Cryptography from Noisy Storage

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

13 pages RevTex, 2 figures. v2: more comments on implementation dependent attacks, v3: published version (minor changes)

Scientific paper

10.1103/PhysRevLett.100.220502

We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks, i.e. the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage, however, we consider an explicit noise model inspired by present-day technology. To illustrate the power of this new model, we show that a protocol for oblivious transfer (OT) is secure for any amount of quantum-storage noise, as long as honest players can perform perfect quantum operations. Our model also allows the security of protocols that cope with noise in the operations of the honest players and achieve more advanced tasks such as secure identification.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Cryptography from Noisy Storage does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Cryptography from Noisy Storage, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptography from Noisy Storage will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-115828

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.