2019
DOI: 10.1103/physreva.99.022336
|View full text |Cite
|
Sign up to set email alerts
|

Semi-device-independent quantum money with coherent states

Abstract: The no-cloning property of quantum mechanics allows unforgeability of quantum banknotes and credit cards. Quantum credit card protocols involve a bank, a client and a payment terminal, and their practical implementation typically relies on encoding information on weak coherent states of light. Here, we provide a security proof in this practical setting for semi-device-independent quantum money with classical verification, involving an honest bank, a dishonest client and a potentially untrusted terminal. Our an… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(27 citation statements)
references
References 36 publications
0
27
0
Order By: Relevance
“…The fewer assumptions a proof bases on, the more independent of the device the proof is. Any proof based on less number of assumptions about the inner working device than the fully device-dependent one is called now a semi-device-independent one [13].…”
Section: Motivation-the Hacker's and Cryptanalyst's Point Of Viewmentioning
confidence: 99%
See 1 more Smart Citation
“…The fewer assumptions a proof bases on, the more independent of the device the proof is. Any proof based on less number of assumptions about the inner working device than the fully device-dependent one is called now a semi-device-independent one [13].…”
Section: Motivation-the Hacker's and Cryptanalyst's Point Of Viewmentioning
confidence: 99%
“…Soon after the first version of this paper was published on arXiv preprints repository, Bozzio et al [13] presented the result with a similar title 'Semi-device-independent quantum money with coherent states'. Their result requires stronger security assumptions (trusted source device) but is more focused on realistic implementations.…”
Section: Private-key Quantum Moneymentioning
confidence: 99%
“…Alice presents the token by giving s and |ψ back to Bob, and Bob validates or rejects the token after measuring the received quantum state in the basis in which |ψ was prepared. In refinements of this scheme [2][3][4][5][6][7][8][9][10], Alice can present the token to Bob or to one of a set of verifiers, by communicating the classical outcomes of quantum measurements applied on |ψ , as requested by Bob or the verifier. Alternatively, Alice presents the token by giving s and |ψ to the verifier, who applies quantum measurements on |ψ .…”
Section: Introductionmentioning
confidence: 99%
“…they guarantee that a token cannot be validated more than once, with unconditional security, i.e. based only on the laws of physics without restricting the technology of dishonest Alice [2][3][4][5][6][7][8][9][10]. Intuitively, this follows from the no-cloning theorem, stating that it is impossible to perfectly copy unknown quantum states [11,12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation