9.2.1 The noisy storage model
Course subject(s)
09. Perfect security from physical assumptions
Let us now examine one specific model – a physical assumption – that allows the secure implementation of any two-party cryptographic primitive: the noisy-storage model.
While physical assumptions such as noisy-storage do of course make assumptions they are quite appealing in that they only need to be valid for a short time during the execution of the protocol. In particular, they cannot be broken later on if the adversary gains more computational or storage powers.
Sorry but there don't seem to be any downloads..
Subtitles (captions) in other languages than provided can be viewed at YouTube. Select your language in the CC-button of YouTube.
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.