Paper 2012/304
Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis, Jesper Buus Nielsen, and Louis Salvail
Abstract
We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map F, given as a quantum circuit, upon their joint quantum input state. Our protocol leaks no more to any active adversary than an ideal functionality for F provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [DNS10].
Note: Fixed a minor issue regarding the magic state distillation protocol.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Proceedings of CRYPTO 2012
- Keywords
- quantum cryptography
- Contact author(s)
- dupuis @ fi muni cz
- History
- 2015-03-31: last of 3 revisions
- 2012-06-03: received
- See all versions
- Short URL
- https://ia.cr/2012/304
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/304, author = {Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail}, title = {Actively Secure Two-Party Evaluation of any Quantum Operation}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/304}, year = {2012}, url = {https://eprint.iacr.org/2012/304} }