Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

npj Quantum Information
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. npj quantum information
  3. articles
  4. article
Experimental secure multiparty computation from quantum oblivious transfer with bit commitment
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 14 March 2026

Experimental secure multiparty computation from quantum oblivious transfer with bit commitment

  • Kai-Yi Zhang1,2,
  • An-Jing Huang3,
  • Kun Tu4,
  • Ming-Han Li3,
  • Chi Zhang3,
  • Wei Qi3,
  • Ya-Dong Wu1 &
  • …
  • Yu Yu1,2 

npj Quantum Information , Article number:  (2026) Cite this article

  • 1564 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Computer science
  • Quantum information

Abstract

Secure multiparty computation enables collaborative computations across multiple users while preserving individual privacy, which has a wide range of applications in finance, machine learning and healthcare. Secure multiparty computation can be realized using oblivious transfer as a primitive function. In this paper, we present an experimental implementation of a quantum-secure quantum oblivious transfer (QOT) protocol using an adapted quantum key distribution system combined with a bit commitment scheme, surpassing previous approaches only secure in the noisy storage model. We demonstrate the first practical application of the QOT protocol by solving the private set intersection, a prime example of secure multiparty computation, where two parties aim to find common elements in their datasets without revealing any other information. In our experiments, two banks can identify common suspicious accounts without disclosing any other data. This not only proves the experimental functionality of QOT, but also showcases its real-world commercial applications.

Similar content being viewed by others

A novel quantum private query protocol and its application in private set intersection

Article Open access 14 October 2025

Secure multiparty quantum key agreement against collusive attacks

Article Open access 04 May 2021

Practical quantum tokens without quantum memories and experimental tests

Article Open access 11 March 2022

Data availability

The datasets generated and/or analyzed during the current study are not publicly available due to confidentiality agreements with participating financial institutions and privacy restrictions on customer-related data, but are available from the corresponding author on reasonable request. No publicly available sequence data were used in this study; therefore accession numbers are not applicable.

Code availability

The code that supports the findings of this study is available from the corresponding author upon reasonable request.

Materials availability

The materials that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Yao, A. C.-C. Protocols for secure computations (extended abstract). In Proc. 23rd Annual Symposium on Foundations of Computer Science, 160–164 (IEEE Computer Society Press, 1982).

  2. Yao, A. C.-C. How to generate and exchange secrets (extended abstract). In Proc. 27th Annual Symposium on Foundations of Computer Science, 162–167 (IEEE Computer Society Press, 1986).

  3. Goldreich, O., Micali, S. & Wigderson, A. How to play any mental game or A completeness theorem for protocols with honest majority. In Aho, A. (ed.) 19th Annual ACM Symposium on Theory of Computing, 218–229 (ACM Press, 1987).

  4. Mohassel, P. & Zhang, Y. SecureML: a system for scalable privacy-preserving machine learning. In Proc. IEEE Symposium on Security and Privacy, 19–38 (IEEE Computer Society Press, 2017).

  5. Cho, H., Wu, D. J. & Berger, B. Secure genome-wide association analysis using multiparty computation. Nat. Biotechnol. 36, 547–551 (2018).

    Google Scholar 

  6. Kilian, J. Founding cryptography on oblivious transfer. In Proc. 20th Annual ACM Symposium on Theory of Computing, 20–31 (ACM Press, 1988).

  7. Even, S., Goldreich, O. & Lempel, A. A randomized protocol for signing contracts. In Chaum, D., Rivest, R. L. & Sherman, A. T. (eds.) Advances in Cryptology – CRYPTO’82, 205–210 (Plenum Press, 1982).

  8. Naor, M. & Pinkas, B. Efficient oblivious transfer protocols. In Kosaraju, S. R. (ed.) 12th Annual ACM-SIAM Symposium on Discrete Algorithms, 448–457 (ACM-SIAM, 2001).

  9. Santos, M. B., Mateus, P. & Pinto, A. N. Quantum oblivious transfer: a short review. Entropy 24, 945 (2022).

    Google Scholar 

  10. Mayers, D. Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414–3417 (1997).

    Google Scholar 

  11. Lo, H.-K. Insecurity of quantum secure computations. Phys. Rev. A 56, 1154–1162 (1997).

    Google Scholar 

  12. Bennett, C. H., Brassard, G., Crépeau, C. & Skubiszewska, M.-H. Practical quantum oblivious transfer. 351–366 (Springer, 2001).

  13. Wehner, S., Schaffner, C. & Terhal, B. M. Cryptography from noisy storage. Phys. Rev. Lett. 100, 220502 (2008).

    Google Scholar 

  14. Wehner, S., Curty, M., Schaffner, C. & Lo, H.-K. Implementation of two-party protocols in the noisy-storage model. Phys. Rev. A 81, 052336 (2010).

    Google Scholar 

  15. Schaffner, C. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model. Phys. Rev. A 82, 032308 (2010).

    Google Scholar 

  16. Erven, C. et al. An experimental implementation of oblivious transfer in the noisy storage model. Nat. Commun. 5, 3418 (2014).

    Google Scholar 

  17. Zhu, T.-X. et al. On-demand integrated quantum memory for polarization qubits. Phys. Rev. Lett. 128, 180501 (2022).

    Google Scholar 

  18. Naor, M. Bit commitment using pseudorandomness. J. Cryptol. 4, 151–158 (1991).

    Google Scholar 

  19. Furrer, F. et al. Continuous-variable protocol for oblivious transfer in the noisy-storage model. Nat. Commun. 9, 1450 (2018).

    Google Scholar 

  20. Amiri, R. et al. Imperfect 1-out-of-2 quantum oblivious transfer: bounds, a protocol, and its experimental implementation. PRX Quantum 2, 010335 (2021).

    Google Scholar 

  21. Stroh, L. et al. Noninteractive xor quantum oblivious transfer: optimal protocols and their experimental implementations. PRX Quantum 4, 020320 (2023).

    Google Scholar 

  22. Bartusek, J., Coladangelo, A., Khurana, D. & Ma, F. One-way functions imply secure computation in a quantum world. In Malkin, T. & Peikert, C. (eds.) Advances in Cryptology – CRYPTO 2021, Part I, vol. 12825 of Lecture Notes in Computer Science, 467–496 (Springer, 2021).

  23. Damgård, I., Fehr, S., Lunemann, C., Salvail, L. & Schaffner, C. Improving the security of quantum protocols via commit-and-open. In Halevi, S. (ed.) Advances in Cryptology – CRYPTO 2009, vol. 5677 of Lecture Notes in Computer Science, 408–427 (Springer, 009).

  24. Grilo, A. B., Lin, H., Song, F. & Vaikuntanathan, V. Oblivious transfer is in MiniQCrypt. In Canteaut, A. & Standaert, F.-X. (eds.) Advances in Cryptology – EUROCRYPT 2021, Part II, vol. 12697 of Lecture Notes in Computer Science, 531–561 (Springer, 021).

  25. Huang, Y., Evans, D. & Katz, J. Private set intersection: are garbled circuits better than custom protocols? In: Proc. ISOC Network and Distributed System Security Symposium – NDSS 2012 (The Internet Society, 2012).

  26. Dong, C., Chen, L. & Wen, Z. When private set intersection meets big data: an efficient and scalable protocol. In Sadeghi, A.-R., Gligor, V. D. & Yung, M. (eds.) ACM CCS 2013: 20th Conference on Computer and Communications Security, 789–800 (ACM Press, 2013).

  27. Lupo, C., Peat, J. T., Andersson, E. & Kok, P. Error-tolerant oblivious transfer in the noisy-storage model. Phys. Rev. Res. 5, 033163 (2023).

    Google Scholar 

  28. Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330–1333 (2000).

    Google Scholar 

  29. Hwang, W.-Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).

    Google Scholar 

  30. Wang, X.-B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).

    Google Scholar 

  31. Lo, H.-K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).

    Google Scholar 

  32. Kolesnikov, V., Kumaresan, R., Rosulek, M. & Trieu, N. Efficient batched oblivious PRF with applications to private set intersection. In Weippl, E. R., Katzenbeisser, S., Kruegel, C., Myers, A. C. & Halevi, S. (eds.) ACM CCS 2016: 23rd Conference on Computer and Communications Security, 818–829 (ACM Press, 2016).

  33. Haenni, R., Koenig, R. E. & Dubuis, E. Cast-as-intended verification in electronic elections based on oblivious transfer. In Electronic Voting: First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings 1, 73–91 (Springer, 2017).

  34. Shor, P. W. Algorithms for quantum computation: Discrete logarithms and factoring. In 35th Annual Symposium on Foundations of Computer Science, 124–134 (IEEE Computer Society Press, 1994).

  35. Bernstein, D. J. & Lange, T. Post-quantum cryptography. Nature 549, 188–194 (2017).

    Google Scholar 

  36. Bose, R. C. & Ray-Chaudhuri, D. K. On a class of error correcting binary group codes. Inf. control 3, 68–79 (1960).

    Google Scholar 

  37. Ishai, Y., Kilian, J., Nissim, K. & Petrank, E. Extending oblivious transfers efficiently. In Boneh, D. (ed.) Advances in Cryptology – CRYPTO 2003, vol. 2729 of Lecture Notes in Computer Science, 145–161 (Springer, 2003).

  38. Kolesnikov, V. & Kumaresan, R. Improved OT extension for transferring short secrets. In Canetti, R. & Garay, J. A. (eds.) Advances in Cryptology – CRYPTO 2013, Part II, vol. 8043 of Lecture Notes in Computer Science, 54–70 (Springer, 2013).

  39. Keller, M., Orsini, E. & Scholl, P. Actively secure OT extension with optimal overhead. In Gennaro, R. & Robshaw, M. J. B. (eds.) Advances in Cryptology – CRYPTO 2015, Part I, vol. 9215 of Lecture Notes in Computer Science, 724–741 (Springer, 2015).

  40. Beaver, D. Efficient multiparty protocols using circuit randomization. In Feigenbaum, J. (ed.) Advances in Cryptology – CRYPTO’91, vol. 576 of Lecture Notes in Computer Science, 420–432 (Springer, 1992).

  41. Masny, D. & Rindal, P. Endemic oblivious transfer. In Cavallaro, L., Kinder, J., Wang, X. & Katz, J. (eds.) ACM CCS 2019: 26th Conference on Computer and Communications Security, 309–326 (ACM Press, 2019).

Download references

Acknowledgements

The authors acknowledge Chengfang Jinke and Minfeng Bank for providing us with the data and the application scenario that facilitate the research. Yu Yu is supported by the National Natural Science Foundation of China (Grant Nos. 62125204 and 92270201) and Innovation Program for Quantum Science and Technology (No. 2021ZD0302901/2021ZD0302902). Ya-Dong Wu acknowledges funding from the National Natural Science Foundation of China through grants No. 12405022.

Author information

Authors and Affiliations

  1. School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China

    Kai-Yi Zhang, Ya-Dong Wu & Yu Yu

  2. State Key Laboratory of Cryptology, Beijing, China

    Kai-Yi Zhang & Yu Yu

  3. Anhui CAS Quantum Network Co., Ltd., Hefei, P.R. China

    An-Jing Huang, Ming-Han Li, Chi Zhang & Wei Qi

  4. Chengfang Financial Technology Company Limited, Beijing, P.R. China

    Kun Tu

Authors
  1. Kai-Yi Zhang
    View author publications

    Search author on:PubMed Google Scholar

  2. An-Jing Huang
    View author publications

    Search author on:PubMed Google Scholar

  3. Kun Tu
    View author publications

    Search author on:PubMed Google Scholar

  4. Ming-Han Li
    View author publications

    Search author on:PubMed Google Scholar

  5. Chi Zhang
    View author publications

    Search author on:PubMed Google Scholar

  6. Wei Qi
    View author publications

    Search author on:PubMed Google Scholar

  7. Ya-Dong Wu
    View author publications

    Search author on:PubMed Google Scholar

  8. Yu Yu
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Kai-Yi Zhang, Ya-Dong Wu and Yu Yu designed research; An-Jing Huang, Kun Tu, Ming-Han Li, Chi Zhang and Wei Qi performed the experiment. All authors discussed the results and reviewed the manuscript.

Corresponding authors

Correspondence to Ya-Dong Wu or Yu Yu.

Ethics declarations

Competing interests

The authors declare no competing interests.

Pending patents

The authors declare that there are no pending patents related to this work.

Journal association

The authors declare that none of the authors is an Editor-in-Chief, Associate Editor, or Guest Editor of npj Quantum Information or any associated collection relevant to this manuscript.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, KY., Huang, AJ., Tu, K. et al. Experimental secure multiparty computation from quantum oblivious transfer with bit commitment. npj Quantum Inf (2026). https://doi.org/10.1038/s41534-026-01219-w

Download citation

  • Received: 11 June 2025

  • Accepted: 03 March 2026

  • Published: 14 March 2026

  • DOI: https://doi.org/10.1038/s41534-026-01219-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Download PDF

Advertisement

Explore content

  • Research articles
  • Reviews & Analysis
  • News & Comment
  • Collections
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • Aims & Scope
  • Journal Information
  • Content types
  • About the Editors
  • Contact
  • Open Access
  • Calls for Papers
  • Editorial policies
  • Article Processing Charges
  • Journal Metrics
  • About the Partner

Publish with us

  • For Authors and Referees
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

npj Quantum Information (npj Quantum Inf)

ISSN 2056-6387 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics