首页> 外文OA文献 >Quantum And Relativistic Protocols For Secure Multi-Party Computation
【2h】

Quantum And Relativistic Protocols For Secure Multi-Party Computation

机译:安全多方计算的量子和相对论协议

摘要

After a general introduction, the thesis is divided into four parts. In thefirst, we discuss the task of coin tossing, principally in order to highlightthe effect different physical theories have on security in a straightforwardmanner, but, also, to introduce a new protocol for non-relativistic strong cointossing. This protocol matches the security of the best protocol known to datewhile using a conceptually different approach to achieve the task. In the second part variable bias coin tossing is introduced. This is avariant of coin tossing in which one party secretly chooses one of two biasedcoins to toss. It is shown that this can be achieved with unconditionalsecurity for a specified range of biases, and with cheat-evident security forany bias. We also discuss two further protocols which are conjectured to beunconditionally secure for any bias. The third section looks at other two-party secure computations for which,prior to our work, protocols and no-go theorems were unknown. We introduce ageneral model for such computations, and show that, within this model, a widerange of functions are impossible to compute securely. We give explicitcheating attacks for such functions. In the final chapter we discuss the task of expanding a private randomstring, while dropping the usual assumption that the protocol's user trusts herdevices. Instead we assume that all quantum devices are supplied by anarbitrarily malicious adversary. We give two protocols that we conjecturesecurely perform this task. The first allows a private random string to beexpanded by a finite amount, while the second generates an arbitrarily largeexpansion of such a string.
机译:在概述之后,论文分为四个部分。首先,我们讨论抛硬币的任务,主要是为了突出不同的物理理论以一种简单的方式对安全性的影响,而且,还介绍了一种用于非相对论性强抛硬币的新协议。该协议与迄今已知的最佳协议的安全性相匹配,同时使用概念上不同的方法来完成任务。在第二部分中,介绍了可变偏置硬币抛掷。这是掷硬币的变体,其中一方秘密选择两个有偏见的硬币之一进行抛掷。结果表明,对于指定范围的偏差,可以使用无条件安全性;对于任何偏差,可以使用作弊显而易见的安全性来实现。我们还讨论了另外两个协议,它们被认为对于任何偏差都是无条件安全的。第三部分介绍了其他两方安全计算,在这些工作中,在我们的工作之前,协议和不通过定理是未知的。我们介绍了用于此类计算的通用模型,并表明在此模型中,无法安全地计算各种功能。我们对此类功能进行了明确的攻击。在最后一章中,我们讨论了扩展私有随机字符串的任务,同时放弃了协议用户信任她的设备的通常假设。相反,我们假设所有量子设备都是由任意恶意的对手提供的。我们提供了两个我们可以猜想安全地执行此任务的协议。第一种允许私有随机字符串扩展有限的数量,而第二种则允许任意扩展该字符串。

著录项

  • 作者

    Colbeck, Roger;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号