Actively Secure Two-Party Evaluation of Any Quantum Operation

نویسندگان

  • Frédéric Dupuis
  • Jesper Buus Nielsen
  • Louis Salvail
چکیده

We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, tracepreserving map F ∈ L(Ain ⊗ Bin) → L(Aout ⊗ Bout), given as a quantum circuit, upon their joint quantum input state ρin ∈ D(Ain ⊗ Bin). Our protocol leaks no more to any active adversary than an ideal functionality for F provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fully Simulatable Quantum-Secure Coin-Flipping and Applications

We propose a coin-flip protocol which yields a string of strong, random coins and is fully simulatable against poly-sized quantum adversaries on both sides. It can be implemented with quantum-computational security without any set-up assumptions, since our construction only assumes mixed commitment schemes which we show how to construct in the given setting. We then show that the interactive ge...

متن کامل

Classical Cryptographic Protocols in a Quantum World

Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: what classical...

متن کامل

Actively Secure Private Function Evaluation

We propose the first general framework for designing actively secure private function evaluation (PFE), not based on universal circuits. Our framework is naturally divided into pre-processing and online stages and can be instantiated using any generic actively secure multiparty computation (MPC) protocol. Our framework helps address the main open questions about efficiency of actively secure PF...

متن کامل

Susceptible Two-Party Quantum Computations

In secure two-party function evaluation Alice holding initially a secret input x and Bob having a secret input y communicate to determine a prescribed function f(x, y) in such a way that after the computation Bob learns f(x, y) but nothing more about x other than he could deduce from y and f(x, y) alone, and Alice learns nothing. Unconditionally secure function evaluation is known to be essenti...

متن کامل

Analysis and Extensions of the PCF Secure Two-Party Computation Compiler Analyse und Erweiterungen des PCF Secure Two-Party Computation Compilers

English In 2013, the Portable Circuit Format (PCF) project was started to improve the way circuits for secure computation can efficiently be built, stored and evaluated. Secure computation is a growing field of cryptography, especially in the last decade and allows two or more parties to jointly evaluate a common function over their inputs without the need to disclose any information but the fi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012