Paper 2012/304

Actively Secure Two-Party Evaluation of any Quantum Operation

Frédéric Dupuis, Jesper Buus Nielsen, and Louis Salvail

Abstract

We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map F, given as a quantum circuit, upon their joint quantum input state. Our protocol leaks no more to any active adversary than an ideal functionality for F provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [DNS10].

Note: Fixed a minor issue regarding the magic state distillation protocol.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Proceedings of CRYPTO 2012
Keywords
quantum cryptography
Contact author(s)
dupuis @ fi muni cz
History
2015-03-31: last of 3 revisions
2012-06-03: received
See all versions
Short URL
https://ia.cr/2012/304
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/304,
      author = {Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail},
      title = {Actively Secure Two-Party Evaluation of any Quantum Operation},
      howpublished = {Cryptology ePrint Archive, Paper 2012/304},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/304}},
      url = {https://eprint.iacr.org/2012/304}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.