Paper
5 September 2008 A practical scheme for quantum oblivious transfer and private database sampling
Author Affiliations +
Abstract
We present an unconditionally secure Oblivious Transfer protocol relying on two rounds of entanglement-free quantum communication. When played honestly, the protocol only requires the ability to measure a single qubit in a fixed basis, and to perform a coherent bit-flip (Pauli X) operation. We present a generalization to a "Private Data Sampling" protocol, where a player (Bob) can obtain a random sample of fixed size from a classical database of size N, while the database owner (Alice) remains oblivious as to which bits were accessed. The protocol is efficient in the sense that the communication complexity per query scales at most linearly with the size of the database. It does not violate Lo's "no-go" theorem for one-sided two-party secure computation, since a given joint input by Alice and Bob can result in randomly different protocol outcomes. Finally it could be used to implement a practical bit string commitment protocol, among other applications.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
David Fattal, Marco Fiorentino, and Raymond G. Beausoleil "A practical scheme for quantum oblivious transfer and private database sampling", Proc. SPIE 7092, Quantum Communications and Quantum Imaging VI, 70920X (5 September 2008); https://doi.org/10.1117/12.793715
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Quantum communications

Information security

Binary data

Neptunium

Radon

Computer security

RELATED CONTENT

Calculation of key reduction for B92 QKD protocol
Proceedings of SPIE (May 21 2015)
Context aware adaptive security service model
Proceedings of SPIE (September 11 2015)
Quantum private data sampling
Proceedings of SPIE (August 26 2009)
Biometric template transformation: a security analysis
Proceedings of SPIE (January 27 2010)

Back to Top