scispace - formally typeset
Open AccessJournal ArticleDOI

On the Computational Collapse of Quantum Information

TLDR
The first quantum black-box reduction for the security of QMC to the binding property of the string commitment is given, which provides a construction for 1--2-oblivious transfer that is computationally secure against the receiver and unconditionally secureagainst the sender from any string commitment scheme satisfying a weak binding property.
Abstract
We analyze the situation where computationally binding string commitment schemes are used to force the receiver of a BB84 encoding of a classical bitstring to measure upon reception. Since measuring induces an irreversible collapse to the received quantum state, even given extra information after the measurement does not allow the receiver to evaluate reliably some predicates apply to the classical bits encoded in the state. This fundamental quantum primitive is called quantum measure commitment (QMC) and allows for secure two-party computation of classical functions. An adversary to QMC is one that can both provide valid proof of having measured the received states while still able to evaluate a predicate applied to the classical content of the encoding. We give the first quantum black-box reduction for the security of QMC to the binding property of the string commitment. We characterize a class of quantum adversaries against QMC that can be transformed into adversaries against a weak form for the binding property of the string commitment. Our result provides a construction for 1--2-oblivious transfer that is computationally secure against the receiver and unconditionally secure against the sender from any string commitment scheme satisfying a weak binding property.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

A formal model for trust in dynamic networks

TL;DR: A novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same time a trust and an information partial order are proposed.
Proceedings ArticleDOI

A functional correspondence between evaluators and abstract machines

TL;DR: The gap between functional evaluators and abstract machines for the λ-calculus is bridged using closure conversion, transformation into continuation-passing style, and defunctionalization, and the Categorical Abstract Machine is considered.
Journal ArticleDOI

A complexity analysis of functional interpretations

TL;DR: A quantitative analysis of Godel's functional interpretation and its monotone variant is given and upper bounds in basic proof data are given on the depth, size, maximal type degree and maximal type arity of the extracted terms as well as on the Depth of the verifying proof.
Journal ArticleDOI

Jeeg: temporal constraints for the synchronization of concurrent objects

TL;DR: Jeeg, a dialect of Java based on a declarative replacement of the synchronization mechanisms of Java that results in a complete decoupling of the ‘business’ and the ’synchronization’ code of classes is introduced.
Book ChapterDOI

Efficient Algorithms for GCD and Cubic Residuosity in the Ring of Eisenstein Integers

TL;DR: Simple and efficient algorithms for computing gcd and cubic residuosity in the ring of Eisenstein integers, Z[ζ], i.e. the integers extended with ζ, a complex primitive third root of unity are presented.
References
More filters
Book

Quantum Computation and Quantum Information

TL;DR: In this article, the quantum Fourier transform and its application in quantum information theory is discussed, and distance measures for quantum information are defined. And quantum error-correction and entropy and information are discussed.

Quantum Computation and Quantum Information

TL;DR: This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.
Journal ArticleDOI

Elementary gates for quantum computation.

TL;DR: U(2) gates are derived, which derive upper and lower bounds on the exact number of elementary gates required to build up a variety of two- and three-bit quantum gates, the asymptotic number required for n-bit Deutsch-Toffoli gates, and make some observations about the number of unitary operations on arbitrarily many bits.
Proceedings ArticleDOI

A hard-core predicate for all one-way functions

TL;DR: This paper proves a conjecture of [Levin 87, sec. 5.6.2] that the scalar product of Boolean vectors p, g, x is a hard-core of every one-way function ƒ, and extends to multiple (up to the logarithm of security) such bits and to any distribution on the x.
Related Papers (5)