Susceptible Two-Party Quantum Computations

  • Authors:
  • Andreas Jakoby;Maciej Liśkiewicz;Aleksander Mądry

  • Affiliations:
  • Institute of Theoretical Computer Science, University of Lübeck, Germany;Institute of Theoretical Computer Science, University of Lübeck, Germany;Massachusetts Institute of Technology, Cambridge, USA

  • Venue:
  • ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In secure two-party function evaluation Alice holding initially a secret input xand Bob having a secret input ycommunicate to determine a prescribed function f(x, y) in such a way that after the computation Bob learns f(x, y) but nothing more about xother than he could deduce from yand f(x,y) alone, and Alice learns nothing. Unconditionally secure function evaluation is known to be essentially impossible even in the quantum world. In this paper we introduce a new, weakened, model for security in two-party quantum computations. In our model --- we call it susceptible function computation --- if one party learns something about the input of the other one with advantage 茂戮驴then the probability that the correct value f(x,y) is computed, when the protocol completes, is at most 1 茂戮驴 茂戮驴(茂戮驴), for some function 茂戮驴of 茂戮驴. Thus, this model allows to measure the trade-off between the advantage of a dishonest party and the error induced by its attack. Furthermore, we present a protocol for computing the one-out-of-two oblivious transfer function that achieves a quadratic trade-off i.e. 茂戮驴= 茂戮驴(茂戮驴2).