Using Quantum Oblivious Transfer to Cheat Sensitive Quantum Bit Commitment
نویسندگان
چکیده
It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independently by Aharonov et al. [2] and Hardy and Kent [8] is investigated. In this variant, the parties require some nonzero probability of detecting a cheating, i.e. if Bob, who commits a bit b to Alice, changes his mind during the revealing phase then Alice detects the cheating with a positive probability (we call this property binding); and if Alice gains information about the committed bit before the revealing phase then Bob discovers this with positive probability (sealing). In our paper we give quantum bit commitment scheme that is simultaneously binding and sealing and we show that if a cheating gives ε advantage to a malicious Alice then Bob can detect the cheating with a probability Ω(ε). If Bob cheats then Alice's probability of detecting the cheating is greater than some xed constant λ > 0. This improves the probabilities of cheating detections shown by Hardy and Kent and the scheme by Aharonov et al. who presented a protocol that is either binding or sealing, but not simultaneously both. To construct a cheat sensitive quantum bit commitment scheme we use a protocol for a weak quantum one-out-of-two oblivious transfer ( ( 2 1 ) -OT). In this version, similarly as in the standard de nition, Alice has initially secret bits a0, a1 and Bob has a secret selection bit i and if both parties are honest they solve the ( 2 1 ) -OT problem ful lling the standard security requirements. However, if Alice is dishonest and she gains some information about the secret selection bit then the probability that Bob computes the correct value is proportionally small. Moreover, if Bob is dishonest and he learns something about both bits, then he is not able to gain full information about one of them.
منابع مشابه
Cheat sensitive quantum bit commitment.
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We describe an unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a sim...
متن کاملUnconditionally secure quantum oblivious transfer
Based on quantum uncertainty and quantum entanglement, an quantum allor-nothing oblivious transfer protocol is proposed. It is illustrated in detail that the protocol is unconditionally secure. The distinct merit of the present protocol lies in that it is not based on quantum bit commitment. The full utilization of the entanglement makes the protocol different from previous insecure ones, thus ...
متن کاملeb 2 00 4 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...
متن کاملv 1 1 1 Ja n 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...
متن کاملar X iv : q ua nt - p h / 04 01 05 7 v 3 1 6 Fe b 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of the secure quantum b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 13 شماره
صفحات -
تاریخ انتشار 2006