Impossibility of unconditionally secure scalar products
نویسندگان
چکیده
The ability to perform scalar products of two vectors, each known to a different party, is a central problem in privacy preserving data mining and other multi party computation problems. Ongoing search for both efficient and secure scalar product protocols has revealed that this task is not easy. In this paper we show that, indeed, scalar products can never be made secure in the information theoretical sense. We show that any attempt to make unconditionally secure scalar products will always allow one of the parties to learn the other parties input vector with high probability. On the other hand, we show that under various assumptions, such as the existence of a trusted third party, both efficient and secure scalar products do exist.
منابع مشابه
ar X iv : q ua nt - p h / 03 05 14 4 v 2 8 Ju l 2 00 3 How to Build Unconditionally Secure Quantum Bit Commitment Protocols ∗
The “impossibility proof” on unconditionally secure quantum bit commitment is critically analyzed. Many possibilities for obtaining a secure bit commitment protocol are indicated, purely on the basis of two-way quantum communications, which are not covered by the impossibility proof formulation. They are classified under six new types of protocols, with security proofs for specific examples on ...
متن کاملWhy There Is No Impossibility Theorem on Secure Quantum Bit Commitment
There is a nearly universal acceptance of the general impossibility1−4 of secure quantum bit commitment (QBC), taken to be a consequence of the EinsteinPodolsky-Rosen (EPR) type entanglement cheating which rules out QBC and other quantum protocols that have been proposed for various cryptographic objectives. Since there is no characterization of all possible QBC protocols, logically there can b...
متن کاملua nt - p h / 00 06 10 9 v 7 18 O ct 2 00 0 UNCONDITIONALLY SECURE QUANTUM BIT COMMITMENT IS POSSIBLE Horace
Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a ge...
متن کاملMaking An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment)
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the rst time thirteen years ago. Bit commitment is suucient in quantum cryptography to realize a variety of applications with unconditional security. In 1993, a quantum bit commitment protocol was proposed together with a security proof. However, a basic aw in the protocol was discov...
متن کاملA brief review on the impossibility of quantum bit commitment
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the first time thirteen years ago. Bit commitment is sufficient in quantum cryptography to realize a variety of applications with unconditional security. In 1993, a quantum bit commitment protocol was proposed together with a security proof. However, a basic flaw in the protocol was ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Data Knowl. Eng.
دوره 68 شماره
صفحات -
تاریخ انتشار 2009