کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
1866940 | 1038115 | 2013 | 12 صفحه PDF | دانلود رایگان |

Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment–bindingness tradeoff (Lo and Chau, 1997 [1], Mayers, 1997 [2]). A strengthened and explicit impossibility proof has been given in DʼAriano et al. (2007) [3] in the Heisenberg picture and in a C⁎C⁎-algebraic framework, considering all conceivable protocols in which both classical and quantum information is exchanged. In the present Letter we provide a new impossibility proof in the Schrödinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs (Chiribella et al., 2008 [4]), with each single-party strategy represented by a conditioned comb. We prove that assuming a stronger notion of concealment—for each classical communication history, not in average—allows Aliceʼs cheat to pass also the worst-case Bobʼs test. The present approach allows us to restate the concealment–bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with the metric given by the comb discriminability-distance.
► First application of the method of quantum combs to protocol security.
► Worst-case analysis of quantum bit commitment in the most general scenario.
► Analysis of constrained operations of a quantum protocol.
Journal: Physics Letters A - Volume 377, Issue 15, 17 June 2013, Pages 1076–1087