2013
DOI: 10.1103/physreva.87.012331
|View full text |Cite
|
Sign up to set email alerts
|

Towards communication-efficient quantum oblivious key distribution

Abstract: Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DB b in such a way that (1) Alice learns DB b and only DB b and (2) Bob does not learn anything about Alice's choice b. While solutions to this problem in the classical domain rely largely on unproven computational complexity theoretic assumptions, it is also known that perfect solutions that guarantee both da… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(8 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…They avoid the assumptions of the no-go theorems [33,35] because their protocol is not perfectly concealing; that is, the sender may obtain some (limited) information about the receiver's choice. This protocol inspired several works that tried to improve on Jakobi's initial proposal [45][46][47][48][49][50][51][52][53][54][55][56][57][58][59]. Moreover, this concept was introduced earlier under a different name (weak string erasure) and with its security based on the noisy-storage model [60].…”
Section: Quantum Oblivious Keysmentioning
confidence: 99%
See 1 more Smart Citation
“…They avoid the assumptions of the no-go theorems [33,35] because their protocol is not perfectly concealing; that is, the sender may obtain some (limited) information about the receiver's choice. This protocol inspired several works that tried to improve on Jakobi's initial proposal [45][46][47][48][49][50][51][52][53][54][55][56][57][58][59]. Moreover, this concept was introduced earlier under a different name (weak string erasure) and with its security based on the noisy-storage model [60].…”
Section: Quantum Oblivious Keysmentioning
confidence: 99%
“…It is important to note that these oblivious keys are primarily generated through quantum processes [11,[45][46][47][48][49][50][51][52][53][54][55][56][57][58][59][60], and to the best of our knowledge, there are no classical protocols to generate them. For this reason, we may also call them QOKs.…”
Section: Quantum Oblivious Keysmentioning
confidence: 99%
“…Several modifications and advancements have been made towards the proposal of the first implementable QPQ scheme by Jakobi et al [16], which was based on a Quantum key distribution (QKD) protocol [17]. This was followed by a flexible generalization by Gao et al [18] and further efficiency improvements suggested by Rao and Jakobi [19]. Zhang et al [20] proposed a QPQ protocol based on the counterfactual QKD scheme [21] and Yang et al developed a flexible QPQ protocol [22] based on the B92 QKD scheme [23].…”
Section: Introductionmentioning
confidence: 99%
“…In light of these negative results, protocols for SPIR have largely evolved to cheat-sensitive protocols, also known as quantum private query [ 11 ]. Examples of these protocols include those based on quantum oblivious key distribution [ 12 , 13 , 14 , 15 , 16 ], those based on sending states to a database oracle [ 17 , 18 ], and those based on round-robin QKD protocol [ 19 ]. In these protocols, the parties are averse to being caught cheating, so cheat-detection strategies allows one to construct protocols with more relaxed conditions as compared to those of SPIR [ 20 ].…”
Section: Introductionmentioning
confidence: 99%