Quantum bit commitment on IBM QX

被引:4
|
作者
Almubayedh, Dhoha A. [1 ]
Alazman, Ghadeer [1 ]
Alkhalis, Mashael [1 ]
Alabdali, Manal [1 ]
Nagy, Naya [1 ]
Nagy, Marius [2 ]
Tatar, Ahmet Emin [3 ]
Alfosail, Malak [1 ]
Rahman, Atta [1 ]
AlMubairik, Norah [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & IT, Dept Comp Sci, POB 1982, Dammam, Saudi Arabia
[2] Prince Mohammad Bin Fahd Univ, Dept Comp Engn & Sci, Al Khobar, Saudi Arabia
[3] King Fahd Univ Petr & Minerals, Math & Stat Dept, Dhahran, Saudi Arabia
关键词
Quantum; Quantum cryptography; Quantum bit commitment; IBM QX; Real quantum processor;
D O I
10.1007/s11128-019-2543-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum bit commitment (QBC) is a quantum version of the classical bit commitment security primitive. As other quantum security primitives and protocols, QBC improves on cheating detection over its classical counterpart. The implementation of the QBC protocol below relies on the use of common quantum gates: the Hadamard gate used for orthonormal bases and the CNOT gate used to swap qubits. The protocol was run and tested on IBM quantum experience (IBM QX). IBM QX offers two different quantum environments: as a simulator and as a real quantum machine. In our implementation, honest and dishonest participants were considered. Results of both the simulation and the quantum execution were compared against the theoretical expectations. The IBM QX simulator gives results that match the theoretical model. The IBM QX real computer deviates from the expected behavior by a measurable amount. Using the standard deviation and the Hamming distance, the conclusion is that the quantum computer is usable as the difference to the simulator is within an acceptable margin of error. The QBC protocol of choice is fully secure against cheating by Bob. The only way Alice can cheat is using multi-dimensional entanglement. The cost for Alice to cheat is exponential in the number of qubits used, namely O(2(6n+3k+1)).
引用
收藏
页数:27
相关论文
共 50 条
  • [31] A Brief Review on Quantum Bit Commitment
    Almeida, Alvaro J.
    Loura, Ricardo
    Paunkovic, Nikola
    Silva, Nuno A.
    Muga, Nelson J.
    Mateus, Paulo
    Andre, Paulo S.
    Pinto, Armando N.
    SECOND INTERNATIONAL CONFERENCE ON APPLICATIONS OF OPTICS AND PHOTONICS, 2014, 9286
  • [32] How to convert the flavor of a quantum bit commitment
    Crépeau, C
    Légaré, F
    Salvail, L
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 60 - 77
  • [33] Quantum bit commitment: A complete classification of protocols
    D'Ariano, GM
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, PROCEEDINGS, 2003, : 365 - 370
  • [34] Quantum Bit Commitment - Within an Equivalence Class
    Nagy, Naya
    Nagy, Marius
    INTERNATIONAL JOURNAL OF UNCONVENTIONAL COMPUTING, 2016, 12 (5-6) : 413 - 432
  • [35] QUANTUM BIT COMMITMENT AND COIN TOSSING PROTOCOLS
    BRASSARD, G
    CREPEAU, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 49 - 61
  • [36] Quantum bit commitment from a physical assumption
    Salvail, L
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 338 - 353
  • [37] Quantum bit commitment under Gaussian constraints
    Mandilara, Aikaterini
    Cerf, Nicolas J.
    PHYSICAL REVIEW A, 2012, 85 (06):
  • [38] Reexamination of quantum bit commitment: The possible and the impossible
    D'Ariano, Giacomo Mauro
    Kretschmann, Dennis
    Schlingemann, Dirk
    Werner, Reinhard F.
    PHYSICAL REVIEW A, 2007, 76 (03):
  • [39] Unconditionally secure quantum bit commitment is impossible
    Mayers, D
    PHYSICAL REVIEW LETTERS, 1997, 78 (17) : 3414 - 3417
  • [40] Game theoretic security of quantum bit commitment
    Zhou, Lu
    Sun, Xin
    Su, Chunhua
    Liu, Zhe
    Choo, Kim-Kwang Raymond
    INFORMATION SCIENCES, 2019, 479 : 503 - 514