Why quantum bit commitment and ideal quantum coin tossing are impossible

被引:134
作者
Lo, HK [1 ]
Chau, HF [1 ]
机构
[1] Inst Adv Study, Sch Nat Sci, Princeton, NJ 08540 USA
关键词
D O I
10.1016/S0167-2789(98)00053-0
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen (EPR) type of attack and delaying her measurements. One might wonder if secure quantum bit commitment protocols exist at all. We answer this question by showing that the same type of attack by Alice will, in principle, break any bit commitment scheme. The cheating strategy generally requires a quantum computer. We emphasize the generality of this "no-go theorem": Unconditionally secure bit commitment schemes based on quantum mechanics-fully quantum, classical or quantum but with measurements-are all ruled out by this result. Since bit commitment is a useful primitive for building up more sophisticated protocols such as zero-knowledge proofs, our results cast very serious doubt on the security of quantum cryptography in the so-called "post-cold-war" applications. We also show that ideal quantum coin tossing is impossible because of the EPR attack. This no-go theorem for ideal quantum coin tossing may help to shed some lights on the possibility of non-ideal protocols. (C) 1998 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:177 / 187
页数:11
相关论文
共 30 条
[1]  
[Anonymous], SIGACT NEWS
[2]  
[Anonymous], 2001, LECT NOTES COMPUTER
[3]  
ARDEHALI M, 1995, QUANTPH9505019
[4]  
ARDEHALI M, 1995, QUANTPH9512026
[5]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[6]  
Bennett C H., 1984, P IEEE INT C COMPUTE, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[7]  
BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351
[8]   QUANTUM CRYPTOGRAPHY [J].
BENNETT, CH ;
BRASSARD, G ;
EKERT, AK .
SCIENTIFIC AMERICAN, 1992, 267 (04) :50-57
[9]   Security of quantum cryptography against collective attacks [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 78 (11) :2256-2259
[10]  
BRASSARD G, 1991, LECT NOTES COMPUT SC, V537, P49