[quantum-info] IQC Colloquium May 12th 2:30PM
Bethany
bmulder at uwaterloo.ca
Fri May 9 13:48:02 EDT 2014
Colloquium
Institute for Quantum Computing
Monday, 12 May 2014 at 2:30PM
QNC 0101
Achieving the limits of the bounded/noisy quantum-storage model
Omar Fawzi
Institute for Theoretical Physics ETH Zurich
The goal of two-party cryptography is to enable Alice and Bob to solve tasks in cooperation even if they do not trust each other. Examples of such tasks include bit commitment, coin flipping and oblivious transfer. Unfortunately, it has been shown that even using quantum communication, none of these tasks can be implemented when the adversary is completely general.
Instead of making computational assumptions based on complexity-theoretic conjectures, the bounded quantum-storage model introduced in 2005 takes advantage of the difficulty of building reliable quantum memories to establish secure two-party computation. More precisely, it was shown that if the cheating party’s storage device is such that it can store at most half of the qubits communicated during the protocol, then security can be achieved. Here, we push the range where security is possible to its limit: security is possible as soon as the adversary’s ability to store quantum information is less than the number of qubits communicated during the protocol.
To stop emails or report spam, click here: http://www.lettermelater.com/unsubscribe.php?mid=1896932&email=bmulder@uwaterloo.ca
More information about the quantum-info
mailing list