2019
DOI: 10.1038/s41598-019-51953-9
|View full text |Cite
|
Sign up to set email alerts
|

Experimentally attacking quantum money schemes based on quantum retrieval games

Abstract: The concept of quantum money (QM) was proposed by Wiesner in the 1970s. Its main advantage is that every attempt to copy QM unavoidably leads to imperfect counterfeits. In the Wiesner’s protocol, quantum banknotes need to be delivered to the issuing bank for verification. Thus, QM requires quantum communication which range is limited by noise and losses. Recently, Bozzio et al. (2018) have demonstrated experimentally how to replace challenging quantum verification with a classical channel and a quantum retriev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…Although the theoretical schemes are secure, in the case of real-life, more practical implementation, new vectors of attack could appear. For example, Jiráková et al [34] show an attack on quantum money implementation.…”
Section: Private-key Quantum Moneymentioning
confidence: 99%
“…Although the theoretical schemes are secure, in the case of real-life, more practical implementation, new vectors of attack could appear. For example, Jiráková et al [34] show an attack on quantum money implementation.…”
Section: Private-key Quantum Moneymentioning
confidence: 99%
“…Recently, experimental investigations of quantum token schemes have been performed [23][24][25][26][27]. Refs.…”
Section: Introductionmentioning
confidence: 99%
“…Refs. [23,27] investigated the experimental implementation of forging attacks on quantum token schemes. Ref.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, experimental investigations of quantum token schemes have been performed [23][24][25][26][27] . References 23,27 investigated the experimental implementation of forging attacks on quantum token schemes. Reference 24 presented a simulation of a quantum token scheme in IBM's five-qubit quantum computer.…”
Section: Introductionmentioning
confidence: 99%