Please use this identifier to cite or link to this item: https://doi.org/10.1088/1367-2630/18/5/055004
DC FieldValue
dc.titleDevice-independent two-party cryptography secure against sequential attacks
dc.contributor.authorKaniewski, J
dc.contributor.authorWehner, S
dc.date.accessioned2020-09-09T06:39:31Z
dc.date.available2020-09-09T06:39:31Z
dc.date.issued2016
dc.identifier.citationKaniewski, J, Wehner, S (2016). Device-independent two-party cryptography secure against sequential attacks. New Journal of Physics 18 (5) : 55004. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/18/5/055004
dc.identifier.issn1367-2630
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/175255
dc.description.abstractThe goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice's setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation. © 2016 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft.
dc.publisherInstitute of Physics Publishing
dc.sourceUnpaywall 20200831
dc.subjectQuantum communication
dc.subjectBuilding blockes
dc.subjectCHSH inequality
dc.subjectClauser-Horne-Shimony-Holt inequality
dc.subjectDevice-independent
dc.subjectNonlocalities
dc.subjectPost-measurement
dc.subjectStorage model
dc.subjectUncertainty
dc.subjectQuantum cryptography
dc.typeArticle
dc.contributor.departmentCENTRE FOR QUANTUM TECHNOLOGIES
dc.description.doi10.1088/1367-2630/18/5/055004
dc.description.sourcetitleNew Journal of Physics
dc.description.volume18
dc.description.issue5
dc.description.page55004
dc.published.statePublished
Appears in Collections:Staff Publications
Elements

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1088_1367-2630_18_5_055004.pdf1.62 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.