Papers
Topics
Authors
Recent
Search
2000 character limit reached

Lower Bounds for Quantum Secure Function Evaluation Reductions

Published 20 May 2024 in quant-ph and cs.CR | (2405.12121v4)

Abstract: One-sided output secure function evaluation is a cryptographic primitive where the two mutually distrustful players, Alice and Bob, both have a private input to a bivariate function. Bob obtains the value of the function for the given inputs, while Alice receives no output. It is known that this primitive cannot be securely implemented if the two players only have access to noiseless classical and quantum communication. In this work, we first show that Bob can extract the function values for all his possible inputs from any implementation of a non-trivial function that is correct and preserves the privacy of Bob's input. Our result holds in the non-asymptotic setting where the players have finite resources and the error is a constant. Then we consider protocols for secure function evaluation in a setup where the two players have access to trusted distributed randomness as a resource. Building upon the first result, we prove a bound on the efficiency of such cryptographic reductions for any non-trivial function in terms of the conditional entropies of the trusted randomness. From this result, we can derive lower bounds on the number of instances of different variants of OT needed to securely implement a given function.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (6)
  1. Colbeck, R.: The impossibility of secure two-party classical computation (2007). https://doi.org/10.1103/PhysRevA.76.062308
  2. Kilian, J.: Founding cryptography on oblivious transfer. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC ’88). pp. 20–31. ACM Press (1988). https://doi.org/10.1145/62212.62215
  3. Nayak, A.: Optimal lower bounds for quantum automata and random access codes. In: 40th Annual Symposium on Foundations of Computer Science. pp. 369–376 (1999). https://doi.org/10.1109/SFFCS.1999.814608
  4. Rudolph, T.: The laws of physics and cryptographic security (2002). https://doi.org/10.48550/arXiv.quant-ph/0202143
  5. Wilde, M.M.: Quantum Information Theory. Cambridge University Press (2013). https://doi.org/10.1017/CBO9781139525343
  6. Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (FOCS ’82). pp. 160–164 (1982). https://doi.org/10.1109/SFCS.1982.38

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 0 likes about this paper.