2010
DOI: 10.1103/physreva.81.052336
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of two-party protocols in the noisy-storage model

Abstract: The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties the… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
87
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 50 publications
(87 citation statements)
references
References 34 publications
0
87
0
Order By: Relevance
“…For example, although randomized procedures like error correction and privacy amplification that are widely employed in QKD have been used in the security analysis of protocols dealing with bounded adversaries 36 , it is an open question whether such procedures can be used in the information-theoretic security setting; in principle, any such step can be used by the malicious party to his or her advantage. Therefore, new techniques may be needed in order to deal with the imperfections of the implementation and the inherent limitations to the attainable communication distance.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, although randomized procedures like error correction and privacy amplification that are widely employed in QKD have been used in the security analysis of protocols dealing with bounded adversaries 36 , it is an open question whether such procedures can be used in the information-theoretic security setting; in principle, any such step can be used by the malicious party to his or her advantage. Therefore, new techniques may be needed in order to deal with the imperfections of the implementation and the inherent limitations to the attainable communication distance.…”
Section: Discussionmentioning
confidence: 99%
“…This system can also potentially be used for protocols employing decoy states [39][40][41] . Although the use of decoy states is a powerful tool for achieving practical long-distance QKD and for improving the performance of quantum cryptographic protocols in the noisy storage model 36 , it is not known, to the best of our knowledge, if a protocol employing decoy states can be devised for quantum coin flipping providing security against all-powerful adversaries.…”
Section: Methodsmentioning
confidence: 99%
“…Using this relation in a cryptographic protocol only yields an additional error ε in the overall security error, and it is widely employed in the protocols of [6,9,10,[12][13][14]. From a theoretical (asymptotic) viewpoint, this uncertainty relation is certainly sufficient.…”
mentioning
confidence: 99%
“…In particular, a low value for c means that the adversary's memory must be very limited and/or noisy for security to be possible [5,6,9] at all. Furthermore, a low value of c means that any experiment implementing such protocols can tolerate only a small amount of bit flip errors and losses [8,12,13]. For instance, if p err is the bit flip error on the channel connecting Alice and Bob, then security for the cryptographic primitive known as oblivious transfer is possible if c − h(p err ) > 0 [12,14], where h(p) = −p log 2 p − (1 − p) log 2 (1 − p) is the binary Shannon entropy.…”
mentioning
confidence: 99%
See 1 more Smart Citation