Abstract

In this paper, we study relativistic bit commitment, which uses timing and location constraints to achieve information theoretic security. Using those constraints, we consider a relativistic bit commitment scheme introduced by Lunghi et al. This protocol was shown secure against classical adversaries as long as the number of rounds performed in the protocol is not too large. In this work, we study classical attacks on this scheme. We use the correspondence between this protocol and the CHSHQ game—which is a variant of the CHSH game—to derive cheating strategies for this protocol. Our attack matches the existing security bound for some range of parameters and shows that the scaling of the security in the number of rounds is essentially optimal.

Highlights

  • The security definitions for relativistic bit commitment are the ones we presented in the section above

  • We presented a cheating strategy for the FQ relativistic bit commitment protocol, which has recently become the most widely studied relativistic bit commitment protocol

  • We show that the security analysis presented in [21,22] is essentially tight, at least when Q is an even power of a prime

Read more

Summary

Context and State of the Art

The goal of relativistic cryptography is to exploit the no superluminal signaling (NSS) principle in order to perform various cryptographic tasks. NSS is more precise since it gives an upper bound on the speed at which such an influence can propagate Apart from this physical principle, we want to ensure information-theoretic security meaning that the proposed schemes cannot be attacked by any classical (nor quantum) computer, even with infinite computing power. Lunghi et al devised a multi-round bit commitment protocol involving only four agents, two for Alice and two for Bob [20] They managed to prove that this protocol, which we call the “FQ protocol” on, remains secure for several rounds, against classical attacks. No cheating strategy has been proposed for this scheme

Contributions
Bit Commitment
Relativistic Bit Commitment
The CHSHQ Game
Attack with Perfect Conditions
Symmetrization of the Protocol
Description of the Attack
Analysis
Generalization
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.