Open Access
ARTICLE
Privacy-Preserving Decision Protocols Based on Quantum Oblivious Key Distribution
1 School of Computer Science and Technology, Harbin Engineering University, Harbin, 150001, China.
2 School of Mathematical Science, Heilongjiang University, Harbin, 150080, China.
3 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and
Telecommunications, Beijing, 100876, China.
4 Center for Quantum Computing, Peng Cheng Laboratory, Shenzhen, 518055, China.
5 College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, 266590, China.
6 School of Artificial Intelligence, Shenzhen Polytechnic, Shenzhen, 518055, China.
7 Department of Electrical and Computer Engineering, National University of Singapore, 117583, Singapore.
* Corresponding Author: Zhiwei Sun. Email: .
Computers, Materials & Continua 2020, 64(3), 1915-1928. https://doi.org/10.32604/cmc.2020.09836
Received 21 January 2020; Accepted 23 April 2020; Issue published 30 June 2020
Abstract
Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes the provider send a secret key sequence to the user obliviously, i.e., the user may only get almost one bit key in the sequence which is unknown to the provider. Recently, a number of works have sought to establish the corresponding quantum oblivious key transfer model and rename it as quantum oblivious key distribution (QOKD) from the well-known expression of quantum key distribution (QKD). In this paper, a new QOKD model is firstly proposed for the provider and user with limited quantum capabilities, where both of them just perform computational basis measurement for single photons. Then we show that the privacy for both of them can be protected, since the probability of getting other’s raw-key bits without being detected is exponentially small. Furthermore, we give the solutions to some special decision problems such as set-member decision and point-inclusion by announcing the improved shifting strategies followed QOKD. Finally, the further discussions and applications of our ideas have been presented.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.