Study on Quantum Oblivious Transfer

Article Preview

Abstract:

The Oblivious Transfer (OT) is a typical foundation agreement of secure multi-party computations. It can be used to solve the “ Millionaire” interesting question raised by the winner of the Turing Award in 1982, Mr. Yao , thus to build more complex secure multi-party computation protocol or to solve practical problems,such as electronic voting, elections, e-commerce. Using of the quantum channel and the principles of the quantum mechanics , Quantum Oblivious Transfer (QOT) can be solve the classic oblivious transfer problems. QOT can be achieved higher security and higher efficiency than the Classic Oblivious Transfer, while it also has a unique advantage in found eavesdropping. We had given a very novel QOT scheme based on three-particle entangled states. Although the use more particles , the process is better concise.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3079-3082

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Yao: Protocols for Secure Computation, Proc of the 23rd IEEE Symposium on Foundations of Computer Science (1982), pp.160-164.

Google Scholar

[2] T. S. Zhao and J. H. Ge: An Efficient PM PC Protocol, In Chinese, Journal of Circuits and Systems,Vol. 13, No. 2 ( 2008), pp.26-30.

Google Scholar

[3] C.M. Tang, Z.A. Yao and D.Q. Xie: Verifiable Oblivious Transfer Protocol, In Chinese, Journal of Guangzhou University(Natural Science Edition), Vol. 9, No. 2 ( 2010), pp.20-24.

Google Scholar

[4] H.K. Lo and H.E. Chau: Why Quantum Bit Commitment and Ideal Quantum Cointossing are Impossible, Physica D.,Vol. 120, (1998),pp.177-187.

DOI: 10.1016/s0167-2789(98)00053-0

Google Scholar

[5] R. Ursin, F . Tiefenbacher, M. T. Schmitt , et al: Entanglement-based Quantum Communication over 144 kms, Nature Physics, (2007), pp.481-486.

Google Scholar

[6] L. M. Duan and G. C. Guo: Probabilistic Cloning and Identification of Linearly Independent Quantum States, Physics Review letters, (1998), pp.4999-5002.

DOI: 10.1103/physrevlett.80.4999

Google Scholar

[7] China Science and Technology Association: Cryptography Subject Development Report, China Science and Technology Press, In Chinese, (2007-2010).

Google Scholar

[8] H. Chen: Introduction of Quantum Confidential Communication, In Chinese, Beijing Institute of Technology Press, (2010).

Google Scholar

[9] G. H. Zeng: Quantum Cryptography, In Chinese, China Science and Technology Press, (2006).

Google Scholar

[10] S. S. Luo: Cryptography and Information Security Technology, In Chinese, Beijing University of Post and Telecommunications Press, (2009).

Google Scholar