Implementation of two-party protocols in the noisy-storage model
- Institute for Quantum Information, Caltech, Pasadena, California 91125 (United States)
- ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra) (Spain)
- Centrum Wiskunde and Informatica (CWI), P. O. Box 94079, 1090 GB Amsterdam (Netherlands)
- Center for Quantum Information and Quantum Control (CQIQC), Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, M5S 3G4 (Canada)
The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.
- OSTI ID:
- 21413371
- Journal Information:
- Physical Review. A, Vol. 81, Issue 5; Other Information: DOI: 10.1103/PhysRevA.81.052336; (c) 2010 The American Physical Society; ISSN 1050-2947
- Country of Publication:
- United States
- Language:
- English
Similar Records
Reexamination of quantum bit commitment: The possible and the impossible
Security of quantum bit-string generation