arXiv Analytics

Sign in

arXiv:1205.3331 [quant-ph]AbstractReferencesReviewsResources

Experimental implementation of bit commitment in the noisy-storage model

Nelly Huei Ying Ng, Siddarth Koduru Joshi, Chen Ming Chia, Christian Kurtsiefer, Stephanie Wehner

Published 2012-05-15, updated 2014-05-14Version 3

Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters.

Comments: 21 pages (7 main text +14 appendix), 6+3 figures. New version changed author's name from Huei Ying Nelly Ng to Nelly Huei Ying Ng, for consistency with other publications
Journal: Nature Communications 3, Article number: 1326 (2012)
Categories: quant-ph
Related articles: Most relevant | Search more
arXiv:2206.02324 [quant-ph] (Published 2022-06-06)
Experimental implementation of Hardy-like quantum pigeonhole paradoxes
Shihao Ru et al.
arXiv:1306.5863 [quant-ph] (Published 2013-06-25, updated 2015-02-08)
Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding
arXiv:0911.2302 [quant-ph] (Published 2009-11-12, updated 2011-04-29)
Implementation of two-party protocols in the noisy-storage model