70 likes | 183 Views
A (very) few recent results in i mplementing two-party p rotocols in the noisy s torage m odel. Chris Erven. Collaborators (and people I’ve pestered with questions): Stephanie Wehner Gregor Weihs Ray Laflamme Christian Schaffner Marcos Curty. Noisy Storage Workshop 2010
E N D
A (very) few recent results in implementing two-party protocols in the noisy storage model Chris Erven Collaborators (and people I’ve pestered with questions): Stephanie Wehner Gregor Weihs Ray Laflamme Christian Schaffner Marcos Curty Noisy Storage Workshop 2010 March 22, 2010
The Experiment Watch out for double clicks! • Locally observed coincidence detection rates ~ 80,000 cps (@5mW) • Max visibilities 99.2% and 96.1% in H/V and +/- bases respectively • Means a baseline error rate of 1.2% • Potential for >99.5% in +/- basis • Fedrizziet. al., “A Wavelength Tuneable Fiber-Coupled Source of Narrowband Entangled Photons”, Opt. Exp., vol 15, pp. 15377, 2007 • Kim et. al., “Phase-Stable Source of Polarization-Entangled Photons using a Polarization Sagnac Interferometer”, Phys. Rev. A, vol 73, pp. 012316, 2006
What we can (and will) do: • Simple protocol for Oblivious Transfer and Secure Identification (Christian) • Entangled source (Marcos et al) • Pre-measure certain system quantities (losses, error rates, probabilities, etc) • Make sure observed experimental parameters fall in a certain allowable range, eg. • 2-universal hash functions • One-way error correction • Complete protocols • Weak string erasure • Also need interactive hashing (NOVY protocol) Chernoff Bound
An experimenter’s wishlist: • Graphs are usually for total storage noise r, would be nice to relate r to • More transparent security statements and rate formulas • Bring the experiment and theory closer (eg. Squashing – Norbert) • Is passive detection alright? • More efficient interactive hashing protocols • Could you use something like twirling to protect against a general storage channel?
Wrap-up • Implementing first the simple and then more complete protocols • Use the noisy storage protocols for secure identification to take care of authentication • Flesh out the secure identification applications Topical QKD Workshop @ IQC on June 14-17 http://www.iqc.ca/quantumworld/index.php?id=18 • Thank You!