A short impossibility proof of quantum bit commitment

被引:19
|
作者
Chiribella, Giulio [3 ]
D'Ariano, Giacomo Mauro [1 ,2 ]
Perinotti, Paolo [1 ,2 ]
Schlingemann, Dirk [4 ]
Werner, Reinhard [5 ]
机构
[1] Univ Pavia, Dipartimento Fis, QUIT Grp, I-27100 Pavia, Italy
[2] Ist Nazl Fis Nucl, Sez Pavia, Grp 4, I-27100 Pavia, Italy
[3] Tsinghua Univ, Ctr Quantum Informat, Inst Interdisciplinary Informat Sci, Beijing, Peoples R China
[4] ISI Fdn, Quantum Informat Theory Unit, Turin, Italy
[5] Leibniz Univ Hannover, Inst Theoret Phys, D-30167 Hannover, Germany
基金
中国国家自然科学基金;
关键词
Quantum protocols; Quantum combs; Quantum bit commitment; THEOREM;
D O I
10.1016/j.physleta.2013.02.045
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment-bindingness tradeoff (Lo and Chau, 1997 [1], Mayers, 1997 [2]). A strengthened and explicit impossibility proof has been given in D'Ariano et al. (2007) [3] in the Heisenberg picture and in a C*-algebraic framework, considering all conceivable protocols in which both classical and quantum information is exchanged. In the present Letter we provide a new impossibility proof in the Schrodinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs (Chiribella et al., 2008 [4]), with each single-party strategy represented by a conditioned comb. We prove that assuming a stronger notion of concealment-for each classical communication history, not in average-allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment-bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with the metric given by the comb discriminability-distance. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:1076 / 1087
页数:12
相关论文
共 50 条
  • [41] Quantum bit commitment under Gaussian constraints
    Mandilara, Aikaterini
    Cerf, Nicolas J.
    PHYSICAL REVIEW A, 2012, 85 (06):
  • [42] Reexamination of quantum bit commitment: The possible and the impossible
    D'Ariano, Giacomo Mauro
    Kretschmann, Dennis
    Schlingemann, Dirk
    Werner, Reinhard F.
    PHYSICAL REVIEW A, 2007, 76 (03):
  • [43] Unconditionally secure quantum bit commitment is impossible
    Mayers, D
    PHYSICAL REVIEW LETTERS, 1997, 78 (17) : 3414 - 3417
  • [44] Game theoretic security of quantum bit commitment
    Zhou, Lu
    Sun, Xin
    Su, Chunhua
    Liu, Zhe
    Choo, Kim-Kwang Raymond
    INFORMATION SCIENCES, 2019, 479 : 503 - 514
  • [45] Quantum bit commitment with misaligned reference frames
    Harrow, A
    Oliveira, R
    Terhal, BM
    PHYSICAL REVIEW A, 2006, 73 (03):
  • [46] Quantum Two-prover Bit Commitment
    Yang Wei
    Huang Liusheng
    Wang Yang
    Luo Yonglong
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 201 - 205
  • [47] Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
    Song, Yaqi
    Yang, Li
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [48] Security bound of cheat sensitive quantum bit commitment
    He, Guang Ping
    SCIENTIFIC REPORTS, 2015, 5
  • [49] A feasible and practically secure quantum bit commitment protocol
    Li, Li
    Shi, Run-Hua
    MODERN PHYSICS LETTERS A, 2021, 36 (34)
  • [50] Why quantum bit commitment and ideal quantum coin tossing are impossible
    Lo, HK
    Chau, HF
    PHYSICA D-NONLINEAR PHENOMENA, 1998, 120 (1-2) : 177 - 187