Complete Insecurity of Quantum Protocols for Classical Two-Party Computation

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

5 pages, 1 figure

Scientific paper

A fundamental task in modern cryptography is the joint computation of a classical deterministic function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other's input than what is implied by the value of the function (secure two-party computation). In this work we show that any quantum protocol that outputs the result to both parties (two-sided computation) and that is secure against a cheating Bob can be completely broken by a cheating Alice. Whereas it is known that quantum protocols for this task cannot be completely secure, our result implies that even partial security cannot be obtained. Our findings stand in stark contrast to recent works on coin tossing, where interesting quantum mechanical advantages can be obtained, and highlight the limits of cryptography within quantum mechanics. With help of von Neumann's minimax theorem we extend the result to the imperfect case, where the quantum protocol may not work perfectly and may not be perfectly secure.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Complete Insecurity of Quantum Protocols for Classical Two-Party Computation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Complete Insecurity of Quantum Protocols for Classical Two-Party Computation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Complete Insecurity of Quantum Protocols for Classical Two-Party Computation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-156301

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.