The Mayers-Lo-Chau theorem establishes that no quantum bit commitment protocol is unconditionally secure. Nonetheless, there can be non-trivial upper bounds on both Bob's probability of correctly estimating Alice's commitment and Alice's probability of successfully unveiling whatever bit she desires. In this paper, we seek to determine these bounds for generalizations of the BB84 bit commitment protocol. In such protocols, an honest Alice commits to a bit by randomly choosing a state from a specified set and submitting this to Bob, and later unveils the bit by announcing the chosen state, at which point Bob measures the projector onto the state. Bob's optimal cheating strategy can be easily deduced from well known results in the theory of q...
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographicall...
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
We analyze the situation where computationally binding string commitment schemes are used to force t...
We define $(varepsilon,delta)$-secure quantum computations between two parties that can play dishon...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classic...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits fol...
Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classica...
Bit commitment is a primitive task of many cryptographic tasks. It has been proved that the uncondit...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
We show that, if a quantum coin flip is combined with another quantum protocol, quantum bit escrow, ...
Since its invention in 1984 by C.H. Bennett and G. Brassard, the BB84 protocol has been proven secur...
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographicall...
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
We analyze the situation where computationally binding string commitment schemes are used to force t...
We define $(varepsilon,delta)$-secure quantum computations between two parties that can play dishon...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classic...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits fol...
Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classica...
Bit commitment is a primitive task of many cryptographic tasks. It has been proved that the uncondit...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
We show that, if a quantum coin flip is combined with another quantum protocol, quantum bit escrow, ...
Since its invention in 1984 by C.H. Bennett and G. Brassard, the BB84 protocol has been proven secur...
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographicall...
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
We analyze the situation where computationally binding string commitment schemes are used to force t...