On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols
نویسنده
چکیده
No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper’s ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao in the case of the security of a quantum oblivious transfer (QOT) protocol. We consider an extended OT task which, in addition to Alice and Sob, includes an eavesdropper Eve among the participants. An honest Eve is inactive and receives no information at all about Alice’s input when Bob and Alice are honest. We prove that the security of a QOX protocol against Bob implies its security against Eve as well as the security of a Q K D protocol.
منابع مشابه
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quantum 1-out-of-2 Oblivious Transfer and quantum Bit Commitment are presented and the uncertainty relation is used to prove the security of these protocols in the boundedquantum-storage model according to new strong secur...
متن کاملSimple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. König, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from König et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious trans...
متن کاملRobust cryptography in the noisy-quantum-storage model
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that quantum storage of qubits is noisy. In this work we analyze a protocol for the universal task of oblivious transfer that can be implemented using quantumkey-distribution (QKD) hardware in the practical setting where honest participants are unable to perform noise-free operations. We derive trade-o...
متن کاملQuantum Key Distribution and String Oblivious Transfer in Noisy Channels
We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally security of this QKD protocol to a proof that a corresponding Quantum String Oblivious Transfer (String-QOT) protocol would be unconditionally secu...
متن کاملCryptography and security: Quick reference
Part II Themes Communication in the presence of an adversary. Encryption; efficiency of encryption: important due to pervasive communication; Batch verification. Authentication. Key distribution. Access control. Crypto-analysis: Break hardness assumptions used in cryptography. Make better proofs of security. Proving the security of protocols. Code obfuscation: Hide your intent. 0 knowledge proo...
متن کامل