Quantum Oblivious Transfer
- 1 December 1994
- journal article
- research article
- Published by Taylor & Francis in Journal of Modern Optics
- Vol. 41 (12), 2445-2454
- https://doi.org/10.1080/09500349414552291
Abstract
In a one-out-of-two oblivious transfer, a party Alice has two messages m 0, m 1 that she sends to another party Bob in such a way that he can decide to obtain either of them at his choosing, but not both. Alice never finds out which message Bob received. First introduced by Wiesner as ‘conjugate coding’, this cryptographic tool was later introduced to the world of public-key cryptography, first by Rabin (in a slightly different form) and then by Even, Goldreich and Lempel who named it after Rabin's primitive, called oblivious transfer. The one-out-of-two oblivious transfer was later shown to be extremely powerful in designing general cryptographic tools. The current paper presents a new design for a one-out-of-two oblivious transfer based on the transmission of polarized light, improving the work of Wiesner and Bennett, Brassard, Breidbart and Wiesner, and shows that the scheme is robust to general attacks.Keywords
This publication has 8 references indexed in Scilit:
- On the Reversibility of Oblivious TransferPublished by Springer Nature ,2001
- Theory of computingACM Computing Surveys, 1996
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Equivalence Between Two Flavours of Oblivious TransfersLecture Notes in Computer Science, 1988
- Primality and CryptographyPublished by Springer Nature ,1986
- A randomized protocol for signing contractsCommunications of the ACM, 1985
- Quantum Cryptography, or Unforgeable Subway TokensPublished by Springer Nature ,1983
- Conjugate codingACM SIGACT News, 1983