History
In 1997 and 1998, some important tasks in mistrustful cryptography were shown to be impossible to achieve with unconditional security. Mayers and Lo and Chau showed that unconditionally secure quantum bit commitment was impossible. Lo showed that oblivious transfer and a broad class of secure computations were also impossible to achieve with unconditional security in quantum cryptography. Moreover, Lo and Chau showed that unconditionally secure ideal quantum coin tossing was impossible too. In this context, Kent provided in 1999 the first relativistic cryptographic protocols, for bit commitment and ideal coin tossing, which overcome the assumptions made by Mayers, Lo and Chau, and achieve unconditional security. Since then, other unconditionally secure relativistic protocols for bit commitment have been found by Kent and others, and other cryptographic tasks have been investigated in the setting of relativistic quantum cryptography.Basics
No-signalling and no-superluminal signalling
The no-signalling principle ofThe setting
It is a fundamental requirement in relativistic cryptography that the parties implementing the cryptographic task have a good description ofTasks investigated in relativistic cryptography
Bit commitment
Coin tossing
In strong coin tossing, Alice and Bob are at different locations and they wish to toss a coin in such a way that Alice is guaranteed that Bob cannot bias the outcome, and Bob is guaranteed that Alice cannot bias the outcome either. It was shown by Lo and Chau that ideal strong coin tossing is impossible to achieve with unconditional security based only on the laws of quantum physics. However, Kent overcame this no-go theorem by providing a relativistic protocol for strong coin tossing that is unconditionally secure. This protocol is conceptually very simple and is illustrated here as an example of a protocol in relativistic cryptography. In Kent's coin tossing protocol, Alice has two agents ''A0'' and ''A1'', and Bob has two agents ''B0'' and ''B1''. ''Ai'' and ''Bi'' are at location ''Li'', for . Let ''L0'' and ''L1'' have a distant separation ''D''. Let us assume that spacetime is Minkowski. Thus, the minimum time that light takes to travel between ''L0'' and ''L1'' is ''t = D/c'', where ''c'' is the speed of light through vacuum. ''A0'' generates a random bit in a secure laboratory and gives it to ''B0'' at a time ''t0''. ''B1'' generates a random bit ''b'' in a secure laboratory and gives it to ''A1'' at a time ''t1''. ''B0'' and ''B1'' communicate and ''b'' through a secure and authenticated channel. Similarly, ''A0'' and ''A1'' communicate and ''b'' through a secure and authenticated channel. Alice and Bob agree that the output of the toss ''d'' is theOblivious transfer and secure computations
Lo showed that oblivious transfer and other secure computations cannot be achieved with unconditional security based only on the laws of quantum physics. This impossibility result by Lo extends to the more general setting of relativistic quantum cryptography. Colbeck showed that various secure computations are impossible to achieve with unconditional security in relativistic quantum cryptography.Position-based quantum cryptography
Position-based quantum cryptography consists in cryptographic tasks whose security exploit the location of a party, the principle of no-superluminal signalling and the laws of quantum physics. For example, in the problem of quantum location authentication, a prover wants to demonstrate his location ''L'' to a set of verifiers using quantum systems. A protocol for quantum location authentication works as follows. A set of verifiers at various locations that surround the location ''L'' send classical messages and quantum states towards the location ''L''. If the prover is at the location ''L'' then he can receive the signals at specific times and reply to the verifiers with requested classical messages and/or quantum states, which must be received by the verifiers at specific times. Quantum location authentication was first investigated by Kent in 2002, which he called ‘quantum tagging’, resulting in a filed US patent by Kent et al. in 2007, and a publication in the academic literature in 2010, after a paper on position-based quantum cryptography was published by Buhrman et al. There is a no-go theorem for quantum location authentication proved by Buhrman et al. stating that it is impossible for a set of verifiers to authenticate the location of a prover with unconditional security. This is because for any quantum location authentication protocol, a set of dishonest provers sharing a sufficient amount of entanglement and positioned between the verifiers and the location ''L'' can intercept all communications from the verifiers, including all transmitted quantum states, and then apply a non-local quantum operation which allows them to reply correctly and at the correct times to the verifiers. Since the dishonest provers do not need to be at the location ''L'' to do this, the quantum location authentication protocol is insecure. This no-go theorem assumes that the location ''L'' of the honest prover is his only credential. Kent showed that if the prover shares secret keys with the verifiers then location authentication can be implemented securely.References
{{reflist, 30em, refs= {{cite journal , doi = 10.1103/PhysRevLett.78.3414 , last = Mayers , first = Dominic , date = 1997 , title = Unconditionally Secure Quantum Bit Commitment is Impossible , journal = Physical Review Letters , volume = 78 , issue = 17 , pages = 3414–3417 , bibcode=1997PhRvL..78.3414M , arxiv = quant-ph/9605044 , citeseerx = 10.1.1.251.5550 , s2cid = 14522232 {{cite journal , doi = 10.1103/PhysRevLett.78.3410 , last1 = Lo , first1 = Hoi-Kwong , last2 = Chau , first2 = H. F. , date = 1997 , title = Is Quantum Bit Commitment Really Possible? , journal = Physical Review Letters , volume = 78 , issue = 17 , pages = 3410–3413 , arxiv = quant-ph/9603004, bibcode = 1997PhRvL..78.3410L , s2cid = 3264257 {{cite journal , doi = 10.1103/PhysRevA.56.1154 , last = Lo , first = Hoi-Kwong , date = 1997 , title = Insecurity of quantum secure computations , journal = Physical Review A , volume = 56 , issue = 2 , pages = 1154–1162 , arxiv = quant-ph/9611031, bibcode = 1997PhRvA..56.1154L , s2cid = 17813922 {{cite journal , doi = 10.1016/S0167-2789(98)00053-0 , last1 = Lo , first1 = Hoi-Kwong , last2 = Chau , first2 = H. F. , date = 1998 , title = Why quantum bit commitment and ideal quantum coin tossing are impossible , journal = Physica D: Nonlinear Phenomena , volume = 120 , issue = 1–2 , pages = 177–187 , arxiv = quant-ph/9711065, bibcode = 1998PhyD..120..177L , s2cid = 14378275 {{cite journal , doi = 10.1103/PhysRevLett.83.1447 , last = Kent , first = Adrian , date = 1999 , title = Unconditionally Secure Bit Commitment , journal = Physical Review Letters , volume = 83 , issue = 7 , pages = 1447–1450 , arxiv = quant-ph/9810068, bibcode = 1999PhRvL..83.1447K , s2cid = 8823466 {{cite journal , doi = 10.1103/PhysRevLett.83.5382 , last = Kent , first = Adrian , date = 1999 , title = Coin Tossing is Strictly Weaker than Bit Commitment , journal = Physical Review Letters , volume = 83 , issue = 25 , pages = 5382–5384 , arxiv = quant-ph/9810067, bibcode = 1999PhRvL..83.5382K , s2cid = 16764407 {{cite journal , doi = 10.1007/s00145-005-0905-8 , last = Kent , first = Adrian , date = 2005 , title = Secure Classical Bit Commitment Using Fixed Capacity Communication Channels , journal = Journal of Cryptology , volume = 18 , issue = 4 , pages = 313–335 , arxiv = quant-ph/9906103, s2cid = 9732039 {{cite journal , doi = 10.1088/1367-2630/13/11/113015 , last = Kent , first = Adrian , date = 2011 , title = Unconditionally secure bit commitment with flying qudits , journal = New Journal of Physics , volume = 13 , issue = 11 , pages = 113015 , arxiv = 1101.4620, bibcode = 2011NJPh...13k3015K , s2cid = 12472004 {{cite journal , doi = 10.1103/PhysRevLett.109.130501 , last = Kent , first = Adrian , date = 2012 , title = Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes , journal = Physical Review Letters , volume = 109 , issue = 13 , pages = 130501 , pmid = 23030073 , arxiv = 1108.2879, bibcode = 2012PhRvL.109m0501K , s2cid = 15681144 {{cite journal , doi = 10.1103/PhysRevA.92.022315 , last1 = Adlam , first1 = Emily , last2 = Kent , first2 = Adrian , date = 2015 , title = Device-independent relativistic quantum bit commitment , journal = Physical Review A , volume = 92 , issue = 2 , pages = 022315 , arxiv = 1504.00944, bibcode = 2015PhRvA..92b2315A , s2cid = 16654172 {{cite journal , doi = 10.1103/PhysRevLett.115.030502 , last1 = Lunghi , first1 = T. , last2 = Kaniewski , first2 = J. , last3 = Bussières , first3 = F. , last4 = Houlmann , first4 = R. , last5 = Tomamichel , first5 = M. , last6 = Wehner , first6 = S. , last7 = Zbinden , first7 = H. , year = 2016 , title = Practical Relativistic Bit Commitment , journal = Physical Review Letters , volume = 115 , issue = 3 , pages = 030502 , pmid = 26230775 , arxiv = 1608.03398, s2cid = 20797497 {{Cite journal , arxiv = 1008.2147, last1 = Kent, first1 = A., title = Quantum Tagging: Authenticating location via quantum information and relativistic signalling constraints, journal = Physical Review A, volume = 84, issue = 1, pages = 012326, last2 = Munro, first2 = William J., last3 = Spiller, first3 = Timothy P., year = 2011, doi = 10.1103/PhysRevA.84.012326, bibcode = 2011PhRvA..84a2326K, s2cid = 1042757 {{cite patent , country=US , number=7075438, inventor1-first = A., inventor1-last = Kent, inventor2-first = W., inventor2-last = Munro, inventor3-first = T., inventor3-last = Spiller , inventor4-first = R., inventor4-last = Beausoleil, pubdate=2006-07-11, title=Tagging systems {{Cite journal , arxiv = 1009.2490, last1 = Buhrman, first1 = Harry, title = Position-Based Quantum Cryptography: Impossibility and Constructions, journal = SIAM Journal on Computing, volume = 43, issue = 1, pages = 150–178, last2 = Chandran, first2 = Nishanth, last3 = Fehr, first3 = Serge, last4 = Gelles, first4 = Ran, last5 = Goyal, first5 = Vipul, last6 = Ostrovsky, first6 = Rafail, last7 = Schaffner, first7 = Christian, year = 2014, doi = 10.1137/130913687, s2cid = 220613220 {{ Cite thesis , last=Colbeck , first=Roger , title=Quantum And Relativistic Protocols For Secure Multi-Party Computation , arxiv=0911.3814, date=December 2006 , publisher=University of Cambridge {{cite journal , doi = 10.1088/0264-9381/29/22/224013 , last = Kent , first = Adrian , date = 2012 , title = Quantum tasks in Minkowski space , journal = Classical and Quantum Gravity , volume = 29 , issue = 22 , pages = 224013 , arxiv = 1204.4022, bibcode = 2012CQGra..29v4013K , s2cid = 55127845 {{cite journal , doi = 10.1103/PhysRevLett.111.180504 , last1 = Lunghi , first1 = T. , last2 = Kaniewski , first2 = J. , last3 = Bussières , first3 = J. , last4 = Houlmann , first4 = R. , last5 = Tomamichel , first5 = M. , last6 = Kent , first6 = A. , last7 = Gisin , first7 = N. , last8 = Wehner , first8 = S. , last9 = Zbinden , first9 = H. , date = 2013 , title = Experimental Bit Commitment Based on Quantum Communication and Special Relativity , journal = Physical Review Letters , volume = 111 , issue = 18 , pages = 180504 , pmid = 24237497 , arxiv = 1306.4801, bibcode = 2013PhRvL.111r0504L , s2cid = 15916727 {{cite journal , doi = 10.1103/PhysRevLett.112.010504 , last1 = Liu , first1 = Yang , last2 = Cao , first2 = Yuan , last3 = Curty , first3 = Marcos , last4 = Liao , first4 = Sheng-Kai , last5 = Wang , first5 = Jian , last6 = Cui , first6 = Ke , last7 = Li , first7 = Yu-Huai , last8 = Lin , first8 = Ze-Hong , last9 = Sun , first9 = Qi-Chao , last10 = Li , first10 = Dong-Dong , last11 = Zhang , first11 = Hong-Fei , last12 = Zhao , first12 = Yong , last13 = Chen , first13 = Teng-Yun , last14 = Peng , first14 = Cheng-Zhi , last15 = Zhang , first15 = Qiang , last16 = Cabello , first16 = Adán , last17 = Pan , first17 = Jian-Wei , date = 2014 , title = Experimental Unconditionally Secure Bit Commitment , journal = Physical Review Letters , volume = 112 , issue = 1 , pages = 010504 , pmid = 24483878 , arxiv = 1306.4413, bibcode = 2014PhRvL.112a0504L , s2cid = 31546945 {{cite journal , doi = 10.1103/PhysRevLett.117.140506 , last1 = Verbanis , first1 = Ephanielle , last2 = Martin , first2 = Anthony , last3 = Houlmann , first3 = Raphaël , last4 = Boso , first4 = Gianluca , last5 = Bussières , first5 = Félix , last6 = Zbinden , first6 = Hugo , date = 2016 , title = 24-Hour Relativistic Bit Commitment , journal = Physical Review Letters , volume = 117 , issue = 14 , pages = 140506 , pmid = 27740788 , arxiv = 1605.07442, bibcode = 2016PhRvL.117n0506V , s2cid = 1992228 {{cite journal , doi = 10.1103/PhysRevA.73.032320 , last1 = Colbeck , first1 = Roger , last2 = Kent , first2 = Adrian , title = Variable-bias coin tossing , journal = Physical Review A , date = 2006 , volume = 73 , issue = 3 , pages = 032320 , arxiv = quant-ph/0508149, bibcode = 2006PhRvA..73c2320C , s2cid = 10583364 {{cite journal , doi = 10.1103/PhysRevA.76.062308 , last = Colbeck , first = Roger , title = Impossibility of secure two-party classical computation , journal = Physical Review A , date = 2007 , volume = 76 , issue = 6 , pages = 062308 , arxiv = 0708.2843, bibcode = 2007PhRvA..76f2308C , s2cid = 18745956 {{cite journal , doi = 10.1103/PhysRevA.84.022335 , last = Kent , first = Adrian , title = Quantum tagging for tags containing secret classical data , journal = Physical Review A , volume = 84 , date = 2011 , issue = 2 , pages = 022335 , arxiv = 1008.5380, bibcode = 2011PhRvA..84b2335K , s2cid = 17776740 {{cite journal , doi = 10.1103/PhysRevA.84.012328 , last = Kent , first = Adrian , title = Location-oblivious data transfer with flying entangled qudits , journal = Physical Review A , date = 2011 , volume = 84 , issue = 1 , pages = 012328 , arxiv = 1102.2816, bibcode = 2011PhRvA..84a2328K , s2cid = 14751282 Quantum information science Quantum cryptography