Cryptology ePrint Archive: Report 2012/304
Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail
Abstract: We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map F, given as a quantum circuit, upon their joint quantum input state. Our protocol leaks no more to any active adversary than an ideal functionality for F provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [DNS10].
Category / Keywords: cryptographic protocols / quantum cryptography
Publication Info: Proceedings of CRYPTO 2012
Date: received 30 May 2012, last revised 31 Mar 2015
Contact author: dupuis at fi muni cz
Available format(s): PDF | BibTeX Citation
Note: Fixed a minor issue regarding the magic state distillation protocol.
Version: 20150331:111741 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]