2015
DOI: 10.1007/s11128-015-1013-1
|View full text |Cite
|
Sign up to set email alerts
|

Quantum oblivious transfer with relaxed constraints on the receiver

Abstract: All existing quantum oblivious transfer protocols can be achieved when all the members have to be quantum. So what will happen if not all the members are quantum? In this paper, we propose two novel protocols for all-or-nothing oblivious transfer and one-out-of-two oblivious transfer respectively by using single qubit states. Our contribution lies in the fact that the message receiver Bob can use fewer quantum resources so that our protocols relax the requirements of protocol implementation in practice. We ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(22 citation statements)
references
References 31 publications
0
22
0
Order By: Relevance
“…This section presents a performance comparison of the proposed protocol with three modern two-level-structured one-out-of-two QOT protocols 21 , 24 , 25 based on Crépeau’s reduction 3 . The protocols of Wei Yang et al .…”
Section: Security Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…This section presents a performance comparison of the proposed protocol with three modern two-level-structured one-out-of-two QOT protocols 21 , 24 , 25 based on Crépeau’s reduction 3 . The protocols of Wei Yang et al .…”
Section: Security Analysismentioning
confidence: 99%
“… 23 involves an untrusted third party, and the second 27 is a one-out-of-n QOT protocol for which the resource consumption for one-out-of-two QOT is similar to that of Li Yang’s protocol 21 . The three protocols considered for comparison 21 , 24 , 25 have two-level structures in which one-out-of-two OT is built on all-or-nothing QOT. However, the probability p of all-or-nothing QOT (where p is the probability of the unambiguous key) is not always 50%.…”
Section: Security Analysismentioning
confidence: 99%
See 3 more Smart Citations