2011
DOI: 10.1007/s11128-011-0284-4
|View full text |Cite
|
Sign up to set email alerts
|

Practical quantum bit commitment protocol

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…Several practically secure QBC protocols have been devised and experimentally implemented in the last decade [50][51][52]. The security of those protocols typically relies on the current technological limitation on non-demolition measurement and long-term quantum memory.…”
Section: Discussionmentioning
confidence: 99%
“…Several practically secure QBC protocols have been devised and experimentally implemented in the last decade [50][51][52]. The security of those protocols typically relies on the current technological limitation on non-demolition measurement and long-term quantum memory.…”
Section: Discussionmentioning
confidence: 99%
“…We have analysed the cheating strategies for the practical two-state and four-state bit-commitment protocols presented in [10] and [4], respectively. We showed that by introducing the "post-processing" of the raw experimental data, one can improve the naïve cheating strategy based on the measurement in the Breidbart basis, originally studied in [10].…”
Section: Discussionmentioning
confidence: 99%
“…Quantifying the impact of these difficulties and studying their solutions is thus of utmost importance if quantum cryptography is to become a widespread reality. As a step towards this goal, we here study the feasibility of several different attacks on a practical two-state quantum bit-commitment (BC) protocol [10,1,2] and its original four-state variant [4] in a noisy environment. By practical, we mean that cheating is subjected to current technological constraints: the lack of long-term quantum memories and, in the case of the currently predominant optical realisations, the non-existence of photon non-demolition measurements.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, when Bob is limited to bounded or noisy quantum storages, secure QOT can be made possible in practice with two approaches. On one hand, with this technological constraint BCCC can be obtained [66][67][68][69][70][71][72][73][74]. This is because Bob can no longer keep system C in Eq.…”
Section: Summary and Discussionmentioning
confidence: 99%