scispace - formally typeset
Journal ArticleDOI

Quantum Oblivious Transfer

Claude Crépeau
- 01 Dec 1994 - 
- Vol. 41, Iss: 12, pp 2445-2454
TLDR
A new design for a one-out-of-two oblivious transfer based on the transmission of polarized light is presented, improving the work of Wiesner and Bennett, Brassard, Breidbart and Wieser, and shows that the scheme is robust to general attacks.
Abstract
In a one-out-of-two oblivious transfer, a party Alice has two messages m 0, m 1 that she sends to another party Bob in such a way that he can decide to obtain either of them at his choosing, but not both. Alice never finds out which message Bob received. First introduced by Wiesner as ‘conjugate coding’, this cryptographic tool was later introduced to the world of public-key cryptography, first by Rabin (in a slightly different form) and then by Even, Goldreich and Lempel who named it after Rabin's primitive, called oblivious transfer. The one-out-of-two oblivious transfer was later shown to be extremely powerful in designing general cryptographic tools. The current paper presents a new design for a one-out-of-two oblivious transfer based on the transmission of polarized light, improving the work of Wiesner and Bennett, Brassard, Breidbart and Wiesner, and shows that the scheme is robust to general attacks.

read more

Citations
More filters
Journal ArticleDOI

Unconditionally Secure Quantum Bit Commitment is Impossible

TL;DR: It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.
BookDOI

Advances in Cryptology — CRYPTO ’96

Neal Koblitz
TL;DR: This work presents new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function, and proves that NMAC and HMAC are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths.
Dissertation

Security and Privacy in Radio-Frequency Identification Devices

TL;DR: Rivest et al. as discussed by the authors presented an introduction to RFID technology, identified several potential threats to security and privacy, and offered several practical proposals for efficient security mechanisms, including policy suggestions and discuss various open questions and areas of research.
Book ChapterDOI

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels

TL;DR: The unconditional security of a quantum key distribution (QKD protocol on a noisy channel against the most general attack allowed by quantum physics was shown in this paper, using the fact that in a previous paper we have reduced the proof of the unconditionally security of this protocol to a proof that a corresponding Quantum String Oblivious Transfer (String-QOT) protocol would be unconditionally secure against Bob if implemented on top of an unconditional secure bit commitment scheme.
Book ChapterDOI

Committed Oblivious Transfer and Private Multi-Party Computation

TL;DR: This paper presents an efficient protocol for "Committed Oblivious Transfer" to perform oblivious transfer on committed bits, which connects Zero Knowledge proofs on BCs, Oblivious Circuit Evaluation and Private Multi-Party Computations in a conceptually simple and efficient way.
References
More filters
Proceedings ArticleDOI

Protocols for secure computations

TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Journal ArticleDOI

Conjugate coding

TL;DR: It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.
Journal ArticleDOI

A randomized protocol for signing contracts

TL;DR: The 1-out-of-2 oblivious transfer as discussed by the authors allows one party to transfer exactly one secret, out of two recognizable secrets, to his counterpart, while the sender is ignorant of which secret has been received.
Proceedings Article

A Randomized Protocol for Signing Contracts.

TL;DR: Randomized protocols for signing contracts, certified mail, and flipping a coin are presented and an implementation of the 1-out-of-2 oblivious transfer, using any public key cryptosystem, is presented.
Proceedings ArticleDOI

Achieving oblivious transfer using weakened security assumptions

TL;DR: The authors present some general techniques for establishing the cryptographic strength of a wide variety of games and show that a noisy telephone line is in fact a very sophisticated cryptographic device.