Cryptography in the Bounded-Quantum-Storage Model
Abstract
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least $n/2$ in order to break the protocol, where n is the number of qubits transmitted. This is in sharp contrast to the classical bounded-memory model, where we can only tolerate adversaries with memory of size quadratic in honest players' memory size. Our protocols are efficient and noninteractive and can be implemented using today's technology. On the technical side, a new entropic uncertainty relation involving min-entropy is established.
[1]
[2]
[3] , Generalized privacy amplification, IEEE Trans. Inform. Theory, 41 (1995), pp. 1915–1923. IETTAW 0018-9448
[4] , Privacy amplification by public discussion, SIAM J. Comput., 17 (1988), pp. 210–229. SMJCAT 0097-5397
[5]
[6] , Uncertainty relations for information entropy in wave mechanics, Comm. Math. Phys., 44 (1975), pp. 129–132. CMPHAY 0010-3616
[7] , Limitations on practical quantum cryptography, Phys. Rev. Lett., 85 (2000), pp. 1330–1333. PRLTAO 0031-9007
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18] , Uncertainty in quantum measurements, Phys. Rev. Lett., 50 (1983), pp. 631–633. PRLTAO 0031-9007
[19]
[20]
[21]
[22]
[23] , Quantum cryptography based on Bell's theorem, Phys. Rev. Lett., 67 (1991), pp. 661–663. PRLTAO 0031-9007
[24] , Cryptographic distinguishability measures for quantum-mechanical states, IEEE Trans. Inform. Theory, 45 (1999), pp. 1216–1227. IETTAW 0018-9448
[25]
[26] , Quantum cryptography with coherent states, Phys. Rev. A, 51 (1995), pp. 1863–1869. PLRAAN 1050-2947
[27]
[28] , Norm inequalities for certain operator sums, J. Funct. Anal., 143 (1997), pp. 337–348. JFUAAW 0022-1236
[29] , Complementary observables and uncertainty relations, Phys. Rev. D, 35 (1987), pp. 3070–3075. PRVDAQ 0556-2821
[30] , Superspace geometry: The exact uncertainty relationship between complementary aspects, J. Phys. A, 23 (1990), pp. 1041–1061. JPHAC5 0305-4470
[31] , Is quantum bit commitment really possible?, Phys. Rev. Lett., 78 (1997), pp. 3410–3413. PRLTAO 0031-9007
[32] , Generalized entropic uncertainty relations, Phys. Rev. Lett., 60 (1988), pp. 1103–1106. PRLTAO 0031-9007
[33]
[34] , Unconditionally secure quantum bit commitment is impossible, Phys. Rev. Lett., 78 (1997), pp. 3414–3417. PRLTAO 0031-9007
[35]
[36]
[37]
[38]
[39]
[40] , Improved bounds in the entropic uncertainty and certainty relations for complementary observables, Phys. Lett. A, 201 (1995), pp. 125–131. PYLAAG 0375-9601
[41] , Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., 85 (2000), pp. 441–444. PRLTAO 0031-9007
[42]
[43]
[44] , Conjugate coding, SIGACT News, 15 (1983), pp. 78–88. SIGNDM 0163-5700


