Oblivious transfer is a fundamental cryptographic primitive in which Bob transfers one of two bits to Alice in such a way that Bob cannot know which of the two bits Alice has learned. We present an optimal security bound for quantum oblivious transfer protocols under a natural and demanding definition of what it means for Alice to cheat. Our lower bound is a smooth tradeoff between the probability P?Bob with which Bob can guess Alice’s bit choice and the probability P?Alice with which Alice can guess both of Bob’s bits given that she learns one of the bits with certainty. We prove that 2P?Bob + P Alice ≥ 2 in any quantum protocol for oblivious transfer, from which it follows that one of the two parties must be able to cheat with probability...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are genera...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
International audienceOblivious transfer is a fundamental cryptographic primitive in which Bob trans...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
Abstract. Due to its universality oblivious transfer (OT) is a primitive of great importance in secu...
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn som...
We describe a protocol for quantum oblivious transfer , utilizing faint pulses of polarized light, b...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
International audienceRandom access coding is an information task that has been extensively studied ...
We study quantum protocols among two distrustful parties. By adopting a rather strict definition of ...
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play cru...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are genera...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
International audienceOblivious transfer is a fundamental cryptographic primitive in which Bob trans...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
Abstract. Due to its universality oblivious transfer (OT) is a primitive of great importance in secu...
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn som...
We describe a protocol for quantum oblivious transfer , utilizing faint pulses of polarized light, b...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
International audienceRandom access coding is an information task that has been extensively studied ...
We study quantum protocols among two distrustful parties. By adopting a rather strict definition of ...
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play cru...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are genera...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...