{ "id": "1205.3331", "version": "v3", "published": "2012-05-15T11:25:42.000Z", "updated": "2014-05-14T03:42:32.000Z", "title": "Experimental implementation of bit commitment in the noisy-storage model", "authors": [ "Nelly Huei Ying Ng", "Siddarth Koduru Joshi", "Chen Ming Chia", "Christian Kurtsiefer", "Stephanie Wehner" ], "comment": "21 pages (7 main text +14 appendix), 6+3 figures. New version changed author's name from Huei Ying Nelly Ng to Nelly Huei Ying Ng, for consistency with other publications", "journal": "Nature Communications 3, Article number: 1326 (2012)", "doi": "10.1038/ncomms2268", "categories": [ "quant-ph" ], "abstract": "Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters.", "revisions": [ { "version": "v3", "updated": "2014-05-14T03:42:32.000Z" } ], "analyses": { "keywords": [ "noisy-storage model", "experimental implementation", "bit commitment protocol", "attackers quantum memory device", "two-party protocols" ], "tags": [ "journal article" ], "publication": { "journal": "Nature Communications", "year": 2012, "month": "Dec", "volume": 3, "pages": 1326 }, "note": { "typesetting": "TeX", "pages": 21, "language": "en", "license": "arXiv", "status": "editable", "adsabs": "2012NatCo...3E1326N" } } }