Quantum bit commitment on IBM QX

被引:4
|
作者
Almubayedh, Dhoha A. [1 ]
Alazman, Ghadeer [1 ]
Alkhalis, Mashael [1 ]
Alabdali, Manal [1 ]
Nagy, Naya [1 ]
Nagy, Marius [2 ]
Tatar, Ahmet Emin [3 ]
Alfosail, Malak [1 ]
Rahman, Atta [1 ]
AlMubairik, Norah [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & IT, Dept Comp Sci, POB 1982, Dammam, Saudi Arabia
[2] Prince Mohammad Bin Fahd Univ, Dept Comp Engn & Sci, Al Khobar, Saudi Arabia
[3] King Fahd Univ Petr & Minerals, Math & Stat Dept, Dhahran, Saudi Arabia
关键词
Quantum; Quantum cryptography; Quantum bit commitment; IBM QX; Real quantum processor;
D O I
10.1007/s11128-019-2543-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum bit commitment (QBC) is a quantum version of the classical bit commitment security primitive. As other quantum security primitives and protocols, QBC improves on cheating detection over its classical counterpart. The implementation of the QBC protocol below relies on the use of common quantum gates: the Hadamard gate used for orthonormal bases and the CNOT gate used to swap qubits. The protocol was run and tested on IBM quantum experience (IBM QX). IBM QX offers two different quantum environments: as a simulator and as a real quantum machine. In our implementation, honest and dishonest participants were considered. Results of both the simulation and the quantum execution were compared against the theoretical expectations. The IBM QX simulator gives results that match the theoretical model. The IBM QX real computer deviates from the expected behavior by a measurable amount. Using the standard deviation and the Hamming distance, the conclusion is that the quantum computer is usable as the difference to the simulator is within an acceptable margin of error. The QBC protocol of choice is fully secure against cheating by Bob. The only way Alice can cheat is using multi-dimensional entanglement. The cost for Alice to cheat is exponential in the number of qubits used, namely O(2(6n+3k+1)).
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Game theoretic security of quantum bit commitment
    Zhou, Lu
    Sun, Xin
    Su, Chunhua
    Liu, Zhe
    Choo, Kim-Kwang Raymond
    INFORMATION SCIENCES, 2019, 479 : 503 - 514
  • [22] Hybrid Hadamard and controlled-Hadamard based quantum random number generators in IBM QX
    Salehi, Ramin
    Razaghi, Mohammad
    Fotouhi, Bashir
    PHYSICA SCRIPTA, 2022, 97 (06)
  • [23] Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
    Song, Yaqi
    Yang, Li
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [24] Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof
    Yan, Jun
    Weng, Jian
    Lin, Dongdai
    Quan, Yujuan
    ALGORITHMS AND COMPUTATION, ISAAC 2015, 2015, 9472 : 555 - 565
  • [25] Erasable bit commitment from temporary quantum trust
    Lütkenhaus N.
    Marwah A.
    Touchette D.
    IEEE Journal on Selected Areas in Information Theory, 2020, 1 (02): : 536 - 554
  • [26] On the impossibility of non-static quantum bit commitment between two parties
    Li, Qin
    Li, Chengqing
    Long, Dongyang
    Chan, W. H.
    Wu, Chunhui
    QUANTUM INFORMATION PROCESSING, 2012, 11 (02) : 519 - 527
  • [27] Implementation of a two-state quantum bit commitment protocol in optical fibers
    Almeida, A. J.
    Stojanovic, A. D.
    Paunkovic, N.
    Loura, R.
    Muga, N. J.
    Silva, N. A.
    Mateus, P.
    Andre, P. S.
    Pinto, A. N.
    JOURNAL OF OPTICS, 2016, 18 (01)
  • [28] On the impossibility of non-static quantum bit commitment between two parties
    Qin Li
    Chengqing Li
    Dongyang Long
    W. H. Chan
    Chunhui Wu
    Quantum Information Processing, 2012, 11 : 519 - 527
  • [29] An Arbitrarily Concealing and Practically Binding Quantum Bit Commitment Protocol
    Xin Sun
    Quanlong Wang
    Feifei He
    International Journal of Theoretical Physics, 2020, 59 : 3464 - 3475
  • [30] Quantum bit commitment with cheat sensitive binding and approximate sealing
    Li, Yan-Bing
    Xu, Sheng-Wei
    Huang, Wei
    Wan, Zong-Jie
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2015, 48 (13)