Experimental Unconditionally Secure Bit Commitment

被引:46
作者
Liu, Yang [1 ,2 ]
Cao, Yuan [1 ,2 ]
Curty, Marcos [3 ]
Liao, Sheng-Kai [1 ,2 ]
Wang, Jian [1 ,2 ]
Cui, Ke [1 ,2 ]
Li, Yu-Huai [1 ,2 ]
Lin, Ze-Hong [1 ,2 ]
Sun, Qi-Chao [1 ,2 ]
Li, Dong-Dong [1 ,2 ]
Zhang, Hong-Fei [1 ,2 ]
Zhao, Yong [1 ,2 ,4 ]
Chen, Teng-Yun [1 ,2 ]
Peng, Cheng-Zhi [1 ,2 ]
Zhang, Qiang [1 ,2 ]
Cabello, Adan [5 ]
Pan, Jian-Wei [1 ,2 ]
机构
[1] Univ Sci & Technol China, Shanghai Branch, Hefei Natl Lab Phys Sci Microscale, Hefei 230026, Anhui, Peoples R China
[2] Univ Sci & Technol China, Dept Modern Phys, Hefei 230026, Anhui, Peoples R China
[3] Univ Vigo, Dept Signal Theory & Commun, E-36310 Vigo, Spain
[4] Shandong Inst Quantum Sci & Technol Co Ltd, Jinan 250101, Shandong, Peoples R China
[5] Univ Seville, Dept Fis Aplicada 2, E-41012 Seville, Spain
关键词
Optical communication - Quantum cryptography - Quantum optics - Relativity;
D O I
10.1103/PhysRevLett.112.010504
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum physics allows for unconditionally secure communication between parties that trust each other. However, when the parties do not trust each other such as in the bit commitment scenario, quantum physics is not enough to guarantee security unless extra assumptions are made. Unconditionally secure bit commitment only becomes feasible when quantum physics is combined with relativistic causality constraints. Here we experimentally implement a quantum bit commitment protocol with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. The security of the protocol relies on the properties of quantum information and relativity theory. In each run of the experiment, a bit is successfully committed with less than 5.68 x 10(-2) cheating probability. This demonstrates the experimental feasibility of quantum communication with relativistic constraints.
引用
收藏
页数:5
相关论文
共 23 条
[1]  
[Anonymous], 1996, P 4 WORKSH PHYS COMP
[2]  
[Anonymous], P 29 ANN INT C THEOR
[3]  
[Anonymous], P 4 WORKSH PHYS COMP
[4]  
[Anonymous], LECT NOTES COMPUT SC
[5]  
[Anonymous], SPRING COMPCON 82 HI
[6]  
[Anonymous], P 11 ANN INT CRYPT C
[7]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[8]   Reexamination of quantum bit commitment: The possible and the impossible [J].
D'Ariano, Giacomo Mauro ;
Kretschmann, Dennis ;
Schlingemann, Dirk ;
Werner, Reinhard F. .
PHYSICAL REVIEW A, 2007, 76 (03)
[9]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[10]  
Goldreich Oded., 1986, Proc. 27th IEEE Symposium on Foundations of Computer Science (FOCS), P174