{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T07:55:08Z","timestamp":1770450908752,"version":"3.49.0"},"reference-count":49,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T00:00:00Z","timestamp":1591920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","award":[", 277 UIDP\/50008\/2020, UID\/CEC\/00408\/2013, POCI-01-0145-FEDER-031826, POCI-01-0247-FEDER-039728, 278 PTDC\/CCI-CIF\/29877\/2017, PD\/BD\/114334\/2016, PD\/BD\/113648\/2015, and CEECIND\/04594\/2017"],"award-info":[{"award-number":[", 277 UIDP\/50008\/2020, UID\/CEC\/00408\/2013, POCI-01-0145-FEDER-031826, POCI-01-0247-FEDER-039728, 278 PTDC\/CCI-CIF\/29877\/2017, PD\/BD\/114334\/2016, PD\/BD\/113648\/2015, and CEECIND\/04594\/2017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Sciences"],"abstract":"<jats:p>The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We present a method to generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach of quantum and classical, we obtain a practical and high-speed oblivious transfer protocol. We analyse the security and efficiency features of the technique and conclude that it presents advantages in both areas when compared to public-key based techniques.<\/jats:p>","DOI":"10.3390\/app10124080","type":"journal-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T03:17:32Z","timestamp":1592191052000},"page":"4080","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation"],"prefix":"10.3390","volume":"10","author":[{"given":"Mariano","family":"Lemus","sequence":"first","affiliation":[{"name":"Departamento de Matem\u00e1tica, Instituto Superior T\u00e9cnico, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"}]},{"given":"Mariana F.","family":"Ramos","sequence":"additional","affiliation":[{"name":"Departamento de Eletr\u00f3nica, Telecomunica\u00e7\u00f5es e Inform\u00e1tica, Universidade de Aveiro, Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es,  Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"given":"Preeti","family":"Yadav","sequence":"additional","affiliation":[{"name":"Departamento de Matem\u00e1tica, Instituto Superior T\u00e9cnico, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6309-6818","authenticated-orcid":false,"given":"Nuno A.","family":"Silva","sequence":"additional","affiliation":[{"name":"Departamento de Eletr\u00f3nica, Telecomunica\u00e7\u00f5es e Inform\u00e1tica, Universidade de Aveiro, Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es,  Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4412-8025","authenticated-orcid":false,"given":"Nelson J.","family":"Muga","sequence":"additional","affiliation":[{"name":"Departamento de Eletr\u00f3nica, Telecomunica\u00e7\u00f5es e Inform\u00e1tica, Universidade de Aveiro, Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es,  Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8792-959X","authenticated-orcid":false,"given":"Andr\u00e9","family":"Souto","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"},{"name":"Departamento de Inform\u00e1tica, Faculdade de Ci\u00eancias da Universidade de Lisboa, Campo Grande 016, 1749-016 Lisboa, Portugal"},{"name":"LASIGE, Faculdade de Ci\u00eancias da Universidade de Lisboa, Campo Grande 016, 1749-016 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9345-4321","authenticated-orcid":false,"given":"Nikola","family":"Paunkovi\u0107","sequence":"additional","affiliation":[{"name":"Departamento de Matem\u00e1tica, Instituto Superior T\u00e9cnico, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2393-8224","authenticated-orcid":false,"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[{"name":"Departamento de Matem\u00e1tica, Instituto Superior T\u00e9cnico, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2101-5896","authenticated-orcid":false,"given":"Armando N.","family":"Pinto","sequence":"additional","affiliation":[{"name":"Departamento de Eletr\u00f3nica, Telecomunica\u00e7\u00f5es e Inform\u00e1tica, Universidade de Aveiro, Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es,  Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2020,6,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lindell, Y., and Pinkas, B. (2009). Secure Multiparty Computation for Privacy-Preserving Data Mining. J. Priv. Confid., 59\u201398.","DOI":"10.29012\/jpc.v1i1.566"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Laud, P., and Kamm, L. (2015). Applications of Secure Multiparty Computation, IOS Press.","DOI":"10.1515\/popets-2015-0011"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1007\/s00145-016-9236-6","article-title":"More Efficient Oblivious Transfer Extensions","volume":"30","author":"Asharov","year":"2017","journal-title":"J. Cryptol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1038\/nature23461","article-title":"Post-quantum cryptography","volume":"549","author":"Bernstein","year":"2017","journal-title":"Nature"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C. (1986, January 27\u201329). How to generate and exchange secrets. Proceedings of the 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), Toronto, ON, Canada.","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., and Wigderson, A. (1987, January 25\u201327). How to Play ANY Mental Game. Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, NY, USA.","DOI":"10.1145\/28395.28420"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R. (2013). GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. Financial Cryptography and Data Security, Proceedings of the 17th International Conference, FC 2013, Okinawa, Japan, 1\u20135 April 2013, Springer. Revised Selected Papers.","DOI":"10.1007\/978-3-642-39884-1"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Beaver, D., Micali, S., and Rogaway, P. (1990, January 14\u201316). The round complexity of secure protocols. Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA.","DOI":"10.1145\/100216.100287"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kilian, J. (1988, January 2\u20134). Founding Cryptography on Oblivious Transfer. Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago, IL, USA.","DOI":"10.1145\/62212.62215"},{"key":"ref_10","unstructured":"Harnik, D., Ishai, Y., and Kushilevitz, E. (2007, January 19\u201323). How many oblivious transfers are needed for secure multiparty computation?. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA."},{"key":"ref_11","unstructured":"Rabin, M.O. (1981). How To Exchange Secrets, Aiken Computation Laboratory, Harvad University. Technical Report TR-81."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Goldreich, O. (2001). Foundations of Cryptography, Volume I Basic Techniques, Cambridge University Press.","DOI":"10.1017\/CBO9780511546891"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Paar, C., and Pelzl, J. (2010). Understanding Cryptography, Springer.","DOI":"10.1007\/978-3-642-04101-3"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","article-title":"Quantum cryptography beyond quantum key distribution","volume":"78","author":"Broadbent","year":"2016","journal-title":"Des. Codes Cryptogr."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12743\/quanta.v6i1.57","article-title":"Quantum cryptography: Key distribution and beyond","volume":"6","author":"Pathak","year":"2017","journal-title":"Quanta"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","article-title":"Is Quantum Bit Commitment Really Possible?","volume":"78","author":"Lo","year":"1997","journal-title":"Phys. Rev. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","article-title":"Unconditionally Secure Quantum Bit Commitment is Impossible","volume":"78","author":"Mayers","year":"1997","journal-title":"Phys. Rev. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"220502","DOI":"10.1103\/PhysRevLett.100.220502","article-title":"Cryptography from Noisy Storage","volume":"100","author":"Wehner","year":"2008","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"052336","DOI":"10.1103\/PhysRevA.81.052336","article-title":"Implementation of two-party protocols in the noisy-storage model","volume":"81","author":"Wehner","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1962","DOI":"10.1109\/TIT.2011.2177772","article-title":"Unconditional Security From Noisy Quantum Storage","volume":"58","author":"Konig","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"052336","DOI":"10.1103\/PhysRevA.89.052336","article-title":"Noise and measurement errors in a practical two-state quantum bit commitment protocol","volume":"89","author":"Loura","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"015202","DOI":"10.1088\/2040-8978\/18\/1\/015202","article-title":"Implementation of a two-state quantum bit commitment protocol in optical fibers","volume":"18","author":"Almeida","year":"2015","journal-title":"J. Opt."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3418","DOI":"10.1038\/ncomms4418","article-title":"An experimental implementation of oblivious transfer in the noisy storage model","volume":"5","author":"Erven","year":"2014","journal-title":"Nat. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1038\/s41467-018-03729-4","article-title":"Continuous-variable protocol for oblivious transfer in the noisy-storage model","volume":"9","author":"Furrer","year":"2018","journal-title":"Nat. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1038\/ncomms2268","article-title":"Experimental implementation of bit commitment in the noisy-storage model","volume":"3","author":"Ng","year":"2012","journal-title":"Nat. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"030502","DOI":"10.1103\/PhysRevLett.115.030502","article-title":"Practical Relativistic Bit Commitment","volume":"115","author":"Lunghi","year":"2015","journal-title":"Phys. Rev. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"140506","DOI":"10.1103\/PhysRevLett.117.140506","article-title":"24-Hour Relativistic Bit Commitment","volume":"117","author":"Verbanis","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"032327","DOI":"10.1103\/PhysRevA.98.032327","article-title":"Practical and unconditionally secure spacetime-constrained oblivious transfer","volume":"98","author":"Kerenidis","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Koblitz, N. (1996). Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. Advances in Cryptology\u2014CRYPTO \u201996, Proceedings of the 16th Annual International Cryptology Conference Santa Barbara, California, CA, USA, 18\u201322 August 1996, Springer.","DOI":"10.1007\/3-540-68697-5"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Pinto, A.N., Ramos, M.F., Silva, N.A., and Muga, N.J. (2018, January 1\u20135). Generation and Distribution of Oblivious Keys through Quantum Communications. Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), Bucharest, Romania.","DOI":"10.1109\/ICTON.2018.8473991"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5035","DOI":"10.1364\/OE.385196","article-title":"Reversal operator to compensate polarization random drifts in quantum communications","volume":"28","author":"Ramos","year":"2020","journal-title":"Opt. Express"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Lindell, Y., and Pinkas, B. (2007, January 20\u201324). An efficient protocol for secure two-party computation in the presence of malicious adversaries. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain.","DOI":"10.1007\/978-3-540-72540-4_4"},{"key":"ref_33","unstructured":"Yao, A.C.C. (June, January 29). Security of Quantum Protocols Against Coherent Measurements. Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, Las Vegas, NV, USA."},{"key":"ref_34","unstructured":"Unruh, D. (June, January 30). Universally composable quantum multi-party computation. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France."},{"key":"ref_35","unstructured":"Naor, M. (2004). Universally Composable Commitments Using Random Oracles. Theory of Cryptography, Springer."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1145\/1008731.1008735","article-title":"Quantum Lower Bounds for the Collision and the Element Distinctness Problems","volume":"51","author":"Aaronson","year":"2004","journal-title":"J. ACM"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Asharov, G., Lindell, Y., Schneider, T., and Zohner, M. (2013, January 4\u20138). More Efficient Oblivious Transfer and Extensions for Faster Secure Computation. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516738"},{"key":"ref_38","unstructured":"Menezes, A.J., Katz, J., Van Oorschot, P.C., and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press, Inc."},{"key":"ref_39","first-page":"688","article-title":"A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem","volume":"2012","author":"Ding","year":"2012","journal-title":"Iacr Cryptol. Eprint Arch."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1038\/srep01576","article-title":"Key reconciliation for high performance quantum key distribution","volume":"3","author":"Elkouss","year":"2013","journal-title":"Sci. Rep."},{"key":"ref_41","unstructured":"Brassard, G., and Salvail, L. (1993). Secret-key reconciliation by public discussion. Workshop on the Theory and Application of of Cryptographic Techniques, Springer."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-004-0102-6","article-title":"Computationally secure oblivious transfer","volume":"18","author":"Naor","year":"2005","journal-title":"J. Cryptol."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Chou, T., and Orlandi, C. (2015, January 23\u201326). The simplest protocol for oblivious transfer. Proceedings of the International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico.","DOI":"10.1007\/978-3-319-22174-8_3"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"021101","DOI":"10.1063\/1.4855515","article-title":"Room temperature single-photon detectors for high bit rate quantum key distribution","volume":"104","author":"Comandar","year":"2014","journal-title":"Appl. Phys. Lett."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"e1701491","DOI":"10.1126\/sciadv.1701491","article-title":"Provably secure and high-rate quantum key distribution with time-bin qudits","volume":"3","author":"Islam","year":"2017","journal-title":"Sci. Adv."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1364\/PRJ.6.000214","article-title":"High-speed and high-performance polarization-based quantum key distribution system without side channel effects caused by multiple lasers","volume":"6","author":"Ko","year":"2018","journal-title":"Photonics Res."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2794","DOI":"10.1364\/OE.26.002794","article-title":"High key rate continuous-variable quantum key distribution with a real local oscillator","volume":"26","author":"Wang","year":"2018","journal-title":"Opt. Express"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Pirandola, S., Andersen, U., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., and Ottaviani, C. (2019). Advances in Quantum Cryptography. arXiv.","DOI":"10.1364\/AOP.361502"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"062335","DOI":"10.1103\/PhysRevA.94.062335","article-title":"Security of two-state and four-state practical quantum bit-commitment protocols","volume":"94","author":"Loura","year":"2016","journal-title":"Phys. Rev. A"}],"container-title":["Applied Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2076-3417\/10\/12\/4080\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:38:32Z","timestamp":1760175512000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2076-3417\/10\/12\/4080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,12]]},"references-count":49,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["app10124080"],"URL":"https:\/\/doi.org\/10.3390\/app10124080","relation":{},"ISSN":["2076-3417"],"issn-type":[{"value":"2076-3417","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,12]]}}}