pith. machine review for the scientific record. sign in

arxiv: 0911.3814 · v2 · submitted 2009-11-19 · 🪐 quant-ph

Recognition: unknown

Quantum And Relativistic Protocols For Secure Multi-Party Computation

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords coinprotocolprotocolssecuritytasktossingbiasdiscuss
0
0 comments X
read the original abstract

After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. In the second part variable bias coin tossing is introduced. This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss. It is shown that this can be achieved with unconditional security for a specified range of biases, and with cheat-evident security for any bias. We also discuss two further protocols which are conjectured to be unconditionally secure for any bias. The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a general model for such computations, and show that, within this model, a wide range of functions are impossible to compute securely. We give explicit cheating attacks for such functions. In the final chapter we discuss the task of expanding a private random string, while dropping the usual assumption that the protocol's user trusts her devices. Instead we assume that all quantum devices are supplied by an arbitrarily malicious adversary. We give two protocols that we conjecture securely perform this task. The first allows a private random string to be expanded by a finite amount, while the second generates an arbitrarily large expansion of such a string.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 3 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. The minimal example of quantum network Bell nonlocality

    quant-ph 2026-05 unverdicted novelty 8.0

    Quantum nonlocality is possible in the triangle network with no inputs and binary outputs, which is the smallest such scenario by number of variables and outcomes.

  2. Higher rates for semi-device-independent randomness expansion by recycling input randomness

    quant-ph 2026-04 unverdicted novelty 6.0

    Two new semi-device-independent randomness expansion protocols achieve high rates by recycling input randomness or biasing inputs, secure against quantum side information, with expansion possible in 10^5 to 10^6 rounds.

  3. Lower overhead fault-tolerant building blocks for noisy quantum computers

    quant-ph 2026-05 unverdicted novelty 5.0

    New combinatorial proofs and circuit designs for quantum error correction reduce physical qubit overhead by up to 10x and time overhead by 2-6x for codes including Steane, Golay, and surface codes.