File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Why quantum bit commitment and ideal quantum coin tossing are impossible

TitleWhy quantum bit commitment and ideal quantum coin tossing are impossible
Authors
Issue Date1998
PublisherElsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/physd
Citation
Physica D: Nonlinear Phenomena, 1998, v. 120 n. 1-2, p. 177-187 How to Cite?
AbstractThere had been well-known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen (EPR) type of attack and delaying her measurements. One might wonder if secure quantum bit commitment protocols exist at all. We answer this question by showing that the same type of attack by Alice will, in principle, break any bit commitment scheme. The cheating strategy generally requires a quantum computer. We emphasize the generality of this "no-go theorem": Unconditionally secure bit commitment schemes based on quantum mechanics-fully quantum, classical or quantum but with measurements-are all ruled out by this result. Since bit commitment is a useful primitive for building up more sophisticated protocols such as zero-knowledge proofs, our results cast very serious doubt on the security of quantum cryptography in the so-called "post-cold-war" applications. We also show that ideal quantum coin tossing is impossible because of the EPR attack. This no-go theorem for ideal quantum coin tossing may help to shed some lights on the possibility of non-ideal protocols. © 1998 Elsevier Science B.V. All rights reserved.
Persistent Identifierhttp://hdl.handle.net/10722/80571
ISSN
2023 Impact Factor: 2.7
2023 SCImago Journal Rankings: 1.074
ISI Accession Number ID
References

 

DC FieldValueLanguage
dc.contributor.authorLo, HKen_HK
dc.contributor.authorChau, HFen_HK
dc.date.accessioned2010-09-06T08:07:55Z-
dc.date.available2010-09-06T08:07:55Z-
dc.date.issued1998en_HK
dc.identifier.citationPhysica D: Nonlinear Phenomena, 1998, v. 120 n. 1-2, p. 177-187en_HK
dc.identifier.issn0167-2789en_HK
dc.identifier.urihttp://hdl.handle.net/10722/80571-
dc.description.abstractThere had been well-known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen (EPR) type of attack and delaying her measurements. One might wonder if secure quantum bit commitment protocols exist at all. We answer this question by showing that the same type of attack by Alice will, in principle, break any bit commitment scheme. The cheating strategy generally requires a quantum computer. We emphasize the generality of this "no-go theorem": Unconditionally secure bit commitment schemes based on quantum mechanics-fully quantum, classical or quantum but with measurements-are all ruled out by this result. Since bit commitment is a useful primitive for building up more sophisticated protocols such as zero-knowledge proofs, our results cast very serious doubt on the security of quantum cryptography in the so-called "post-cold-war" applications. We also show that ideal quantum coin tossing is impossible because of the EPR attack. This no-go theorem for ideal quantum coin tossing may help to shed some lights on the possibility of non-ideal protocols. © 1998 Elsevier Science B.V. All rights reserved.en_HK
dc.languageengen_HK
dc.publisherElsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/physden_HK
dc.relation.ispartofPhysica D: Nonlinear Phenomenaen_HK
dc.titleWhy quantum bit commitment and ideal quantum coin tossing are impossibleen_HK
dc.typeArticleen_HK
dc.identifier.emailChau, HF: hfchau@hku.hken_HK
dc.identifier.authorityChau, HF=rp00669en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/S0167-2789(98)00053-0-
dc.identifier.scopuseid_2-s2.0-0001731260en_HK
dc.identifier.hkuros38909en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-0001731260&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume120en_HK
dc.identifier.issue1-2en_HK
dc.identifier.spage177en_HK
dc.identifier.epage187en_HK
dc.identifier.isiWOS:000075193500014-
dc.publisher.placeNetherlandsen_HK
dc.identifier.scopusauthoridLo, HK=7202085450en_HK
dc.identifier.scopusauthoridChau, HF=7005742276en_HK
dc.identifier.issnl0167-2789-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats