Post-Quantum Multi-Party Computation
نویسندگان
چکیده
We initiate the study of multi-party computation for classical functionalities in plain model, with security against malicious quantum adversaries. observe that existing techniques readily give a polynomial-round protocol, but our main result is construction constant-round post-quantum computation. assume mildly super-polynomial hardness learning errors (LWE), and polynomial an LWE-based circular assumption. Along way, we develop following cryptographic primitives may be independent interest: To prove new straight-line non-black-box simulation technique parallel sessions does not clone adversary’s state. This also relevant to setting.
منابع مشابه
Multi-party Quantum Computation
We investigate definitions of and protocols for multi-party quantum computing in the scenario where the secret data are quantum systems. We work in the quantum information-theoretic model, where no assumptions are made on the computational power of the adversary. For the slightly weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (o...
متن کاملUniversally Composable Quantum Multi-party Computation
The Universal Composability model (UC) by Canetti (FOCS 2001) allows for secure composition of arbitrary protocols. We present a quantum version of the UC model which enjoys the same compositionality guarantees. We prove that in this model statistically secure oblivious transfer protocols can be constructed from commitments. Furthermore, we show that every statistically classically UC secure pr...
متن کاملOutsourcing Multi-Party Computation
We initiate the study of secure multi-party computation (MPC) in a server-aided setting, where the parties have access to a single server that (1) does not have any input to the computation; (2) does not receive any output from the computation; but (3) has a vast (but bounded) amount of computational resources. In this setting, we are concerned with designing protocols that minimize the computa...
متن کاملov 2 00 1 Multi - party Quantum Computation
We investigate definitions of and protocols for multi-party quantum computing in the scenario where the secret data are quantum systems. We work in the quantum information-theoretic model, where no assumptions are made on the computational power of the adversary. For the slightly weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (o...
متن کاملQuantum And Relativistic Protocols For Secure Multi-Party Computation
Secure multi-party computation is a task whereby mistrustful parties attempt to compute some joint function of their private data in such a way as to reveal as little as possible about it. It encompasses many cryptographic primitives, including coin tossing and oblivious transfer. Ideally, one would like to generate either a protocol or a no-go theorem for any such task. Very few computations o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-77870-5_16