2023
DOI: 10.1088/1367-2630/accf32
|View full text |Cite
|
Sign up to set email alerts
|

Device-independent oblivious transfer from the bounded-quantum-storage-model and computational assumptions

Abstract: We present a device-independent protocol for oblivious transfer (DIOT) and analyze its security under the assumption that the receiver's quantum storage is bounded during protocol execution and that the device behaves independently and identically in each round. We additionally require that, for each device component, the input corresponding to the choice of measurement basis, and the resulting output, is communicated only with the party holding that component. Our protocol is everlastingly secure and, compare… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 28 publications
(29 reference statements)
0
1
0
Order By: Relevance
“…(i) This proposal assumes that the measurement devices and state generation device, involved follow the principles of quantum mechanics and the corresponding outcomes are determined by the Born rule. (ii) We follow the similar assumptions here like the recent DI Oblivious Transfer proposal in [31]. That means for this proposal, we assume that the measurement and state generation devices are described by independent Hilbert spaces and the devices operate independently and identically in all trials.…”
Section: Assumptions For Our Di-qpq Proposalmentioning
confidence: 99%
“…(i) This proposal assumes that the measurement devices and state generation device, involved follow the principles of quantum mechanics and the corresponding outcomes are determined by the Born rule. (ii) We follow the similar assumptions here like the recent DI Oblivious Transfer proposal in [31]. That means for this proposal, we assume that the measurement and state generation devices are described by independent Hilbert spaces and the devices operate independently and identically in all trials.…”
Section: Assumptions For Our Di-qpq Proposalmentioning
confidence: 99%
“…2. In this proposal, we follow a similar assumption as in [9], which is based on the bounded-quantum-storage-model and computational assumptions. Our assumption is that the measurement devices and the state generation devices involved in the scheme are described by a tensor product of Hilbert spaces, one for each device.…”
Section: 1mentioning
confidence: 99%
“…Here, based on some assumptions, we have strengthened the security of the QPQ scheme [35] by providing a full DI proposal. Following the assumptions from the recent DI oblivious transfer proposal in [9], here we assume that the devices involved in our full DI proposals are independent and memoryless but it is not a very practical assumption. Recently, there are some results for multi-round protocols on bit commitment [3], oblivious transfer and bit commitment [11], weak string erasure [21] etc.…”
Section: Security Of User Against Dishonest Bobmentioning
confidence: 99%