On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Committed Oblivious Transfer and Private Multi-Party Computation
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On Deniability in Quantum Key Exchange
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
The Search for the Holy Grail in Quantum Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Susceptible Two-Party Quantum Computations
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Efficient cryptographic protocols based on noisy channels
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Quantum oblivious mutual identification
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Security in advanced optical communication networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Bell inequalities: what do we know about them and why should cryptographers care?
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
On the impossibility of non-static quantum bit commitment between two parties
Quantum Information Processing
Universally composable quantum multi-party computation
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Practical quantum bit commitment protocol
Quantum Information Processing
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states
Quantum Information Processing
Hi-index | 0.00 |
We describe a complete protocol for bit commitment based on the transmission of polarized photons. We show that under the laws of quantum physics, this protocol cannot be cheated by either party except with exponentially small probability (exponential in the running time needed to implement the honest protocol). A more thorough analysis is required to adjust all the constants used in this paper to get the best performance from our construction. Better performances may probably be achieved by using a third conjugate transmission-reception basis of circular polarization.