Experimental implementation of bit commitment in the noisy-storage model

63Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives is important in modern cryptography. Here we present a bit commitment protocol that is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters. © 2012 Macmillan Publishers Limited. All rights reserved.

Cite

CITATION STYLE

APA

Ng, N. H. Y., Joshi, S. K., Chen Ming, C., Kurtsiefer, C., & Wehner, S. (2012). Experimental implementation of bit commitment in the noisy-storage model. Nature Communications, 3. https://doi.org/10.1038/ncomms2268

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free