Impossibility of Growing Quantum Bit Commitments
نویسندگان
چکیده
منابع مشابه
Impossibility of growing quantum bit commitments.
Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two parties, connected by an insecure quantum channel, to generate a secret key of arbitrary length. Conversely, no key agreement is possible without access to an initial key. Here, we consider another fundamental cryptographic task, commitments. While, similar to key agreement,...
متن کاملImpossibility Proofs and Quantum Bit Commitment
The nature and scope of various impossibility proofs as they relate to real-world situations are discussed. In particular, it is shown in words without technical symbols how secure quantum bit commitment protocols may be obtained with testing that exploits the multiple possibilities of cheating entanglement formation.
متن کاملA brief review on the impossibility of quantum bit commitment
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the first time thirteen years ago. Bit commitment is sufficient in quantum cryptography to realize a variety of applications with unconditional security. In 1993, a quantum bit commitment protocol was proposed together with a security proof. However, a basic flaw in the protocol was ...
متن کاملPossibility, impossibility, and cheat sensitivity of quantum-bit string commitment
Harry Buhrman, Matthias Christandl,* Patrick Hayden, Hoi-Kwong Lo, and Stephanie Wehner CWI, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands DAMTP, University of Cambridge, Wilberforce Road, Cambridge, CB3 0WA, United Kingdom Arnold Sommerfeld Center for Theoretical Physics, Faculty of Physics, Ludwig-Maximilians-University Munich, Theresienstrasse 37, 80333 Munich, Germany School of Computer...
متن کاملDefeating classical bit commitments with a quantum computer
It has been recently shown by Mayers that no bit commitment scheme is secure if the participants have unlimited computational power and technology. However it was noticed that a secure protocol could be obtained by forcing the cheater to perform a measurement. Similar situations had been encountered previously in the design of Quantum Oblivious Transfer. The question is whether a classical bit ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2011
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.107.090502