Experimental implementation of bit commitment in the noisy-storage model
Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as th...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/101857 http://hdl.handle.net/10220/18781 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-101857 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1018572023-02-28T19:43:21Z Experimental implementation of bit commitment in the noisy-storage model Ng, Nelly Huei Ying. Joshi, Siddarth K. Chen Ming, Chia. Kurtsiefer, Christian. Wehner, Stephanie. School of Physical and Mathematical Sciences DRNTU::Science::Physics::Atomic physics::Quantum theory Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters. Accepted version 2014-02-07T02:40:58Z 2019-12-06T20:45:48Z 2014-02-07T02:40:58Z 2019-12-06T20:45:48Z 2012 2012 Journal Article Ng, N. H. Y., Joshi, S. K., Chia C. M., Kurtsiefer, C., & Wehner, S. (2012). Experimental implementation of bit commitment in the noisy-storage model. Nature Communications, 3(1326), 1-21. 2041-1723 https://hdl.handle.net/10356/101857 http://hdl.handle.net/10220/18781 10.1038/ncomms2268 en Nature communications © 2012 Macmillan Publishers Limited. This is the author created version of a work that has been peer reviewed and accepted for publication by Nature Communications , Macmillan Publishers Limited. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1038/ncomms2268]. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Science::Physics::Atomic physics::Quantum theory |
spellingShingle |
DRNTU::Science::Physics::Atomic physics::Quantum theory Ng, Nelly Huei Ying. Joshi, Siddarth K. Chen Ming, Chia. Kurtsiefer, Christian. Wehner, Stephanie. Experimental implementation of bit commitment in the noisy-storage model |
description |
Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Ng, Nelly Huei Ying. Joshi, Siddarth K. Chen Ming, Chia. Kurtsiefer, Christian. Wehner, Stephanie. |
format |
Article |
author |
Ng, Nelly Huei Ying. Joshi, Siddarth K. Chen Ming, Chia. Kurtsiefer, Christian. Wehner, Stephanie. |
author_sort |
Ng, Nelly Huei Ying. |
title |
Experimental implementation of bit commitment in the noisy-storage model |
title_short |
Experimental implementation of bit commitment in the noisy-storage model |
title_full |
Experimental implementation of bit commitment in the noisy-storage model |
title_fullStr |
Experimental implementation of bit commitment in the noisy-storage model |
title_full_unstemmed |
Experimental implementation of bit commitment in the noisy-storage model |
title_sort |
experimental implementation of bit commitment in the noisy-storage model |
publishDate |
2014 |
url |
https://hdl.handle.net/10356/101857 http://hdl.handle.net/10220/18781 |
_version_ |
1759855319861690368 |