Strong no-go theorem for Gaussian quantum bit commitment

@article{Magnin2010StrongNT,
  title={Strong no-go theorem for Gaussian quantum bit commitment},
  author={Lo{\"i}ck Magnin and Fr{\'e}d{\'e}ric Magniez and Anthony Leverrier and Nicolas J. Cerf},
  journal={Physical Review A},
  year={2010},
  volume={81},
  pages={010302}
}
Unconditionally secure bit commitment is forbidden by quantum mechanics. We extend this no-go theorem to continuous-variable protocols where both players are restricted to use Gaussian states and operations, which is a reasonable assumption in current-state optical implementations. Our Gaussian no-go theorem also provides a natural counter-example to a conjecture that quantum mechanics can be rederived from the assumption that key distribution is allowed while bit commitment is forbidden in… 
Quantum bit commitment under Gaussian constraints
TLDR
A quantum bit commitment protocol is introduced and it is proved that it is asymptotically secure if cheating is restricted to Gaussian operations.
Quantum key distribution based on orthogonal states allows secure quantum bit commitment
  • G. He
  • Computer Science
  • 2011
TLDR
A QBC protocol is built in which the density matrices of the quantum states encoding the commitment do not satisfy a crucial condition on which the no-go proofs of QBC are based, so that theNo- go proofs could be evaded.
Unconditionally secure quantum bit commitment based on the uncertainty principle
  • Guang Ping He
  • Computer Science
    Proceedings of the Royal Society A
  • 2019
TLDR
A simple QBC protocol is proposed which manages to evade the no-go proofs and is found that in high-dimensional systems, there exist some states which can display a chaos effect in quantum steering.
Simplified quantum bit commitment using single photon nonlocality
  • G. He
  • Physics
    Quantum Inf. Process.
  • 2014
We simplified our previously proposed quantum bit commitment (QBC) protocol based on the Mach–Zehnder interferometer, by replacing symmetric beam splitters with asymmetric ones. It eliminates the
Quantum bit commitment is weaker than quantum bit seals
  • G. He
  • Computer Science
  • 2014
TLDR
It is shown that secure QBC can be built upon secure QBS, but not vice versa, which seems that QBC is strictly weaker than QBS in security requirement.
Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
TLDR
This paper proposes three practical quantum cryptographic protocols and gives a definition of physical security for QBC protocols and proves that the practical QBC protocol is physically secure and can be implemented in the real world.
Semi-Counterfactual Quantum Bit Commitment Protocol
TLDR
A semi-counterfactual quantum bit commitment (SCQBC) protocol is presented here for the first time, which makes use of counterfactual property, and a general bit commitment framework can be extracted from the SCQBC scheme, which opens up a new class of cryptographic protocols inCounterfactual cryptography.
Oblivious transfer based on quantum state computational distinguishability
TLDR
This paper presents a quantum computationally secure protocol for oblivious transfer between two parties, under the assumption of quantum hardness of state distinguishability, and it is feasible, in the sense that it is implementable in polynomial time.
Theoretical study of continuous-variable quantum key distribution
TLDR
This thesis develops an optimal reconciliation algorithm for the initial protocol, then introduces a new protocol for which the reconciliation problem is automatically taken care of thanks to a discrete modulation, and introduces and study a class of symmetries in phase space, which is particularly relevant for continuous-variable QKD.
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
TLDR
The principle of continuous-variable quantum key distribution is described, focusing in particular on protocols based on coherent states, and the security of these protocols is discussed and the state-of-the-art in experimental implementations are reported, including the issue of side-channel attacks.
...
...

References

SHOWING 1-10 OF 74 REFERENCES
Unconditionally secure quantum bit commitment is impossible
TLDR
It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.
Unconditionally Secure Bit Commitment
  • A. Kent
  • Computer Science, Mathematics
  • 1999
TLDR
A new classical bit commitment protocol based on cryptographic constraints imposed by special relativity that evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.
UNCONDITIONALLY SECURE QUANTUM BIT COMMITMENT IS POSSIBLE
TLDR
The scope of this general impossibility proof is extended and analyzed, and gaps are found, and one of these protocols, QBC2, is proved to be unconditionally secure.
Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.
TLDR
This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.
De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.
We show that the quantum de Finetti theorem holds for states on infinite-dimensional systems, provided they satisfy certain experimentally verifiable conditions. This result can be applied to prove
Cryptography in the bounded quantum-storage model
TLDR
It is shown that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least n/2 in order to break the protocol, where n is the number of qubits transmitted.
Reexamination of quantum bit commitment: The possible and the impossible
TLDR
It is shown that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver, and provides a natural characterization of protocols that fall outside the standard setting of unlimitedmore » available technology and thus may allow secure bit commitment.
Characterizing Quantum Theory in Terms of Information-Theoretic Constraints
We show that three fundamental information-theoretic constraints—the impossibility of superluminal information transfer between two physical systems by performing measurements on one of them, the
Is Quantum Bit Commitment Really Possible?
TLDR
At the heart of such optimism has been the widespread belief that unconditionally secure quantum bit commitment (QBC) schemes exist, which is put into very serious doubt by showing.
The security of practical quantum key distribution
TLDR
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
...
...