967 research outputs found
Coin Tossing is Strictly Weaker Than Bit Commitment
We define cryptographic assumptions applicable to two mistrustful parties who
each control two or more separate secure sites between which special relativity
guarantees a time lapse in communication. We show that, under these
assumptions, unconditionally secure coin tossing can be carried out by
exchanges of classical information. We show also, following Mayers, Lo and
Chau, that unconditionally secure bit commitment cannot be carried out by
finitely many exchanges of classical or quantum information. Finally we show
that, under standard cryptographic assumptions, coin tossing is strictly weaker
than bit commitment. That is, no secure classical or quantum bit commitment
protocol can be built from a finite number of invocations of a secure coin
tossing black box together with finitely many additional information exchanges.Comment: Final version; to appear in Phys. Rev. Let
Unconditionally Secure Bit Commitment
We describe a new classical bit commitment protocol based on cryptographic
constraints imposed by special relativity. The protocol is unconditionally
secure against classical or quantum attacks. It evades the no-go results of
Mayers, Lo and Chau by requiring from Alice a sequence of communications,
including a post-revelation verification, each of which is guaranteed to be
independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev.
Let
A deterministic cavity-QED source of polarization entangled photon pairs
We present two cavity quantum electrodynamics proposals that, sharing the
same basic elements, allow for the deterministic generation of entangled
photons pairs by means of a three-level atom successively coupled to two single
longitudinal mode high-Q optical resonators presenting polarization degeneracy.
In the faster proposal, the three-level atom yields a polarization entangled
photon pair via two truncated Rabi oscillations, whereas in the adiabatic
proposal a counterintuitive Stimulated Raman Adiabatic Passage process is
considered. Although slower than the former process, this second method is very
efficient and robust under fluctuations of the experimental parameters and,
particularly interesting, almost completely insensitive to atomic decay.Comment: 5 pages, 5 figure
Unconditionally secure quantum bit commitment is impossible
The claim of quantum cryptography has always been that it can provide
protocols that are unconditionally secure, that is, for which the security does
not depend on any restriction on the time, space or technology available to the
cheaters. We show that this claim does not hold for any quantum bit commitment
protocol. Since many cryptographic tasks use bit commitment as a basic
primitive, this result implies a severe setback for quantum cryptography. The
model used encompasses all reasonable implementations of quantum bit commitment
protocols in which the participants have not met before, including those that
make use of the theory of special relativity.Comment: 4 pages, revtex. Journal version replacing the version published in
the proceedings of PhysComp96. This is a significantly improved version which
emphasis the generality of the resul
Is Quantum Bit Commitment Really Possible?
We show that all proposed quantum bit commitment schemes are insecure because
the sender, Alice, can almost always cheat successfully by using an
Einstein-Podolsky-Rosen type of attack and delaying her measurement until she
opens her commitment.Comment: Major revisions to include a more extensive introduction and an
example of bit commitment. Overlap with independent work by Mayers
acknowledged. More recent works by Mayers, by Lo and Chau and by Lo are also
noted. Accepted for publication in Phys. Rev. Let
Higher Security Thresholds for Quantum Key Distribution by Improved Analysis of Dark Counts
We discuss the potential of quantum key distribution (QKD) for long distance
communication by proposing a new analysis of the errors caused by dark counts.
We give sufficient conditions for a considerable improvement of the key
generation rates and the security thresholds of well-known QKD protocols such
as Bennett-Brassard 1984, Phoenix-Barnett-Chefles 2000, and the six-state
protocol. This analysis is applicable to other QKD protocols like Bennett 1992.
We examine two scenarios: a sender using a perfect single-photon source and a
sender using a Poissonian source.Comment: 6 pages, 2 figures, v2: We obtained better results by using reverse
reconciliation as suggested by Nicolas Gisi
Experimental quantum tossing of a single coin
The cryptographic protocol of coin tossing consists of two parties, Alice and
Bob, that do not trust each other, but want to generate a random bit. If the
parties use a classical communication channel and have unlimited computational
resources, one of them can always cheat perfectly. Here we analyze in detail
how the performance of a quantum coin tossing experiment should be compared to
classical protocols, taking into account the inevitable experimental
imperfections. We then report an all-optical fiber experiment in which a single
coin is tossed whose randomness is higher than achievable by any classical
protocol and present some easily realisable cheating strategies by Alice and
Bob.Comment: 13 page
Location-Oblivious Data Transfer with Flying Entangled Qudits
We present a simple and practical quantum protocol involving two mistrustful
agencies in Minkowski space, which allows Alice to transfer data to Bob at a
spacetime location that neither can predict in advance. The location depends on
both Alice's and Bob's actions. The protocol guarantees unconditionally to
Alice that Bob learns the data at a randomly determined location; it guarantees
to Bob that Alice will not learn the transfer location even after the protocol
is complete.
The task implemented, transferring data at a space-time location that remains
hidden from the transferrer, has no precise analogue in non-relativistic
quantum cryptography. It illustrates further the scope for novel cryptographic
applications of relativistic quantum theory.Comment: References updated. Published versio
Does Social Presence or the Potential for Interaction reduce Social Gaze in Online Social Scenarios? Introducing the "Live Lab" paradigm.
Research has shown that people’s gaze is biased away from faces in the real-world but
towards them when they are viewed onscreen. Non-equivalent stimulus conditions may have
represented a confound in this research however, as participants viewed onscreen stimuli as
pre-recordings where interaction was not possible, compared to real-world stimuli which
were viewed in real-time where interaction was possible. We assessed the independent
contributions of online social presence and ability for interaction on social gaze by
developing the “live lab” paradigm. Participants in three groups (N = 132) viewed a
confederate either as a) a live webcam stream where interaction was not possible (one-way),
b) a live webcam stream where an interaction was possible (two-way) or c) as a prerecording.
Potential for interaction, rather than online social presence, was the primary
influence on gaze behaviour: Participants in the pre-recorded and one-way conditions looked
more to the face than those in the two-way condition, particularly when the confederate made
“eye contact”. Fixation durations to the face were shorter when the scene was viewed live,
particularly during a bid for eye contact
Our findings support the dual function of gaze, but suggest that online social presence alone
is not sufficient to activate social norms of civil inattention. Implications for the
reinterpretation of previous research are discussed
- …