Huei Ying Nelly Ng, Siddarth Koduru Joshi, Chen Ming Chia, Christian Kurtsiefer, Stephanie Wehner
We present a two-party protocol that is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. More precisely, we experimentally execute a protocol for bit commitment by measurements on polarization-entangled photon pairs, thereby demonstrating the feasability of two-party protocols in this model. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters.
View original:
http://arxiv.org/abs/1205.3331
No comments:
Post a Comment