v 1 1 1 Ja n 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
نویسندگان
چکیده
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit commitment protocol. The protocol he constructed satisfy both the correctness and the privacy for Alice with probability 1 − εn, the privacy for Bob with probability 1 2 . In this paper, we show that quantum can be constructed using only the Bell states, and the scheme satisfies the correctness and the privacy for Alice with probability 1, the privacy for Bob with probability 1 2 . Furthermore, we show the relations between the OTs, i.e. Bit-QOT 2 can be constructed using String-QOT 2 , String-QOT n can be constructed using String-QOT 2 , String-QOTm n can be constructed using String-QOT n , and vice versa. We get the conclusion that String-QOT n can be constructed using Bit-QOT 2 and vice versa. So, String-QOTm n and Bit-QOTm n can be constructed by the Bit-QOT 2 . Finally, We show that quantum bit commitment and quantum coin flipping can be constructed using QOT.
منابع مشابه
ar X iv : q ua nt - p h / 04 01 05 7 v 3 1 6 Fe b 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of the secure quantum b...
متن کاملeb 2 00 4 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...
متن کاملua nt - p h / 04 08 10 8 v 1 1 7 A ug 2 00 4 Statistically Secure Quantum Oblivious Transfer ∗
Abstract. In 1997, Lo claimed that Quantum Oblivious Transfer (QOT) is impossible. The result implies severe setback for quantum cryptography. However, it is based on a hypothesis. i.e. to prevent Alice from learning Bob’s choice in the scheme, the reduced density matrices in Alice’s hand for the two cases must be the same. Actually, to prevent Alice from learning his choice, Bob can send the q...
متن کاملA Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
In the various 1-out-of-n distributed oblivious transfer protocols (DOT) designed in an unconditionally secure environment, a receiver contacts k out of m servers to obtain one of the n secrets held by a sender. After a protocol has been executed, the sender has no information on the choice of the receiver and the receiver has no information on the secrets she did not obtain. Likewise, a coalit...
متن کاملEfficient 1-Out-n Oblivious Transfer Schemes
In this paper we propose an efficient (string) OT 1 n scheme for any n ≥ 2. We build our OT 1 n scheme from fundamental cryptographic techniques directly. It achieves optimal efficiency in terms of the number of rounds and the total number of exchanged messages for the case that the receiver’s choice is unconditionally secure. The computation time of our OT 1 n scheme is very efficient, too. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008