Quantum preprocessing for information-theoretic security in two-party computation

08/15/2019
by   Li Yu, et al.
0

In classical two-party computation, a trusted initializer who prepares certain initial correlations, known as one-time tables, can help make the inputs of both parties information-theoretically secure. We propose some bipartite quantum protocols with possible aborts for approximately generating such bipartite classical correlations with varying degrees of privacy, without introducing a third party. For the security level to be interesting for secure two-party computation, it suffices to require that one particular party is conservative, meaning that he values the privacy of his data higher than the learning of the other party's data, or to require that the other party is honest-but-curious. We show that the security is usually dependent on the noise level, but not for some party in one of the protocols. We show how to use the generated one-time tables to achieve nontrivial information-theoretic security in generic two-party classical or quantum computation tasks.

READ FULL TEXT
research
08/15/2019

Quantum preprocessing for security enhancement in classical two-party computation

In classical two-party computation, a trusted initializer who prepares c...
research
08/10/2019

Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose

As far as we know, the literature on secure computation from cut-and-cho...
research
06/13/2022

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Due to the computational cost of running inference for a neural network,...
research
02/03/2020

InfoCommit: Information-Theoretic Polynomial Commitment and Verification

We introduce InfoCommit, a protocol for polynomial commitment and verifi...
research
09/27/2020

Information Theoretic HotStuff

This work presents Information Theoretic HotStuff (IT-HS), a new optimal...
research
07/22/2022

Spatial data sharing with secure multi-party computation for exploratory spatial data analysis

Spatial data sharing plays a significant role in opening data research a...
research
12/27/2022

Information-theoretically secure equality-testing protocol with dispute resolution

There are often situations where two remote users each have data, and wi...

Please sign up or login with your details

Forgot password? Click here to reset