necessary elements to decode and retrieve the desired message . Check the protocol in Figure 8 for more details.
- Security. Regarding security, the general no-go theorems do not apply to this SCOT protocol because of the Minkowski causality. The causality implies that any nonlocal unitary applied within both spacetime regions and , can only be completed in the future light cone of point Q. In other words, the attack cannot be achieved within both spacetime regions and .
- Further work. The protocol was improved in a subsequent work [134], allowing more practical implementation of SCOT. This improved protocol does not require quantum memories and long-distance quantum communications. Then, the protocol presented by Garcia and Kerenidis [134] was extended to one-out-of-k SCOT, where the sender owns k messages and the receiver gets just one of the messages without letting the sender know his choice [135].
4.6.2. Location-Oblivious Data Transfer
- Definition. In LODT, both parties agree on two spacetime points, and , and the receiver defines some , where denotes the future light cone of spacetime point X. The sender inputs just one message m, and the receiver has no input. At the end of the protocol, the receiver obtains the message m at some random location for , while the sender stays oblivious about the spacetime point . Note that this is fundamentally different from SCOT. In SCOT, the receiver wants to hide his bit choice b, whether in LODT he wants to hide the location where he obtains the sender’s message m.
- Protocol [73]. The protocol assumes the sender and the receiver can independently and securely access all the points P, , and , and instantaneously exchange information there. Theoretically, we achieve this through the concept of representatives (or agents) located at the relevant space-time points (P, , and ). Although the author [73] does not differentiate between agents, for the sake of coherence with SCOT exposition, here we simplify and refer to the sender’s agents as , and and to the receiver’s agents as , and , which are located at , and , respectively (Figure 9). Moreover, in the beginning of the protocol, the parties agree on a maximally entangled orthonormal basis of that encodes the possible messages owned by the sender, i.e., for . () is the d–dimensional Hilbert space initially used by the sender (receiver).
5. Weak OT
- On bounds. We already know that it is impossible to have an unconditionally secure QOT. However, the literature about WOT thrives to have a deeper understanding of these impossibility results by studying both upper and lower bounds on the cheating probabilities, and . The Holy Grail of this research endeavour is to find protocols where both bounds meet, i.e., optimal protocols with tight cheating probabilities. The same endeavour was carried out successfully for quantum bit commitments [3] and quantum coin flipping [4]. However, at the time of writing, there has not been proposed an optimal protocol with tight cheating probabilities for OT under malicious adversaries. At present, only Chailloux et al. [138] presented a protocol that achieves the lower-bound cheating probability. However, it assumes the parties are semi-honest, i.e., the cheating parties do not deviate from the prescribed protocol.
- On lower bounds. It is common to look for the maximum value of the cheating probabilities when studying lower bounds. This is motivated by the fact that it is possible to develop a QOT protocol unconditionally secure against the sender () and completely insecure against the receiver () [6,47]. Therefore, the research community has been focused on finding general lower bounds on the maximum of the cheating probabilities, i.e., . At the time of writing, the known general lower bounds are presented in Table 1.
- Chailloux-Kerenidis-Sikora protocol [137]. The first WOT protocol (Figure 11) was presented in a joint work by Chailloux, Kerenidis and Sikora [137]. This protocol is structurally different from BBCS-inspired protocols because it is a two-quantum-message protocol, i.e., the receiver sends some quantum system to the sender, and the sender returns the same quantum system to the receiver after applying some operation. Additionally, both parties work in a three-dimensional Hilbert space and do not use the standard conjugate coding technique. It is proved in the original work that both cheating probabilities are equal to , i.e., .
- Amiri at al. protocol [142]. More recently, Amiri et al. [142] proposed a protocol along with its experimental realization, that allows performing a batch of random WOT. The central technique used in this protocol is unambiguous state elimination (USE) measurements. Succinctly, unambiguous measurements aim to unambiguously distinguish a set of states for with prior probabilities . USE measurements are a particular type of unambiguous measurements that only guarantee some state parameter x does not belong to a subset of . In other words, these measurements decrease the set of possible states to which the measured state belongs. This protocol improves on the previous presented protocol , as the receiver’s cheating probability is slightly decreased to .
6. Weak Private Database Query
- Protocol [80]. The first presented PDQ protocol (Figure 13 and Figure 14) is very similar in structure to the BBCS protocol [6]. Indeed, it is a one-quantum-message protocol that generats an oblivious key used by the sender to encode her database and by the receiver to obtain the desired item. In PDQ, we use the same definition of oblivious key (Definition 4) as given in Section 4.1. Besides the similarities between and , the following differences are worth stressing.
- Further work. The above protocol inspired the development of more efficient and flexible protocols for PDQ. In Table 2, we present a list of PDQ/OT protocols based on oblivious keys. Note that the term oblivious transfer (OT) is equivalent to private database query (PDQ), and QKD-based PDQ is equivalent to QOK-based OT. In addition, most of the protocols presented in Table 2 rely their security on the SARG04 protocol.
Year | Author | Brief Description |
---|---|---|
2012 | Gao et al. [148] | Generalized the [80] protocol by adding a parameter that regulates the average number of bits known by the receiver. |
2013 | Rao et al. [149] | Improved the communication complexity of [80] from to . |
2013 | Zhang et al. [150] | Designed a PDQ protocol based on counterfactual QKD. |
2014 | Wei et al. [151] | Developed a generalization of the [80] protocol that allows to retrieve a block of bits from the database with only one query. |
2014 | Chan et al. [152] | Developed a practical fault-tolerant PDQ protocol that can cope with noisy channels and presented an experimental realization. |
2015 | Gao et al. [153] | Presented an attack on the common dilution method of the oblivious key and introduced a new error-correction method for the oblivious keys. |
2015 | Liu et al. [154] | Introduced a PDQ protocol based on Round Robin Differential Phase Shift (RRDPS) QKD which limits the number of items an honest receiver is able to know to just one and with zero failure probability. |
2015 | Yang et al. [155] | Proposed the first PDQ protocol based on semi-QKD. |
2015 | Yu et al. [156] | Pointed that the Yang et al. [155] semi-QKD based PDQ protocol can be attacked and presented a fully quantum PDQ. |
2016 | Wei et al. [157] | Proposed a two-way QKD based PDQ protocol that is loss tolerant and robust against both quantum memory and joint measurement attacks. |
2016 | Yang et al. [158] | Proposed a PDQ protocol based on one-way-six-state QKD with security against joint-measurement attacks given by a new design for the classical post-processing of the oblivious keys. |
2017 | Maitra et al. [159] | Proposed a Device-Independent Quantum Private Query. |
2018 | Wei et al. [160] | Examined the security of Liu et al. [154] RRDPS protocol under imperfect sources and presented an improved protocol based on a technique known as low-shift and addition (LSA). |
2018 | Zhou et al. [161] | Proposed a new PDQ protocol based on two-way QKD that ensures the privacy of both sender and receiver. |
2019 | Chang et al. [162] | Suggested a PDQ protocol based on a two-way QKD with improved privacy. |
2019 | Du and Li [163] | Proposed a robust High Capability QKD-Based PDQ protocol. |
2020 | Ye et al. [164] | Developed a Semi-QKD based PDQ protocol such that any kind of evasion can be detected. |
7. Further Topics
- All-or-nothing OT. The first proposal of OT was put forward by Rabin [10] in a flavour different from 1-out-of-2 OT, named all-or-nothing OT or OT. In this flavour, the sender only has one message m, and the receiver receives it with probability , without the sender knowing whether or not the receiver has received her message. In the classical setting, both 1-out-of-2 OT and all-or-nothing OT are proved to be equivalent [165]. However, these classical reductions cannot be applied in the quantum setting as it was proved by He and Wang [166] that these two flavours are not equivalent in the quantum setting. The first all-or-nothing QOT was proposed by Crépeau and Kilian [82] and later extended by Damgård et al. [68] in the bounded-quantum-storage model. In general, 1-out-of-2 OT protocols can be adapted to achieve all-or-nothing OT [167,168]. Moreover, He and Wang [169] presented an entanglement-based all-or-nothing OT protocol that claims to be secure despite the impossibility results of two-party function evaluation. Their claim is based on the fact that, in the all-or-nothing variant, the receiver does not unambiguously obtain the message m, which is an implicit assumption in Lo’s impossibility result [47].
- XOR OT. The concept of XOR oblivious transfer was presented in the classical setting by Brassard et al. [170]. In this variant of OT, the sender inputs two messages, and , and the receiver obtains one of these three elements: , or . In the quantum setting, there are currently only two proposed protocols that achieve this task [171,172].
- OT of qubits. The vast majority of quantum oblivious transfer protocols focus on a classical input-output setting, i.e., both the messages input by the sender and the elements obtained by the receiver are classical. More recently, Zhang et al. [173] proposed the concept of OT with qubit messages. In their work, they present a variant of the all-or-nothing OT with an unknown qubit message. The main tool used to achieve this task is a probabilistic teleportation protocol.
- Experimental protocols. Experimental realizations of quantum communication protocols have to take into account sources of errors (loss of photons and error in measurements) which are not considered by more theoretical protocols. In practice, it is desirable to design loss-tolerant and fault-tolerant protocols. This study was initiated by Schaffner et al. [105,109] and followed by Wehner et al. [174], where they analyse the impact of both loss and error on the security of the protocol. Based on this work, two independent practical experiments implemented OT in the noisy storage model. Erven et al. [175] implementation was based on Discrete Variables and generated a 1366-bit random oblivious transfer string in ∼3 min. Furrer et al. [176] implementation was based on Continuous Variables and achieved a generation rate of around 1000 oblivious bit transfers per second. In addition, experimental implementations of PDQ protocols have been reported in the literature [152] as well as Weak OT protocols [142].
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
QKD | Quantum key distribution |
QOT | Quantum oblivious transfer |
OT | Oblivious transfer |
SMC | Secure multiparty computation |
QBC | Quantum bit commitment |
BC | Bit commitment |
CRS | Common Reference String |
UC | Universal Composability |
BQS | Bounded-quantum-storage |
NQS | Noisy-quantum-storage |
CPTP | Completely positive trace preserving |
OTM | One-time memory |
LOCC | local operations and classical communication |
SCOT | Spacetime-constrained oblivious transfer |
LODT | Location-oblivious data transfer |
WOT | Weak OT |
USE | Unambiguously state elimination |
PDQ | Private database query |
References
- Broadbent, A.; Schaffner, C. Quantum cryptography beyond quantum key distribution. Des. Codes Cryptogr. 2015, 78, 351–382. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Pinto, A.N.; Silva, N.A.; Almeida, A.; Muga, N.J. Using Quantum Technologies to Improve Fiber Optic Communication Systems. IEEE Commun. Mag. 2013, 8, 42–48. [Google Scholar] [CrossRef]
- Chailloux, A.; Kerenidis, I. Optimal Bounds for Quantum Bit Commitment. In Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, CA, USA, 22–25 October 2011. [Google Scholar] [CrossRef] [Green Version]
- Chailloux, A.; Kerenidis, I. Optimal Quantum Strong Coin Flipping. In Proceedings of the 2009 50th Annual IEEE Symposium on Foundations of Computer Science, Washington, DC, USA, 25–27 October 2009. [Google Scholar] [CrossRef] [Green Version]
- Broadbent, A.; Fitzsimons, J.; Kashefi, E. Universal Blind Quantum Computation. In Proceedings of the 2009 50th Annual IEEE Symposium on Foundations of Computer Science, Washington, DC, USA, 25–27 October 2009. [Google Scholar] [CrossRef] [Green Version]
- Bennett, C.H.; Brassard, G.; Crépeau, C.; Skubiszewska, M.H. Practical Quantum Oblivious Transfer. In Proceedings of the Advances in Cryptology—CRYPTO’91, Brighton, UK, 8–11 April 1991; Feigenbaum, J., Ed.; Springer: Berlin/Heidelberg, Germany, 1992; pp. 351–366. [Google Scholar]
- Unruh, D. Quantum Position Verification in the Random Oracle Model. In Proceedings of the Advances in Cryptology—CRYPTO 2014, Santa Barbara, CA, USA, 17–21 August 2014; Garay, J.A., Gennaro, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 1–18. [Google Scholar]
- Damgård, I.; Fehr, S.; Salvail, L.; Schaffner, C. Secure identification and QKD in the bounded-quantum-storage model. Theor. Comput. Sci. 2014, 560, 12–26. [Google Scholar] [CrossRef]
- Damgård, I.; Fehr, S.; Lunemann, C.; Salvail, L.; Schaffner, C. Improving the Security of Quantum Protocols via Commit-and-Open. In Proceedings of the Advances in Cryptology—CRYPTO 2009, Santa Barbara, CA, USA, 16–20 August 2009; Halevi, S., Ed.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 408–427. [Google Scholar]
- Rabin, M.O. How to Exchange Secrets with Oblivious Transfer; Technical Report TR-81; Aiken Computation Laboratory, Harvard University: Cambridge, MA, USA, 1981. [Google Scholar]
- Yao, A.C.C. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS 1986), Washington, DC, USA, 27–29 October 1986. [Google Scholar] [CrossRef]
- Kilian, J. Founding crytpography on oblivious transfer. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing—STOC’88, Chicago, IL, USA, 2–4 May 1988; ACM Press: New York, NY, USA, 1988. [Google Scholar] [CrossRef]
- Keller, M.; Orsini, E.; Scholl, P. MASCOT. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; ACM Press: New York, NY, USA, 2016. [Google Scholar] [CrossRef]
- Chang, Y.C. Single Database Private Information Retrieval with Logarithmic Communication. In Information Security and Privacy; Wang, H., Pieprzyk, J., Varadharajan, V., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 50–61. [Google Scholar]
- Orrù, M.; Orsini, E.; Scholl, P. Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection. In Proceedings of the Topics in Cryptology—CT-RSA 2017, San Francisco, CA, USA, 14–17 February 2017; Handschuh, H., Ed.; Springer International Publishing: Cham, Switzerland, 2017; pp. 381–396. [Google Scholar]
- Bi, B.; Huang, D.; Mi, B.; Deng, Z.; Pan, H. Efficient LBS Security-Preserving Based on NTRU Oblivious Transfer. Wirel. Pers. Commun. 2019, 108, 2663–2674. [Google Scholar] [CrossRef]
- Santos, M.B.; Mateus, P.; Vlachou, C. Quantum Universally Composable Oblivious Linear Evaluation. arXiv 2022, arXiv:2204.14171. [Google Scholar]
- Santos, M.B.; Gomes, A.C.; Pinto, A.N.; Mateus, P. Quantum Secure Multiparty Computation of Phylogenetic Trees of SARS-CoV-2 Genome. In Proceedings of the 2021 Telecoms Conference (ConfTELE), Leiria, Portugal, 11–12 February 2021. [Google Scholar] [CrossRef]
- Santos, M.B.; Gomes, A.C.; Pinto, A.N.; Mateus, P. Private Computation of Phylogenetic Trees Based on Quantum Technologies. IEEE Access 2022, 10, 38065–38088. [Google Scholar] [CrossRef]
- Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), Chicago, IL, USA, 3–5 November 1982; pp. 160–164. [Google Scholar] [CrossRef]
- Goldreich, O.; Micali, S.; Wigderson, A. How to Play ANY Mental Game. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing—STOC’87, New York, NY, USA, 25–27 May 1987; Association for Computing Machinery: New York, NY, USA, 1987; pp. 218–229. [Google Scholar] [CrossRef]
- Asharov, G.; Lindell, Y.; Schneider, T.; Zohner, M. More efficient oblivious transfer extensions. J. Cryptol. 2017, 30, 805–858. [Google Scholar] [CrossRef]
- Keller, M.; Orsini, E.; Scholl, P. Actively Secure OT Extension with Optimal Overhead. In Proceedings of the Advances in Cryptology—CRYPTO 2015, Santa Barbara, CA, USA, 16–20 August 2015; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2015; Volume 9215, pp. 724–741. [Google Scholar] [CrossRef] [Green Version]
- Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. Siam J. Comput. 1997, 26, 1484–1509. [Google Scholar] [CrossRef] [Green Version]
- Yadav, V.K.; Andola, N.; Verma, S.; Venkatesan, S. A Survey of Oblivious Transfer Protocol. ACM Comput. Surv. 2022. [Google Scholar] [CrossRef]
- Impagliazzo, R.; Rudich, S. Limits on the Provable Consequences of One-Way Permutations. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing—STOC’89, Seattle, WA, USA, 14–17 May 1989; Association for Computing Machinery: New York, NY, USA, 1989; pp. 44–61. [Google Scholar] [CrossRef]
- Gertner, Y.; Kannan, S.; Malkin, T.; Reingold, O.; Viswanathan, M. The relationship between public key encryption and oblivious transfer. In Proceedings of the Proceedings 41st Annual Symposium on Foundations of Computer Science, Redondo Beach, CA, USA, 12–14 November 2000. [Google Scholar] [CrossRef]
- Even, S.; Goldreich, O.; Lempel, A. A Randomized Protocol for Signing Contracts. Commun. ACM 1985, 28, 637–647. [Google Scholar] [CrossRef]
- Naor, M.; Pinkas, B. Efficient oblivious transfer protocols. In Proceedings of the SODA’01, Washington, DC, USA, 7–9 January 2001. [Google Scholar]
- Chou, T.; Orlandi, C. The Simplest Protocol for Oblivious Transfer. In Proceedings of the 4th International Conference on Progress in Cryptology—LATINCRYPT 2015, Guadalajara, Mexico, 23–26 August 2015; Springer: Berlin/Heidelberg, Germany, 2015; Volume 9230, pp. 40–58. [Google Scholar] [CrossRef] [Green Version]
- Grilo, A.B.; Lin, H.; Song, F.; Vaikuntanathan, V. Oblivious Transfer Is in MiniQCrypt. In Proceedings of the Advances in Cryptology—EUROCRYPT 2021, Zagreb, Croatia, 17–21 October 2021; Canteaut, A., Standaert, F.X., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 531–561. [Google Scholar]
- Bartusek, J.; Coladangelo, A.; Khurana, D.; Ma, F. One-Way Functions Imply Secure Computation in a Quantum World. In Proceedings of the Advances in Cryptology—CRYPTO 2021, Virtual. 16–20 August 2021; Malkin, T., Peikert, C., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 467–496. [Google Scholar]
- Santos, M.B.; Pinto, A.N.; Mateus, P. Quantum and classical oblivious transfer: A comparative analysis. IET Quantum Commun. 2021, 2, 42–53. [Google Scholar] [CrossRef]
- Brassard, G.; Crépeau, C. 25 years of quantum cryptography. ACM SIGACT News 1996, 27, 13–24. [Google Scholar] [CrossRef]
- Brassard, G. Brief history of quantum cryptography: A personal perspective. In Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, Awaji Island, Japan, 16–19 October 2005. [Google Scholar] [CrossRef] [Green Version]
- Müller-Quade, J. Quantum cryptography beyond key exchange. Inform. Forsch. Und Entwickl. 2006, 21, 39–54. [Google Scholar] [CrossRef]
- Fehr, S. Quantum Cryptography. Found. Phys. 2010, 40, 494–531. [Google Scholar] [CrossRef]
- Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012. [Google Scholar] [CrossRef] [Green Version]
- Portmann, C.; Renner, R. Security in Quantum Cryptography. arXiv 2021, arXiv:2102.00021. [Google Scholar] [CrossRef]
- Sun, S.; Huang, A. A Review of Security Evaluation of Practical Quantum Key Distribution System. Entropy 2022, 24, 260. [Google Scholar] [CrossRef]
- Salvail, L. The Search for the Holy Grail in Quantum Cryptography. In Lectures on Data Security: Modern Cryptology in Theory and Practice; Damgård, I.B., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; pp. 183–216. [Google Scholar] [CrossRef] [Green Version]
- Yao, A.C.C. Security of quantum protocols against coherent measurements. In Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing—STOC’95, Las Vegas, NV, USA, 29 May–1 June 1995; ACM Press: New York, NY, USA, 1995. [Google Scholar] [CrossRef]
- Brassard, G.; Crepeau, C.; Jozsa, R.; Langlois, D. A quantum bit commitment scheme provably unbreakable by both parties. In Proceedings of the 1993 IEEE 34th Annual Foundations of Computer Science, Palo Alto, CA, USA, 3–5 November 1993. [Google Scholar] [CrossRef]
- Mayers, D. The Trouble with Quantum Bit Commitment. arXiv 1996, arXiv:quant-ph/9603015. [Google Scholar]
- Lo, H.K.; Chau, H.F. Is Quantum Bit Commitment Really Possible? Phys. Rev. Lett. 1997, 78, 3410–3413. [Google Scholar] [CrossRef] [Green Version]
- Mayers, D. Unconditionally Secure Quantum Bit Commitment is Impossible. Phys. Rev. Lett. 1997, 78, 3414–3417. [Google Scholar] [CrossRef] [Green Version]
- Lo, H.K. Insecurity of quantum secure computations. Phys. Rev. A 1997, 56, 1154–1162. [Google Scholar] [CrossRef] [Green Version]
- Colbeck, R. Impossibility of secure two-party classical computation. Phys. Rev. A 2007, 76. [Google Scholar] [CrossRef] [Green Version]
- Buhrman, H.; Christandl, M.; Schaffner, C. Complete Insecurity of Quantum Protocols for Classical Two-Party Computation. Phys. Rev. Lett. 2012, 109, 160501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Salvail, L.; Schaffner, C.; Sotáková, M. Quantifying the leakage of quantum protocols for classical two-party cryptography. Int. J. Quantum Inf. 2014, 13, 1450041. [Google Scholar] [CrossRef] [Green Version]
- Fehr, S.; Katz, J.; Song, F.; Zhou, H.S.; Zikas, V. Feasibility and Completeness of Cryptographic Tasks in the Quantum World. In Proceedings of the Theory of Cryptography, Tokyo, Japan, 3–6 March 2013; Sahai, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 281–296. [Google Scholar]
- Brassard, G.; Crépeau, C.; Mayers, D.; Salvail, L. A brief review on the impossibility of quantum bit commitment. arXiv 1997, arXiv:quant-ph/9712023. [Google Scholar]
- Yuen, H.P. Unconditionally Secure Quantum Bit Commitment Is Possible. arXiv 2000, arXiv:quant-ph/9605044. [Google Scholar]
- Yuen, H.P. Quantum bit commitment and unconditional security. arXiv 2002, arXiv:quant-ph/0207089. [Google Scholar]
- Yuen, H.P. How to Build Unconditionally Secure Quantum Bit Commitment Protocols. arXiv 2003, arXiv:quant-ph/0305144. [Google Scholar]
- Cheung, C.Y. Quantum Bit Commitment can be Unconditionally Secure. arXiv 2001, arXiv:quant-ph/9605044. [Google Scholar]
- Bub, J. The quantum bit commitment theorem. Found. Phys. 2001, 31, 735–756. [Google Scholar] [CrossRef]
- Cheung, C.Y. Secret parameters in quantum bit commitment. arXiv 2005, arXiv:quant-ph/0508180. [Google Scholar] [CrossRef] [Green Version]
- Cheung, C.Y. Quantum Bit Commitment with Secret Parameters. Int. J. Mod. Phys. 2007, 21, 4271–4274. [Google Scholar] [CrossRef] [Green Version]
- D’Ariano, G.M.; Kretschmann, D.; Schlingemann, D.; Werner, R.F. Reexamination of quantum bit commitment: The possible and the impossible. Phys. Rev. A 2007, 76, 032328. [Google Scholar] [CrossRef] [Green Version]
- Chiribella, G.; D’Ariano, G.M.; Perinotti, P. Probabilistic theories with purification. Phys. Rev. A 2010, 81, 062348. [Google Scholar] [CrossRef] [Green Version]
- Chiribella, G.; D’Ariano, G.M.; Perinotti, P.; Schlingemann, D.; Werner, R. A short impossibility proof of quantum bit commitment. Phys. Lett. 2013, 377, 1076–1087. [Google Scholar] [CrossRef] [Green Version]
- He, G.P. Comment on “A short impossibility proof of quantum bit commitment”. arXiv 2013, arXiv:0905.3801. [Google Scholar]
- Cohn-Gordon, K. Commitment Algorithms. Master’s Thesis, University of Oxford, Oxford, UK, 2012. [Google Scholar]
- Sun, X.; He, F.; Wang, Q. Impossibility of Quantum Bit Commitment, a Categorical Perspective. Axioms 2020, 9, 28. [Google Scholar] [CrossRef] [Green Version]
- Broadbent, A.; Karvonen, M. Categorical composable cryptography. In Proceedings of the Foundations of Software Science and Computation Structures, Munich, Germany, 2–7 April 2022; Bouyer, P., Schröder, L., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 161–183. [Google Scholar]
- Aaronson, S. Quantum lower bound for the collision problem. In Proceedings of the Thiry-Fourth Annual ACM Symposium on Theory of Computing—STOC’02, Montreal, QC, Canada, 19–21 May 2002; ACM Press: New York, NY, USA, 2002. [Google Scholar] [CrossRef] [Green Version]
- Damgard, I.; Fehr, S.; Salvail, L.; Schaffner, C. Cryptography In the Bounded Quantum-Storage Model. In Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS’05), Pittsburgh, PA, USA, 23–25 October 2005. [Google Scholar] [CrossRef] [Green Version]
- Wehner, S.; Schaffner, C.; Terhal, B.M. Cryptography from Noisy Storage. Phys. Rev. Lett. 2008, 100, 220502. [Google Scholar] [CrossRef] [Green Version]
- Konig, R.; Wehner, S.; Wullschleger, J. Unconditional Security From Noisy Quantum Storage. IEEE Trans. Inf. Theory 2012, 58, 1962–1984. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.K. Building one-time memories from isolated qubits. In Proceedings of the 5th Conference on Innovations in Theoretical Computer Science, Princeton, NJ, USA, 12–14 January 2014; ACM: New York, NY, USA, 2014. [Google Scholar] [CrossRef] [Green Version]
- Pitalúa-García, D. Spacetime-constrained oblivious transfer. Phys. Rev. A 2016, 93, 062346. [Google Scholar] [CrossRef] [Green Version]
- Kent, A. Location-oblivious data transfer with flying entangled qudits. Phys. Rev. A 2011, 84, 012328. [Google Scholar] [CrossRef] [Green Version]
- Unruh, D. Everlasting Multi-party Computation. J. Cryptol. 2018, 31, 965–1011. [Google Scholar] [CrossRef] [Green Version]
- Wiesner, S. Conjugate coding. ACM SIGACT News 1983, 15, 78–88. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G.; Breidbart, S.; Wiesner, S. Quantum Cryptography, or Unforgeable Subway Tokens. In Advances in Cryptology; Springer: Berlin/Heidelberg, Germany, 1983; pp. 267–275. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G.; Breidbart, S. Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP. Nat. Comput. 2014, 13, 453–458. [Google Scholar] [CrossRef] [Green Version]
- Fehr, S.; Schaffner, C. Composing Quantum Protocols in a Classical Environment. In Theory of Cryptography; Reingold, O., Ed.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 350–367. [Google Scholar]
- Jakobi, M.; Simon, C.; Gisin, N.; Bancal, J.D.; Branciard, C.; Walenta, N.; Zbinden, H. Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 2011, 83, 022301. [Google Scholar] [CrossRef] [Green Version]
- Lemus, M.; Ramos, M.F.; Yadav, P.; Silva, N.A.; Muga, N.J.; Souto, A.; Paunković, N.; Mateus, P.; Pinto, A.N. Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation. Appl. Sci. 2020, 10, 4080. [Google Scholar] [CrossRef]
- Crepeau, C.; Kilian, J. Achieving oblivious transfer using weakened security assumptions. In Proceedings of the 29th Annual Symposium on Foundations of Computer Science, White Plains, NY, USA, 24–26 October 1988. [Google Scholar] [CrossRef]
- Mayers, D.; Salvail, L. Quantum oblivious transfer is secure against all individual measurements. In Proceedings of the Proceedings Workshop on Physics and Computation, PhysComp’94, Dallas, TX, USA, 17–20 November 1994. [Google Scholar] [CrossRef]
- Mayers, D. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. In Proceedings of the Advances in Cryptology—CRYPTO’96, Santa Barbara, CA, USA, 18–22 August 1996; Springer: Berlin/Heidelberg, Germany, 1996; pp. 343–357. [Google Scholar] [CrossRef] [Green Version]
- Crépeau, C.; Dumais, P.; Mayers, D.; Salvail, L. Computational Collapse of Quantum State with Application to Oblivious Transfer. In Theory of Cryptography; Naor, M., Ed.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 374–393. [Google Scholar]
- Unruh, D. Universally Composable Quantum Multi-party Computation. In Proceedings of the Advances in Cryptology—EUROCRYPT 2010, French Riviera, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 486–505. [Google Scholar] [CrossRef] [Green Version]
- Bouman, N.J.; Fehr, S. Sampling in a Quantum Population, and Applications. In Proceedings of the Advances in Cryptology—CRYPTO 2010, Santa Barbara, CA, USA, 15–19 August 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 724–741. [Google Scholar] [CrossRef] [Green Version]
- Berta, M.; Christandl, M.; Colbeck, R.; Renes, J.M.; Renner, R. The uncertainty principle in the presence of quantum memory. Nat. Phys. 2010, 6, 659–662. [Google Scholar] [CrossRef]
- Tomamichel, M.; Renner, R. Uncertainty Relation for Smooth Entropies. Phys. Rev. Lett. 2011, 106. [Google Scholar] [CrossRef]
- Renner, R. Security of Quantum Key Distribution. arXiv 2006, arXiv:quant-ph/0512258. [Google Scholar] [CrossRef]
- Damgård, I.B.; Fehr, S.; Renner, R.; Salvail, L.; Schaffner, C. A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. In Proceedings of the Advances in Cryptology—CRYPTO 2007, Santa Barbara, CA, USA, 19–23 August 2007; Menezes, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 360–378. [Google Scholar]
- Renner, R.; König, R. Universally Composable Privacy Amplification Against Quantum Adversaries. In Theory of Cryptography; Springer: Berlin/Heidelberg, Germany, 2005; pp. 407–425. [Google Scholar] [CrossRef] [Green Version]
- Naor, M. Bit commitment using pseudorandomness. J. Cryptol. 1991, 4, 151–158. [Google Scholar] [CrossRef]
- HÅstad, J.; Impagliazzo, R.; Levin, L.A.; Luby, M. A Pseudorandom Generator from any One-way Function. SIAM J. Comput. 1999, 28, 1364–1396. [Google Scholar] [CrossRef]
- Haitner, I.; Reingold, O. Statistically-hiding commitment from any one-way function. In Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing—STOC’07, San Diego, CA, USA, 11–13 June 2007; ACM Press: New York, NY, USA, 2007. [Google Scholar] [CrossRef]
- Canetti, R.; Fischlin, M. Universally Composable Commitments. In Proceedings of the Advances in Cryptology—CRYPTO 2001, Santa Barbara, CA, USA, 19–23 August 2001; Kilian, J., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; pp. 19–40. [Google Scholar]
- Unruh, D. Concurrent Composition in the Bounded Quantum Storage Model. In Proceedings of the Advances in Cryptology—EUROCRYPT 2011, Tallinn, Estonia, 15–19 May 2011; Paterson, K.G., Ed.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 467–486. [Google Scholar]
- Müller-Quade, J.; Renner, R. Composability in quantum cryptography. New J. Phys. 2009, 11, 085006. [Google Scholar] [CrossRef] [Green Version]
- Ben-Or, M.; Mayers, D. General Security Definition and Composability for Quantum & Classical Protocols. arXiv 2004, arXiv:quant-ph/0409062. [Google Scholar]
- Unruh, D. Simulatable security for quantum protocols. arXiv 2004, arXiv:quant-ph/0409125. [Google Scholar]
- Canetti, R. Universally Composable Security. J. ACM 2020, 67, 1–94. [Google Scholar] [CrossRef]
- Maurer, U.; Renner, R. Abstract Cryptography. In Proceedings of the Second Symposium on Innovations in Computer Science, ICS 2011, Beijing, China, 7–9 January 2011; Chazelle, B., Ed.; Tsinghua University Press: Beijing, China, 2011; pp. 1–21. [Google Scholar]
- Mandayam, P.; Wehner, S. Achieving the physical limits of the bounded-storage model. Phys. Rev. A 2011, 83. [Google Scholar] [CrossRef] [Green Version]
- Wehner, S.; Wullschleger, J. Composable Security in the Bounded-Quantum-Storage Model. In Proceedings of the Automata, Languages and Programming, Reykjavik, Iceland, 7–11 July 2008; Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 604–615. [Google Scholar]
- Schaffner, C. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model. Phys. Rev. A 2010, 82, 032308. [Google Scholar] [CrossRef] [Green Version]
- Cachin, C.; Crepeau, C.; Marcil, J. Oblivious transfer with a memory-bounded receiver. In Proceedings of the Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280), Palo Alto, CA, USA, 8–11 November 1998. [Google Scholar] [CrossRef]
- Ding, Y.Z.; Harnik, D.; Rosen, A.; Shaltiel, R. Constant-Round Oblivious Transfer in the Bounded Storage Model. In Theory of Cryptography; Naor, M., Ed.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 446–472. [Google Scholar]
- Savvides, G. Interactive Hashing and Reductions between Oblivious Transfer Variants. Ph.D. Thesis, McGill University, School of Computer Science, Montreal, QC, Canada, 2007. [Google Scholar]
- Schaffner, C.; Terhal, B.M.; Wehner, S. Robust cryptography in the noisy-quantum-storage model. Quantum Inf. Comput. 2009, 9, 963–996. [Google Scholar] [CrossRef]
- Jain, N.; Stiller, B.; Khan, I.; Elser, D.; Marquardt, C.; Leuchs, G. Attacks on practical quantum key distribution systems (and how to prevent them). Contemp. Phys. 2016, 57, 366–387. [Google Scholar] [CrossRef] [Green Version]
- Mayers, D.; Yao, A.C. Self testing quantum apparatus. Quantum Inf. Comput. 2004, 4, 273–286. [Google Scholar] [CrossRef]
- Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kaniewski, J.; Wehner, S. Device-independent two-party cryptography secure against sequential attacks. New J. Phys. 2016, 18, 055004. [Google Scholar] [CrossRef] [Green Version]
- Ribeiro, J.; Thinh, L.P.; Kaniewski, J.; Helsen, J.; Wehner, S. Device independence for two-party cryptography and position verification with memoryless devices. Phys. Rev. A 2018, 97, 062307. [Google Scholar] [CrossRef] [Green Version]
- Acín, A.; Gisin, N.; Masanes, L. From Bell’s Theorem to Secure Quantum Key Distribution. Phys. Rev. Lett. 2006, 97, 120405. [Google Scholar] [CrossRef] [Green Version]
- Clauser, J.F.; Horne, M.A.; Shimony, A.; Holt, R.A. Proposed Experiment to Test Local Hidden-Variable Theories. Phys. Rev. Lett. 1969, 23, 880–884. [Google Scholar] [CrossRef] [Green Version]
- Broadbent, A.; Yuen, P. Device-Independent Oblivious Transfer from the Bounded-Quantum-Storage-Model and Computational Assumptions. arXiv 2021, arXiv:2111.08595. [Google Scholar]
- Metger, T.; Dulek, Y.; Coladangelo, A.; Arnon-Friedman, R. Device-independent quantum key distribution from computational assumptions. New J. Phys. 2021, 23, 123021. [Google Scholar] [CrossRef]
- Metger, T.; Vidick, T. Self-testing of a single quantum device under computational assumptions. Quantum 2021, 5, 544. [Google Scholar] [CrossRef]
- Peikert, C. A Decade of Lattice Cryptography; Cryptology ePrint Archive, Paper 2015/939; Now Publishers Inc.: Hanover, MA, USA, 2015. [Google Scholar]
- Ribeiro, J.; Wehner, S. On Bit Commitment and Oblivious Transfer in Measurement-Device Independent settings. arXiv 2020, arXiv:2004.10515. [Google Scholar]
- Lo, H.K.; Curty, M.; Qi, B. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [Green Version]
- Murta, G.; van Dam, S.B.; Ribeiro, J.; Hanson, R.; Wehner, S. Towards a realization of device-independent quantum key distribution. Quantum Sci. Technol. 2019, 4, 035011. [Google Scholar] [CrossRef] [Green Version]
- Sajeed, S.; Radchenko, I.; Kaiser, S.; Bourgoin, J.P.; Pappa, A.; Monat, L.; Legré, M.; Makarov, V. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing. Phys. Rev. A 2015, 91, 032326. [Google Scholar] [CrossRef] [Green Version]
- Zhou, Z.; Guang, Q.; Gao, C.; Jiang, D.; Chen, L. Measurement-Device-Independent Two-Party Cryptography with Error Estimation. Sensors 2020, 20, 6351. [Google Scholar] [CrossRef]
- Goldwasser, S.; Kalai, Y.T.; Rothblum, G.N. One-Time Programs. In Proceedings of the Advances in Cryptology—CRYPTO 2008, Santa Barbara, CA, USA, 17–21 August 2008; Wagner, D., Ed.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 39–56. [Google Scholar]
- Hausladen, P.; Wootters, W.K. A ‘Pretty Good’ Measurement for Distinguishing Quantum States. J. Mod. Opt. 1994, 41, 2385–2390. [Google Scholar] [CrossRef]
- Liu, Y.K. Single-Shot Security for One-Time Memories in the Isolated Qubits Model. In Proceedings of the Advances in Cryptology—CRYPTO 2014, Santa Barbara, CA, USA, 17–21 August 2014; Garay, J.A., Gennaro, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 19–36. [Google Scholar]
- Liu, Y.K. Privacy Amplification in the Isolated Qubits Model. In Proceedings of the Advances in Cryptology—EUROCRYPT 2015, Sofia, Bulgaria, 26–30 April 2015; Oswald, E., Fischlin, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2015; pp. 785–814. [Google Scholar]
- Colbeck, R.; Kent, A. Variable-bias coin tossing. Phys. Rev. A 2006, 73, 032320. [Google Scholar] [CrossRef] [Green Version]
- Kaniewski, J. Relativistic quantum cryptography. arXiv 2015, arXiv:1512.00602. [Google Scholar]
- Vilasini, V.; Portmann, C.; del Rio, L. Composable security in relativistic quantum cryptography. New J. Phys. 2019, 21, 043057. [Google Scholar] [CrossRef]
- Laneve, L.; del Rio, L. Impossibility of composable Oblivious Transfer in relativistic quantum cryptography. arXiv 2021, arXiv:2106.11200. [Google Scholar]
- Pitalúa-García, D.; Kerenidis, I. Practical and unconditionally secure spacetime-constrained oblivious transfer. Phys. Rev. A 2018, 98, 032327. [Google Scholar] [CrossRef] [Green Version]
- Pitalúa-García, D. One-out-of-m spacetime-constrained oblivious transfer. Phys. Rev. A 2019, 100, 012302. [Google Scholar] [CrossRef] [Green Version]
- He, G.P. Secure quantum weak oblivious transfer against individual measurements. Quantum Inf. Process. 2015, 14, 2153–2170. [Google Scholar] [CrossRef] [Green Version]
- Chailloux, A.; Kerenidis, I.; Sikora, J. Lower bounds for quantum oblivious transfer. Quantum Inf. Comput. 2013, 13, 158–177. [Google Scholar] [CrossRef]
- Chailloux, A.; Gutoski, G.; Sikora, J. Optimal bounds for semi-honest quantum oblivious transfer. Chic. J. Theor. Comput. Sci. 2016, 2016. [Google Scholar]
- Beaver, D. Precomputing Oblivious Transfer. In Proceedings of the Advances in Cryptology—CRYPT0’95, Santa Barbara, CA, USA, 27–31 August 1995; Coppersmith, D., Ed.; Springer: Berlin/Heidelberg, Germany, 1995; pp. 97–109. [Google Scholar]
- Osborn, S.; Sikora, J. A constant lower bound for any quantum protocol for secure function evaluation. arXiv 2022, arXiv:2203.08268. [Google Scholar]
- Gutoski, G.; Rosmanis, A.; Sikora, J. Fidelity of quantum strategies with applications to cryptography. Quantum 2018, 2, 89. [Google Scholar] [CrossRef]
- Amiri, R.; Stárek, R.; Reichmuth, D.; Puthoor, I.V.; Mičuda, M.; Ladislav Mišta, J.; Dušek, M.; Wallden, P.; Andersson, E. Imperfect 1-Out-of-2 Quantum Oblivious Transfer: Bounds, a Protocol, and its Experimental Implementation. PRX Quantum 2021, 2. [Google Scholar] [CrossRef]
- Gertner, Y.; Ishai, Y.; Kushilevitz, E.; Malkin, T. Protecting Data Privacy in Private Information Retrieval Schemes. J. Comput. Syst. Sci. 2000, 60, 592–629. [Google Scholar] [CrossRef] [Green Version]
- Giovannetti, V.; Lloyd, S.; Maccone, L. Quantum Private Queries. Phys. Rev. Lett. 2008, 100, 230502. [Google Scholar] [CrossRef] [Green Version]
- Giovannetti, V.; Lloyd, S.; Maccone, L. Quantum Private Queries: Security Analysis. IEEE Trans. Inf. Theory 2010, 56, 3465–3477. [Google Scholar] [CrossRef] [Green Version]
- Olejnik, L. Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 2011, 84, 022313. [Google Scholar] [CrossRef] [Green Version]
- Scarani, V.; Acín, A.; Ribordy, G.; Gisin, N. Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations. Phys. Rev. Lett. 2004, 92, 057901. [Google Scholar] [CrossRef] [Green Version]
- Gao, F.; Liu, B.; Wen, Q.Y.; Chen, H. Flexible quantum private queries based on quantum key distribution. Opt. Express 2012, 20, 17411–17420. [Google Scholar] [CrossRef] [Green Version]
- Rao, P.; Jakobi, M. Towards Communication-Efficient Quantum Oblivious Key Distribution. Phys. Rev. A 2012, 87, 012331. [Google Scholar] [CrossRef] [Green Version]
- Zhang, J.L.; Guo, F.Z.; Gao, F.; Liu, B.; Wen, Q.Y. Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 2013, 88, 022334. [Google Scholar] [CrossRef]
- Wei, C.Y.; Gao, F.; Wen, Q.Y.; Wang, T.Y. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol. Sci. Rep. 2014, 4, 7537. [Google Scholar] [CrossRef] [Green Version]
- Chan, P.; Lucio-Martinez, I.; Mo, X.; Simon, C.; Tittel, W. Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 2014, 4, 5233. [Google Scholar] [CrossRef] [Green Version]
- Gao, F.; Liu, B.; Huang, W.; Wen, Q. Postprocessing of the Oblivious Key in Quantum Private Query. IEEE J. Sel. Top. Quantum Electron. 2015, 21, 98–108. [Google Scholar] [CrossRef] [Green Version]
- Liu, B.; Gao, F.; Huang, W.; Wen, Q. QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 2015, 58, 100301. [Google Scholar] [CrossRef] [Green Version]
- Yang, Y.G.; Zhang, M.O.; Yang, R. Private database queries using one quantum state. Quantum Inf. Process. 2015, 14, 1017–1024. [Google Scholar] [CrossRef]
- Yu, F.; Qiu, D.; Situ, H.; Wang, X.; Long, S. Enhancing user privacy in SARG04-based private database query protocols. Quantum Inf. Process. 2015, 14, 4201–4210. [Google Scholar] [CrossRef]
- Wei, C.Y.; Wang, T.Y.; Gao, F. Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 2016, 93, 042318. [Google Scholar] [CrossRef]
- Yang, Y.G.; Liu, Z.C.; Li, J.; Chen, X.B.; Zuo, H.J.; Zhou, Y.H.; Shi, W.M. Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 2016, 380, 4033–4038. [Google Scholar] [CrossRef]
- Maitra, A.; Paul, G.; Roy, S. Device-independent quantum private query. Phys. Rev. A 2017, 95, 042344. [Google Scholar] [CrossRef] [Green Version]
- Wei, C.; Cai, X.; Liu, B.; Wang, T.; Gao, F. A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure. IEEE Trans. Comput. 2018, 67, 2–8. [Google Scholar] [CrossRef] [Green Version]
- Zhou, Y.H.; Bai, X.W.; Li, L.L.; Shi, W.M.; Yang, Y.G. A Quantum Private Query Protocol for Enhancing both User and Database Privacy. Commun. Theor. Phys. 2018, 69, 31. [Google Scholar] [CrossRef]
- Chang, Y.; Zhang, S.B.; Wan, G.g.; Yan, L.L.; Zhang, Y.; Li, X.Y. Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy. Int. J. Theor. Phys. 2019, 58, 2069–2080. [Google Scholar] [CrossRef]
- Du, Z.; Li, X. Robust High Capability QKD-Based Database Private Query. Int. J. Theor. Phys. 2019, 58, 391–398. [Google Scholar] [CrossRef]
- Ye, T.Y.; Li, H.K.; Hu, J.L. Semi-Quantum Private Query Protocol without Invoking the Measurement Capability of Classical User. Int. J. Theor. Phys. 2020. [Google Scholar] [CrossRef]
- Crépeau, C. Equivalence Between Two Flavours of Oblivious Transfers. In Proceedings of the Advances in Cryptology—CRYPTO’87, Santa Barbara, CA, USA, 16–20 August 1987; Pomerance, C., Ed.; Springer: Berlin/Heidelberg, Germany, 1988; pp. 350–354. [Google Scholar]
- He, G.P.; Wang, Z.D. Nonequivalence of two flavors of oblivious transfer at the quantum level. Phys. Rev. A 2006, 73, 044304. [Google Scholar] [CrossRef] [Green Version]
- Yang, Y.G.; Sun, S.J.; Pan, Q.X.; Xu, P. Quantum oblivious transfer based on unambiguous set discrimination. Optik 2015, 126, 3838–3843. [Google Scholar] [CrossRef]
- Yang, Y.G.; Yang, R.; Lei, H.; Shi, W.M.; Zhou, Y.H. Quantum oblivious transfer with relaxed constraints on the receiver. Quantum Inf. Process. 2015, 14, 3031–3040. [Google Scholar] [CrossRef]
- He, G.P.; Wang, Z.D. Oblivious transfer using quantum entanglement. Phys. Rev. A 2006, 73, 012331. [Google Scholar] [CrossRef] [Green Version]
- Brassard, G.; Crépeau, C.; Wolf, S. Oblivious Transfers and Privacy Amplification. J. Cryptol. 2003, 16, 219–237. [Google Scholar] [CrossRef]
- Stroh, L.; Stárek, R.; Horová, N.; Puthoor, I.V.; Dušek, M.; Andersson, E. A non-interactive XOR quantum oblivious transfer protocol. arXiv 2006, arXiv:2006.06671. [Google Scholar]
- Kundu, S.; Sikora, J.; Tan, E.Y.Z. A device-independent protocol for XOR oblivious transfer. Quantum 2022, 6, 725. [Google Scholar] [CrossRef]
- Zhang, M.; Li, J.; Shi, S.; Liu, Y.; Zheng, Q. A Novel Application of Probabilistic Teleportation: p-Rabin Quantum Oblivious Transfer of a Qubit. Int. J. Theor. Phys. 2019, 58, 3333–3341. [Google Scholar] [CrossRef]
- Wehner, S.; Curty, M.; Schaffner, C.; Lo, H.K. Implementation of two-party protocols in the noisy-storage model. Phys. Rev. A 2010, 81, 052336. [Google Scholar] [CrossRef] [Green Version]
- Erven, C.; Ng, N.; Gigov, N.; Laflamme, R.; Wehner, S.; Weihs, G. An experimental implementation of oblivious transfer in the noisy storage model. Nat. Commun. 2014, 5, 3418. [Google Scholar] [CrossRef] [Green Version]
- Furrer, F.; Gehring, T.; Schaffner, C.; Pacher, C.; Schnabel, R.; Wehner, S. Continuous-variable protocol for oblivious transfer in the noisy-storage model. Nat. Commun. 2018, 9, 1450. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Santos, M.B.; Mateus, P.; Pinto, A.N. Quantum Oblivious Transfer: A Short Review. Entropy 2022, 24, 945. https://doi.org/10.3390/e24070945
Santos MB, Mateus P, Pinto AN. Quantum Oblivious Transfer: A Short Review. Entropy. 2022; 24(7):945. https://doi.org/10.3390/e24070945
Chicago/Turabian StyleSantos, Manuel B., Paulo Mateus, and Armando N. Pinto. 2022. "Quantum Oblivious Transfer: A Short Review" Entropy 24, no. 7: 945. https://doi.org/10.3390/e24070945