[quantum-info] IQC Colloquium May 12th 2:30PM

Bethany bmulder at uwaterloo.ca
Fri May 9 13:48:02 EDT 2014


Colloquium

Institute for Quantum Computing

Monday, 12 May 2014 at 2:30PM

QNC 0101

Achieving the limits of the bounded/noisy quantum-storage model

Omar Fawzi

Institute for Theoretical Physics ETH Zurich

The goal of two-party cryptography is to enable Alice and Bob to solve tasks in cooperation even if they do not trust each other. Examples of such tasks include bit commitment, coin flipping and oblivious transfer. Unfortunately, it has been shown that even using quantum communication, none of these tasks can be implemented when the adversary is completely general.
Instead of making computational assumptions based on complexity-theoretic conjectures, the bounded quantum-storage model introduced in 2005 takes advantage of the difficulty of building reliable quantum memories to establish secure two-party computation. More precisely, it was shown that if the cheating party’s storage device is such that it can store at most half of the qubits communicated during the protocol, then security can be achieved. Here, we push the range where security is possible to its limit: security is possible as soon as the adversary’s ability to store quantum information is less than the number of qubits communicated during the protocol.




To stop emails or report spam, click here: http://www.lettermelater.com/unsubscribe.php?mid=1896932&email=bmulder@uwaterloo.ca



More information about the quantum-info mailing list