1. Imperfect 1-Out-of-2 Quantum Oblivious Transfer: Bounds, a Protocol, and its Experimental Implementation
- Author
-
Miloslav Dusek, Ittoop Vergheese Puthoor, Michal Mičuda, Robert Stárek, Petros Wallden, Erika Andersson, Ryan Amiri, L. Mišta, and David Reichmuth
- Subjects
TheoryofComputation_MISCELLANEOUS ,Quantum Physics ,Theoretical computer science ,Oblivious transfer ,Computer science ,business.industry ,Cheating ,General Engineering ,FOS: Physical sciences ,Cryptography ,01 natural sciences ,010305 fluids & plasmas ,Quantum cryptography ,0103 physical sciences ,General Earth and Planetary Sciences ,Imperfect ,Quantum Physics (quant-ph) ,010306 general physics ,Quantum information science ,business ,Protocol (object-oriented programming) ,Quantum ,General Environmental Science - Abstract
Oblivious transfer is an important primitive in modern cryptography. Applications include secure multiparty computation, oblivious sampling, e-voting, and signatures. Information-theoretically secure perfect 1-out-of 2 oblivious transfer is impossible to achieve. Imperfect variants, where both participants' ability to cheat is still limited, are possible using quantum means while remaining classically impossible. Precisely what security parameters are attainable remains unknown. We introduce a theoretical framework for studying semirandom quantum oblivious transfer, which is shown to be equivalent to regular oblivious transfer in terms of cheating probabilities. We then use it to derive bounds on cheating. We also present a protocol with lower cheating probabilities than previous schemes, together with its optical realization. We show that a lower bound of 2/3 on the minimum achievable cheating probability can be directly derived for semirandom protocols using a different method and definition of cheating than used previously. The lower bound increases from 2/3 to approximately 0.749 if the states output by the protocol are pure and symmetric. The oblivious transfer scheme we present uses unambiguous state elimination measurements and can be implemented with the same technological requirements as standard quantum cryptography. The cheating probabilities are 3/4 and approximately 0.729 for sender and receiver respectively, which is lower than in existing protocols. Using a photonic test-bed, we have implemented the protocol with honest parties, as well as optimal cheating strategies., 22 pages, 1 figure, v2 moderate changes, published version
- Published
- 2021