Experimental implementation of bit commitment in the noisy-storage model.
Ng, Nelly Huei Ying.
Joshi, Siddarth K.
Chen Ming, Chia.
Date of Issue2012
School of Physical and Mathematical Sciences
Fundamental primitives such as bit commitment and oblivious transfer serve as building blocks for many other two-party protocols. Hence, the secure implementation of such primitives are important in modern cryptography. In this work, we present a bit commitment protocol which is secure as long as the attacker's quantum memory device is imperfect. The latter assumption is known as the noisy-storage model. We experimentally executed this protocol by performing measurements on polarization-entangled photon pairs. Our work includes a full security analysis, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of two-party protocols in this model using real-world quantum devices. Finally, we provide a general analysis of our bit commitment protocol for a range of experimental parameters.
DRNTU::Science::Physics::Atomic physics::Quantum theory
© 2012 Macmillan Publishers Limited. This is the author created version of a work that has been peer reviewed and accepted for publication by Nature Communications , Macmillan Publishers Limited. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1038/ncomms2268].