A robust and composable device-independent protocol for oblivious transfer using (fully) untrusted quantum devices in the bounded storage model

This paper presents the first robust, composable, and device-independent oblivious transfer protocol secure against joint quantum attacks in the bounded storage model, utilizing Magic Square devices and a parallel repetition theorem for hybrid strategies to achieve negligible errors with polylogarithmic runtime suitable for the NISQ era.

Original authors: Rishabh Batra, Sayantan Chakraborty, Rahul Jain, Upendra Kapshikar

Published 2026-04-13
📖 6 min read🧠 Deep dive

This is an AI-generated explanation of the paper below. It is not written or endorsed by the authors. For technical accuracy, refer to the original paper. Read full disclaimer

Imagine two banks, Bank Alice and Bank Bob, want to swap a secret piece of information. They don't trust each other, and they don't trust the hardware they are using. In fact, the hardware might have been built by a sneaky third party who is working with one of the banks to cheat.

This is the problem of Oblivious Transfer (OT).

  • The Goal: Alice has two secrets (let's call them Secret A and Secret B). Bob wants to choose one of them to learn.
  • The Rules: Bob must learn only the one he chose and know nothing about the other. Alice must learn nothing about which one Bob chose.

Usually, if the hardware is perfect, this is easy. But in the real world, hardware is noisy, and manufacturers might be dishonest. This paper presents a solution that works even if the devices are completely untrusted and slightly broken.

Here is the breakdown of their solution using simple analogies.

1. The "Magic Square" Game

To make sure the devices aren't cheating, the protocol uses a game called the Magic Square.

  • The Analogy: Imagine Alice and Bob are playing a game where they have to fill out a 3x3 grid with 0s and 1s.
    • Alice picks a row.
    • Bob picks a column.
    • They must output a number for that specific square.
    • The Catch: If they are honest and using "quantum magic," they can always make their numbers match perfectly at the intersection, even though they can't talk to each other during the game. If they are using fake, classical devices, they will fail to match about 1% of the time.
  • The Test: The protocol runs this game thousands of times. If the devices fail too often, the banks know something is wrong (either the devices are broken or someone is cheating) and they stop.

2. The "Time Bomb" (Bounded Storage)

The biggest trick in this paper is a concept called the Bounded Storage Model.

  • The Analogy: Imagine the devices have a "memory foam" that is very sticky but also very fragile.
    • When the game starts, the devices can hold onto a lot of complex quantum information (like a super-complex knot of string).
    • However, there is a DELAY (a timer). Let's say the timer is set to 1 second.
    • After 1 second, the "memory foam" collapses. The complex knot unravels instantly, and the information turns into simple, classical data (like a piece of paper).
  • Why this helps: A cheater might try to store the secret data in their quantum memory to analyze it later. But because of the "Time Bomb," they can't hold onto the quantum data long enough to cheat. Once the timer hits, the quantum advantage is gone, and they are left with only what they could measure before the timer went off.

3. The "Robustness" (Handling Broken Toys)

In the real world, devices aren't perfect. A factory might make a "Magic Square" device that is 99% perfect, but 1% of the time it makes a mistake due to a tiny manufacturing error.

  • The Analogy: Think of a robot that is supposed to walk in a straight line. If it stumbles once every 100 steps, is it broken? No.
  • The Solution: This protocol is Robust. It doesn't demand perfection. It says, "As long as the devices are mostly working (even if they are slightly off), we can still extract a secure secret." It uses error-correcting codes (like adding extra "check digits" to a credit card number) to fix the small mistakes the devices make.

4. The "Lego" Property (Composability)

Most security protocols are like a single, fragile glass house. If you try to build a bigger house on top of it, the whole thing might collapse.

  • The Analogy: This protocol is like a Lego brick. It is designed so that you can snap it onto other security protocols (like a digital signature or a voting system) without breaking the security guarantees.
  • Why it matters: You can use this "OT brick" to build massive, complex secure systems (like a secure election or a private auction) without having to re-prove the math for the whole thing every time.

5. The "Non-IID" Attack (The Mastermind)

Usually, security proofs assume that every device is identical and independent (like buying 100 identical dice from a store). But a smart cheater might buy 100 dice that are secretly linked to each other (e.g., if Die #1 rolls a 6, Die #2 knows to roll a 1).

  • The Breakthrough: This paper proves the protocol is safe even if the cheater designs all the devices together as a single, giant, linked system. It doesn't matter if the devices are "cousins" or "twins"; the "Time Bomb" and the "Magic Square" test still catch them.

Summary: How it Works in Practice

  1. Setup: Alice and Bob get their "untrusted" quantum devices from a vendor.
  2. The Test: They play the Magic Square game many times to check if the devices are working (and not cheating).
  3. The Delay: They wait for the "Time Bomb" (DELAY) to go off. This forces any quantum cheating attempts to collapse into useless data.
  4. The Extraction: Alice sends Bob a "locked box" containing her two secrets. The key to the box is hidden in the results of the Magic Square game.
  5. The Result: Because of the Time Bomb, Bob can only unlock the box for the secret he chose. He cannot figure out the other secret because the "quantum clues" needed to do so have already evaporated.

The Bottom Line:
This paper solves a major open problem in cryptography. It shows that even if you have no trust in your hardware, no trust in the manufacturer, and the hardware is slightly broken, you can still perform secure, private transactions—as long as you can't store quantum data for very long. It turns the limitations of current technology (noisy, short-lived quantum memory) into a security feature.

Drowning in papers in your field?

Get daily digests of the most novel papers matching your research keywords — with technical summaries, in your language.

Try Digest →