Insecurity of quantum secure computations
- 1 August 1997
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 56 (2) , 1154-1162
- https://doi.org/10.1103/physreva.56.1154
Abstract
It had been widely claimed that quantum mechanics can protect private information during public decision in, for example, the so-called two-party secure computation. If this were the case, quantum smart-cards, storing confidential information accessible only to a proper reader, could prevent fake teller machines from learning the PIN (personal identification number) from the customers’ input. Although such optimism has been challenged by the recent surprising discovery of the insecurity of the so-called quantum bit commitment, the security of quantum two-party computation itself remains unaddressed. Here I answer this question directly by showing that all one-sided two-party computations (which allow only one of the two parties to learn the result) are necessarily insecure. As corollaries to my results, quantum one-way oblivious password identification and the so-called quantum one-out-of-two oblivious transfer are impossible. I also construct a class of functions that cannot be computed securely in any two-sided two-party computation. Nevertheless, quantum cryptography remains useful in key distribution and can still provide partial security in “quantum money” proposed by Wiesner.All Related Versions
This publication has 13 references indexed in Scilit:
- Unconditionally Secure Quantum Bit Commitment is ImpossiblePhysical Review Letters, 1997
- Is Quantum Bit Commitment Really Possible?Physical Review Letters, 1997
- SHORT DISTANCE APPLICATIONS OF QUANTUM CRYPTOGRAPHYJournal of Nonlinear Optical Physics & Materials, 1996
- 25 years of quantum cryptographyACM SIGACT News, 1996
- A complete classification of quantum ensembles having a given density matrixPhysics Letters A, 1993
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Conjugate codingACM SIGACT News, 1983
- Communication by EPR devicesPhysics Letters A, 1982
- A single quantum cannot be clonedNature, 1982