A short impossibility proof of quantum bit commitment

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

Autoren

  • G. Chiribella
  • G. M. D'Ariano
  • P. Perinotti
  • D. M. Schlingemann
  • R. F. Werner

Organisationseinheiten

Forschungs-netzwerk anzeigen

Details

Originalspracheundefiniert/unbekannt
Seiten (von - bis)1076-1087
Seitenumfang12
FachzeitschriftPhys. Lett. A
Jahrgang377
PublikationsstatusVeröffentlicht - 2013

Abstract

Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment-bindingness tradeoff. A strengthened and explicit impossibility proof has been given in: G. M. D'Ariano, D. Kretschmann, D. Schlingemann, and R. F. Werner, Phys. Rev. A 76, 032328 (2007), in the Heisenberg picture and in a C*-algebraic framework, considering all conceivable protocols in which both classical and quantum information are exchanged. In the present paper we provide a new impossibility proof in the Schrodinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs, with each single-party strategy represented by a conditional comb. We prove that assuming a stronger notion of concealment-worst-case over the classical information histories--allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment-bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with respect to the comb-discriminability distance.

Zitieren

A short impossibility proof of quantum bit commitment. / Chiribella, G.; D'Ariano, G. M.; Perinotti, P. et al.
in: Phys. Lett. A, Jahrgang 377, 2013, S. 1076-1087.

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

Chiribella, G, D'Ariano, GM, Perinotti, P, Schlingemann, DM & Werner, RF 2013, 'A short impossibility proof of quantum bit commitment', Phys. Lett. A, Jg. 377, S. 1076-1087.
Chiribella, G., D'Ariano, G. M., Perinotti, P., Schlingemann, D. M., & Werner, R. F. (2013). A short impossibility proof of quantum bit commitment. Phys. Lett. A, 377, 1076-1087.
Chiribella G, D'Ariano GM, Perinotti P, Schlingemann DM, Werner RF. A short impossibility proof of quantum bit commitment. Phys. Lett. A. 2013;377:1076-1087.
Chiribella, G. ; D'Ariano, G. M. ; Perinotti, P. et al. / A short impossibility proof of quantum bit commitment. in: Phys. Lett. A. 2013 ; Jahrgang 377. S. 1076-1087.
Download
@article{444457b641854ac4b8db7c34b8561db7,
title = "A short impossibility proof of quantum bit commitment",
abstract = "Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment-bindingness tradeoff. A strengthened and explicit impossibility proof has been given in: G. M. D'Ariano, D. Kretschmann, D. Schlingemann, and R. F. Werner, Phys. Rev. A 76, 032328 (2007), in the Heisenberg picture and in a C*-algebraic framework, considering all conceivable protocols in which both classical and quantum information are exchanged. In the present paper we provide a new impossibility proof in the Schrodinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs, with each single-party strategy represented by a conditional comb. We prove that assuming a stronger notion of concealment-worst-case over the classical information histories--allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment-bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with respect to the comb-discriminability distance.",
author = "G. Chiribella and D'Ariano, {G. M.} and P. Perinotti and Schlingemann, {D. M.} and Werner, {R. F.}",
note = "Funding information: G.M.D. acknowledges interesting discussions with H. Yuen, H.K. Lo, and C. Bennett. G.C., G.M.D., P.P. acknowledge A. Bisio for useful observations. G.C. is supported the National Basic Research Program of China (973) 2011CBA00300 ( 2011CBA00301 ), by the National Natural Science Foundation of China through Grants 61033001 and 61061130540 , and by the 1000 Youth Fellowship Program of China . G.C., G.M.D., and P.P. acknowledge support by EC through projects CORNER and COQUIT.",
year = "2013",
language = "Undefined/Unknown",
volume = "377",
pages = "1076--1087",
journal = "Phys. Lett. A",
issn = "1873-2410",
publisher = "Elsevier",

}

Download

TY - JOUR

T1 - A short impossibility proof of quantum bit commitment

AU - Chiribella, G.

AU - D'Ariano, G. M.

AU - Perinotti, P.

AU - Schlingemann, D. M.

AU - Werner, R. F.

N1 - Funding information: G.M.D. acknowledges interesting discussions with H. Yuen, H.K. Lo, and C. Bennett. G.C., G.M.D., P.P. acknowledge A. Bisio for useful observations. G.C. is supported the National Basic Research Program of China (973) 2011CBA00300 ( 2011CBA00301 ), by the National Natural Science Foundation of China through Grants 61033001 and 61061130540 , and by the 1000 Youth Fellowship Program of China . G.C., G.M.D., and P.P. acknowledge support by EC through projects CORNER and COQUIT.

PY - 2013

Y1 - 2013

N2 - Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment-bindingness tradeoff. A strengthened and explicit impossibility proof has been given in: G. M. D'Ariano, D. Kretschmann, D. Schlingemann, and R. F. Werner, Phys. Rev. A 76, 032328 (2007), in the Heisenberg picture and in a C*-algebraic framework, considering all conceivable protocols in which both classical and quantum information are exchanged. In the present paper we provide a new impossibility proof in the Schrodinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs, with each single-party strategy represented by a conditional comb. We prove that assuming a stronger notion of concealment-worst-case over the classical information histories--allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment-bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with respect to the comb-discriminability distance.

AB - Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment-bindingness tradeoff. A strengthened and explicit impossibility proof has been given in: G. M. D'Ariano, D. Kretschmann, D. Schlingemann, and R. F. Werner, Phys. Rev. A 76, 032328 (2007), in the Heisenberg picture and in a C*-algebraic framework, considering all conceivable protocols in which both classical and quantum information are exchanged. In the present paper we provide a new impossibility proof in the Schrodinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs, with each single-party strategy represented by a conditional comb. We prove that assuming a stronger notion of concealment-worst-case over the classical information histories--allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment-bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with respect to the comb-discriminability distance.

M3 - Article

VL - 377

SP - 1076

EP - 1087

JO - Phys. Lett. A

JF - Phys. Lett. A

SN - 1873-2410

SN - 1873-2429

ER -

Von denselben Autoren