Insecurity of Quantum Secure Computations

@article{Lo1996InsecurityOQ,
  title={Insecurity of Quantum Secure Computations},
  author={H. Lo},
  journal={ArXiv},
  year={1996},
  volume={quant-ph/9611031}
}
  • H. Lo
  • Published 1996
  • Physics, Computer Science
  • ArXiv
It had been widely claimed that quantum mechanics can protect private information during public decision in, for example, the so-called two-party secure computation. If this were the case, quantum smart-cards, storing confidential information accessible only to a proper reader, could prevent fake teller machines from learning the PIN (personal identification number) from the customers' input. Although such optimism has been challenged by the recent surprising discovery of the insecurity of the… Expand
319 Citations
Quantum preprocessing for information-theoretic security in two-party computation
  • 1
On the Everlasting Security of Password-Authenticated Quantum Key Exchange
  • PDF
Quantum preprocessing for information-theoretic security in two-party computation
Quantum preprocessing for information-theoretic security in two-party computation
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
  • 56
  • PDF
Imperfect Oblivious Transfer Extended Abstract
  • PDF
Secure Identification and QKD in the Bounded-Quantum-Storage Model
  • 59
  • PDF
Can relativistic bit commitment lead to secure quantum oblivious transfer?
  • G. He
  • Computer Science, Physics
  • 2015
  • 4
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 46 REFERENCES
Why quantum bit commitment and ideal quantum coin tossing are impossible
  • 216
  • PDF
Practical Quantum Oblivious Transfer
  • 224
  • PDF
Is Quantum Bit Commitment Really Possible?
  • 480
  • PDF
Unconditionally secure quantum bit commitment is impossible
  • 619
  • Highly Influential
  • PDF
The Trouble with Quantum Bit Commitment
  • 98
  • PDF
A simple quantum oblivious transfer protocol
  • 8
  • PDF
Algorithms for quantum computation: discrete logarithms and factoring
  • P. Shor
  • Mathematics, Computer Science
  • Proceedings 35th Annual Symposium on Foundations of Computer Science
  • 1994
  • 4,899
  • PDF
Quantum cryptography using any two nonorthogonal states.
  • Bennett
  • Computer Science, Medicine
  • Physical review letters
  • 1992
  • 2,167
25 years of quantum cryptography
  • 41
  • PDF
...
1
2
3
4
5
...