Title :
A Computationally Secure Quantum Oblivious Transfer Scheme
Author :
Lü, Xin ; Ma, Zhi ; Feng, Deng-Guo
Author_Institution :
State Key Lab. of Inf. Security, Chinese Acad. of Sci., Beijing
Abstract :
Oblivious transfer is an important primitive in modern cryptography and is widely utilized in designing more complex protocols. In a one-out-of-two oblivious transfer, a party Alice has two messages x 0, x1 send to another party Bob in such a way that he can decide to obtain one of them at his choice but not both. In the literature (A. Kawachi et al., EUROCRYPT 2005, 268-284), the quantum states ppi + and ppi - are used as public keys to construct an encryption algorithm. In the paper, we further demonstrate that, for pi ne thetas, the quantum states ppi plusmn and pthetas plusmn can´t been distinguished by quantum computers. Using this result, we devise a one-out-of-two oblivious transfer scheme, in which any cheating of the entities are detected at the end of the protocol. Correctness and privacy of this protocol are analyzed and results show that the proposed scheme is computationally secured
Keywords :
quantum computing; quantum cryptography; transport protocols; complex protocols; computationally secure transfer scheme; encryption algorithm; modern cryptography; one-out-of-two oblivious transfer; public keys; quantum computers; quantum oblivious transfer scheme; quantum states; Cryptographic protocols; Helium; Information security; Laboratories; Performance evaluation; Privacy; Public key cryptography; Quantum computing; Quantum mechanics; Registers; Information security; oblivious transfer; quantum cryptography;
Conference_Titel :
Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference
Conference_Location :
Phoenix Park
Print_ISBN :
89-5519-129-4
DOI :
10.1109/ICACT.2006.206280