Abstract
Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives is important in modern cryptography. Here we present a bit commitment protocol that is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters.
Original language | English |
---|---|
Article number | 1326 |
Journal | Nature Communications |
Volume | 3 |
DOIs | |
Publication status | Published - 2012 |
Bibliographical note
Copyright:Copyright 2020 Elsevier B.V., All rights reserved.
Research Groups and Themes
- Photonics and Quantum