Repository logo
Institutional Digital Repository
Shreenivas Deshpande Library, IIT (BHU), Varanasi

Secure Two-Party Computation in a Quantum World

dc.contributor.authorBüscher N.; Demmler D.; Karvelas N.P.; Katzenbeisser S.; Krämer J.; Rathee D.; Schneider T.; Struck P.
dc.date.accessioned2025-05-23T11:30:27Z
dc.description.abstractSecure multi-party computation has been extensively studied in the past years and has reached a level that is considered practical for several applications. The techniques developed thus far have been steadily optimized for performance and were shown to be secure in the classical setting, but are not known to be secure against quantum adversaries. In this work, we start to pave the way for secure two-party computation in a quantum world where the adversary has access to a quantum computer. We show that post-quantum secure two-party computation has comparable efficiency to their classical counterparts. For this, we develop a lattice-based OT protocol which we use to implement a post-quantum secure variant of Yao’s famous garbled circuits (GC) protocol (FOCS’82). Along with the OT protocol, we show that the oblivious transfer extension protocol of Ishai et al. (CRYPTO’03), which allows running many OTs using mainly symmetric cryptography, is post-quantum secure. To support these results, we prove that Yao’s GC protocol achieves post-quantum security if the underlying building blocks do. © 2020, Springer Nature Switzerland AG.
dc.identifier.doihttps://doi.org/10.1007/978-3-030-57808-4_23
dc.identifier.urihttp://172.23.0.11:4000/handle/123456789/12208
dc.relation.ispartofseriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.titleSecure Two-Party Computation in a Quantum World

Files

Collections