Noise and measurement errors in a practical two-state quantum bit commitment protocol

被引:18
|
作者
Loura, Ricardo [1 ,2 ]
Almeida, Alvaro J. [3 ,4 ]
Andre, Paulo S. [3 ,4 ]
Pinto, Armando N. [4 ,5 ]
Mateus, Paulo [1 ,2 ]
Paunkovic, Nikola [1 ,2 ]
机构
[1] IST TU Lisbon, SQIG Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[2] Univ Tecn Lisboa, IST, Dept Math, P-1049001 Lisbon, Portugal
[3] Univ Aveiro, Dept Phys, P-3810193 Aveiro, Portugal
[4] Univ Aveiro, Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[5] Dept Elect Telecommun & Informat, P-3810193 Aveiro, Portugal
关键词
UNCONDITIONAL SECURITY; KEY DISTRIBUTION; INFORMATION; IDENTIFICATION; CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.89.052336
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a two-state practical quantum bit commitment protocol, the security of which is based on the current technological limitations, namely the nonexistence of either stable long-term quantum memories or nondemolition measurements. For an optical realization of the protocol, we model the errors, which occur due to the noise and equipment (source, fibers, and detectors) imperfections, accumulated during emission, transmission, and measurement of photons. The optical part is modeled as a combination of a depolarizing channel (white noise), unitary evolution (e.g., systematic rotation of the polarization axis of photons), and two other basis-dependent channels, namely the phase- and bit-flip channels. We analyze quantitatively the effects of noise using two common information-theoretic measures of probability distribution distinguishability: the fidelity and the relative entropy. In particular, we discuss the optimal cheating strategy and show that it is always advantageous for a cheating agent to add some amount of white noise-the particular effect not being present in standard quantum security protocols. We also analyze the protocol's security when the use of (im)perfect nondemolition measurements and noisy or bounded quantum memories is allowed. Finally, we discuss errors occurring due to a finite detector efficiency, dark counts, and imperfect single-photon sources, and we show that the effects are the same as those of standard quantum cryptography.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Implementation of a two-state quantum bit commitment protocol in optical fibers
    Almeida, A. J.
    Stojanovic, A. D.
    Paunkovic, N.
    Loura, R.
    Muga, N. J.
    Silva, N. A.
    Mateus, P.
    Andre, P. S.
    Pinto, A. N.
    JOURNAL OF OPTICS, 2016, 18 (01)
  • [2] Security of two-state and four-state practical quantum bit-commitment protocols
    Loura, Ricardo
    Arsenovic, Dusan
    Paunkovic, Nikola
    Popovic, Duska B.
    Prvanovic, Slobodan
    PHYSICAL REVIEW A, 2016, 94 (06)
  • [3] A practical quantum bit commitment protocol
    Sheikholeslam, S. Arash
    Gulliver, T. Aaron
    RESULTS IN PHYSICS, 2012, 2 : 97 - 99
  • [4] Practical quantum bit commitment protocol
    Ariel Danan
    Lev Vaidman
    Quantum Information Processing, 2012, 11 : 769 - 775
  • [5] Practical quantum bit commitment protocol
    Danan, Ariel
    Vaidman, Lev
    QUANTUM INFORMATION PROCESSING, 2012, 11 (03) : 769 - 775
  • [6] Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
    Song, Yaqi
    Yang, Li
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [7] Quantum bit commitment in a channel with noise
    Molotkov, SN
    Nazin, SS
    JETP LETTERS, 2001, 73 (02) : 107 - 113
  • [8] Quantum bit commitment in a channel with noise
    S. N. Molotkov
    S. S. Nazin
    Journal of Experimental and Theoretical Physics Letters, 2001, 73 : 107 - 113
  • [9] A Secured Quantum Two-Bit Commitment Protocol for Communication Systems
    Khawasik, Manal
    Elsayed, Wagdy
    Rashad, Magdi
    Younes, Ahmed
    IEEE ACCESS, 2022, 10 : 50218 - 50226
  • [10] Quantum Bit Commitment and the Reality of the Quantum State
    Srikanth, R.
    FOUNDATIONS OF PHYSICS, 2018, 48 (01) : 92 - 109