Corpus ID: 12699405

Optimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol

  title={Optimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol},
  author={R. Spekkens and T. Rudolph},
  journal={Quantum Inf. Comput.},
  • R. Spekkens, T. Rudolph
  • Published 2002
  • Computer Science, Mathematics, Physics
  • Quantum Inf. Comput.
  • It is well known that no quantum bit commitment protocol is unconditionally secure. Nonetheless, there can be non-trivial upper bounds on both Bob's probability of correctly estimating Alice's commitment and Alice's probability of successfully unveiling whatever bit she desires. In this paper, we seek to determine these bounds for generalizations of the BB84 bit commitment protocol. In such protocols, an honest Alice commits to a bit by randomly choosing a state from a specified set and… CONTINUE READING
    Quantum And Relativistic Protocols For Secure Multi-Party Computation
    • 286
    • PDF
    Fair Loss-Tolerant Quantum Coin Flipping
    • 24
    • Highly Influenced
    • PDF
    Implementation of a two-state quantum bit commitment protocol in optical fibers
    • 9
    • PDF
    Quantum cryptographic primitives in realistic conditions


    Publications referenced by this paper.
    Is Quantum Bit Commitment Really Possible?
    • 463
    • PDF
    Quantum bit escrow
    • 104
    • PDF
    Quantum Gambling
    • 39
    • PDF
    The Quantum Bit Commitment Theorem
    • J. Bub
    • Physics, Mathematics
    • 2000
    • 24
    • PDF
    A new protocol and lower bounds for quantum coin flipping
    • 62
    • PDF
    Unconditionally Secure Bit Commitment
    • A. Kent
    • Physics, Computer Science
    • 1999
    • 143
    • PDF
    Cheat sensitive quantum bit commitment.
    • 65
    • PDF