Experimental implementation of bit commitment in the noisy-storage model

Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as th...

Full description

Saved in:
Bibliographic Details
Main Authors: Ng, Nelly Huei Ying., Joshi, Siddarth K., Chen Ming, Chia., Kurtsiefer, Christian., Wehner, Stephanie.
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2014
Subjects:
Online Access:https://hdl.handle.net/10356/101857
http://hdl.handle.net/10220/18781
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-101857
record_format dspace
spelling sg-ntu-dr.10356-1018572023-02-28T19:43:21Z Experimental implementation of bit commitment in the noisy-storage model Ng, Nelly Huei Ying. Joshi, Siddarth K. Chen Ming, Chia. Kurtsiefer, Christian. Wehner, Stephanie. School of Physical and Mathematical Sciences DRNTU::Science::Physics::Atomic physics::Quantum theory Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters. Accepted version 2014-02-07T02:40:58Z 2019-12-06T20:45:48Z 2014-02-07T02:40:58Z 2019-12-06T20:45:48Z 2012 2012 Journal Article Ng, N. H. Y., Joshi, S. K., Chia C. M., Kurtsiefer, C., & Wehner, S. (2012). Experimental implementation of bit commitment in the noisy-storage model. Nature Communications, 3(1326), 1-21. 2041-1723 https://hdl.handle.net/10356/101857 http://hdl.handle.net/10220/18781 10.1038/ncomms2268 en Nature communications © 2012 Macmillan Publishers Limited. This is the author created version of a work that has been peer reviewed and accepted for publication by Nature Communications , Macmillan Publishers Limited. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1038/ncomms2268]. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Science::Physics::Atomic physics::Quantum theory
spellingShingle DRNTU::Science::Physics::Atomic physics::Quantum theory
Ng, Nelly Huei Ying.
Joshi, Siddarth K.
Chen Ming, Chia.
Kurtsiefer, Christian.
Wehner, Stephanie.
Experimental implementation of bit commitment in the noisy-storage model
description Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Ng, Nelly Huei Ying.
Joshi, Siddarth K.
Chen Ming, Chia.
Kurtsiefer, Christian.
Wehner, Stephanie.
format Article
author Ng, Nelly Huei Ying.
Joshi, Siddarth K.
Chen Ming, Chia.
Kurtsiefer, Christian.
Wehner, Stephanie.
author_sort Ng, Nelly Huei Ying.
title Experimental implementation of bit commitment in the noisy-storage model
title_short Experimental implementation of bit commitment in the noisy-storage model
title_full Experimental implementation of bit commitment in the noisy-storage model
title_fullStr Experimental implementation of bit commitment in the noisy-storage model
title_full_unstemmed Experimental implementation of bit commitment in the noisy-storage model
title_sort experimental implementation of bit commitment in the noisy-storage model
publishDate 2014
url https://hdl.handle.net/10356/101857
http://hdl.handle.net/10220/18781
_version_ 1759855319861690368