AN EXAMPLE OF SARG 04 PROTOCOL FROM ALICE TO BOB The Bit
نویسنده
چکیده
A potentially serious problem with current payment systems is that their underlying hard problems from number theory may be solved by either a quantum computer or unanticipated future advances in algorithms and hardware. A new quantum payment system is proposed in this paper. The suggested system makes use of fundamental principles of quantum mechanics to ensure the unconditional security without prior arrangements between customers and vendors. More specifically, the new system uses Greenberger-Home-Zeilinger (GHZ) states and Quantum Key Distribution to authenticate the vendors and guarantee the transaction integrity. Keywords—Bell state, GHZ state, Quantum key distribution, Quantum payment system.
منابع مشابه
ar X iv : q ua nt - p h / 04 01 05 7 v 3 1 6 Fe b 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of the secure quantum b...
متن کاملStronger impossibility results for quantum string commitment
String commitment schemes are similar to the well studied bit commitment schemes in cryptography with the difference that the committing party, say Alice is supposed to commit a long string instead of a single bit, to another party say Bob. Similar to bit commitment schemes, such schemes are supposed to be binding, i.e Alice cannot change her choice after committing and concealing i.e. Bob cann...
متن کاملv 1 1 1 Ja n 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗
Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...
متن کاملImproved Construnctions of Quantum Bit-Commitment Based on Quantum One-Way Permutations
A bit-commitment protocol involves two party: a sender (say Alice) and a receiver (say Bob). Alice has a classical string in mind, which she wants to communicate to Bob at a later time. In order to guarantee that she will not change her mind in the interim, Alice agrees to lock her commitment in a safe which she sends to Bob, but keeps the key of the safe. At the moment of truth, Alice unveils ...
متن کاملOptimal bounds for correlations via semidefinite programming
Nonlocal boxes (NLBs) are devices that are used to generate correlated bits between two spatially separated parties. If the generated correlation is weak, it can sometimes be distilled into a stronger correlation by repeated applications of the nonlocal box. We initiate here a study of the distillation of correlations for nonlocal boxes that output quantum states rather than classical bits. We ...
متن کامل