Literature DB >> 35885167

Quantum Oblivious Transfer: A Short Review.

Manuel B Santos1,2, Paulo Mateus1,2, Armando N Pinto3,4.   

Abstract

Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations. Although much of the work in this field covers quantum key distribution (QKD), there have been some crucial steps towards the understanding and development of quantum oblivious transfer (QOT). One can show the similarity between the application structure of both QKD and QOT primitives. Just as QKD protocols allow quantum-safe communication, QOT protocols allow quantum-safe computation. However, the conditions under which QOT is fully quantum-safe have been subject to intense scrutiny and study. In this review article, we survey the work developed around the concept of oblivious transfer within theoretical quantum cryptography. We focus on some proposed protocols and their security requirements. We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.

Entities:  

Keywords:  oblivious transfer; private database query; quantum cryptography; secure multiparty computation

Year:  2022        PMID: 35885167      PMCID: PMC9320716          DOI: 10.3390/e24070945

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.738


  17 in total

1.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

Authors:  Valerio Scarani; Antonio Acín; Grégoire Ribordy; Nicolas Gisin
Journal:  Phys Rev Lett       Date:  2004-02-06       Impact factor: 9.161

2.  Measurement-device-independent quantum key distribution.

Authors:  Hoi-Kwong Lo; Marcos Curty; Bing Qi
Journal:  Phys Rev Lett       Date:  2012-03-30       Impact factor: 9.161

3.  Quantum cryptography based on Bell's theorem.

Authors: 
Journal:  Phys Rev Lett       Date:  1991-08-05       Impact factor: 9.161

4.  From Bell's theorem to secure quantum key distribution.

Authors:  Antonio Acín; Nicolas Gisin; Lluis Masanes
Journal:  Phys Rev Lett       Date:  2006-09-20       Impact factor: 9.161

5.  Uncertainty relation for smooth entropies.

Authors:  Marco Tomamichel; Renato Renner
Journal:  Phys Rev Lett       Date:  2011-03-16       Impact factor: 9.161

6.  Complete insecurity of quantum protocols for classical two-party computation.

Authors:  Harry Buhrman; Matthias Christandl; Christian Schaffner
Journal:  Phys Rev Lett       Date:  2012-10-17       Impact factor: 9.161

7.  An experimental implementation of oblivious transfer in the noisy storage model.

Authors:  C Erven; N Ng; N Gigov; R Laflamme; S Wehner; G Weihs
Journal:  Nat Commun       Date:  2014-03-12       Impact factor: 14.919

8.  Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP.

Authors:  Charles H Bennett; Gilles Brassard; Seth Breidbart
Journal:  Nat Comput       Date:  2014       Impact factor: 1.690

9.  Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol.

Authors:  Chun-Yan Wei; Fei Gao; Qiao-Yan Wen; Tian-Yin Wang
Journal:  Sci Rep       Date:  2014-12-18       Impact factor: 4.379

Review 10.  A Review of Security Evaluation of Practical Quantum Key Distribution System.

Authors:  Shihai Sun; Anqi Huang
Journal:  Entropy (Basel)       Date:  2022-02-10       Impact factor: 2.524

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.