Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classical and the quantum worlds. But when committing to a string of n bits at once, how far can we stretch the quantum limits? In this paper, we introduce a framework for quantum schemes where Alice commits a string of n bits to Bob in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are twofold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a+b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we cons...
The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed....
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are genera...
Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classic...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
Assume that a party, Alice, has a bit x in mind, to which she would like to be committed toward anot...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
Abstract Bit commitment involves the submission of evidence from one party to another so that the ev...
We show that all proposed quantum bit commitment schemes are insecure because the sender can always ...
We show that, if a quantum coin flip is combined with another quantum protocol, quantum bit escrow, ...
We show that the long-standing assumption of "no-communication" between the provers of the two-prove...
It has been recently shown by Mayers that no bit commitment is secure if the participants have unlim...
This paper proposes a different approach to pinpoint the causes for which an unconditionally secure ...
The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed....
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are genera...
Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classic...
It is well known that unconditionally secure bit commitment is impossible even in the quantum world....
Assume that a party, Alice, has a bit x in mind, to which she would like to be committed toward anot...
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
AbstractIn this paper, we introduce a new quantum bit commitment protocol which is secure against en...
Abstract Bit commitment involves the submission of evidence from one party to another so that the ev...
We show that all proposed quantum bit commitment schemes are insecure because the sender can always ...
We show that, if a quantum coin flip is combined with another quantum protocol, quantum bit escrow, ...
We show that the long-standing assumption of "no-communication" between the provers of the two-prove...
It has been recently shown by Mayers that no bit commitment is secure if the participants have unlim...
This paper proposes a different approach to pinpoint the causes for which an unconditionally secure ...
The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed....
Unconditionally secure two-party bit commitment based solely on the principles of quantum mechanics ...
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are genera...