Experimental implementation of bit commitment in the noisy-storage model

Nelly Huei Ying Ng, Siddarth K. Joshi, Chia Chen Ming, Christian Kurtsiefer, Stephanie Wehner*

*Corresponding author for this work

Research output: Contribution to journalArticle (Academic Journal)peer-review

43 Citations (Scopus)

Abstract

Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives is important in modern cryptography. Here we present a bit commitment protocol that is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters.

Original languageEnglish
Article number1326
JournalNature Communications
Volume3
DOIs
Publication statusPublished - 2012

Bibliographical note

Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.

Fingerprint Dive into the research topics of 'Experimental implementation of bit commitment in the noisy-storage model'. Together they form a unique fingerprint.

Cite this