Degrees of concealment and bindingness in quantum bit commitment protocols

R. W. Spekkens,T. Rudolph
DOI: https://doi.org/10.1103/PhysRevA.65.012310
2002-11-14
Abstract:Although it is impossible for a bit commitment protocol to be both arbitrarily concealing and arbitrarily binding, it is possible for it to be both partially concealing and partially binding. This means that Bob cannot, prior to the beginning of the unveiling phase, find out everything about the bit committed, and Alice cannot, through actions taken after the end of the commitment phase, unveil whatever bit she desires. We determine upper bounds on the degrees of concealment and bindingness that can be achieved simultaneously in any bit commitment protocol, although it is unknown whether these can be saturated. We do, however, determine the maxima of these quantities in a restricted class of bit commitment protocols, namely those wherein all the systems that play a role in the commitment phase are supplied by Alice. We show that these maxima can be achieved using a protocol that requires Alice to prepare a pair of systems in an entangled state, submit one of the pair to Bob at the commitment phase, and the other at the unveiling phase. Finally, we determine the form of the trade-off that exists between the degree of concealment and the degree of bindingness given various assumptions about the purity and dimensionality of the states used in the protocol.
Quantum Physics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to determine the optimal degree of concealment and binding that can be simultaneously achieved in quantum bit - commitment protocols. Specifically: 1. **Problem Background**: - Bit Commitment (BC) is a cryptographic primitive involving two distrusting parties (Alice and Bob). - Alice wishes to submit an encoded bit of information to Bob such that Bob cannot reliably identify this bit before Alice decodes it, and Alice cannot reliably change this bit after submission. - It is known that a completely concealable and completely binding BC protocol is impossible to achieve. 2. **Research Objectives**: - This paper aims to determine the maximum concealment and maximum binding that can be simultaneously achieved in quantum bit - commitment protocols. - Specifically, the author hopes to find the optimal trade - off relationship between concealment and binding in these protocols and determine whether there are specific protocols that can reach these optimal values. 3. **Main Contributions**: - The paper establishes the upper bounds of concealment and binding in all BC protocols. - For a restricted class of BC protocols (i.e., BC protocols provided by Alice), the author finds the optimal trade - off relationship between concealment and binding. - A new BC protocol - the purified BC protocol - is proposed, which can achieve optimal concealment and binding in the restricted class. 4. **Key Concepts**: - **Concealment**: Measures the degree to which Bob cannot accurately estimate the bit committed by Alice before the unveiling stage. - **Bindingness**: Measures the degree to which Alice cannot casually unveil any bit after submission. - **Maximum Information Gain (\(G_{\text{max}}\))**: The maximum difference between the probability that Bob estimates the bit committed by Alice through a certain strategy and the probability when he behaves honestly. - **Maximum Control (\(C_{\text{max}}\))**: The maximum difference between the probability that Alice unveils the bit she wants through a certain strategy and the probability when she behaves honestly. 5. **Mathematical Expressions**: - Bob's maximum information gain is defined as: \[ G_{\text{max}}=\max_{S_B}G(S_B) \] - Alice's maximum control is defined as: \[ C_{\text{max}}=\max_{S_A}C(S_A) \] 6. **Conclusions**: - For all BC protocols, there is a lower - bound curve of concealment and binding, satisfying: \[ 2G_{\text{max}}+\sqrt{2}C_{\text{max}}\geq1 \] - For BC protocols provided by Alice, the optimal trade - off relationship between concealment and binding is: \[ G_{\text{max}}+C_{\text{max}}=\frac{1}{2} \] Through these studies, the paper provides an important theoretical basis for the security and performance of quantum bit - commitment protocols.