Table of Content

Open Access iconOpen Access



Privacy-Preserving Decision Protocols Based on Quantum Oblivious Key Distribution

Kejia Zhang1, 2, 3, 4, Chunguang Ma5, Zhiwei Sun4, 6, *, Xue Zhang2, 3, Baomin Zhou2, Yukun Wang7

1 School of Computer Science and Technology, Harbin Engineering University, Harbin, 150001, China.
2 School of Mathematical Science, Heilongjiang University, Harbin, 150080, China.
3 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China.
4 Center for Quantum Computing, Peng Cheng Laboratory, Shenzhen, 518055, China.
5 College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, 266590, China.
6 School of Artificial Intelligence, Shenzhen Polytechnic, Shenzhen, 518055, China.
7 Department of Electrical and Computer Engineering, National University of Singapore, 117583, Singapore.

* Corresponding Author: Zhiwei Sun. Email: email.

Computers, Materials & Continua 2020, 64(3), 1915-1928.


Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes the provider send a secret key sequence to the user obliviously, i.e., the user may only get almost one bit key in the sequence which is unknown to the provider. Recently, a number of works have sought to establish the corresponding quantum oblivious key transfer model and rename it as quantum oblivious key distribution (QOKD) from the well-known expression of quantum key distribution (QKD). In this paper, a new QOKD model is firstly proposed for the provider and user with limited quantum capabilities, where both of them just perform computational basis measurement for single photons. Then we show that the privacy for both of them can be protected, since the probability of getting other’s raw-key bits without being detected is exponentially small. Furthermore, we give the solutions to some special decision problems such as set-member decision and point-inclusion by announcing the improved shifting strategies followed QOKD. Finally, the further discussions and applications of our ideas have been presented.


Cite This Article

K. Zhang, C. Ma, Z. Sun, X. Zhang, B. Zhou et al., "Privacy-preserving decision protocols based on quantum oblivious key distribution," Computers, Materials & Continua, vol. 64, no.3, pp. 1915–1928, 2020.


cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2216


  • 1473


  • 0


Share Link