Quantum And Relativistic Protocols For Secure Multi-Party Computation

作者: Roger Colbeck

DOI:

关键词:

摘要: After a general introduction, the thesis is divided into four parts. In first, we discuss task of coin tossing, principally in order to highlight effect different physical theories have on security straightforward manner, but, also, introduce new protocol for non-relativistic strong tossing. This matches best known date while using conceptually approach achieve task. In second part variable bias tossing introduced. variant which one party secretly chooses two biased coins toss. It shown that this can be achieved with unconditional specified range biases, and cheat-evident any bias. We also further protocols are conjectured unconditionally secure The third section looks at other two-party computations which, prior our work, no-go theorems were unknown. model such computations, show that, within model, wide functions impossible compute securely. give explicit cheating attacks functions. final chapter expanding private random string, dropping usual assumption protocol's user trusts her devices. Instead assume all quantum devices supplied by an arbitrarily malicious adversary. conjecture securely perform The first allows string expanded finite amount, generates large expansion string.

参考文章(4)
Michael Ben-Or, Michał Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim, The Universal Composable Security of Quantum Key Distribution Theory of Cryptography. pp. 386- 406 ,(2005) , 10.1007/978-3-540-30576-7_21
Sandu Popescu, Daniel Rohrlich, Which states violate Bell's inequality maximally? Physics Letters A. ,vol. 169, pp. 411- 414 ,(1992) , 10.1016/0375-9601(92)90819-8
Constantine Pagonis, Michael L.G. Redhead, Robert K. Clifton, The breakdown of quantum non-locality in the classical limit Physics Letters A. ,vol. 155, pp. 441- 444 ,(1991) , 10.1016/0375-9601(91)90643-M
Renato Renner, Robert König, Universally Composable Privacy Amplification Against Quantum Adversaries Theory of Cryptography. ,vol. 3378, pp. 407- 425 ,(2005) , 10.1007/978-3-540-30576-7_22