bit commitment
Recently Published Documents


TOTAL DOCUMENTS

152
(FIVE YEARS 20)

H-INDEX

27
(FIVE YEARS 2)

2021 ◽  
Vol 11 (23) ◽  
pp. 11416
Author(s):  
Houquan Liu ◽  
Libo Yuan

Quantum qubit commitment is a stronger version of the quantum bit commitment. It is impossible to realize unconditionally secure quantum qubit commitment in nonrelativistic domain. In this paper, we propose an unconditionally secure relativistic quantum qubit commitment protocol for the first time, which will have some unique applications in the upcoming era of quantum network.


Author(s):  
Li Li ◽  
Run-Hua Shi

As a fundamental cryptographic primitive, bit commitment has lots of important and practical applications in modern cryptography. All previously proposed non-relativistic quantum bit commitment protocols cannot evade the Lo–Chau and Mayers attacks. Furthermore, relativistic quantum bit commitment protocols require rigorous spacetime constraints. In this paper, we present a simple, feasible but practically secure quantum bit commitment protocol without any spacetime constraint. The security of the proposed protocol is based on non-relativistic quantum mechanics, but it can resist all known attacks, including the Lo–Chau and Mayers attacks in practice.


Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 405 ◽  
Author(s):  
Seok Hyung Lie ◽  
Hyukjoon Kwon ◽  
M. S. Kim ◽  
Hyunseok Jeong

The commodity-based cryptography is an alternative approach to realize conventionally impossible cryptographic primitives such as unconditionally secure bit-commitment by consuming pre-established correlation between distrustful participants. A unit of such classical correlation is known as the one-time table (OTT). In this paper, we introduce a new example besides quantum key distribution in which quantum correlation is useful for cryptography. We propose a scheme for unconditionally secure qubit-commitment, a quantum cryptographic primitive forbidden by the recently proven no-masking theorem in the standard model, based on the consumption of the quantum generalization of the OTT, the bipartite quantum state we namedquantum one-time tables(QOTT). The construction of the QOTT is based on the newly analyzed internal structure of quantum masker and the quantum secret sharing schemes. Our qubit-commitment scheme is shown to be universally composable. We propose to measure the randomness cost of preparing a (Q)OTT in terms of its entropy, and show that the QOTT with superdense coding can increase the security level with half the cost of OTTs for unconditionally secure bit-commitment. The QOTT exemplifies an operational setting where neither maximally classically correlated state nor maximally entangled state, but rather a well-structured partially entangled mixed state is more valuable resource.


2021 ◽  
Vol 543 ◽  
pp. 106-111
Author(s):  
Hao Cao ◽  
Wenping Ma ◽  
Liangdong Lü ◽  
Ge Liu ◽  
Xiaoxue Liu ◽  
...  

Entropy ◽  
2020 ◽  
Vol 22 (12) ◽  
pp. 1377
Author(s):  
Xin Sun ◽  
Piotr Kulicki ◽  
Mirek Sopek

This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of auction satisfies bid privacy, posterior privacy, bids’ binding, decentralization and unconditional security. Except quantum Blockchain, the main technique involved in both protocols is quantum bit commitment.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6351
Author(s):  
Zishuai Zhou ◽  
Qisheng Guang ◽  
Chaohui Gao ◽  
Dong Jiang ◽  
Lijun Chen

We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identification.


2020 ◽  
Vol 59 (11) ◽  
pp. 3464-3475
Author(s):  
Xin Sun ◽  
Quanlong Wang ◽  
Feifei He
Keyword(s):  

2020 ◽  
Vol 1 (2) ◽  
pp. 536-554
Author(s):  
Norbert Lutkenhaus ◽  
Ashutosh Marwah ◽  
Dave Touchette
Keyword(s):  

2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Yaqi Song ◽  
Li Yang
Keyword(s):  

Axioms ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 28 ◽  
Author(s):  
Xin Sun ◽  
Feifei He ◽  
Quanlong Wang

Bit commitment is a cryptographic task in which Alice commits a bit to Bob such that she cannot change the value of the bit after her commitment and Bob cannot learn the value of the bit before Alice opens her commitment. According to the Mayers–Lo–Chau (MLC) no-go theorem, ideal bit commitment is impossible within quantum theory. In the information theoretic-reconstruction of quantum theory, the impossibility of quantum bit commitment is one of the three information-theoretic constraints that characterize quantum theory. In this paper, we first provide a very simple proof of the MLC no-go theorem and its quantitative generalization. Then, we formalize bit commitment in the theory of dagger monoidal categories. We show that in the setting of dagger monoidal categories, the impossibility of bit commitment is equivalent to the unitary equivalence of purification.


Sign in / Sign up

Export Citation Format

Share Document