Next Article in Journal
Constructing a Virtual Environment for Multibody Simulation Software Using Photogrammetry
Next Article in Special Issue
Photon Subtraction-Induced Plug-and-Play Scheme for Enhancing Continuous-Variable Quantum Key Distribution with Discrete Modulation
Previous Article in Journal
Hyperspectral Imaging for Skin Feature Detection: Advances in Markerless Tracking for Spine Surgery
Previous Article in Special Issue
Improving Continuous Variable Quantum Secret Sharing with Weak Coherent States
Article

Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation

1
Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal
2
Instituto de Telecomunicações, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal
3
Departamento de Eletrónica, Telecomunicações e Informática, Universidade de Aveiro, Campus Universitário de Santiago, 3810-193 Aveiro, Portugal
4
Instituto de Telecomunicações, Campus Universitário de Santiago, 3810-193 Aveiro, Portugal
5
Departamento de Informática, Faculdade de Ciências da Universidade de Lisboa, Campo Grande 016, 1749-016 Lisboa, Portugal
6
LASIGE, Faculdade de Ciências da Universidade de Lisboa, Campo Grande 016, 1749-016 Lisboa, Portugal
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(12), 4080; https://doi.org/10.3390/app10124080
Received: 15 May 2020 / Revised: 9 June 2020 / Accepted: 10 June 2020 / Published: 12 June 2020
(This article belongs to the Special Issue Quantum Communications and Quantum Networks)
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We present a method to generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach of quantum and classical, we obtain a practical and high-speed oblivious transfer protocol. We analyse the security and efficiency features of the technique and conclude that it presents advantages in both areas when compared to public-key based techniques. View Full-Text
Keywords: secure multiparty computation; oblivious transfer; quantum communications secure multiparty computation; oblivious transfer; quantum communications
Show Figures

Figure 1

MDPI and ACS Style

Lemus, M.; Ramos, M.F.; Yadav, P.; Silva, N.A.; Muga, N.J.; Souto, A.; Paunković, N.; Mateus, P.; Pinto, A.N. Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation. Appl. Sci. 2020, 10, 4080. https://doi.org/10.3390/app10124080

AMA Style

Lemus M, Ramos MF, Yadav P, Silva NA, Muga NJ, Souto A, Paunković N, Mateus P, Pinto AN. Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation. Applied Sciences. 2020; 10(12):4080. https://doi.org/10.3390/app10124080

Chicago/Turabian Style

Lemus, Mariano; Ramos, Mariana F.; Yadav, Preeti; Silva, Nuno A.; Muga, Nelson J.; Souto, André; Paunković, Nikola; Mateus, Paulo; Pinto, Armando N. 2020. "Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation" Appl. Sci. 10, no. 12: 4080. https://doi.org/10.3390/app10124080

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop