TY - JOUR
T1 - Incomplete quantum oblivious transfer with perfect one-sided security
AU - Reichmuth, David
AU - Puthoor, Ittoop Vergheese
AU - Wallden, Petros
AU - Andersson, Anna Erika Elisabeth
PY - 2025/7/23
Y1 - 2025/7/23
N2 - Oblivious transfer is a fundamental cryptographic primitive which is useful for secure multiparty computation. There are several variants of oblivious transfer. We consider 1-out-of-2 oblivious transfer, where a sender sends two bits of information to a receiver. The receiver only receives one of the two bits, while the sender does not know which bit the receiver has received. Perfect quantum oblivious transfer with information-theoretic security is known to be impossible. We aim to find the lowest possible cheating probabilities. Bounds on cheating probabilities have been investigated for “complete” protocols, where if both parties follow the protocol, the bit value obtained by the receiver matches the sender’s bit value. We instead investigate incomplete protocols, where the receiver obtains an incorrect bit value with probability pf . We present optimal non-interactive protocols where Alice’s bit values are encoded in four symmetric pure quantum states, and where she cannot cheat better than with a random guess. We find the protocols such that for a given pf ,Bob’s cheating probability pr is as low as possible, and vice versa. Furthermore, we show that non-interactive quantum protocols can outperform non-interactive classical protocols, and give a lower bound on Bob’s cheating probability in interactive quantum protocols. Importantly for optical implementations, our protocols do not require entanglement nor quantum memory.
AB - Oblivious transfer is a fundamental cryptographic primitive which is useful for secure multiparty computation. There are several variants of oblivious transfer. We consider 1-out-of-2 oblivious transfer, where a sender sends two bits of information to a receiver. The receiver only receives one of the two bits, while the sender does not know which bit the receiver has received. Perfect quantum oblivious transfer with information-theoretic security is known to be impossible. We aim to find the lowest possible cheating probabilities. Bounds on cheating probabilities have been investigated for “complete” protocols, where if both parties follow the protocol, the bit value obtained by the receiver matches the sender’s bit value. We instead investigate incomplete protocols, where the receiver obtains an incorrect bit value with probability pf . We present optimal non-interactive protocols where Alice’s bit values are encoded in four symmetric pure quantum states, and where she cannot cheat better than with a random guess. We find the protocols such that for a given pf ,Bob’s cheating probability pr is as low as possible, and vice versa. Furthermore, we show that non-interactive quantum protocols can outperform non-interactive classical protocols, and give a lower bound on Bob’s cheating probability in interactive quantum protocols. Importantly for optical implementations, our protocols do not require entanglement nor quantum memory.
U2 - 10.1103/d5yk-nn96
DO - 10.1103/d5yk-nn96
M3 - Article
SN - 2643-1564
JO - Physical Review Research
JF - Physical Review Research
ER -