Implementation of two-party protocols in the noisy-storage model

نویسندگان

  • Stephanie Wehner
  • Marcos Curty
  • Christian Schaffner
  • Hoi-Kwong Lo
چکیده

Stephanie Wehner,1,* Marcos Curty,2,† Christian Schaffner,3,‡ and Hoi-Kwong Lo4,§ 1Institute for Quantum Information, Caltech, Pasadena, California 91125, USA 2ETSI Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra), Spain 3Centrum Wiskunde & Informatica (CWI), P. O. Box 94079, 1090 GB Amsterdam, the Netherlands 4Center for Quantum Information and Quantum Control (CQIQC), Department of Physics and Department of Electrical & Computer Engineering, University of Toronto, Toronto, Ontario, M5S 3G4, Canada (Received 26 November 2009; published 25 May 2010)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Experimental implementation of bit commitment in the noisy-storage model.

Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives is important in modern cryptography. Here we present a bit commitment protocol that is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. ...

متن کامل

Cryptography from noisy storage.

We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; i.e., the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage; however, we consider an explicit noise model inspired by present-day technology. To il...

متن کامل

Position-Based Cryptography from the Noisy Channels

We study the problem of constructing secure positioning protocols (Sastry et. al, 2003). Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P ’s location in space, using information about the time it takes P to respond to queries sent from different points. It has been shown by Chandramn et al (2009) that in general such task is impossible to achi...

متن کامل

Model Based Design approach for Implementation of PHEV Energy Management

Hardware implementation of the Plug-in hybrid electric vehicles (PHEVs) control strategy is an important stage of the development of the vehicle electric control unit (ECU). This paper introduces Model-Based Design (MBD) approach for implementation of PHEV energy management. Based on this approach, implementation of the control algorithm on an electronic hardware is performed using automatic co...

متن کامل

Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. König, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from König et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious trans...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010