1 / 7

A (very) few recent results in i mplementing two-party p rotocols in the noisy s torage m odel

A (very) few recent results in i mplementing two-party p rotocols in the noisy s torage m odel. Chris Erven. Collaborators (and people I’ve pestered with questions): Stephanie Wehner Gregor Weihs Ray Laflamme Christian Schaffner Marcos Curty. Noisy Storage Workshop 2010

milly
Download Presentation

A (very) few recent results in i mplementing two-party p rotocols in the noisy s torage m odel

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A (very) few recent results in implementing two-party protocols in the noisy storage model Chris Erven Collaborators (and people I’ve pestered with questions): Stephanie Wehner Gregor Weihs Ray Laflamme Christian Schaffner Marcos Curty Noisy Storage Workshop 2010 March 22, 2010

  2. The Experiment Watch out for double clicks! • Locally observed coincidence detection rates ~ 80,000 cps (@5mW) • Max visibilities 99.2% and 96.1% in H/V and +/- bases respectively • Means a baseline error rate of 1.2% • Potential for >99.5% in +/- basis • Fedrizziet. al., “A Wavelength Tuneable Fiber-Coupled Source of Narrowband Entangled Photons”, Opt. Exp., vol 15, pp. 15377, 2007 • Kim et. al., “Phase-Stable Source of Polarization-Entangled Photons using a Polarization Sagnac Interferometer”, Phys. Rev. A, vol 73, pp. 012316, 2006

  3. What we can (and will) do: • Simple protocol for Oblivious Transfer and Secure Identification (Christian) • Entangled source (Marcos et al) • Pre-measure certain system quantities (losses, error rates, probabilities, etc) • Make sure observed experimental parameters fall in a certain allowable range, eg. • 2-universal hash functions • One-way error correction • Complete protocols • Weak string erasure • Also need interactive hashing (NOVY protocol) Chernoff Bound

  4. An experimenter’s wishlist: • Graphs are usually for total storage noise r, would be nice to relate r to • More transparent security statements and rate formulas • Bring the experiment and theory closer (eg. Squashing – Norbert) • Is passive detection alright? • More efficient interactive hashing protocols • Could you use something like twirling to protect against a general storage channel?

  5. Distributed Free-Space System

  6. Wrap-up • Implementing first the simple and then more complete protocols • Use the noisy storage protocols for secure identification to take care of authentication • Flesh out the secure identification applications Topical QKD Workshop @ IQC on June 14-17 http://www.iqc.ca/quantumworld/index.php?id=18 • Thank You!

  7. Extra Slides

More Related