Quantum Bit Commitment: Difference between revisions

No edit summary
 
(12 intermediate revisions by 4 users not shown)
Line 1: Line 1:
This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[Bit Commitment]] securely by using a relativistic scheme.
This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[bit commitment]] securely by using a relativistic scheme.
In bit commitment, the commiter "commits" to a particular bit value.
In bit commitment, the committer "commits" to a particular bit value.
The receiver knows nothing about the committed bit value until the commiter chooses to do so (''hiding property'').
The receiver knows nothing about the committed bit value until the committer chooses to do so (''hiding property'').
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (''binding property'').
The receiver has a guarantee that once committed, the committer cannot change the committed bit value (''binding property'').
Bit commitment cannot be done with non-relativistic schemes as proved by Mayers in his [https://arxiv.org/abs/quant-ph/9605044 paper].  
Information-theoretic secure bit commitment cannot be done with non-relativistic schemes see this review paper [https://arxiv.org/abs/quant-ph/9712023].  




'''Tags:''' [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]],  
'''Tags:''' [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]],  
[[Category:Information-theoretic security|Information-theoretic security]],
[[:Category:Information-theoretic security|Information-theoretic security]],
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]
[[Category:Information-theoretic security]]
[[Category:Information-theoretic security]]
Line 15: Line 15:
* Quantum theory is correct.
* Quantum theory is correct.
* The background space-time is approximately Minkowski.
* The background space-time is approximately Minkowski.
* The commiter can signal at precisely light speed.
* The committer can signal at precisely light speed.
* All information processing is instantaneous.
* All information processing is instantaneous.


Line 21: Line 21:
==Outline==
==Outline==


The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.
Both the receiver and the committer have 2 agents each which are the parties they send their qubits to and receive the committed value from. The agents are light-like separated from the committer.
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.
 
The commiter then sends the outcomes to their agents over secure classical channels.
The receiver securely pre-prepares a set of qubits randomly chosen from the BB84 states and sends them to the committer.
To unveil the committed bit, the commiter's agents reveal the outcomes to the receiver's agents.
To commit to the bit 0, the committer measures the received qubits in the standard basis and in Hadamard basis to commit to 1.
The receiver's agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.
The committer then sends the outcomes to their agents over secure classical channels.
To unveil the committed bit, the committer's agents reveal the outcomes to the receiver's agents.
The receiver's agents then check if the outcomes they have received are the same and consistent with the states sent to the committer.
If the check passes, the receiver accepts the commitment.
If the check passes, the receiver accepts the commitment.


==Notation==
==Notation==
Line 33: Line 34:
* <math>N</math>: Number of random qubits used in the commitment.
* <math>N</math>: Number of random qubits used in the commitment.
* <math>|\psi_i\rangle</math>: Random BB84 qubit with index <math>i</math>.
* <math>|\psi_i\rangle</math>: Random BB84 qubit with index <math>i</math>.
* <math>P</math>: Space-time origin point for the Minkowski space.
* <math>P</math>: Space-time origin point for the Minkowski space which is the position of the committer.
* <math>Q_0</math>: Commiter's first agent.
* <math>Q_0</math>: Commiter's first agent.
* <math>Q_1</math>: Commiter's second agent.
* <math>Q_1</math>: Commiter's second agent.
Line 43: Line 44:
* Secure classical channels between the parties and their agents.
* Secure classical channels between the parties and their agents.
* Basic state preparation abilities for the receiver.
* Basic state preparation abilities for the receiver.
* Instantaneous measurement capabilities for the commiter.
* Instantaneous measurement capabilities for the committer.


<br/>
==Knowledge Graph==


[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]
{{graph}}


==Properties==
==Properties==
Line 55: Line 56:




==Pseudocode==
==Protocol Description==
 
[https://github.com/quantumprotocolzoo/protocols/tree/master/QuantumBitCommitment <u>Click here for Python code</u>]</br>
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.
The committer and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.


===Commitment Phase===
===Commitment Phase===

Latest revision as of 16:23, 12 November 2019

This example protocol achieves the task of bit commitment securely by using a relativistic scheme. In bit commitment, the committer "commits" to a particular bit value. The receiver knows nothing about the committed bit value until the committer chooses to do so (hiding property). The receiver has a guarantee that once committed, the committer cannot change the committed bit value (binding property). Information-theoretic secure bit commitment cannot be done with non-relativistic schemes see this review paper [1].


Tags: Two Party Protocols, Quantum Enhanced Classical Functionality, Specific Task, Information-theoretic security,

AssumptionsEdit

  • Quantum theory is correct.
  • The background space-time is approximately Minkowski.
  • The committer can signal at precisely light speed.
  • All information processing is instantaneous.


OutlineEdit

Both the receiver and the committer have 2 agents each which are the parties they send their qubits to and receive the committed value from. The agents are light-like separated from the committer.

The receiver securely pre-prepares a set of qubits randomly chosen from the BB84 states and sends them to the committer. To commit to the bit 0, the committer measures the received qubits in the standard basis and in Hadamard basis to commit to 1. The committer then sends the outcomes to their agents over secure classical channels. To unveil the committed bit, the committer's agents reveal the outcomes to the receiver's agents. The receiver's agents then check if the outcomes they have received are the same and consistent with the states sent to the committer. If the check passes, the receiver accepts the commitment.

NotationEdit

  •  : Number of random qubits used in the commitment.
  •  : Random BB84 qubit with index  .
  •  : Space-time origin point for the Minkowski space which is the position of the committer.
  •  : Commiter's first agent.
  •  : Commiter's second agent.
  •  : Receiver's first agent.
  •  : Receiver's second agent.

RequirementsEdit

  • Secure classical channels between the parties and their agents.
  • Basic state preparation abilities for the receiver.
  • Instantaneous measurement capabilities for the committer.

Knowledge GraphEdit

PropertiesEdit

  • There is no need of quantum memory for the parties.
  • The protocol is unconditionally secure.


Protocol DescriptionEdit

Click here for Python code
The committer and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.

Commitment PhaseEdit

Receiver

  1. Prepare a set of   qubits   chosen independently and randomly from the BB84 states -  .
  2. Send the qubits to the commiter at point P.

Commiter

  1. To commit to 0, measure in the   basis.
  2. To commit to 1, measure in the   basis.
  3. Send the measurement outcomes to the agents   and   via the secure classical channels.

Unveiling PhaseEdit

Committer

  1. The committer's agents reveal the measurement outcomes to the receiver's agents   and  .

Receiver

  1. Check if the revealed outcomes of both the agents are same, if not, then abort.
  2. Check if the revealed outcomes are consistent with the sent states, if not, then abort.
  3. If the checks pass, accept the commitment.

Further InformationEdit

*contributed by Natansh Mathur