Skip to main content
Top
Published in: Quantum Information Processing 8/2015

01-08-2015

Quantum oblivious transfer with relaxed constraints on the receiver

Authors: Yu-Guang Yang, Rui Yang, He Lei, Wei-Min Shi, Yi-Hua Zhou

Published in: Quantum Information Processing | Issue 8/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

All existing quantum oblivious transfer protocols can be achieved when all the members have to be quantum. So what will happen if not all the members are quantum? In this paper, we propose two novel protocols for all-or-nothing oblivious transfer and one-out-of-two oblivious transfer respectively by using single qubit states. Our contribution lies in the fact that the message receiver Bob can use fewer quantum resources so that our protocols relax the requirements of protocol implementation in practice. We analyze the security of the protocols and prove that they are secure against Bob who even has the quantum attack capability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE Press, New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE Press, New York (1984)
2.
go back to reference Mayers, D.: Unconditional secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414–3417 (1997)ADSCrossRef Mayers, D.: Unconditional secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414–3417 (1997)ADSCrossRef
3.
go back to reference Lo, H.K., Chau, H.F.: Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410–3413 (1997)ADSCrossRef Lo, H.K., Chau, H.F.: Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410–3413 (1997)ADSCrossRef
4.
go back to reference Mayers, D., Salvail, L.: Quantum oblivious transfer is secure against all individual measurements. In: Proceedings of the Third Workshop on Physics and Computation–PhysComp ’94, p. 69. IEEE Computer Society Press, Dallas (1994) Mayers, D., Salvail, L.: Quantum oblivious transfer is secure against all individual measurements. In: Proceedings of the Third Workshop on Physics and Computation–PhysComp ’94, p. 69. IEEE Computer Society Press, Dallas (1994)
6.
go back to reference Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1541–1162 (1997)CrossRef Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1541–1162 (1997)CrossRef
7.
go back to reference Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computational Laboratory (1981) Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computational Laboratory (1981)
8.
go back to reference Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)MathSciNetCrossRef Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)MathSciNetCrossRef
9.
go back to reference He, G.P., Wang, Z.D.: Oblivious transfer using quantum entanglement. Phys. Rev. A 73, 012331 (2006)ADSCrossRef He, G.P., Wang, Z.D.: Oblivious transfer using quantum entanglement. Phys. Rev. A 73, 012331 (2006)ADSCrossRef
10.
go back to reference Chen, I.C., Hwang, T., Li, C.M.: Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol. Phys. Scr. 78(3), 035005 (2008)MathSciNetADSCrossRef Chen, I.C., Hwang, T., Li, C.M.: Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol. Phys. Scr. 78(3), 035005 (2008)MathSciNetADSCrossRef
11.
go back to reference Yang, Y.G., Xu, P., Sun, S.J., et al.: Quantum oblivious transfer with an untrusted third party. Optik-Int. J. Light Electron Optics 125(18), 5409–5413 (2014)CrossRef Yang, Y.G., Xu, P., Sun, S.J., et al.: Quantum oblivious transfer with an untrusted third party. Optik-Int. J. Light Electron Optics 125(18), 5409–5413 (2014)CrossRef
12.
go back to reference Yang, Y.-G., Sun, S.-J., Wang, Y.: Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol. Int. J. Theor. Phys. 54(3), 910–916 (2015)MathSciNetCrossRef Yang, Y.-G., Sun, S.-J., Wang, Y.: Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol. Int. J. Theor. Phys. 54(3), 910–916 (2015)MathSciNetCrossRef
13.
go back to reference Li, Y.B., Wen, Q.Y., Qin, S., Guo, F.-Z., Sun, Y.: Practical quantum all-or-nothing oblivious transfer protocol. Quantum Inf. Process. 13, 131–139 (2014)ADSCrossRef Li, Y.B., Wen, Q.Y., Qin, S., Guo, F.-Z., Sun, Y.: Practical quantum all-or-nothing oblivious transfer protocol. Quantum Inf. Process. 13, 131–139 (2014)ADSCrossRef
14.
go back to reference Bennett, C.H., Brassard, G., Crépeau, C., Skubiszewska, M.H.: Practical quantum oblivious transfer. In: Proceedings of the Advances in Cryptology-Crypto’90, pp. 351–366. Springer, Berlin (1991) Bennett, C.H., Brassard, G., Crépeau, C., Skubiszewska, M.H.: Practical quantum oblivious transfer. In: Proceedings of the Advances in Cryptology-Crypto’90, pp. 351–366. Springer, Berlin (1991)
15.
go back to reference Damgard, I., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: Proceedings of 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pp. 449–458. IEEE (2005) Damgard, I., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: Proceedings of 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pp. 449–458. IEEE (2005)
16.
go back to reference Boyer, M., Kenigsberg, D., Mor, T.: Comment on “Quantum key distribution with classical Bob” reply. Phys. Rev. Lett. 102, 098902 (2009)MathSciNetADSCrossRef Boyer, M., Kenigsberg, D., Mor, T.: Comment on “Quantum key distribution with classical Bob” reply. Phys. Rev. Lett. 102, 098902 (2009)MathSciNetADSCrossRef
17.
19.
go back to reference Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNet Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNet
20.
go back to reference Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)ADSCrossRef Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)ADSCrossRef
21.
go back to reference Lin, S., Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping”. Phys. Rev. A 76, 036301 (2007)MathSciNetADSCrossRef Lin, S., Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping”. Phys. Rev. A 76, 036301 (2007)MathSciNetADSCrossRef
22.
go back to reference Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748–750 (2007)ADSCrossRef Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748–750 (2007)ADSCrossRef
23.
go back to reference Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “Experimental demonstration of a quantum protocol for Byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “Experimental demonstration of a quantum protocol for Byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef
24.
go back to reference Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)ADSCrossRef Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)ADSCrossRef
25.
go back to reference Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283, 192–195 (2010)ADSCrossRef Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283, 192–195 (2010)ADSCrossRef
26.
go back to reference Guo, F.Z., Qin, S.J., Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445–448 (2010)ADSCrossRef Guo, F.Z., Qin, S.J., Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445–448 (2010)ADSCrossRef
27.
go back to reference Yang, Y.-G., Chai, H.-P., Teng, Y.-W., Wen, Q.-Y.: Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles. Int. J. Theor. Phys. 50, 395–400 (2011)MathSciNetCrossRef Yang, Y.-G., Chai, H.-P., Teng, Y.-W., Wen, Q.-Y.: Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles. Int. J. Theor. Phys. 50, 395–400 (2011)MathSciNetCrossRef
28.
go back to reference Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976) Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976)
29.
go back to reference Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Advances in Cryptology: Proceedings of Eurocrypt’00, pp. 122–138 (2000) Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Advances in Cryptology: Proceedings of Eurocrypt’00, pp. 122–138 (2000)
30.
go back to reference Kilian, J.: Founding cryptography on oblivious transfer. In: Proceedings of 20th Annual ACM Symposium on the Theory of Computing (Chicago, IL, 1988), pp. 20–31. ACM Press, New York (1988) Kilian, J.: Founding cryptography on oblivious transfer. In: Proceedings of 20th Annual ACM Symposium on the Theory of Computing (Chicago, IL, 1988), pp. 20–31. ACM Press, New York (1988)
31.
go back to reference Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805–813 (2014)MathSciNetCrossRef Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805–813 (2014)MathSciNetCrossRef
32.
go back to reference Yang, Y.-G., Sun, S.-J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Optik-Int. J. Light Electron Optics 125, 5538–5541 (2014)CrossRef Yang, Y.-G., Sun, S.-J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Optik-Int. J. Light Electron Optics 125, 5538–5541 (2014)CrossRef
33.
go back to reference Yang, Y.-G., Zhang, M.O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017–1024 (2015)MathSciNetADSCrossRef Yang, Y.-G., Zhang, M.O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017–1024 (2015)MathSciNetADSCrossRef
34.
go back to reference Sun, S.-J., Yang, Y.-G., Zhang, M.O.: Relativistic quantum private database queries. Quantum Inf. Process. 14, 1443–1450 (2015)ADSCrossRef Sun, S.-J., Yang, Y.-G., Zhang, M.O.: Relativistic quantum private database queries. Quantum Inf. Process. 14, 1443–1450 (2015)ADSCrossRef
Metadata
Title
Quantum oblivious transfer with relaxed constraints on the receiver
Authors
Yu-Guang Yang
Rui Yang
He Lei
Wei-Min Shi
Yi-Hua Zhou
Publication date
01-08-2015
Publisher
Springer US
Published in
Quantum Information Processing / Issue 8/2015
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-1013-1

Other articles of this Issue 8/2015

Quantum Information Processing 8/2015 Go to the issue