Study on Quantum Bit Commitment

Article Preview

Abstract:

The Bit Commitment (BC) is an important basic agreement in cryptography . The concept was first proposed by the winner of the Turing Award in 1995 ManuelBlum. Bit commitment scheme can be used to build up zero knowledge proof, verified secret sharing, throwing coins etc agreement.Simultaneously and Oblivious Transfer together constitute the basis of secure multi-party computations. Both of them are hotspots in the field of information security. We investigated unconditional secure Quantum Bit Commitment (QBC) existence. And we constructed a new bit commitment model – double prover bit commitment. The Quantum Bit Commitment Protocol can be resistant to errors caused by noise.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3076-3078

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Yao: Protocols for Secure Computation, Proc of the 23rd IEEE Symposium on Foundations of Computer Science (1982), pp.160-164.

Google Scholar

[2] T. S. Zhao , J. H. Ge and B. Yang: An Efficient COT Protocol, In Chinese, Journal of Circuits and Systems,Vol. 11, No. 2 ( 2006), pp.99-102.

Google Scholar

[3] C.M. Tang, Z.A. Yao and D.Q. Xie: Verifiable Oblivious Transfer Protocol, In Chinese, Journal of Guangzhou University(Natural Science Edition), Vol. 9, No. 2 ( 2010), pp.20-24.

Google Scholar

[4] H.K. Lo and H.E. Chau: Why Quantum Bit Commitment and Ideal Quantum Cointossing are Impossible, Physica D.,Vol. 120, (1998),pp.177-187.

DOI: 10.1016/s0167-2789(98)00053-0

Google Scholar

[5] M. T. Schmitt, H. Weier, H . Furst, et al: Experimental Demonstration of Free-space Decoy-state Quantum Key Distribution over 144 kms, Physics Rview Lettters, (2007).

DOI: 10.1109/cleoe-iqec.2007.4386755

Google Scholar

[6] L. M. Duan and G. C. Guo: Probabilistic Cloning and Identification of Linearly Independent Quantum States, Physics Review letters, (1998), pp.4999-5002.

DOI: 10.1103/physrevlett.80.4999

Google Scholar

[7] China Science and Technology Association: Cryptography Subject Development Report, China Science and Technology Press, In Chinese, (2007-2010).

Google Scholar

[8] H. Chen: Introduction of Quantum Confidential Communication, Beijing Institute of Technology Press, In Chinese, (2010).

Google Scholar

[9] G. H. Zeng: Quantum Cryptography, China Science and Technology Press, (2006).

Google Scholar

[10] S. S. Luo: Cryptography and Information Security Technology, Beijing University of Post and Telecommunications Press, In Chinese, (2009).

Google Scholar