Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions (2405.12121v2)

Published 20 May 2024 in quant-ph and cs.CR

Abstract: Oblivious transfer (OT) is a fundamental primitive for secure two-party computation. It is well known that OT cannot be implemented with information-theoretic security if the two players only have access to noiseless communication channels, even in the quantum case. As a result, weaker variants of OT have been studied. In this work, we rigorously establish the impossibility of cheat-sensitive OT, where a dishonest party can cheat, but risks being detected. We construct a general attack on any quantum protocol that allows the receiver to compute all inputs of the sender and provide an explicit upper bound on the success probability of this attack. This implies that cheat-sensitive quantum Symmetric Private Information Retrieval cannot be implemented with statistical information-theoretic security. Leveraging the techniques devised for our proofs, we provide entropic bounds on primitives needed for secure function evaluation. They imply impossibility results for protocols where the players have access to OT as a resource. This result significantly improves upon existing bounds and yields tight bounds for reductions of 1-out-of-n OT to a resource primitive. Our results hold in particular for transformations between a finite number of primitives and for any error.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (6)
  1. Colbeck, R.: The impossibility of secure two-party classical computation (2007). https://doi.org/10.1103/PhysRevA.76.062308
  2. Kilian, J.: Founding cryptography on oblivious transfer. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC ’88). pp. 20–31. ACM Press (1988). https://doi.org/10.1145/62212.62215
  3. Nayak, A.: Optimal lower bounds for quantum automata and random access codes. In: 40th Annual Symposium on Foundations of Computer Science. pp. 369–376 (1999). https://doi.org/10.1109/SFFCS.1999.814608
  4. Rudolph, T.: The laws of physics and cryptographic security (2002). https://doi.org/10.48550/arXiv.quant-ph/0202143
  5. Wilde, M.M.: Quantum Information Theory. Cambridge University Press (2013). https://doi.org/10.1017/CBO9781139525343
  6. Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (FOCS ’82). pp. 160–164 (1982). https://doi.org/10.1109/SFCS.1982.38

Summary

We haven't generated a summary for this paper yet.