Quantum bit commitment on IBM QX

被引:4
|
作者
Almubayedh, Dhoha A. [1 ]
Alazman, Ghadeer [1 ]
Alkhalis, Mashael [1 ]
Alabdali, Manal [1 ]
Nagy, Naya [1 ]
Nagy, Marius [2 ]
Tatar, Ahmet Emin [3 ]
Alfosail, Malak [1 ]
Rahman, Atta [1 ]
AlMubairik, Norah [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & IT, Dept Comp Sci, POB 1982, Dammam, Saudi Arabia
[2] Prince Mohammad Bin Fahd Univ, Dept Comp Engn & Sci, Al Khobar, Saudi Arabia
[3] King Fahd Univ Petr & Minerals, Math & Stat Dept, Dhahran, Saudi Arabia
关键词
Quantum; Quantum cryptography; Quantum bit commitment; IBM QX; Real quantum processor;
D O I
10.1007/s11128-019-2543-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum bit commitment (QBC) is a quantum version of the classical bit commitment security primitive. As other quantum security primitives and protocols, QBC improves on cheating detection over its classical counterpart. The implementation of the QBC protocol below relies on the use of common quantum gates: the Hadamard gate used for orthonormal bases and the CNOT gate used to swap qubits. The protocol was run and tested on IBM quantum experience (IBM QX). IBM QX offers two different quantum environments: as a simulator and as a real quantum machine. In our implementation, honest and dishonest participants were considered. Results of both the simulation and the quantum execution were compared against the theoretical expectations. The IBM QX simulator gives results that match the theoretical model. The IBM QX real computer deviates from the expected behavior by a measurable amount. Using the standard deviation and the Hamming distance, the conclusion is that the quantum computer is usable as the difference to the simulator is within an acceptable margin of error. The QBC protocol of choice is fully secure against cheating by Bob. The only way Alice can cheat is using multi-dimensional entanglement. The cost for Alice to cheat is exponential in the number of qubits used, namely O(2(6n+3k+1)).
引用
收藏
页数:27
相关论文
共 50 条
  • [31] An Arbitrarily Concealing and Practically Binding Quantum Bit Commitment Protocol
    Sun, Xin
    Wang, Quanlong
    He, Feifei
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (11) : 3464 - 3475
  • [32] Quantum Bit Commitment Combining with BB84 Protocol
    Zhang, Linxi
    Zhu, Changhua
    Zhao, Nan
    Pei, Changxing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 291 - 298
  • [33] Unconditionally secure quantum bit commitment based on the uncertainty principle
    He, Guang Ping
    PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2019, 475 (2222):
  • [34] TWO-WAY QUANTUM-BIT-STRING COMMITMENT
    Li, Chuan-Ming
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2010, 24 (10): : 1245 - 1252
  • [35] Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function
    Huang, Weicong
    Guang, Qisheng
    Jiang, Dong
    Chen, Lijun
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2021, 2022, 441 : 127 - 138
  • [36] Unconditionally Secure Quantum Bit Commitment Protocol Based on Incomplete Information
    Nagy, Naya
    Nagy, Marius
    THEORY AND PRACTICE OF NATURAL COMPUTING (TPNC 2014), 2014, 8890 : 134 - 143
  • [37] A Secured Quantum Two-Bit Commitment Protocol for Communication Systems
    Khawasik, Manal
    Elsayed, Wagdy
    Rashad, Magdi
    Younes, Ahmed
    IEEE ACCESS, 2022, 10 : 50218 - 50226
  • [38] PHYSICAL LIMITATIONS OF QUANTUM CRYPTOGRAPHIC PRIMITIVES OR OPTIMAL BOUNDS FOR QUANTUM COIN FLIPPING AND BIT COMMITMENT
    Chailloux, Andre
    Kerenidis, Iordanis
    SIAM JOURNAL ON COMPUTING, 2017, 46 (05) : 1647 - 1677
  • [39] Cheat sensitive quantum bit commitment via pre- and post-selected quantum states
    Yan-Bing Li
    Qiao-Yan Wen
    Zi-Chen Li
    Su-Juan Qin
    Ya-Tao Yang
    Quantum Information Processing, 2014, 13 : 141 - 149
  • [40] Cheat sensitive quantum bit commitment via pre- and post-selected quantum states
    Li, Yan-Bing
    Wen, Qiao-Yan
    Li, Zi-Chen
    Qin, Su-Juan
    Yang, Ya-Tao
    QUANTUM INFORMATION PROCESSING, 2014, 13 (01) : 141 - 149