arXiv Analytics

Sign in

arXiv:quant-ph/0209150AbstractReferencesReviewsResources

The quantum bit commitment: a complete classification of protocols

Giacomo Mauro D'Ariano

Published 2002-09-26Version 1

This paper addresses the controversy between Mayers, Lo and Chau on one side, and Yuen on the opposite side, on whether there exist or not unconditionally secure protocols. For such purpose, a complete classification of all possible bit commitment protocols is given, including all possible cheating attacks. For the simplest class of protocols (non-aborting and with complete and perfect verification), it is shown how naturally a game-theoretical situation arises. For these protocols, bounds for the cheating probabilities are derived, which turn out to be different from those given in the impossibility proof. The whole classification and analysis has been carried out using a "finite open system" approach. The discrepancy with the impossibility proof is explained on the basis of the implicit adoption of a "closed system approach"--equivalent to modeling the commitment as performed by two fixed machines interacting unitarily in a overall "closed system". However, it is shown that the closed system approach for the classification of commitment protocols unavoidably leads to infinite dimensions, which then invalidate the continuity argument at the basis of the impossibility proof.

Comments: Presented at QCM&C, Boston, July 2002. To appear on the Proceedings (Rinton press) Shortened version of quant-ph/0209149 6 pages Rinton style (included)
Categories: quant-ph
Related articles: Most relevant | Search more
arXiv:quant-ph/0209149 (Published 2002-09-26)
The quantum bit commitment: a finite open system approach for a complete classification of protocols
arXiv:1708.04964 [quant-ph] (Published 2017-08-16)
Quantum bit commitment and the reality of the quantum state
arXiv:1306.5357 [quant-ph] (Published 2013-06-22)
Comment on "A short impossibility proof of quantum bit commitment"