Quantum bit commitment in a noisy channel
نویسندگان
چکیده
Under rather general assumptions about the properties of a noisy quantum channel, a first quantum protocol is proposed which allows to implement the secret bit commitment with the probability arbitrarily close to unity. The idea that quantum physics can provide more secure communication between two distant parties than the classical one was first put forward by Wiesner [1]. Later, after the works [2,3], a lot of papers devoted to secret key distribution (quantum cryptography) have been published. Apart from the key distribution protocol, there exist other cryptographic protocols which are both important for applications and interesting in themselves. These are the so-called Bit Commitment (BC) and Coin Tossing (CT) protocols [4,5]. Quantum versions of these protocols were first proposed by Bennett and Brassard [6]. BC is the information exchange protocol allowing two distant users A and B which do not trust each other to implement the following scheme. User A sends some (part of) information on his secret bit b (b = 0 or 1, commitment stage) to user B in such a way that user B cannot recover the secret bit chosen by A on the basis of information supplied alone. However, this information should be sufficient to prevent cheating by user A, i.e., later (at the disclosure stage) when user B asks user A to send him the rest information on the chosen secret bit, user A should be unable to change his mind and modify the value of his secret bit. The CT protocol is the scheme allowing two distant users which do not trust each other to implement the procedure of drawing an honest lot. Classical versions of these protocols are based on unproved computational complexity of some trap-door functions which require exponentially large resources to calculate their inverse on the classical computer [7,8]. Some time ago it was generally assumed that the quantum protocols based on the fundamental restriction imposed by the laws of quantum mechanics rather than on the computational complexity are unconditionally secure [9]. However, it was later shown by Mayers, Lo and Chau [10,11] that the non-relativistic quantum BC protocol is not actually secure. User A can cheat user B without being detected by the latter employing the so-called EPR-attack (EPR stands for Einstein, Podolsky, and Rosen [12]). The possibility of successful EPR-attack is actually based on the result of paper by Hougston, Josza, and Wotters on the measurements performed over the …
منابع مشابه
Unconditionally Secure Quantum Bit Commitment Expansion
It is known that a quantum bit commitment that would be secure against all attacks allowed by quantum mechanics is impossible if a standard model of communication is used. This result was a severe step back for quantum cryptography. However, this impossibility result applies only if no bit commitment exists initially between Alice and Bob. Here we consider an initial situation in which the comm...
متن کاملQuantum Key Distribution and String Oblivious Transfer in Noisy Channels
We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally security of this QKD protocol to a proof that a corresponding Quantum String Oblivious Transfer (String-QOT) protocol would be unconditionally secu...
متن کاملQuantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances
Quantum cryptography has long been claimed to be useful for achieving many tasks that are impossible from the perspective of conventional cryptography. Arguably, the most important problem in quantum cryptography has been a rigorous proof of the security of quantum key distribution, the most well-known application. This notoriously hard problem has eluded researchers for years and has become ev...
متن کامل2 2 M ay 1 99 8 Quantum Computers Render Quantum Key Distribution Unconditionally Secure
Quantum cryptography has long been claimed to be useful for achieving many tasks that are impossible from the perspective of conventional cryptography. Arguably, the most important problem in quantum cryptography has been a rigorous proof of the security of quantum key distribution, the most wellknown application. This notoriously hard problem has eluded researchers for the last fifteen years a...
متن کاملGENERALIZED JOINT HIGHER-RANK NUMERICAL RANGE
The rank-k numerical range has a close connection to the construction of quantum error correction code for a noisy quantum channel. For noisy quantum channel, a quantum error correcting code of dimension k exists if and only if the associated joint rank-k numerical range is non-empty. In this paper the notion of joint rank-k numerical range is generalized and some statements of [2011, Generaliz...
متن کامل