Noise and measurement errors in a practical two-state quantum bit commitment protocol

被引:18
|
作者
Loura, Ricardo [1 ,2 ]
Almeida, Alvaro J. [3 ,4 ]
Andre, Paulo S. [3 ,4 ]
Pinto, Armando N. [4 ,5 ]
Mateus, Paulo [1 ,2 ]
Paunkovic, Nikola [1 ,2 ]
机构
[1] IST TU Lisbon, SQIG Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[2] Univ Tecn Lisboa, IST, Dept Math, P-1049001 Lisbon, Portugal
[3] Univ Aveiro, Dept Phys, P-3810193 Aveiro, Portugal
[4] Univ Aveiro, Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[5] Dept Elect Telecommun & Informat, P-3810193 Aveiro, Portugal
关键词
UNCONDITIONAL SECURITY; KEY DISTRIBUTION; INFORMATION; IDENTIFICATION; CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.89.052336
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a two-state practical quantum bit commitment protocol, the security of which is based on the current technological limitations, namely the nonexistence of either stable long-term quantum memories or nondemolition measurements. For an optical realization of the protocol, we model the errors, which occur due to the noise and equipment (source, fibers, and detectors) imperfections, accumulated during emission, transmission, and measurement of photons. The optical part is modeled as a combination of a depolarizing channel (white noise), unitary evolution (e.g., systematic rotation of the polarization axis of photons), and two other basis-dependent channels, namely the phase- and bit-flip channels. We analyze quantitatively the effects of noise using two common information-theoretic measures of probability distribution distinguishability: the fidelity and the relative entropy. In particular, we discuss the optimal cheating strategy and show that it is always advantageous for a cheating agent to add some amount of white noise-the particular effect not being present in standard quantum security protocols. We also analyze the protocol's security when the use of (im)perfect nondemolition measurements and noisy or bounded quantum memories is allowed. Finally, we discuss errors occurring due to a finite detector efficiency, dark counts, and imperfect single-photon sources, and we show that the effects are the same as those of standard quantum cryptography.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Implementable quantum-bit-string commitment protocol
    Tsurumaru, T
    PHYSICAL REVIEW A, 2005, 71 (01):
  • [22] Semi-Counterfactual Quantum Bit Commitment Protocol
    Song, Yaqi
    Yang, Li
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [23] Semi-Counterfactual Quantum Bit Commitment Protocol
    Yaqi Song
    Li Yang
    Scientific Reports, 10
  • [24] Classical noise-based cryptography similar to two-state quantum cryptography
    Yuen, HP
    Kim, AM
    PHYSICS LETTERS A, 1998, 241 (03) : 135 - 138
  • [25] The Two-State Estimator for Linear Systems with Additive Measurement and Process Cauchy Noise
    Speyer, Jason L.
    Idan, Moshe
    Fernandez, Javier
    2012 IEEE 51ST ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2012, : 4107 - 4114
  • [26] Quantum Two-prover Bit Commitment
    Yang Wei
    Huang Liusheng
    Wang Yang
    Luo Yonglong
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 201 - 205
  • [27] Multiaxis quantum noise spectroscopy robust to errors in state preparation and measurement
    Khan, Muhammad Qasim
    Dong, Wenzheng
    Norris, Leigh M.
    Viola, Lorenza
    PHYSICAL REVIEW APPLIED, 2024, 22 (02):
  • [28] An Arbitrarily Concealing and Practically Binding Quantum Bit Commitment Protocol
    Xin Sun
    Quanlong Wang
    Feifei He
    International Journal of Theoretical Physics, 2020, 59 : 3464 - 3475
  • [29] An Arbitrarily Concealing and Practically Binding Quantum Bit Commitment Protocol
    Sun, Xin
    Wang, Quanlong
    He, Feifei
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (11) : 3464 - 3475
  • [30] Quantum Bit Commitment Combining with BB84 Protocol
    Zhang, Linxi
    Zhu, Changhua
    Zhao, Nan
    Pei, Changxing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 291 - 298