Reexamination of quantum bit commitment: The possible and the impossible

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

Autoren

Organisationseinheiten

Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
FachzeitschriftPhys. Rev. A
Jahrgang76
Ausgabenummer3
PublikationsstatusVeröffentlicht - 2007

Abstract

Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed honest strategy, so that anonymous state protocols, which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.

Zitieren

Reexamination of quantum bit commitment: The possible and the impossible. / D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Schlingemann, Dirk et al.
in: Phys. Rev. A, Jahrgang 76, Nr. 3, 2007.

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

D'Ariano GM, Kretschmann D, Schlingemann D, Werner RF. Reexamination of quantum bit commitment: The possible and the impossible. Phys. Rev. A. 2007;76(3). doi: 10.1103/PhysRevA.76.032328
D'Ariano, Giacomo Mauro ; Kretschmann, Dennis ; Schlingemann, Dirk et al. / Reexamination of quantum bit commitment: The possible and the impossible. in: Phys. Rev. A. 2007 ; Jahrgang 76, Nr. 3.
Download
@article{9cc1519cd7a341daa0db66853a2350b7,
title = "Reexamination of quantum bit commitment: The possible and the impossible",
abstract = "Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed honest strategy, so that anonymous state protocols, which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.",
author = "D'Ariano, {Giacomo Mauro} and Dennis Kretschmann and Dirk Schlingemann and Werner, {Reinhard F.}",
year = "2007",
doi = "10.1103/PhysRevA.76.032328",
language = "English",
volume = "76",
journal = "Phys. Rev. A",
issn = "2469-9934",
publisher = "American Physical Society",
number = "3",

}

Download

TY - JOUR

T1 - Reexamination of quantum bit commitment: The possible and the impossible

AU - D'Ariano, Giacomo Mauro

AU - Kretschmann, Dennis

AU - Schlingemann, Dirk

AU - Werner, Reinhard F.

PY - 2007

Y1 - 2007

N2 - Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed honest strategy, so that anonymous state protocols, which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.

AB - Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed honest strategy, so that anonymous state protocols, which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.

U2 - 10.1103/PhysRevA.76.032328

DO - 10.1103/PhysRevA.76.032328

M3 - Article

VL - 76

JO - Phys. Rev. A

JF - Phys. Rev. A

SN - 2469-9934

IS - 3

ER -

Von denselben Autoren