9.2.1 The noisy storage model

Course subject(s) 09. Perfect security from physical assumptions

Let us now examine one specific model – a physical assumption – that allows the secure implementation of any two-party cryptographic primitive: the noisy-storage model.

While physical assumptions such as noisy-storage do of course make assumptions they are quite appealing in that they only need to be valid for a short time during the execution of the protocol. In particular, they cannot be broken later on if the adversary gains more computational or storage powers.

Sorry but there don't seem to be any downloads..

Subtitles (captions) in other languages than provided can be viewed at YouTube. Select your language in the CC-button of YouTube.

Creative Commons License
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.
Back to top