Journal ArticleDOI
Quantum Oblivious Transfer
TLDR
A new design for a one-out-of-two oblivious transfer based on the transmission of polarized light is presented, improving the work of Wiesner and Bennett, Brassard, Breidbart and Wieser, and shows that the scheme is robust to general attacks.Abstract:
In a one-out-of-two oblivious transfer, a party Alice has two messages m 0, m 1 that she sends to another party Bob in such a way that he can decide to obtain either of them at his choosing, but not both. Alice never finds out which message Bob received. First introduced by Wiesner as ‘conjugate coding’, this cryptographic tool was later introduced to the world of public-key cryptography, first by Rabin (in a slightly different form) and then by Even, Goldreich and Lempel who named it after Rabin's primitive, called oblivious transfer. The one-out-of-two oblivious transfer was later shown to be extremely powerful in designing general cryptographic tools. The current paper presents a new design for a one-out-of-two oblivious transfer based on the transmission of polarized light, improving the work of Wiesner and Bennett, Brassard, Breidbart and Wiesner, and shows that the scheme is robust to general attacks.read more
Citations
More filters
Journal ArticleDOI
Unconditionally Secure Quantum Bit Commitment is Impossible
TL;DR: It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.
BookDOI
Advances in Cryptology — CRYPTO ’96
TL;DR: This work presents new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function, and proves that NMAC and HMAC are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths.
Dissertation
Security and Privacy in Radio-Frequency Identification Devices
TL;DR: Rivest et al. as discussed by the authors presented an introduction to RFID technology, identified several potential threats to security and privacy, and offered several practical proposals for efficient security mechanisms, including policy suggestions and discuss various open questions and areas of research.
Book ChapterDOI
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
TL;DR: The unconditional security of a quantum key distribution (QKD protocol on a noisy channel against the most general attack allowed by quantum physics was shown in this paper, using the fact that in a previous paper we have reduced the proof of the unconditionally security of this protocol to a proof that a corresponding Quantum String Oblivious Transfer (String-QOT) protocol would be unconditionally secure against Bob if implemented on top of an unconditional secure bit commitment scheme.
Book ChapterDOI
Committed Oblivious Transfer and Private Multi-Party Computation
TL;DR: This paper presents an efficient protocol for "Committed Oblivious Transfer" to perform oblivious transfer on committed bits, which connects Zero Knowledge proofs on BCs, Oblivious Circuit Evaluation and Private Multi-Party Computations in a conceptually simple and efficient way.
References
More filters
Proceedings ArticleDOI
Protocols for secure computations
TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Journal ArticleDOI
Conjugate coding
TL;DR: It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.
Journal ArticleDOI
A randomized protocol for signing contracts
TL;DR: The 1-out-of-2 oblivious transfer as discussed by the authors allows one party to transfer exactly one secret, out of two recognizable secrets, to his counterpart, while the sender is ignorant of which secret has been received.
Proceedings Article
A Randomized Protocol for Signing Contracts.
TL;DR: Randomized protocols for signing contracts, certified mail, and flipping a coin are presented and an implementation of the 1-out-of-2 oblivious transfer, using any public key cryptosystem, is presented.
Proceedings ArticleDOI
Achieving oblivious transfer using weakened security assumptions
Claude Crépeau,Joe Kilian +1 more
TL;DR: The authors present some general techniques for establishing the cryptographic strength of a wide variety of games and show that a noisy telephone line is in fact a very sophisticated cryptographic device.