arXiv Analytics

Sign in

arXiv:0911.2302 [quant-ph]AbstractReferencesReviewsResources

Implementation of two-party protocols in the noisy-storage model

Stephanie Wehner, Marcos Curty, Christian Schaffner, Hoi-Kwong Lo

Published 2009-11-12, updated 2011-04-29Version 2

The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

Comments: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030 considering practical aspects, v2: published version, title changed in accordance with PRA guidelines
Journal: Phys. Rev. A 81, 052336 (2010)
Categories: quant-ph
Subjects: 03.67.Dd
Related articles: Most relevant | Search more
arXiv:1509.09123 [quant-ph] (Published 2015-09-30)
Continuous-Variable Protocols in the Noisy-Storage Model
arXiv:1404.4205 [quant-ph] (Published 2014-04-16)
Implementation of a Measurement-Device-Independent Entanglement Witness
Ping Xu et al.
arXiv:1012.3878 [quant-ph] (Published 2010-12-17)
Device-independent quantum key distribution