Quantum Oblivious Transfer is Secure Against IndividualMeasurements (
نویسندگان
چکیده
In this paper we show that the BBCS-protocol implementing one of the most important cryptographic primitives oblivious transfer, is secure against any individual measurement allowed by quantum mechanics. We analyze the common situation where successive measurements on the same photon could be used to cheat in the protocol. We model this situation by using a single inner-product-preserving operator (IPP) followed by a complete composite outcome Von Neumann measurement. A lower bound on the residual collision entropy is then obtained under the assumption that only individual measurements can be performed. This bound is used to apply privacy ampliication techniques in order to conclude the security of the BBCS-protocol.
منابع مشابه
Quantum oblivious transfer protocols based on EPR states
We describe efficient protocols for quantum oblivious transfer and for one-out-of-two quantum oblivious transfer. These protocols, which can be implemented with present technology, are secure against general attacks as long as the cheater can not store the bit for an arbitrarily long period of time.
متن کاملSimple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. König, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from König et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious trans...
متن کاملA simple quantum oblivious transfer protocol
A simple and efficient protocol for quantum oblivious transfer is proposed. The protocol can easily be implemented with present technology and is secure against cheaters with unlimited computing power provided the receiver does not have the technology to store the particles for an arbitrarily long period of time. The proposed protocol is a significant improvement over the previous protocols. Un...
متن کاملQuantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding
Oblivious transfer protocols (R-OT and OT1) are presented based on nonorthogonal states transmission, and the bit commitment protocols on the top of OT1 are constructed. Although these OT protocols are all unconditional secure, the bit commitment protocols based on OT protocols are not secure against attack similar to that presented by no-go theorem.
متن کاملQuantum oblivious transfer protocol based on entangled states
We describe an efficient protocol for quantum oblivious transfer. The protocol, which can be implemented with present technology, is secure against cheaters with unlimited computing power and with the ability to store the particles for an arbitrarily long period of time. The protocol is based on the following two entangled states: | Φ〉 = 1 √ 2 (|↑↑〉+ |↓ x〉) and |Ψ〉 = 1 √ 2 (|↑↑〉+ |↓ −x〉). PACS ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1994