87,994 research outputs found
Security of Plug-and-Play QKD Arrangements with Finite Resources
The security of a passive plug-and-play QKD arrangement in the case of finite
(resources) key lengths is analysed. It is assumed that the eavesdropper has
full access to the channel so an unknown and untrusted source is assumed. To
take into account the security of the BB84 protocol under collective attacks
within the framework of quantum adversaries, a full treatment provides the
well-known equations for the secure key rate. A numerical simulation keeping a
minimum number of initial parameters constant as the total error sought and the
number of pulses is carried out. The remaining parameters are optimized to
produce the maximum secure key rate. Two main strategies are addressed: with
and without two-decoy-states including the optimization of signal to decoy
relationship
Instantaneous Decentralized Poker
We present efficient protocols for amortized secure multiparty computation
with penalties and secure cash distribution, of which poker is a prime example.
Our protocols have an initial phase where the parties interact with a
cryptocurrency network, that then enables them to interact only among
themselves over the course of playing many poker games in which money changes
hands.
The high efficiency of our protocols is achieved by harnessing the power of
stateful contracts. Compared to the limited expressive power of Bitcoin
scripts, stateful contracts enable richer forms of interaction between standard
secure computation and a cryptocurrency.
We formalize the stateful contract model and the security notions that our
protocols accomplish, and provide proofs using the simulation paradigm.
Moreover, we provide a reference implementation in Ethereum/Solidity for the
stateful contracts that our protocols are based on.
We also adopt our off-chain cash distribution protocols to the special case
of stateful duplex micropayment channels, which are of independent interest. In
comparison to Bitcoin based payment channels, our duplex channel implementation
is more efficient and has additional features
- âŠ