Abstract
Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives is important in modern cryptography. Here we present a bit commitment protocol that is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters. © 2012 Macmillan Publishers Limited. All rights reserved.
Cite
CITATION STYLE
Ng, N. H. Y., Joshi, S. K., Chen Ming, C., Kurtsiefer, C., & Wehner, S. (2012). Experimental implementation of bit commitment in the noisy-storage model. Nature Communications, 3. https://doi.org/10.1038/ncomms2268
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.