An adaptive attack on Wiesner's quantum money
نویسندگان
چکیده
Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner’s scheme remained appealing because it is both conceptually clean as well as relatively easy to implement. We show efficient adaptive attacks on Wiesner’s quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner’s scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit. The attack shows that Wiesner’s scheme can only be safe if the bank replaces valid notes after validation.
منابع مشابه
Optimal Counterfeiting Attacks and Generalizations for Wiesner's Quantum Money
We present an analysis of Wiesner’s quantum money scheme, as well as some natural generalizations of it, based on semidefinite programming. For Wiesner’s original scheme, it is determined that the optimal probability for a counterfeiter to create two copies of a bank note from one, where both copies pass the bank’s test for validity, is (3/4)n for n being the number of qubits used for each note...
متن کاملAn Analysis of Circulation of Decentralized Digital Money in Quantum Electrodynamics Space: the Econphysics Approach
The study aimed at showing how to create and release cryptocurrency, based on which one can introduce a new generation of this money that can continue its life in the quantum computers space and study whether cryptocurrency could be controlled or the rules should be rewritten in line with new technology. Regarding this, we showed the evolution of money and its uses in economic relations. Accord...
متن کاملOn the query complexity of counterfeiting quantum money
Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum bill) which anyone can verify but no one can copy. The only published protocol (quantum money from knots) implements a protocol for collision-free money that is defined in terms of a classical oracle. I give a reduction from a hard classical problem to a restricted type of attack against the ...
متن کاملOn Quantum Obfuscation
Encryption of data is fundamental to secure communication in the modern world. Beyond encryption of data lies obfuscation, i.e., encryption of functionality. It is well-known that the most powerful means of obfuscating classical programs, so-called “black-box obfuscation,” is provably impossible [BGI+01]. For years since, obfuscation was believed to always be either impossible or useless, depen...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Quantum Information & Computation
دوره 16 شماره
صفحات -
تاریخ انتشار 2016