Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver Bob obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learnt. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states, and present an optimal protocol, which outperforms classical protocols. We also "reverse" this protocol, so that Bob ...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
Abstract Secure multiparty computation has the potential to be a disruptive technique in the realm o...
We define $(varepsilon,delta)$-secure quantum computations between two parties that can play dishon...
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn som...
XOR oblivious transfer (XOT) is a classical cryptographic primitive which is apparently weaker than ...
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. It...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
Oblivious transfer is a fundamental cryptographic primitive in which Bob transfers one of two bits t...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
We describe a protocol for quantum oblivious transfer , utilizing faint pulses of polarized light, b...
We describe an efficient and simple protocol for quantum oblivious transfer. This protocol can easil...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
Abstract Secure multiparty computation has the potential to be a disruptive technique in the realm o...
We define $(varepsilon,delta)$-secure quantum computations between two parties that can play dishon...
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn som...
XOR oblivious transfer (XOT) is a classical cryptographic primitive which is apparently weaker than ...
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. It...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
Oblivious transfer is a fundamental cryptographic primitive in which Bob transfers one of two bits t...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness ...
We describe a protocol for quantum oblivious transfer , utilizing faint pulses of polarized light, b...
We describe an efficient and simple protocol for quantum oblivious transfer. This protocol can easil...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
Abstract Secure multiparty computation has the potential to be a disruptive technique in the realm o...
We define $(varepsilon,delta)$-secure quantum computations between two parties that can play dishon...