# Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation

@inproceedings{Dumais2000PerfectlyCQ, title={Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation}, author={Paul Dumais and Dominic Mayers and Louis Salvail}, booktitle={International Conference on the Theory and Application of Cryptographic Techniques}, year={2000} }

We show that although unconditionally secure quantum bit commitment is impossible, it can be based upon any family of quantum one-way permutations. The resulting scheme is unconditionally concealing and computationally binding. Unlike the classical reduction of Naor, Ostrovski, Ventkatesen and Young, our protocol is non-interactive and has communication complexity O(n) qubits for n a security parameter.

## 103 Citations

### Quantum Bit-commitment for small storage based on quantum one-way permutations

- Computer Science, PhysicsNew Generation Computing
- 2009

We propose a quantum bit-commitment scheme based on quantum one-way permutations with the unconditionally binding and computationally concealing property. Our scheme reduces exponentially the number…

### How to Convert the Flavor of a Quantum Bit Commitment

- Computer ScienceEUROCRYPT
- 2001

In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing QBC scheme. For a…

### How to Convert a Flavor of Quantum Bit Commitment

- Computer Science
- 2000

How to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing scheme that can be based upon any family of quantum one-way functions.

### A Statistically Secure Quantum Bit Commitment Scheme

- Computer Science
- 2004

A quantum bit commitment scheme which is statistically binding and perfectly concealing is proposed which can evade the no-go theorem.

### A Non-Interactive Quantum Bit Commitment Scheme that Exploits the Computational Hardness of Quantum State Distinction

- Computer Science, MathematicsArXiv
- 2013

This work proposes an efficient quantum protocol performing quantum bit commitment, which is a simple cryptographic primitive involved with two parties, called a committer and a verifier, which achieves computational concealing and statistical binding under a natural complexity-theoretical assumption.

### Computational Collapse of Quantum State with Application to Oblivious Transfer

- Computer Science, MathematicsTCC
- 2004

Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1-2 quantum oblivious…

### A Weak Quantum Oblivious Transfer

- Computer Science, Physics
- 2010

This paper proposed a weak version of the all-or-nothing OT, in which the honest parties do not need long term quantum memory, entanglements, or sophisticated quantum computations.

### Multi-party Quantum Computation

- Computer Science, Mathematics
- 2001

This work uses a new tool to establish that any multi-party quantum computation can be securely performed as long as the number of dishonest players is less than n/6.

### Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function

- Computer ScienceTCQ
- 2009

We provide a quantum bit commitment scheme which has statistically-hiding and computationally-binding properties from any approximable-preimage-size quantum one-way function, which is a…

### Straight Construction of Non-Interactive Quantum Bit Commitment Schemes from Indistinguishable Quantum State Ensembles

- Computer ScienceTPNC
- 2015

Two efficient quantum schemes performing quantum bit commitment, which is a simple cryptographic primitive involved with two parties, called a committer and a verifier, are proposed, built directly from two efficiently generated ensembles of reduced quantum states.

## References

SHOWING 1-10 OF 22 REFERENCES

### Unconditionally secure quantum bit commitment is impossible

- Computer Science, Mathematics
- 1997

It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.

### Quantum Key Distribution and String Oblivious Transfer in Noisy Channels

- Computer Science, MathematicsCRYPTO
- 1996

A lemma is proved that extends a security proof given by Yao for a (one bit) QOT protocol to this String-QOT protocol, which implies the unconditional security of the QKD protocol despite the previous proof that unconditionally secure bit commitment schemes are impossible.

### Unconditional security in quantum cryptography

- Computer ScienceJACM
- 2001

Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.

### The Trouble with Quantum Bit Commitment

- Computer Science
- 1996

Here is the first complete proof that the BCJL protocol is insecure, and the required attack and proof are more subtle.

### Quantum Bit Commitment from a Physical Assumption

- MathematicsCRYPTO
- 1998

This paper shows that under the assumption that the sender is not able to perform generalized measurements involving more than n qubits coherently (n-coherent measurements) then quantum bit commitment is possible.

### Practical Quantum Oblivious Transfer

- Computer Science, MathematicsCRYPTO
- 1991

We describe a protocol for quantum oblivious transfer, utilizing faint pulses of polarized light, by which one of two mutually distrustful parties ("Alice") transmits two one-bit messages in such a…

### Security of quantum protocols against coherent measurements

- Computer Science, MathematicsSTOC '95
- 1995

Some mathematical techniques for analyzing probabilistic events in Hilbert spaces are developed, and the security of a canonical quantum oblivious transfer protocol against coherent measurements is proved.

### Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation

- Computer Science, MathematicsJournal of Cryptology
- 1998

A general construction of zero-knowledge arguments based on specific algebraic assumptions is shown which can be based on any one-way permutation and obtained by a construction of an information-theoretic secure bit-commitment protocol.

### Is Quantum Bit Commitment Really Possible?

- Computer ScienceArXiv
- 1996

At the heart of such optimism has been the widespread belief that unconditionally secure quantum bit commitment (QBC) schemes exist, which is put into very serious doubt by showing.