It has been recently shown by Mayers that no bit commitment is secure if the participants have unlimited computational power and technology. However it was noticed that a secure protocol could be obtained by forcing the cheater to execute a measurement. Similar situations had been encountered previously in the design of Quantum Oblivious Transfer. The question is whether a classical bit commitment could be used for this specific purpose. We demonstrate that, surprisingly, classical unconditionally concealing bit commitments do not help. 1 Introduction After that Mayers obtained his general impossibility theorem for bit commitment (see the Appendix of [13] and [1, 2]), different kind of ideas were proposed by some of us with the hope to rea...
Bit commitment is a primitive task of many cryptographic tasks. It has been proved that the uncondit...
Bit commitment (BC) is one of the most important fundamental protocols in secure multi-party computa...
Entanglement-based attacks, which are subtle and powerful, are usually believed to render quantum bi...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
Abstract Bit commitment involves the submission of evidence from one party to another so that the ev...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
We show that all proposed quantum bit commitment schemes are insecure because the sender can always ...
While unconditionally secure bit commitment (BC) is considered impossible within the quant...
Assume that a party, Alice, has a bit x in mind, to which she would like to be committed toward anot...
This paper proposes a different approach to pinpoint the causes for which an unconditionally secure ...
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
We show that the long-standing assumption of "no-communication" between the provers of the two-prove...
The concept of quantum bit commitment was introduced in the early 1980s for the purpose of basing bi...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
Bit commitment is a primitive task of many cryptographic tasks. It has been proved that the uncondit...
Bit commitment (BC) is one of the most important fundamental protocols in secure multi-party computa...
Entanglement-based attacks, which are subtle and powerful, are usually believed to render quantum bi...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
Abstract Bit commitment involves the submission of evidence from one party to another so that the ev...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
We show that all proposed quantum bit commitment schemes are insecure because the sender can always ...
While unconditionally secure bit commitment (BC) is considered impossible within the quant...
Assume that a party, Alice, has a bit x in mind, to which she would like to be committed toward anot...
This paper proposes a different approach to pinpoint the causes for which an unconditionally secure ...
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
We show that the long-standing assumption of "no-communication" between the provers of the two-prove...
The concept of quantum bit commitment was introduced in the early 1980s for the purpose of basing bi...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
Bit commitment is a primitive task of many cryptographic tasks. It has been proved that the uncondit...
Bit commitment (BC) is one of the most important fundamental protocols in secure multi-party computa...
Entanglement-based attacks, which are subtle and powerful, are usually believed to render quantum bi...