Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
149 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Lower Bounds for Quantum Secure Function Evaluation Reductions (2405.12121v4)

Published 20 May 2024 in quant-ph and cs.CR

Abstract: One-sided output secure function evaluation is a cryptographic primitive where the two mutually distrustful players, Alice and Bob, both have a private input to a bivariate function. Bob obtains the value of the function for the given inputs, while Alice receives no output. It is known that this primitive cannot be securely implemented if the two players only have access to noiseless classical and quantum communication. In this work, we first show that Bob can extract the function values for all his possible inputs from any implementation of a non-trivial function that is correct and preserves the privacy of Bob's input. Our result holds in the non-asymptotic setting where the players have finite resources and the error is a constant. Then we consider protocols for secure function evaluation in a setup where the two players have access to trusted distributed randomness as a resource. Building upon the first result, we prove a bound on the efficiency of such cryptographic reductions for any non-trivial function in terms of the conditional entropies of the trusted randomness. From this result, we can derive lower bounds on the number of instances of different variants of OT needed to securely implement a given function.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (6)
  1. Colbeck, R.: The impossibility of secure two-party classical computation (2007). https://doi.org/10.1103/PhysRevA.76.062308
  2. Kilian, J.: Founding cryptography on oblivious transfer. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC ’88). pp. 20–31. ACM Press (1988). https://doi.org/10.1145/62212.62215
  3. Nayak, A.: Optimal lower bounds for quantum automata and random access codes. In: 40th Annual Symposium on Foundations of Computer Science. pp. 369–376 (1999). https://doi.org/10.1109/SFFCS.1999.814608
  4. Rudolph, T.: The laws of physics and cryptographic security (2002). https://doi.org/10.48550/arXiv.quant-ph/0202143
  5. Wilde, M.M.: Quantum Information Theory. Cambridge University Press (2013). https://doi.org/10.1017/CBO9781139525343
  6. Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (FOCS ’82). pp. 160–164 (1982). https://doi.org/10.1109/SFCS.1982.38

Summary

We haven't generated a summary for this paper yet.