2017
DOI: 10.48550/arxiv.1703.03754
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The Quantum Cut-and-Choose Technique and Quantum Two-Party Computation

Abstract: The application and analysis of the Cut-and-Choose technique in protocols secure against quantum adversaries is not a straightforward transposition of the classical case, among other reasons due to the difficulty to use "rewinding" in the quantum realm. We introduce a Quantum Computation Cut-and-Choose (QC-CC) technique which is a generalisation of the classical Cut-and-Choose in order to build quantum protocols secure against quantum covert adversaries. Such adversaries can essentially deviate arbitrarily pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…The second type of applications involves the family of protocols for which their quantum communication consists of random single qubits as the ones provided by QFactory, such as: quantum-key-distribution [BB84], quantum money [BOV + 18], quantum coin-flipping [PCDK11], quantum signatures [WDKA15], two-party quantum computation [KW17,KMW17], multiparty quantum computation [KP17], etc.…”
Section: Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…The second type of applications involves the family of protocols for which their quantum communication consists of random single qubits as the ones provided by QFactory, such as: quantum-key-distribution [BB84], quantum money [BOV + 18], quantum coin-flipping [PCDK11], quantum signatures [WDKA15], two-party quantum computation [KW17,KMW17], multiparty quantum computation [KP17], etc.…”
Section: Applicationsmentioning
confidence: 99%
“…A way forward: The ultimate goal would be to extent QFactory into a Quantum Universal Composable protocol [Unr10] in order to be able to compose it with any other protocol, or at least to proof the security against a malicious adversary. In classical protocols (and recently in quantum too [KMW17]), the way to boost the security from honest-but-curious to malicious is to introduce a "compiler" (e.g. using the construction in [GMW87] or a cut-and-choose technique) and boost the security by essentially enforcing the honest-but-curious behaviour to malicious adversaries (or abort).…”
Section: Issue 2 (Verification)mentioning
confidence: 99%
See 1 more Smart Citation
“…The case of a dishonest majority was thus far only considered for k = 2 parties, where one of the two players can be dishonest [DNS10, DNS12, KMW17] 1 . These protocols are based on different cryptographic techniques, in particular quantum authentication codes in conjunction with classical MPC [DNS10,DNS12] and quantum-secure bit commitment and oblivious transfer [KMW17].…”
Section: Introductionmentioning
confidence: 99%
“…This is very much in the spirit of a cryptographic technique known as cut-and-choose[62], which has also been used in the context of testing quantum states[63].…”
mentioning
confidence: 99%