The physics of no-bit-commitment : Generalized quantum non-locality versus oblivious transfer

Tony Short,Nicolas Gisin,Sandu Popescu
DOI: https://doi.org/10.48550/arXiv.quant-ph/0504134
2005-04-19
Abstract:We show here that the recent work of Wolf and Wullschleger (<a class="link-https" data-arxiv-id="quant-ph/0502030" href="https://arxiv.org/abs/quant-ph/0502030">quant-ph/0502030</a>) on oblivious transfer apparently opens the possibility that non-local correlations which are stronger than those in quantum mechanics could be used for bit-commitment. This is surprising, because it is the very existence of non-local correlations which in quantum mechanics prevents bit-commitment. We resolve this apparent paradox by stressing the difference between non-local correlations and oblivious transfer, based on the time-ordering of their inputs and outputs, which prevents bit-commitment.
Quantum Physics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: **Explore whether a secure bit - commitment protocol can be achieved within the framework of using non - local correlations, especially when these non - local correlations are stronger than those in quantum mechanics**. ### Background and Problem Description 1. **The Impossibility of Quantum Bit - Commitment** - In quantum mechanics, due to the existence of entangled states, it is impossible to implement an unconditionally secure bit - commitment protocol. Specifically, Alice can deceive Bob by using entangled states. - This result was proved by Mayers, Lo, Chau, etc., who showed that any quantum bit - commitment scheme can be broken by Alice in some way. 2. **Non - local Correlations and PR - boxes** - Popescu and Rohrlich proposed the concept of PR - boxes, which is a theoretical model with stronger non - local correlations than those in quantum mechanics. PR - boxes can provide stronger non - local correlations without violating the theory of relativity. - Wolf and Wullschleger further showed how to use PR - boxes to simulate a cryptographic primitive called "one - out - of - two oblivious transfer (OT)". 3. **OT - boxes and Bit - Commitment** - It is known that OT - boxes can be used to implement secure bit - commitment protocols. Therefore, if PR - boxes can simulate OT - boxes, then theoretically, bit - commitment can also be implemented with PR - boxes. ### The Core Problem of the Paper - **The Main Contradiction**: Although PR - boxes can simulate the output of OT - boxes, can this simulation maintain all the properties of OT - boxes, especially security? - **The Importance of Temporal Order**: There are essential differences in the temporal order of input and output between OT - boxes and PR - boxes. OT - boxes require that Bob can only obtain the output after Alice has input, while PR - boxes have no such restriction, which allows Alice to input at any time, thus undermining the security of the protocol. ### Conclusion - Through detailed analysis, the paper points out that although PR - boxes can simulate the output of OT - boxes, due to their differences in temporal order, PR - boxes cannot achieve secure bit - commitment. - Specifically, Alice can perform the measurement only in the revealing phase instead of in the commitment phase, which breaks the binding property, allowing Alice to change her committed value arbitrarily without being detected. ### Summary The main contribution of this paper lies in clarifying the relationship between non - local correlations (especially PR - boxes) and bit - commitment, emphasizing the importance of temporal order in the design of secure protocols, and explaining why unconditionally secure bit - commitment cannot be achieved even in the framework of stronger non - local correlations. \[ \text{Formula Examples:} \] - The non - local correlation form of PR - boxes is: \[ a\oplus b = xy \] where \(a\) and \(b\) are the outputs of Alice and Bob respectively, and \(x\) and \(y\) are their inputs. - The correctness and privacy requirements of the bit - commitment protocol: 1. **Correctness**: If both Alice and Bob are honest, then Bob will eventually know the bit value committed by Alice. 2. **Privacy**: Before the revealing phase, Bob cannot know Alice's committed value. 3. **Binding**: Once the commitment phase is over, Alice cannot change her committed value. Through these analyses, the paper reveals the essential characteristics of non - local correlations and their impact on cryptographic protocols.