ar X iv : q ua nt - p h / 04 01 05 7 v 3 1 6 Fe b 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗

نویسندگان

  • Tianming Bu
  • Hong Zhu
چکیده

Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of the secure quantum bit commitment protocol. The protocol he constructed satisfy both the correctness and the privacy for Alice with probability 1−εn, the privacy for Bob with probability 1 2 . In this paper, we show that quantum can be constructed using only the Bell states, and the scheme satisfies the correctness and the privacy for Alice with probability 1, the privacy for Bob with probability 1 2 . Furthermore, we show the relations between the OTs, i.e. Bit-QOT 2 can be constructed using String-QOT 2 , String-QOT n can be constructed using String-QOT 2 , String-QOTm n can be constructed using String-QOT n , and vice versa. We get the conclusion that String-QOT n can be constructed using Bit-QOT 2 and vice versa. So, String-QOTm n and Bit-QOTm n can be constructed by the Bit-QOT 2 . Finally, We show that quantum bit commitment and quantum coin flipping can be constructed using QOT.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ar X iv : q ua nt - p h / 03 05 10 0 v 2 1 0 Fe b 20 04 Polynomial Time Quantum Computation with Advice ∗

Advice is supplementary information that enhances the computational power of an underlying computation. This paper focuses on advice that is given in the form of a pure quantum state and examines the influence of such advice on the behaviors of an underlying polynomial-time quantum computation with bounded-error probability.

متن کامل

ar X iv : q ua nt - p h / 07 02 07 4 v 1 7 F eb 2 00 7 QBC 3 : An Unconditionally Secure Quantum Bit Commitment Protocol

This article describes an unconditionally secure quantum bit commitment protocol, QBC3, based on entanglement destruction via forced measurements. Some comments on the current status of the field are also made.

متن کامل

ar X iv : q ua nt - p h / 04 05 01 1 v 1 3 M ay 2 00 4 Decoherence alias Loschmidt echo of the environment

T. Gorin, T. Prosen, T. H. Seligman, 4 and W. T. Strunz Theoretische Quantendynamik, Albert-Ludwigs-Universität, Hermann-Herder-Str. 3, 79104 Freiburg, Germany Physics Department, Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia Centro Internacional de Ciencias, C.P. 62131 Cuernavaca, Morelos Mexico Centro de Ciencias F́ısicas, University of ...

متن کامل

ar X iv : q ua nt - p h / 02 03 04 6 v 1 1 1 M ar 2 00 2 Quantum imaging

We provide a brief overview of the newly born field of quantum imaging, and discuss some concepts that lie at the root of this field.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008