Reexamination of quantum bit commitment: The possible and the impossible

被引:76
作者
D'Ariano, Giacomo Mauro
Kretschmann, Dennis
Schlingemann, Dirk
Werner, Reinhard F.
机构
[1] Univ Pavia, Dipartimento Fis A Volta, Quantum Informat Theory Grp, I-27100 Pavia, Italy
[2] Univ Cambridge, DAMTP, Ctr Quantum Computat, Cambridge CB3 0WA, England
[3] Tech Univ Carolo Wilhelmina Braunschweig, Inst Math Phys, D-38106 Braunschweig, Germany
[4] ISI Fdn, Quantum Informat Theory Unit, I-10133 Turin, Italy
来源
PHYSICAL REVIEW A | 2007年 / 76卷 / 03期
关键词
D O I
10.1103/PhysRevA.76.032328
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed "honest" strategy, so that "anonymous state protocols," which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.
引用
收藏
页数:27
相关论文
共 69 条
[1]   Private quantum channels [J].
Ambainis, A ;
Mosca, M ;
Tapp, A ;
de Wolf, R .
41ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2000, :547-553
[2]  
[Anonymous], 1996, LNCS, DOI DOI 10.1007/3-540-68697-5
[3]  
[Anonymous], 1991, ADV CRYPTOLOGY P CRY
[4]   Operational distance and fidelity for quantum channels [J].
Belavkin, VP ;
D'Ariano, GM ;
Raginsky, M .
JOURNAL OF MATHEMATICAL PHYSICS, 2005, 46 (06)
[5]  
Bennett C. H., 1984, P IEEE INT C COMP SY, DOI DOI 10.1016/J.TCS.2014.05.025
[6]  
Blum M., 1982, Digest of Papers Spring COMPCON 82. High Technology in the Information Industry, P133, DOI 10.1145/1008908.1008911
[7]   MINIMUM DISCLOSURE PROOFS OF KNOWLEDGE [J].
BRASSARD, G ;
CHAUM, D ;
CREPEAU, C .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1988, 37 (02) :156-189
[8]  
Brassard G., 1993, Proceedings. 34th Annual Symposium on Foundations of Computer Science (Cat. No.93CH3368-8), P362, DOI 10.1109/SFCS.1993.366851
[9]  
Brassard G., ARXIVQUANTPH9712023
[10]  
Bratteli O., 1987, Texts Monogr. Phys.