### Secure Two-Party Computation in a Quantum World

Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, and Patrick Struck

##### Abstract

Secure multi-party computation has been extensively studied in the past years and has reached a level that is considered practical for several applications. The techniques developed thus far have been steadily optimized for performance and were shown to be secure in the classical setting, but are not known to be secure against quantum adversaries. In this work, we start to pave the way for secure two-party computation in a quantum world where the adversary has access to a quantum computer. We show that post-quantum secure two-party computation has comparable efficiency to their classical counterparts. For this, we develop a lattice-based OT protocol which we use to implement a post-quantum secure variant of Yao's famous garbled circuits (GC) protocol (FOCS'82). Along with the OT protocol, we show that the oblivious transfer extension protocol of Ishai et al. (CRYPTO'03), which allows running many OTs using mainly symmetric cryptography, is post-quantum secure. To support these results, we prove that Yao's GC protocol achieves post-quantum security if the underlying building blocks do.

Available format(s)
Category
Cryptographic protocols
Publication info
Published elsewhere. MAJOR revision.18th International Conference on Applied Cryptography and Network Security (ACNS 2020)
Keywords
Post-quantum securityYao’s GC protocolOblivious transferSecure two-party computationHomomorphic encryption
Contact author(s)
demmler @ informatik uni-hamburg de
deevashwer student cse15 @ iitbhu ac in
History
2020-08-25: last of 2 revisions
See all versions
Short URL
https://ia.cr/2020/411

CC BY

BibTeX

@misc{cryptoeprint:2020/411,
author = {Niklas Büscher and Daniel Demmler and Nikolaos P.  Karvelas and Stefan Katzenbeisser and Juliane Krämer and Deevashwer Rathee and Thomas Schneider and Patrick Struck},
title = {Secure Two-Party Computation in a Quantum World},
howpublished = {Cryptology ePrint Archive, Paper 2020/411},
year = {2020},
note = {\url{https://eprint.iacr.org/2020/411}},
url = {https://eprint.iacr.org/2020/411}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.