2013
DOI: 10.1007/s11128-013-0566-0
|View full text |Cite
|
Sign up to set email alerts
|

Cheat sensitive quantum bit commitment via pre- and post-selected quantum states

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
19
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 29 publications
0
19
0
Order By: Relevance
“…The implementation of those protocols often uses quantum optical devices such as nanosecond pulse laser, single mode optical fiber, and Mach-Zehnder interferometer for the generation, communication, and operation of non-entangled photons. With the recent development on the generation and manipulation of entangled photons [53], in the future,we are also interested in implementing QBC protocols based on (low-dimensional) entangled states [9,16].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The implementation of those protocols often uses quantum optical devices such as nanosecond pulse laser, single mode optical fiber, and Mach-Zehnder interferometer for the generation, communication, and operation of non-entangled photons. With the recent development on the generation and manipulation of entangled photons [53], in the future,we are also interested in implementing QBC protocols based on (low-dimensional) entangled states [9,16].…”
Section: Discussionmentioning
confidence: 99%
“…Quantum bit commitment (QBC) [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] protocol was first proposed by Bennett and Brassard in 1984 [1]. Later, several QBC protocols were designed to achieve unconditional security, such as those in [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…In short, this intercept-resend attack will be discovered in the honest test with the probability of 1 2 . That is, our scheme is cheat sensitive [19,20,21]. In order to further resist this intercept-resend attack, in principle the client can replace the encoded state | ⟩ = [19], where the phase is a parameter randomly and privately selected by the client.…”
Section: Discussionmentioning
confidence: 99%
“…Several QBC protocols were proposed based on physical hypothesis, such as bounded-quantum-storage model [30,31], noisy-storage model [32][33][34] and technological limitations on non-demolition measurements [35], the security of these protocols is threatened by the development of techniques. Some QBC schemes with security requirements relaxed were put forward, such as cheat-sensitive QBC [36][37][38][39] and game theoretic secure QBC [40]. There are also some non-relativistic QBC schemes which are claimed to be unconditionally secure [41][42][43][44][45][46].…”
Section: Introductionmentioning
confidence: 99%