Implementation of two-party protocols in the noisy-storage model

Stephanie Wehner, Marcos Curty, Christian Schaffner, and Hoi-Kwong Lo
Phys. Rev. A 81, 052336 – Published 25 May 2010

Abstract

The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
28 More
  • Received 26 November 2009

DOI:https://doi.org/10.1103/PhysRevA.81.052336

©2010 American Physical Society

Authors & Affiliations

Stephanie Wehner1,*, Marcos Curty2,†, Christian Schaffner3,‡, and Hoi-Kwong Lo4,§

  • 1Institute for Quantum Information, Caltech, Pasadena, California 91125, USA
  • 2ETSI Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra), Spain
  • 3Centrum Wiskunde & Informatica (CWI), P. O. Box 94079, 1090 GB Amsterdam, the Netherlands
  • 4Center for Quantum Information and Quantum Control (CQIQC), Department of Physics and Department of Electrical & Computer Engineering, University of Toronto, Toronto, Ontario, M5S 3G4, Canada

  • *wehner@caltech.edu
  • mcurty@com.uvigo.es
  • c.schaffner@cwi.nl
  • §hklo@comm.utoronto.ca

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 81, Iss. 5 — May 2010

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×