• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

噪声存储模型中的无感知传输的连续变量协议。

Continuous-variable protocol for oblivious transfer in the noisy-storage model.

机构信息

NTT Basic Research Laboratories, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, Kanagawa, 243-0198, Japan.

Department of Physics, Graduate School of Science, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan.

出版信息

Nat Commun. 2018 Apr 13;9(1):1450. doi: 10.1038/s41467-018-03729-4.

DOI:10.1038/s41467-018-03729-4
PMID:29654262
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5899178/
Abstract

Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.

摘要

加密协议是我们信息社会的支柱。这包括两方协议,可以为不信任的参与者提供保护。这种协议可以由一个叫做不经意传输的基本原语构建。我们在这里提出并实验证明了一种用于光学连续变量系统的不经意传输的量子协议,并在噪声存储模型中证明了其安全性。该模型允许我们通过发送比攻击者在协议期间可靠存储的更多量子信号来建立安全性。安全证明基于我们为连续变量系统推导出的不确定性关系,这些关系与量子密钥分发中使用的关系不同。我们通过使用平衡零差探测测量的纠缠双模压缩态,在各种信道损耗的原理验证实验中实验证明了所提出的不经意传输协议。我们的工作使得使用连续变量通信系统实现任意两方量子密码协议成为可能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/86b331c316bf/41467_2018_3729_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/65e5846fcda7/41467_2018_3729_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/a1a6952191a7/41467_2018_3729_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/2e9419ca344a/41467_2018_3729_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/e319a8bc9ce0/41467_2018_3729_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/86b331c316bf/41467_2018_3729_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/65e5846fcda7/41467_2018_3729_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/a1a6952191a7/41467_2018_3729_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/2e9419ca344a/41467_2018_3729_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/e319a8bc9ce0/41467_2018_3729_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e06/5899178/86b331c316bf/41467_2018_3729_Fig5_HTML.jpg

相似文献

1
Continuous-variable protocol for oblivious transfer in the noisy-storage model.噪声存储模型中的无感知传输的连续变量协议。
Nat Commun. 2018 Apr 13;9(1):1450. doi: 10.1038/s41467-018-03729-4.
2
An experimental implementation of oblivious transfer in the noisy storage model.在噪声存储模型中实现不经意传输的实验。
Nat Commun. 2014 Mar 12;5:3418. doi: 10.1038/ncomms4418.
3
Cryptography from noisy storage.来自噪声存储的密码学。
Phys Rev Lett. 2008 Jun 6;100(22):220502. doi: 10.1103/PhysRevLett.100.220502. Epub 2008 Jun 5.
4
Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting.量子环境下用于安全多方计算的随机不经意传输
Entropy (Basel). 2021 Jul 31;23(8):1001. doi: 10.3390/e23081001.
5
Experimental implementation of bit commitment in the noisy-storage model.在噪声存储模型中实现位承诺的实验。
Nat Commun. 2012;3:1326. doi: 10.1038/ncomms2268.
6
Performing private database queries in a real-world environment using a quantum protocol.在真实环境中使用量子协议执行私有数据库查询。
Sci Rep. 2014 Jun 10;4:5233. doi: 10.1038/srep05233.
7
Quantum Oblivious Transfer: A Short Review.量子不经意传输:简短综述
Entropy (Basel). 2022 Jul 7;24(7):945. doi: 10.3390/e24070945.
8
Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.连续变量量子密钥分发:针对相干攻击的可组合安全性的有限密钥分析。
Phys Rev Lett. 2012 Sep 7;109(10):100502. doi: 10.1103/PhysRevLett.109.100502. Epub 2012 Sep 5.
9
Two Quantum Protocols for Oblivious Set-member Decision Problem.用于不经意集合成员决策问题的两种量子协议。
Sci Rep. 2015 Oct 30;5:15914. doi: 10.1038/srep15914.
10
Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.具有针对相干攻击的可组合和单边设备无关安全性的连续变量量子密钥分发的实现。
Nat Commun. 2015 Oct 30;6:8795. doi: 10.1038/ncomms9795.

引用本文的文献

1
Quantum Oblivious Transfer: A Short Review.量子不经意传输:简短综述
Entropy (Basel). 2022 Jul 7;24(7):945. doi: 10.3390/e24070945.
2
Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting.量子环境下用于安全多方计算的随机不经意传输
Entropy (Basel). 2021 Jul 31;23(8):1001. doi: 10.3390/e23081001.

本文引用的文献

1
Quantum memories: emerging applications and recent advances.量子存储器:新兴应用与最新进展
J Mod Opt. 2016 Nov 12;63(20):2005-2028. doi: 10.1080/09500340.2016.1148212. Epub 2016 Mar 16.
2
Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.具有针对相干攻击的可组合和单边设备无关安全性的连续变量量子密钥分发的实现。
Nat Commun. 2015 Oct 30;6:8795. doi: 10.1038/ncomms9795.
3
An experimental implementation of oblivious transfer in the noisy storage model.
在噪声存储模型中实现不经意传输的实验。
Nat Commun. 2014 Mar 12;5:3418. doi: 10.1038/ncomms4418.
4
Stable control of 10 dB two-mode squeezed vacuum states of light.10分贝双模压缩真空态光的稳定控制
Opt Express. 2013 May 6;21(9):11546-53. doi: 10.1364/OE.21.011546.
5
Experimental implementation of bit commitment in the noisy-storage model.在噪声存储模型中实现位承诺的实验。
Nat Commun. 2012;3:1326. doi: 10.1038/ncomms2268.
6
Complete insecurity of quantum protocols for classical two-party computation.量子协议用于经典两方计算的完全不安全。
Phys Rev Lett. 2012 Oct 19;109(16):160501. doi: 10.1103/PhysRevLett.109.160501. Epub 2012 Oct 17.
7
Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.连续变量量子密钥分发:针对相干攻击的可组合安全性的有限密钥分析。
Phys Rev Lett. 2012 Sep 7;109(10):100502. doi: 10.1103/PhysRevLett.109.100502. Epub 2012 Sep 5.
8
De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.无限维量子系统的德·菲内蒂表示定理及其在量子密码学中的应用。
Phys Rev Lett. 2009 Mar 20;102(11):110504. doi: 10.1103/PhysRevLett.102.110504. Epub 2009 Mar 19.
9
Cryptography from noisy storage.来自噪声存储的密码学。
Phys Rev Lett. 2008 Jun 6;100(22):220502. doi: 10.1103/PhysRevLett.100.220502. Epub 2008 Jun 5.
10
Inseparability criterion for continuous variable systems.连续变量系统的不可分离性判据。
Phys Rev Lett. 2000 Mar 20;84(12):2722-5. doi: 10.1103/PhysRevLett.84.2722.