Computational Collapse of Quantum State with Application to Oblivious Transfer
نویسندگان
چکیده
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2 quantum oblivious transfer. This reduction proposed by Crépeau and Kilian was proved secure against any receiver by Yao, in the case where perfect commitments are used. However, quantum commitments would normally be based on computational assumptions. A natural question therefore arises: What happens to the security of the above reduction when computationally secure commitments are used instead of perfect ones? In this paper, we address the security of 1−2 QOT when computationally binding string commitments are available. In particular, we analyse the security of a primitive called Quantum Measurement Commitment when it is constructed from unconditionally concealing but computationally binding commitments. As measuring a quantum state induces an irreversible collapse, we describe a QMC as an instance of “computational collapse of a quantum state”. In a QMC a state appears to be collapsed to a polynomial time observer who cannot extract full information about the state without breaking a computational assumption. We reduce the security of QMC to a weak binding criteria for the string commitment. We also show that secure QMCs implies QOT using a straightforward variant of the reduction above. † Funded by the Danish National Research Foundation. ‡ FICS, Foundations in Cryptography and Security, funded by the Danish Natural Sciences Research Council. Part of this research was done while visiting University of Århus and was funded by Québec’s FQRNT and MDER, and Canada’s NSERC and MITACS. Part of this research was funded by NSERC This work has been supported in part by the National Science Foundation under Grant No. EIA-0086038. † Part of this research was funded by European projects QAIP and PROSECCO. M. Naor (Ed.): TCC 2004, LNCS 2951, pp. 374–393, 2004. c © Springer-Verlag Berlin Heidelberg 2004 Computational Collapse of Quantum State 375
منابع مشابه
On the Computational Collapse of Quantum Information
We analyze the situation where computationally binding string commitment schemes are used to force the receiver of a BB84 encoding of a classical bitstring to measure upon reception. Since measuring induces an irreversible collapse to the received quantum state, even given extra information after the measurement does not allow the receiver to evaluate reliably some predicates apply to the class...
متن کاملLong distance quantum cryptography made simple
Any two-party cryptographic primitive can be implemented using quantum communication under the assumption that it is difficult to store a large number of quantum states perfectly. However, achieving reliable quantum communication over long distances remains a difficult problem. Here, we consider a large network of nodes with only neighboring quantum links. We exploit properties of this cloud of...
متن کاملBit-string oblivious transfer based on quantum state computational distinguishability
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not. Since Shor’s quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that f...
متن کاملOblivious transfer based on quantum state computational distinguishability
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not. Since Shor’s quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that f...
متن کاملTowards Communication-Efficient Quantum Oblivious Key Distribution
Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DBb in such a way that (1) Alice learns DBb and only DBb and (2) Bob does not learn anything about Alice’s choice b. While solutions to this problem in the classical domain rely largely on unpr...
متن کامل