Lupo C, Peat JT, Andsersson E, Kok P.
Submitted to arXiv on 8 February 2023
The noisy-storage model of quantum cryptography allows for information-theoretically secure two-party computation based on the assumption that a cheating user has at most access to an imperfect, noisy quantum memory, whereas the honest users do not need a quantum memory at all. This can be achieved through primitives such as Oblivious Transfer (OT). In general, the more noisy the quantum memory of the cheating user, the more secure the implementation of OT. For experimental implementations, one has to consider that also the devices held by the honest users are lossy and noisy, and error correction needs to be applied to correct these trusted errors. In general, this reduces the security of the protocol, since a cheating user may hide themselves in the trusted noise. Here we leverage known bounds on the security of OT to derive a tighter trade-off between trusted and untrusted noise.