In this chapter we present an alternative path to base security in challenging settings. We will discover that physical assumptions on the adversary, such that they have a bounded or a noisy quantum memory, can be leveraged to design secure protocols for tasks, such as 1-2 oblivious transfer, for which there cannot exist an unconditionally secure protocol. To prove security we make a fresh use of uncertainty relations introduced earlier in the context of quantum key distribution.
Review the options below to login to check your access.
Log in with your Cambridge Aspire website account to check access.
If you believe you should have access to this content, please contact your institutional librarian or consult our FAQ page for further information about accessing our content.