In quantum communication, the noisy-storage model assumes that an attacker’s memory device is imperfect, thus enabling two parties to implement protocols securely. Using polarization-entangled photon pairs, Ng et al.analyse and verify a two-party bit commitment protocol within the noisy-storage.
- Nelly Huei Ying Ng
- Siddarth K. Joshi
- Stephanie Wehner