Please use this identifier to cite or link to this item:
|Title:||Experimental implementation of bit commitment in the noisy-storage model|
Chen Ming, C.
|Source:||Ng, N.H.Y., Joshi, S.K., Chen Ming, C., Kurtsiefer, C., Wehner, S. (2012). Experimental implementation of bit commitment in the noisy-storage model. Nature Communications 3. ScholarBank@NUS Repository. https://doi.org/10.1038/ncomms2268|
|Abstract:||Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives is important in modern cryptography. Here we present a bit commitment protocol that is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters. © 2012 Macmillan Publishers Limited. All rights reserved.|
|Source Title:||Nature Communications|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Dec 7, 2017
WEB OF SCIENCETM
checked on Nov 23, 2017
checked on Dec 18, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.