-
A simple unconditionally secure quantum bit commitment protocol via quantum teleportation
Authors:
Horace P. Yuen
Abstract:
By using local quantum teleportation of a fixed state to one qubit of an entangled pair sent from the other party, it is shown how one party can commit a bit with only classical information as evidence that results in an unconditionally secure protocol. The well-known ``impossibility proof'' does not cover such protocols due to its different commitment and opening prescriptions, which necessitat…
▽ More
By using local quantum teleportation of a fixed state to one qubit of an entangled pair sent from the other party, it is shown how one party can commit a bit with only classical information as evidence that results in an unconditionally secure protocol. The well-known ``impossibility proof'' does not cover such protocols due to its different commitment and opening prescriptions, which necessitate actual quantum measurements among different possible systems that cannot be entangled as a consequence.
△ Less
Submitted 14 January, 2004; v1 submitted 23 May, 2003;
originally announced May 2003.
-
Secure communication using mesoscopic coherent states
Authors:
Geraldo A. Barbosa,
Eric Corndorf,
Prem Kumar,
Horace P. Yuen
Abstract:
We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme can be optically amplified. New avenues are open to secure c…
▽ More
We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme can be optically amplified. New avenues are open to secure communications at high speeds in fiber-optic or free-space channels.
△ Less
Submitted 21 April, 2003; v1 submitted 3 December, 2002;
originally announced December 2002.
-
Why there is no impossibility theorem on Secure Quantum Bit Commitment
Authors:
Horace P. Yuen
Abstract:
The impossibility proof on unconditionally secure quantum bit commitment is critically reviewed. Different ways of obtaining secure protocols are indicated.
The impossibility proof on unconditionally secure quantum bit commitment is critically reviewed. Different ways of obtaining secure protocols are indicated.
△ Less
Submitted 30 October, 2002;
originally announced October 2002.
-
Secure communication using coherent states
Authors:
Geraldo A. Barbosa,
Eric Corndorf,
Prem Kumar,
Horace P. Yuen,
G. Mauro D'Ariano,
Matteo G. A. Paris,
Paolo Perinotti
Abstract:
We demonstrate that secure communication using coherent states is possible. The optimal eavesdrop** strategy for an M-ry ciphering scheme shows that the minimum probability of error in a measurement for bit determination can be made arbitrarily close to the pure guessing value P_e=1/2. This ciphering scheme can be optically amplified without degrading the security level. New avenues are open t…
▽ More
We demonstrate that secure communication using coherent states is possible. The optimal eavesdrop** strategy for an M-ry ciphering scheme shows that the minimum probability of error in a measurement for bit determination can be made arbitrarily close to the pure guessing value P_e=1/2. This ciphering scheme can be optically amplified without degrading the security level. New avenues are open to secure communications at high speeds in fiber-optic or free-space channels.
△ Less
Submitted 28 July, 2003; v1 submitted 11 October, 2002;
originally announced October 2002.
-
Quantum bit commitment and unconditional security
Authors:
Horace P. Yuen
Abstract:
It is generally believed that unconditionally secure quantum bit commitment is impossible, due to widespread acceptance of an impossibility proof that utilizes quantum entaglement cheating. In this paper, we delineate how the impossibiliy proof formulation misses various types of quantum bit commitment protocols based on two-way quantum communications. We point out some of the gaps in the imposs…
▽ More
It is generally believed that unconditionally secure quantum bit commitment is impossible, due to widespread acceptance of an impossibility proof that utilizes quantum entaglement cheating. In this paper, we delineate how the impossibiliy proof formulation misses various types of quantum bit commitment protocols based on two-way quantum communications. We point out some of the gaps in the impossibility proof reasoning, and present corresponding counterexamples. Four different types of bit commitment protocols are constructed with several new protocol techniques. A specific Type 4 protocol is described and proved unconditionally secure. Security analysis of a Type 1 protocol and a Type 2 protocol are also sketched. The security of Type 3 protocols is as yet open. A development of quantum statistical decision theory and quantum games is needed to provie a complete security analysis of many such protocols.
△ Less
Submitted 20 August, 2002; v1 submitted 16 July, 2002;
originally announced July 2002.
-
How unconditionally secure quantum bit commitment is possible
Authors:
H. P. Yuen
Abstract:
Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a gen…
▽ More
Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a general impossibility theorem. In this paper, the scope of this general impossibility proof is analyzed, and gaps are found. Two variants of a bit commitment scheme utilizing anonymous quantum states and decoy states are presented. In the first variant, the exact verifying measurement is independent of the committed bit value, thus the second party can make it before the first party opens, making possible an unconditional security proof based on no-cloning. In the second variant, the impossibility proof fails because quantum entanglement purification of a mixed state does not render the protocol determinate. Whether impossibility holds in this or similar protocols is an open question, although preliminary results already show that the impossibility proof cannot work as it stands.
△ Less
Submitted 20 November, 2001; v1 submitted 12 September, 2001;
originally announced September 2001.
-
Communication and measurement with squeezed states
Authors:
Horace P. Yuen
Abstract:
The principles are elaborated which underlie the applications of general nonclassical states to communication and measurement systems. Relevant classical communication concepts are reviewed. Communication and measurement processes are compared. The possible advantages of nonclassical states in classical information transfer are assessed. The significance of novel quantum amplifiers and duplicato…
▽ More
The principles are elaborated which underlie the applications of general nonclassical states to communication and measurement systems. Relevant classical communication concepts are reviewed. Communication and measurement processes are compared. The possible advantages of nonclassical states in classical information transfer are assessed. The significance of novel quantum amplifiers and duplicators in communication is emphasized. A general approach is developed for determining the ultimate accuracy limit in quantum measurement systems. It is found that bandwidth or mode number is a most important parameter and ultrahigh precision measurement is possible in systems with a fixed energy but many modes. The problem of the standard quantum limit in monitoring the position of a free mass is also addressed.
△ Less
Submitted 12 September, 2001;
originally announced September 2001.
-
Unconditional security in quantum bit commitment
Authors:
Horace P. Yuen
Abstract:
The commitment of bits between two mutually distrustful parties is a powerful cryptographic primitive with which many cryptographic objectives can be achieved. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a general impossibility theorem. Gaps in the proof of this impossibility theorem are found.…
▽ More
The commitment of bits between two mutually distrustful parties is a powerful cryptographic primitive with which many cryptographic objectives can be achieved. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a general impossibility theorem. Gaps in the proof of this impossibility theorem are found. An unconditionally secure bit commitment protocol utilizing anonymous quantum states and the no-clone theorem is presented below with a full security proof.
△ Less
Submitted 1 June, 2001;
originally announced June 2001.
-
Anonymous-key quantum cryptography and unconditionally secure quantum bit commitment
Authors:
Horace P. Yuen
Abstract:
A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is pr…
▽ More
A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.
△ Less
Submitted 27 September, 2000;
originally announced September 2000.
-
Unconditionally Secure Quantum Bit Commitment Is Possible
Authors:
Horace P. Yuen
Abstract:
Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. It is widely believed that secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a general impossibili…
▽ More
Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. It is widely believed that secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a general impossibility theorem. In this paper, the scope of this general impossibility proof is extended and analyzed, and gaps are found. Three specific protocols are described for which the entanglement cheating as given in the impossibility proof fails to work. One of these protocols, QBC2, is proved to be unconditionally secure.
△ Less
Submitted 18 October, 2000; v1 submitted 23 June, 2000;
originally announced June 2000.
-
On the correspondence between classical and quantum measurements on a bosonic field
Authors:
G. M. D'Ariano,
M. F. Sacchi,
H. P. Yuen
Abstract:
We study the correspondence between classical and quantum measurements on a harmonic oscillator that describes a one-mode bosonic field. We connect the quantum measurement of an observable of the field with the possibility of amplifying the observable ideally through a quantum amplifier. The ``classical'' measurement corresponds to the joint measurement of the position $q$ and momentum $p$ of th…
▽ More
We study the correspondence between classical and quantum measurements on a harmonic oscillator that describes a one-mode bosonic field. We connect the quantum measurement of an observable of the field with the possibility of amplifying the observable ideally through a quantum amplifier. The ``classical'' measurement corresponds to the joint measurement of the position $q$ and momentum $p$ of the harmonic oscillator, with following evaluation of a function $f$ of the outcome $α=q+ip$. For the electromagnetic field the joint measurement is achieved by a heterodyne detector. The quantum measurement of an observable $\hat O$ is obtained by preamplifying the heterodyne detector through an ideal amplifier of $\hat O$, and rescaling the outcome by the gain $g$. We give a general criterion which states when this preamplified heterodyne detection scheme approaches the ideal quantum measurement of $\hat O$ in the limit of infinite gain. We show that this criterion is satisfied and the ideal measurement is achieved for the case of the photon number operator and for the quadrature. For both operators the method is robust to nonunit quantum efficiency of the heterodyne detector. On the other hand, we show that the preamplified heterodyne detection scheme does not work for arbitrary observable of the field. As a counterexample, we prove that the simple quadratic function of the field $\hat K=i(a^{†2}-a^2)/2$ has no corresponding polynomial function $f(α,\bar α)$---including the obvious choice $f=\hbox{Im}(α^2)$---that allows the measurement of $\hat K$ through the preamplified heterodyne measurement scheme.
△ Less
Submitted 16 July, 1999;
originally announced July 1999.