{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:55:40Z","timestamp":1766159740819,"version":"build-2065373602"},"reference-count":66,"publisher":"American Physical Society (APS)","issue":"4","license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["F7113"],"award-info":[{"award-number":["F7113"]}],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"publisher","award":["FA9550-21-1-0355"],"award-info":[{"award-number":["FA9550-21-1-0355"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","award":["UID\/50008\/2020","PEst-OE\/EEI\/LA0008\/2013"],"award-info":[{"award-number":["UID\/50008\/2020","PEst-OE\/EEI\/LA0008\/2013"]}]},{"name":"FCT Est\u00edmulo ao Emprego Cient\u00edfico","award":["CEECIND\/04594\/2017\/CP1393\/CT000"],"award-info":[{"award-number":["CEECIND\/04594\/2017\/CP1393\/CT000"]}]},{"name":"European Union\u2019s Horizon Europe research and innovation program","award":["101114043"],"award-info":[{"award-number":["101114043"]}]},{"name":"JST Moonshot R&D program","award":["JPMJMS226C"],"award-info":[{"award-number":["JPMJMS226C"]}]},{"name":"FCT Portugal financing","award":["UIDB\/50021\/2020","UIDP\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020","UIDP\/50021\/2020"]}]}],"content-domain":{"domain":["journals.aps.org"],"crossmark-restriction":true},"short-container-title":["PRX Quantum"],"accepted":{"date-parts":[[2025,8,21]]},"abstract":"<jats:p>Motivated by the applications of secure multi-party computation as a privacy-protecting data analysis tool, and identifying oblivious transfer as one of its main practical enablers, we propose a practical realization of randomized quantum oblivious transfer. By using only symmetric cryptography primitives to implement commitments, we construct computationally secure randomized oblivious transfer without the need for public-key cryptography or assumptions imposing limitations on the adversarial devices. We show that the protocol is secure under an indistinguishability-based notion of security and demonstrate an experimental implementation to test its real-world performance. Its security and performance are then compared to both quantum and classical alternatives, showing potential advantages over existing solutions based on the noisy storage model and public-key cryptography.<\/jats:p>","DOI":"10.1103\/j8mt-c124","type":"journal-article","created":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:49:21Z","timestamp":1760107761000},"update-policy":"https:\/\/doi.org\/10.1103\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Performance of Practical Quantum Oblivious Key Distribution"],"prefix":"10.1103","volume":"6","author":[{"given":"Mariano","family":"Lemus","sequence":"first","affiliation":[{"id":[{"id":"https:\/\/ror.org\/02ht4fk33","id-type":"ROR","asserted-by":"publisher"}],"name":"Instituto de Telecomunica\u00e7\u00f5es"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3900-1532","authenticated-orcid":true,"given":"Peter","family":"Schiansky","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/014cpn338","id-type":"ROR","asserted-by":"publisher"}],"name":"Vienna Center for Quantum Science and Technology (VCQ)"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6904-6152","authenticated-orcid":true,"given":"Manuel","family":"Goul\u00e3o","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/04mqy3p58","id-type":"ROR","asserted-by":"publisher"}],"name":"INESC-ID, Instituto Superior T\u00e9cnico"},{"id":[{"id":"https:\/\/ror.org\/01c27hj86","id-type":"ROR","asserted-by":"publisher"}],"name":"Universidade de Lisboa"},{"id":[{"id":"https:\/\/ror.org\/02qg15b79","id-type":"ROR","asserted-by":"publisher"}],"name":"Okinawa Institute of Science and Technology Graduate University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3661-2810","authenticated-orcid":true,"given":"Mathieu","family":"Bozzio","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/014cpn338","id-type":"ROR","asserted-by":"publisher"}],"name":"Vienna Center for Quantum Science and Technology (VCQ)"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2023-2768","authenticated-orcid":true,"given":"David","family":"Elkouss","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/02qg15b79","id-type":"ROR","asserted-by":"publisher"}],"name":"Okinawa Institute of Science and Technology Graduate University"},{"id":[{"id":"https:\/\/ror.org\/04wf30j82","id-type":"ROR","asserted-by":"publisher"}],"name":"QuTech"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9345-4321","authenticated-orcid":true,"given":"Nikola","family":"Paunkovi\u0107","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/02ht4fk33","id-type":"ROR","asserted-by":"publisher"}],"name":"Instituto de Telecomunica\u00e7\u00f5es"},{"id":[{"id":"https:\/\/ror.org\/01c27hj86","id-type":"ROR","asserted-by":"publisher"}],"name":"Universidade de Lisboa"}]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/02ht4fk33","id-type":"ROR","asserted-by":"publisher"}],"name":"Instituto de Telecomunica\u00e7\u00f5es"},{"id":[{"id":"https:\/\/ror.org\/01c27hj86","id-type":"ROR","asserted-by":"publisher"}],"name":"Universidade de Lisboa"}]},{"given":"Philip","family":"Walther","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/014cpn338","id-type":"ROR","asserted-by":"publisher"}],"name":"Vienna Center for Quantum Science and Technology (VCQ)"}]}],"member":"16","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"j8mt-c124Cc1R1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","type":"journal-article"},{"key":"j8mt-c124Cc2R1","unstructured":"P. W. Shor, in Proceedings 35th Annual Symposium on Foundations of Computer Science (IEEE, Washington, DC, USA, 1994), pp. 124\u2013134.","type":"other"},{"key":"j8mt-c124Cc3R1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925","type":"journal-article"},{"key":"j8mt-c124Cc4R1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324","type":"journal-article"},{"key":"j8mt-c124Cc5R1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461","type":"journal-article"},{"key":"j8mt-c124Cc6R1","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502","type":"journal-article"},{"key":"j8mt-c124Cc7R1","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920","type":"journal-article"},{"key":"j8mt-c124Cc8R1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0157-4","type":"journal-article"},{"key":"j8mt-c124Cc9R1","doi-asserted-by":"crossref","unstructured":"Y. Lindell, in Encyclopedia of Data Warehousing and Mining (IGI Global, Hershey, PA, USA, 2005) pp. 1005\u20131009.","DOI":"10.4018\/978-1-59140-557-3.ch189","type":"other"},{"key":"j8mt-c124Cc10R1","doi-asserted-by":"crossref","unstructured":"Y. Lindell, Secure multiparty computation (MPC), Cryptology ePrint Archive (2020).","DOI":"10.1145\/3387108","type":"other"},{"key":"j8mt-c124Cc11R1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.024","type":"journal-article"},{"key":"j8mt-c124Cc12R1","unstructured":"A. C. Yao, in 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982) (IEEE, Chicago, IL, USA, 1982), pp. 160\u2013164.","type":"other"},{"key":"j8mt-c124Cc13R1","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, in Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali (Association for Computing Machinery, New York, NY, USA, 2019), pp. 307\u2013328.","DOI":"10.1145\/3335741.3335759","type":"other"},{"key":"j8mt-c124Cc14R1","unstructured":"I. Damg\u00e5rd, V. Pastro, N. Smart, and S. Zakarias, in Advances in Cryptology\u2013CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19\u201323, 2012. Proceedings (Springer, Santa Barbara, CA, USA, 2012), pp. 643\u2013662.","type":"other"},{"key":"j8mt-c124Cc15R1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818","type":"journal-article"},{"key":"j8mt-c124Cc16R1","unstructured":"M. O. Rabin, How to exchange secrets with oblivious transfer, Technical Report, TR-81, Aiken Computation Lab, Harvard University, 1981.","type":"other"},{"key":"j8mt-c124Cc17R1","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau, in Advances in Cryptology-CRYPTO\u201987: Proceedings 7 (Springer, Santa Barbara, CA, USA, 1988), pp. 350\u2013354.","DOI":"10.1007\/3-540-48184-2_30","type":"other"},{"key":"j8mt-c124Cc18R1","unstructured":"A. C.-C. Yao, in 27th Annual Symposium on Foundations of Computer Science (SFCS 1986) (IEEE, Washington, DC, USA, 1986), pp. 162\u2013167.","type":"other"},{"key":"j8mt-c124Cc19R1","doi-asserted-by":"crossref","unstructured":"J. Kilian, in Proceedings of the Twentieth Annual ACM symposium on Theory of Computing (Association for Computing Machinery (ACM), Chicago, IL, USA, 1988), pp. 20\u201331.","DOI":"10.1145\/62212.62215","type":"other"},{"key":"j8mt-c124Cc20R1","doi-asserted-by":"publisher","DOI":"10.3390\/app10124080","type":"journal-article"},{"key":"j8mt-c124Cc21R1","unstructured":"C. H. Bennett, G. Brassard, C. Cr\u00e9peau, and M.-H. Skubiszewska, in Annual International Cryptology Conference (Springer, Santa Barbara, CA, USA, 1991), pp. 351\u2013366.","type":"other"},{"key":"j8mt-c124Cc22R1","unstructured":"R. Canetti and M. Fischlin, in Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19\u201323, 2001 Proceedings 21 (Springer, Santa Barbara, CA, USA, 2001), pp. 19\u201340.","type":"other"},{"key":"j8mt-c124Cc23R1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3410","type":"journal-article"},{"key":"j8mt-c124Cc24R1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3414","type":"journal-article"},{"key":"j8mt-c124Cc25R1","unstructured":"U. Maurer and R. Renner, in International Conference on Supercomputing (Association for Computing Machinery (ACM), Tucson, AZ, USA, 2011).","type":"other"},{"key":"j8mt-c124Cc26R1","doi-asserted-by":"publisher","DOI":"10.1137\/060651343","type":"journal-article"},{"key":"j8mt-c124Cc27R1","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms4418","type":"journal-article"},{"key":"j8mt-c124Cc28R1","doi-asserted-by":"crossref","unstructured":"Y.-K. Liu, in Proceedings of the 5th Conference on Innovations in Theoretical Computer Science (Association for Computing Machinery (ACM), Princeton, NJ, USA, 2014), pp. 269\u2013286.","DOI":"10.1145\/2554797.2554823","type":"other"},{"key":"j8mt-c124Cc29R1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-03729-4","type":"journal-article"},{"key":"j8mt-c124Cc30R1","doi-asserted-by":"crossref","unstructured":"D. Mansy and P. Rindal, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery (ACM), Princeton, NJ, USA, 2019), pp. 309\u2013326.","DOI":"10.1145\/3319535.3354210","type":"other"},{"key":"j8mt-c124Cc31R1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846798","type":"journal-article"},{"key":"j8mt-c124Cc32R1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.01.021","type":"journal-article"},{"key":"j8mt-c124Cc33R1","doi-asserted-by":"crossref","unstructured":"P. Branco, L. Fiolhais, M. Goul\u00e3o, P. Martins, P. Mateus, and L. Sousa, in IACR Transactions on Cryptographic Hardware and Embedded Systems (Association for Computing Machinery (ACM), London, UK, 2021), p. 215.","DOI":"10.46586\/tches.v2021.i4.215-238","type":"other"},{"key":"j8mt-c124Cc34R1","unstructured":"S. Halevi and S. Micali, in Advances in Cryptology\u2013CRYPTO\u201996: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18\u201322, 1996 Proceedings 16 (Springer, Santa Barbara, CA, USA, 1996), pp. 201\u2013215.","type":"other"},{"key":"j8mt-c124Cc35R1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196774","type":"journal-article"},{"key":"j8mt-c124Cc36R1","unstructured":"R. Impagliazzo, in Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference (IEEE, Minneapolis, MN, USA, 1995), pp. 134\u2013147.","type":"other"},{"key":"j8mt-c124Cc37R1","doi-asserted-by":"crossref","unstructured":"B. Barak, in Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Springer, New York, NY, USA, 2017), pp. 45\u201377.","DOI":"10.1007\/978-3-319-57048-8_2","type":"other"},{"key":"j8mt-c124Cc38R1","doi-asserted-by":"crossref","unstructured":"A. B. Grilo, H. Lin, F. Song, and V. Vaikuntanathan, in Advances in Cryptology\u2013EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part II (Springer, Zagreb, Croatia, 2021), pp. 531\u2013561.","DOI":"10.1007\/978-3-030-77886-6_18","type":"other"},{"key":"j8mt-c124Cc39R1","unstructured":"A. C.-C. Yao, in Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing (Association for Computing Machinery (ACM), Las Vegas, NV, USA, 1995), pp. 67\u201375.","type":"other"},{"key":"j8mt-c124Cc40R1","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd, S. Fehr, C. Lunemann, L. Salvail, and C. Schaffner, in Annual International Cryptology Conference (Springer, Santa Barbara, CA, USA, 2009), pp. 408\u2013427.","DOI":"10.1007\/978-3-642-03356-8_24","type":"other"},{"key":"j8mt-c124Cc41R1","doi-asserted-by":"crossref","unstructured":"D. Unruh, in EUROCRYPT (Springer, Monaco and Nice, France, 2010), Vol. 6110, pp. 486\u2013505.","DOI":"10.1007\/978-3-642-13190-5_25","type":"other"},{"key":"j8mt-c124Cc42R1","doi-asserted-by":"crossref","unstructured":"J. Bartusek, A. Coladangelo, D. Khurana, and F. Ma, in Advances in Cryptology\u2013CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16\u201320, 2021, Proceedings, Part I 41 (Springer, Santa Barbara, CA, USA, 2021), pp. 467\u2013496.","DOI":"10.1007\/978-3-030-84242-0_17","type":"other"},{"key":"j8mt-c124Cc43R1","doi-asserted-by":"publisher","DOI":"10.3390\/e24070945","type":"journal-article"},{"key":"j8mt-c124Cc44R1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177772","type":"journal-article"},{"key":"j8mt-c124Cc45R1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.012316","type":"journal-article"},{"key":"j8mt-c124Cc46R1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.16947845","type":"dataset"},{"key":"j8mt-c124Cc47R1","doi-asserted-by":"crossref","unstructured":"T. Yamakawa and M. Zhandry, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Monaco and Nice, France, 2021), pp. 568\u2013597.","DOI":"10.1007\/978-3-030-77886-6_20","type":"other"},{"key":"j8mt-c124Cc48R1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.82.032308","type":"journal-article"},{"key":"j8mt-c124Cc49R1","doi-asserted-by":"publisher","DOI":"10.1364\/oe.26.003286","type":"journal-article"},{"key":"j8mt-c124Cc51R1","doi-asserted-by":"publisher","DOI":"10.1038\/srep07468","type":"journal-article"},{"key":"j8mt-c124Cc52R1","doi-asserted-by":"publisher","DOI":"10.1364\/OE.397030","type":"journal-article"},{"key":"j8mt-c124Cc53R1","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.2.030338","type":"journal-article"},{"key":"j8mt-c124Cc54R1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/12\/6\/063001","type":"journal-article"},{"key":"j8mt-c124Cc55R1","doi-asserted-by":"publisher","DOI":"10.3390\/e23081001","type":"journal-article"},{"key":"j8mt-c124Cc56R1","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2006","type":"book"},{"key":"j8mt-c124Cc57R1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.93.062346","type":"journal-article"},{"key":"j8mt-c124Cc58R1","doi-asserted-by":"crossref","unstructured":"D. Unruh, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, Hanoi, Vietnam, 2016), pp. 166\u2013195.","DOI":"10.1007\/978-3-662-53890-6_6","type":"other"},{"key":"j8mt-c124Cc59R1","doi-asserted-by":"crossref","unstructured":"M. Zhandry, in Annual International Cryptology Conference (Springer, Santa Barbara, CA, USA, 2022), pp. 596\u2013624.","DOI":"10.1007\/978-3-031-15982-4_20","type":"other"},{"key":"j8mt-c124Cc60R1","doi-asserted-by":"crossref","unstructured":"A. Agarwal, J. Bartusek, D. Khurana, and N. Kumar, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Lyon, France, 2023), pp. 363\u2013394.","DOI":"10.1007\/978-3-031-30545-0_13","type":"other"},{"key":"j8mt-c124Cc61R1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exv008","type":"journal-article"},{"key":"j8mt-c124Cc62R1","volume-title":"Quantum Detection and Estimation Theory","author":"C. W. Helstrom","year":"1976","type":"book"},{"key":"j8mt-c124Cc63R1","doi-asserted-by":"publisher","DOI":"10.1109\/18.761271","type":"journal-article"},{"key":"j8mt-c124Cc64R1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749908003256","type":"journal-article"},{"key":"j8mt-c124Cc65R1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830","type":"journal-article"},{"key":"j8mt-c124Cc66R1","doi-asserted-by":"crossref","unstructured":"N. J. Bouman and S. Fehr, in Annual Cryptology Conference (Springer, Santa Barbara, CA, USA, 2010), pp. 724\u2013741.","DOI":"10.1007\/978-3-642-14623-7_39","type":"other"},{"key":"j8mt-c124Cc67R1","doi-asserted-by":"publisher","DOI":"10.3390\/e27070751","type":"journal-article"}],"container-title":["PRX Quantum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.aps.org\/article\/10.1103\/j8mt-c124","content-type":"unspecified","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/harvest.aps.org\/v2\/journals\/articles\/10.1103\/j8mt-c124\/fulltext","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:49:27Z","timestamp":1760107767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.aps.org\/doi\/10.1103\/j8mt-c124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,10]]}},"URL":"https:\/\/doi.org\/10.1103\/j8mt-c124","relation":{"has-preprint":[{"id-type":"doi","id":"10.48550\/arXiv.2501.03973","asserted-by":"subject"}]},"ISSN":["2691-3399"],"issn-type":[{"value":"2691-3399","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"2025-03-05","name":"date_received","label":"Date Received","group":{"name":"publication_dates","label":"Publication dates"}},{"value":"Published by the American Physical Society. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright_statement","label":"Copyright statement","group":{"name":"copyright","label":"copyright"}},{"value":"2025","name":"copyright_year","label":"Copyright year","group":{"name":"copyright","label":"copyright"}},{"value":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/","name":"creative_commons_license","label":"Creative Commons license","group":{"name":"licenses","label":"Licenses"}},{"value":"\u00a92025 The authors","name":"copyright_holder","label":"Copyright holder","group":{"name":"copyright","label":"copyright"}}],"article-number":"040308"}}