Diamanti, E., Grilo, A. B., Innocenzi, A., Lefebvre, P., Yacoub, V., & Y´ang¨uez, A. (2024). A Practical Protocol for Quantum Oblivious Transfer from One-Way Functions. arXiv preprint arXiv:2406.09110.
This paper aims to develop a practical and efficient quantum oblivious transfer (QOT) protocol based on one-way functions that overcomes the limitations of previous theoretical protocols, particularly their susceptibility to errors and inefficiency in implementation.
The authors propose a new simulation-secure QOT protocol that builds upon the structure of previous work by [BCKM21] but introduces crucial modifications. They employ a relaxed-extractable and equivocal quantum bit commitment scheme, reducing the required number of repetitions and enhancing efficiency. Additionally, they incorporate error correction techniques, specifically syndrome-based non-interactive codes like LDPC codes, to address the issue of noise in practical implementations.
The proposed protocol significantly reduces the number of BB84 states required compared to previous protocols, from an order of 10^13 to around 10^6, making it feasible for experimental realization. The use of relaxed extractability in the bit commitment scheme, while maintaining equivocality, proves sufficient for the security of the QOT protocol. The integration of error correction techniques allows for handling noise in practical settings, enhancing the protocol's robustness.
The paper presents a significant advancement in QOT protocol design by proposing a practical and efficient protocol based on one-way functions. The protocol's reduced resource requirements and error resilience pave the way for experimental implementation and potential applications in secure multi-party computation.
This research contributes significantly to the field of quantum cryptography by bridging the gap between theoretical QOT protocols and practical implementations. The proposed protocol's efficiency and error resilience make it a promising candidate for real-world applications requiring secure computation, such as secure data sharing and distributed cryptographic protocols.
The paper focuses on the protocol design and analysis, leaving the experimental implementation and evaluation for future work. Further research could explore the integration of the proposed protocol within larger cryptographic systems and investigate its performance in various practical scenarios.
Na inny język
z treści źródłowej
arxiv.org
Głębsze pytania