2010
DOI: 10.1007/978-3-642-13190-5_25
|View full text |Cite
|
Sign up to set email alerts
|

Universally Composable Quantum Multi-party Computation

Abstract: Abstract. The Universal Composability model (UC) by Canetti (FOCS 2001) allows for secure composition of arbitrary protocols. We present a quantum version of the UC model which enjoys the same compositionality guarantees. We prove that in this model statistically secure oblivious transfer protocols can be constructed from commitments. Furthermore, we show that every statistically classically UC secure protocol is also statistically quantum UC secure. Such implications are not known for other quantum security… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
213
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 104 publications
(213 citation statements)
references
References 24 publications
0
213
0
Order By: Relevance
“…For instance, Unruh [Unr10] shows that classical statistical security in Canetti's universal composabitily (UC) model implies quantum statistical security. Hallgren, Smith, and Song [HSS11] give a two-party protocol that is quantum computationally secure in the UC.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, Unruh [Unr10] shows that classical statistical security in Canetti's universal composabitily (UC) model implies quantum statistical security. Hallgren, Smith, and Song [HSS11] give a two-party protocol that is quantum computationally secure in the UC.…”
Section: Related Workmentioning
confidence: 99%
“…We define the notion of BQS-UC-security, which is an extension of quantum-UC-security [15]. We have composability in the following sense: If π is a secure realization of a functionality F , and σ F securely realizes G by using one instance of F , then σ π , the result of replacing F by π, still securely realizes G. In contrast to quantum-UC-security, however, BQS-UC-security does not allow for concurrent self-composition: if π is secure, this does not automatically imply that two concurrent instances of π are secure 1 .…”
Section: Our Contributionmentioning
confidence: 99%
“…Given C ⊆ parties π , we denote by π C the protocol where all parties in C have been replaced by corruption parties which are controlled by the adversary. For details on the machine and the network model, we refer to the full version [16] or to [15].…”
Section: The Bqs-uc Modelmentioning
confidence: 99%
See 2 more Smart Citations