Search

Search results

  1. Bit commitment

    Bit commitment is a protocol between two mistrusting parties, Alice and ... to reveal the value X to Bob. The functionality of a bit commitment protocol can be compared with that of a safe as follows: To ... key to Bob who opens the safe and reads the value of X. Bit commitment is an important cryptographic primitive as it can be used as a ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  2. Is quantum bit commitment really impossible?

    ... (not just taking others' conclusions for granted) on quantum bit commitment (QBC) can share your opinion here. In fact I proposed a QBC ...

    Forum topic - Gphe - 26/10/2015 - 17:08 - 0 comments

  3. Coin tossing

    ... A generic example of a coin tossing protocol is based on bit commitment . Alice first chooses a random bit r 1 and then uses the bit commitment scheme to commit to this bit. Bob then chooses another random ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  4. Oblivious transfer

    ... multiparty computation protocol (including, e.g., bit commitment ). It exists various versions of OT primitives, whose ... came up with a quantum protocol for realizing OT (and bit commitment) which is secure under the sole assumption that the adversary ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  5. Communication protocols between mistrustful parties

    ... parties. Typical examples for such protocols are bit commitment , coin tossing , oblivious transfer , or, more generally, ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  6. Quantum cryptography

    ... effort to realize other cryptographic tasks such as bit commitment . Unfortunately, it turned out that quantum mechanics is not as ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  7. Strong coin tossing

    ... have been introduced to achieve this. One is based on bit commitment, the other on sharing entanglement. For weak coin tossing, ... The security of such a protocol is only as strong as the bit commitment on which it is based. Bounds on the possible biases achievable ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  8. “Quantum Computing and Programming Workshop”

    Tags:  QBronze79 QPoland QIreland QWorld QAIF Post date:  Monday, February 28, 2022 - 17:05 Dates:  Monday, March 7, 2022 to Friday, March 11, 2022 Organising...

    Conference - pgora - 28/02/2022 - 17:13 - 0 comments