Fully Distrustful Quantum Cryptography

J. Silman,A. Chailloux,N. Aharon,I. Kerenidis,S. Pironio,S. Massar
DOI: https://doi.org/10.1103/PhysRevLett.106.220501
2011-01-27
Abstract:In the distrustful quantum cryptography model the different parties have conflicting interests and do not trust one another. Nevertheless, they trust the quantum devices in their labs. The aim of the device-independent approach to cryptography is to do away with the necessity of making this assumption, and, consequently, significantly increase security. In this paper we enquire whether the scope of the device-independent approach can be extended to the distrustful cryptography model, thereby rendering it `fully' distrustful. We answer this question in the affirmative by presenting a device-independent (imperfect) bit-commitment protocol, which we then use to construct a device-independent coin flipping protocol.
Quantum Physics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to implement device - independent protocols in untrusted quantum cryptography models. Specifically, the paper explores whether device - independent methods can be extended to untrusted cryptography models, so that the protocol is secure not only against eavesdroppers, but also against malicious parties participating in the protocol (i.e., in the case where Alice and Bob do not trust each other). The paper proves this point by proposing a device - independent (imperfect) bit - commitment protocol and using this protocol to construct a device - independent coin - flipping protocol. This not only increases the security of the protocol, but also provides a new method for using quantum technology in untrusted environments. The key to the paper lies in showing how to ensure the security of the protocol between two untrusted parties through quantum non - locality, even if these quantum devices are provided by adversaries. This method avoids the limitations of having to assume device reliability in traditional protocols and improves the overall security of the protocol.