Physics – Quantum Physics
Scientific paper
2009-11-12
Phys. Rev. A 81, 052336 (2010)
Physics
Quantum Physics
41 pages, 33 figures, this is a companion paper to arXiv:0906.1030 considering practical aspects, v2: published version, title
Scientific paper
10.1103/PhysRevA.81.052336
The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down conversion sources. In addition, we analyze a modification of the protocols based on decoy states.
Curty Marcos
Lo Hoi-Kwong
Schaffner Christian
Wehner Stephanie
No associations
LandOfFree
Implementation of two-party protocols in the noisy-storage model does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Implementation of two-party protocols in the noisy-storage model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Implementation of two-party protocols in the noisy-storage model will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-150166