Oblivious transfer based on single-qubit rotations
From MaRDI portal
Publication:5272497
DOI10.1088/1751-8121/aa6a69zbMath1367.81030arXiv1407.8146OpenAlexW3103336874WikidataQ59196611 ScholiaQ59196611MaRDI QIDQ5272497
No author found.
Publication date: 29 June 2017
Published in: Journal of Physics A: Mathematical and Theoretical (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1407.8146
Quantum computation (81P68) Cryptography (94A60) Quantum information, communication, networks (quantum-theoretic aspects) (81P45)
Related Items
Coherent attack on oblivious transfer based on single-qubit rotations, A novel application of probabilistic teleportation: \(p\)-Rabin quantum oblivious transfer of a qubit
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast cut-and-choose-based protocols for malicious and covert adversaries
- Minimum disclosure proofs of knowledge
- Universal classes of hash functions
- Secure two-party computation via cut-and-choose oblivious transfer
- Secure classical bit commitment using fixed capacity communication channels
- Quantum walk public-key cryptographic system
- Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
- Efficient Password Authenticated Key Exchange via Oblivious Transfer
- Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
- Two-Output Secure Computation with Malicious Adversaries
- Oblivious transfers and intersecting codes
- Unconditional security in quantum cryptography
- An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification
- Oblivious Transfer Is Symmetric
- Simple, Black-Box Constructions of Adaptively Secure Protocols
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Foundations of Cryptography
- Applications of single-qubit rotations in quantum public-key cryptography
- On the Feasibility of Extending Oblivious Transfer
- Unconditional Security From Noisy Quantum Storage
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries