Noise and measurement errors in a practical two-state quantum bit commitment protocol

被引:18
|
作者
Loura, Ricardo [1 ,2 ]
Almeida, Alvaro J. [3 ,4 ]
Andre, Paulo S. [3 ,4 ]
Pinto, Armando N. [4 ,5 ]
Mateus, Paulo [1 ,2 ]
Paunkovic, Nikola [1 ,2 ]
机构
[1] IST TU Lisbon, SQIG Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[2] Univ Tecn Lisboa, IST, Dept Math, P-1049001 Lisbon, Portugal
[3] Univ Aveiro, Dept Phys, P-3810193 Aveiro, Portugal
[4] Univ Aveiro, Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[5] Dept Elect Telecommun & Informat, P-3810193 Aveiro, Portugal
关键词
UNCONDITIONAL SECURITY; KEY DISTRIBUTION; INFORMATION; IDENTIFICATION; CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.89.052336
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a two-state practical quantum bit commitment protocol, the security of which is based on the current technological limitations, namely the nonexistence of either stable long-term quantum memories or nondemolition measurements. For an optical realization of the protocol, we model the errors, which occur due to the noise and equipment (source, fibers, and detectors) imperfections, accumulated during emission, transmission, and measurement of photons. The optical part is modeled as a combination of a depolarizing channel (white noise), unitary evolution (e.g., systematic rotation of the polarization axis of photons), and two other basis-dependent channels, namely the phase- and bit-flip channels. We analyze quantitatively the effects of noise using two common information-theoretic measures of probability distribution distinguishability: the fidelity and the relative entropy. In particular, we discuss the optimal cheating strategy and show that it is always advantageous for a cheating agent to add some amount of white noise-the particular effect not being present in standard quantum security protocols. We also analyze the protocol's security when the use of (im)perfect nondemolition measurements and noisy or bounded quantum memories is allowed. Finally, we discuss errors occurring due to a finite detector efficiency, dark counts, and imperfect single-photon sources, and we show that the effects are the same as those of standard quantum cryptography.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence Classes
    Tatar, Ahmet Emin
    Nagy, Marius
    Nagy, Naya
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 419 - 423
  • [32] Uncertainty Relation for Errors Focusing on General POVM Measurements with an Example of Two-State Quantum Systems
    Lee, Jaeha
    Tsutsui, Izumi
    ENTROPY, 2020, 22 (11) : 1 - 18
  • [33] On the two-state vector reformulation of quantum mechanics
    Aharonov, Yakir
    Vaidman, Lev
    Physica Scripta T, T76 : 85 - 92
  • [34] On the two-state vector reformulation of quantum mechanics
    Aharonov, Y
    Vaidman, L
    PHYSICA SCRIPTA, 1998, T76 : 85 - 92
  • [35] Decoherence and dissipation in quantum two-state systems
    Grigorescu, M.
    Physica A: Statistical Mechanics and its Applications, 1998, 256 (1-2): : 149 - 162
  • [36] Circuit parameters of quantum two-state cells
    Civalleri, PP
    Gilli, M
    Bonnin, M
    2004 47TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, 2004, : 471 - 474
  • [37] Decoherence and dissipation in quantum two-state systems
    Grigorescu, M
    PHYSICA A, 1998, 256 (1-2): : 149 - 162
  • [38] Dynamical echo in two-state quantum systems
    Sankaranarayanan, R.
    Sheeba, Jane H.
    Lakshmanan, M.
    CHAOS SOLITONS & FRACTALS, 2007, 33 (05) : 1618 - 1624
  • [39] Two-state vector formalism and quantum interference
    Hashmi, F. A.
    Li, Fu
    Zhu, Shi-Yao
    Zubairy, M. Suhail
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2016, 49 (34)
  • [40] Quantum and classical bounds for two-state overlaps
    Galvao, Ernesto F.
    Brod, Daniel J.
    PHYSICAL REVIEW A, 2020, 101 (06)