Abstract
No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper’s ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao in the case of the security of a quantum oblivious transfer (QOT) protocol. We consider an extended OT task which, in addition to Alice and Bob, includes an eavesdropper Eve among the participants. An honest Eve is inactive and receives no information at all about Alice’s input when Bob and Alice are honest. We prove that the security of a QOT protocol against Bob implies its security against Eve as well as the security of a QKD protocol.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
C.H. Bennett, G. Brassard, Quantum Cryptography: Public key distribution and coin tossing, Proc. of IEEE International Conference on Computers, Systems, and Signal Processing, Banglore, India, December 1984, pp. 175–179.
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental quantum cryptography, Journal of Cryptology, vol. 5, no. 1, 1992, pp. 3–28. Previous version in Advances in Cryptology — Eurocrypt’ 90 Proceeding, May 1990, Springer — Verlag, pp. 253–265.
C.H. Bennett, G. Brassard, S. Breidbart and S. Wiesner, Quantum cryptography, or unforgeable subway tokens, Advances in Cryptology: Crypto’ 82 Proceeding, August 1982, Plenum Press pp. 267–275.
C.H. Bennett, G. Brassard, C. Crépeau, M.-H. Skubiszewska, Practical Quantum Oblivious Transfer, In proceedings of CRYPTO’91, Lecture Notes in Computer Science, vol. 576, Springer — Verlag, Berlin, 1992, pp. 351–366.
G. Grassard and C. Crépeau, Quantum bit commitment and coin tossing protocols, in Advances in Cryptology: Proceeding of CRYPTO’90, Lecture Notes in Computer Science, vol. 537, Springer — Verlag, Berlin, 1991, pp. 49–61.
G. Brassard, C. Crépeau, R. Jozsa, D. Langlois, A quantum bit commitment scheme provably unbreakable by both parties, in Proceeding of the 34th annual IEEE Symposium on Foundations of Computer Science, November 1993, pp. 362–371.
C. Crépeau, Equivalence Between Two Flavors of Oblivious Transfers, Advances in Cryptology — Crypto’ 87 Proceeding, August 1987, Springer — Verlag, pp. 350–354.
C. Crépeau, Correct and Private Reductions among Oblivious Transfers, Ph.D. Thesis, Massachusetts Institute of Technology, 1990.
C. Crépeau, Quantum oblivious transfer, Journal of Modern Optics, vol. 41, no. 12, December 1994, pp. 2445–2454.
C. Crépeau, and L. Salvail, Quantum Oblivious Mutual Identification, Advances in Cryptology: Proceedings of Eurocrypt’ 95, May 1995, Springer — Verlag, to appear.
D. Mayers and L. Salvail, Quantum Oblivious Transfer is Secure Against All Individual Measurements, Proceedings of the workshop on Physics and Computation, PhysComp’ 94, Dallas, Nov 1994, pp. 69–77.
Marand, C. and P. Townsend, Quantum key distribution over distances up to 30km, Optics Letters, to appear.
P.D. Townsend, Secure key distribution system based on quantum cryptography, Electronics Letters, Vol. 30, no. 10, 12 May 1994.
P.D. Townsend, J.G. Rarity and P.R. Tapster, Single pulse interference in a 10 km long optical fibre interferometer, Electronics Letters, vol. 29, no. 7, 1 April 1993, pp. 634–635.
P.D. Townsend, J.G. Rarity and P.R. Tapster, Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel, Electronics Letters, vol. 29, no. 14, 8 July 1993, pp. 1291–1293.
A. Yao, Security of Quantum Protocols Against Coherent Measurements, in Proceedings of the 26th Symposium on the Theory of Computing, June 1995, to appear.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mayers, D. (1995). On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols. In: Coppersmith, D. (eds) Advances in Cryptology — CRYPT0’ 95. CRYPTO 1995. Lecture Notes in Computer Science, vol 963. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44750-4_10
Download citation
DOI: https://doi.org/10.1007/3-540-44750-4_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60221-7
Online ISBN: 978-3-540-44750-4
eBook Packages: Springer Book Archive