“…The protocol evades [289] the MLC attack [225,226] essentially by departing from the concealment condition (14), but using synchronous exchange of classical or quantum information between the players in order to be concealing to Bob, which imposes strong complexity, space and time constraints on the protocol. This was followed by another scheme employing both quantum and classical communication [290], which was shown to be secure under the assumption of perfect devices [291,292], and has been experimentally realized as a robust method [293,294]. However, these protocols were restricted to a one-round communication, which entails that for terrestrial agents, the commitment remains valid for at most just over 20 ms. To improve on this, [295] proposed a method involving several rounds of classical communication, which was proved secure against classical attacks, wherein the holding phase could be made arbitrarily long via periodic, coordinated communication between the agents of Alice and Bob.…”