A novel single agent quantum bit commitment scheme

Author(s):  
Linxi Zhang ◽  
Nan Zhao ◽  
Changxing Pei ◽  
Long Wang
2012 ◽  
Vol 263-266 ◽  
pp. 3076-3078
Author(s):  
Xiao Qiang Guo ◽  
Li Hong Li ◽  
Cui Ling Luo ◽  
Yi Shuo Shi

The Bit Commitment (BC) is an important basic agreement in cryptography . The concept was first proposed by the winner of the Turing Award in 1995 ManuelBlum. Bit commitment scheme can be used to build up zero knowledge proof, verified secret sharing, throwing coins etc agreement.Simultaneously and Oblivious Transfer together constitute the basis of secure multi-party computations. Both of them are hotspots in the field of information security. We investigated unconditional secure Quantum Bit Commitment (QBC) existence. And we constructed a new bit commitment model – double prover bit commitment. The Quantum Bit Commitment Protocol can be resistant to errors caused by noise.


2000 ◽  
Vol 7 (52) ◽  
Author(s):  
Claude Crépeau ◽  
Frédéric Légaré ◽  
Louis Salvail

In this paper we show how to convert a statistically binding<br />but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing scheme. For a security parameter n, the construction of the statistically concealing scheme requires O(n^2) executions of the statistically binding scheme. As a consequence, statistically concealing but computationally binding quantum bit commitments can be based upon any family of quantum one-way functions. Such a construction is not known to exist in the classical world.


2010 ◽  
Vol 81 (1) ◽  
Author(s):  
Loïck Magnin ◽  
Frédéric Magniez ◽  
Anthony Leverrier ◽  
Nicolas J. Cerf
Keyword(s):  

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6351
Author(s):  
Zishuai Zhou ◽  
Qisheng Guang ◽  
Chaohui Gao ◽  
Dong Jiang ◽  
Lijun Chen

We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identification.


JETP Letters ◽  
2001 ◽  
Vol 73 (2) ◽  
pp. 107-113
Author(s):  
S. N. Molotkov ◽  
S. S. Nazin
Keyword(s):  

2001 ◽  
Vol 18 (2) ◽  
pp. 155-159
Author(s):  
Ming Zhong ◽  
Yixian Yang

Sign in / Sign up

Export Citation Format

Share Document