2020
DOI: 10.3390/app10124080
|View full text |Cite
|
Sign up to set email alerts
|

Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation

Abstract: The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We present a method to generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach of quantum and classical, we obtain a practical and high-speed oblivious transfer protoc… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
27
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 13 publications
(28 citation statements)
references
References 50 publications
0
27
0
Order By: Relevance
“…It is important to note that these oblivious keys are primarily generated through quantum processes [11,[45][46][47][48][49][50][51][52][53][54][55][56][57][58][59][60], and to the best of our knowledge, there are no classical protocols to generate them. For this reason, we may also call them QOKs.…”
Section: Quantum Oblivious Keysmentioning
confidence: 99%
See 2 more Smart Citations
“…It is important to note that these oblivious keys are primarily generated through quantum processes [11,[45][46][47][48][49][50][51][52][53][54][55][56][57][58][59][60], and to the best of our knowledge, there are no classical protocols to generate them. For this reason, we may also call them QOKs.…”
Section: Quantum Oblivious Keysmentioning
confidence: 99%
“…However, most of its protocols' security and efficiency relies on the security and efficiency of oblivious transfer (OT). In this work, we make a detailed comparison between the complexity of the hybrid quantum oblivious transfer (HQOT) protocol presented in [11] and the classical OT [12], which to the best of our knowledge, is the fastest OT protocol. We also propose an optimised version of HQOT and discuss several other OT protocols generated from oblivious keys.This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Other applications are proposed for quantum networks, which could provide a range of cryptographic functions such as quantum bit commitment [33]; useful for operations such as sealed bid transactions; quantum money [34], useful to prevent double spending; and quantum oblivious transfer [35] [36], which may have useful applications to privacy. However, not all of these protocols offer the same degree of security as QKD.…”
Section: Technological Description and State Of The Artmentioning
confidence: 99%
“…Governmental data storage and communications, Data centres [27]) with in-field deployment (e.g. OpenQKD, https://openqkd.eu/); Quantum Oblivious Key Distribution (QOKD) protocol is based on the same technology as QKD and QRNG, benefiting from its development and allowing to generate the necessary resource used to execute Oblivious Transfer [28]- [30].…”
Section: Introductionmentioning
confidence: 99%