It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independently by Aharonov et al. [STOC, 2000] and Hardy and Kent [Phys. Rev. Lett. 92 (2004)] is investigated. In this variant, the parties require some nonzero probability of detecting a cheating, i.e. if Bob, who commits a bit b to Alice, changes his mind during the revealing phase then Alice detects the cheating with a positive probability (we call this property binding); and if Alice gains information about the committed bit before the revealing phase then Bob discovers this with positive probability (sealing). In our paper we give quantum bit commitment scheme that is si...
While unconditionally secure bit commitment (BC) is considered impossible within the quant...
We analyze the situation where computationally binding string commitment schemes are used to force t...
It has been recently shown by Mayers that no bit commitment is secure if the participants have unlim...
We define $(varepsilon,delta)$-secure quantum computations between two parties that can play dishon...
We show that, if a quantum coin flip is combined with another quantum protocol, quantum bit escrow, ...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
The concept of quantum bit commitment was introduced in the early 1980s for the purpose of basing bi...
The Mayers-Lo-Chau theorem establishes that no quantum bit commitment protocol is unconditionally se...
Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classic...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classica...
Bit commitment is a primitive task of many cryptographic tasks. It has been proved that the uncondit...
While unconditionally secure bit commitment (BC) is considered impossible within the quant...
We analyze the situation where computationally binding string commitment schemes are used to force t...
It has been recently shown by Mayers that no bit commitment is secure if the participants have unlim...
We define $(varepsilon,delta)$-secure quantum computations between two parties that can play dishon...
We show that, if a quantum coin flip is combined with another quantum protocol, quantum bit escrow, ...
Quantum computing allows us to revisit the study of quantum cryptographic primitives with informatio...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
The concept of quantum bit commitment was introduced in the early 1980s for the purpose of basing bi...
The Mayers-Lo-Chau theorem establishes that no quantum bit commitment protocol is unconditionally se...
Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classic...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classica...
Bit commitment is a primitive task of many cryptographic tasks. It has been proved that the uncondit...
While unconditionally secure bit commitment (BC) is considered impossible within the quant...
We analyze the situation where computationally binding string commitment schemes are used to force t...
It has been recently shown by Mayers that no bit commitment is secure if the participants have unlim...