Cryptography In the Bounded Quantum-Storage Model

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

26 pages, full version of a paper appeared in 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 449-

Scientific paper

We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least n/2 in order to break the protocol, where n is the number of qubits transmitted. This is in sharp contrast to the classical bounded-memory model, where we can only tolerate adversaries with memory of size quadratic in honest players' memory size. Our protocols are efficient, non-interactive and can be implemented using today's technology. On the technical side, a new entropic uncertainty relation involving min-entropy is established.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Cryptography In the Bounded Quantum-Storage Model does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Cryptography In the Bounded Quantum-Storage Model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptography In the Bounded Quantum-Storage Model will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-21011

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.