TY - JOUR
T1 - Quantum bit commitment on IBM QX
AU - Almubayedh, Dhoha A.
AU - Alazman, Ghadeer
AU - Alkhalis, Mashael
AU - Alabdali, Manal
AU - Nagy, Naya
AU - Nagy, Marius
AU - Tatar, Ahmet Emin
AU - Alfosail, Malak
AU - Rahman, Atta
AU - AlMubairik, Norah
N1 - Publisher Copyright:
© 2019, Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2020/2/1
Y1 - 2020/2/1
N2 - Quantum bit commitment (QBC) is a quantum version of the classical bit commitment security primitive. As other quantum security primitives and protocols, QBC improves on cheating detection over its classical counterpart. The implementation of the QBC protocol below relies on the use of common quantum gates: the Hadamard gate used for orthonormal bases and the CNOT gate used to swap qubits. The protocol was run and tested on IBM quantum experience (IBM QX). IBM QX offers two different quantum environments: as a simulator and as a real quantum machine. In our implementation, honest and dishonest participants were considered. Results of both the simulation and the quantum execution were compared against the theoretical expectations. The IBM QX simulator gives results that match the theoretical model. The IBM QX real computer deviates from the expected behavior by a measurable amount. Using the standard deviation and the Hamming distance, the conclusion is that the quantum computer is usable as the difference to the simulator is within an acceptable margin of error. The QBC protocol of choice is fully secure against cheating by Bob. The only way Alice can cheat is using multi-dimensional entanglement. The cost for Alice to cheat is exponential in the number of qubits used, namely O(2 6 n + 3 k + 1).
AB - Quantum bit commitment (QBC) is a quantum version of the classical bit commitment security primitive. As other quantum security primitives and protocols, QBC improves on cheating detection over its classical counterpart. The implementation of the QBC protocol below relies on the use of common quantum gates: the Hadamard gate used for orthonormal bases and the CNOT gate used to swap qubits. The protocol was run and tested on IBM quantum experience (IBM QX). IBM QX offers two different quantum environments: as a simulator and as a real quantum machine. In our implementation, honest and dishonest participants were considered. Results of both the simulation and the quantum execution were compared against the theoretical expectations. The IBM QX simulator gives results that match the theoretical model. The IBM QX real computer deviates from the expected behavior by a measurable amount. Using the standard deviation and the Hamming distance, the conclusion is that the quantum computer is usable as the difference to the simulator is within an acceptable margin of error. The QBC protocol of choice is fully secure against cheating by Bob. The only way Alice can cheat is using multi-dimensional entanglement. The cost for Alice to cheat is exponential in the number of qubits used, namely O(2 6 n + 3 k + 1).
KW - IBM QX
KW - Quantum
KW - Quantum bit commitment
KW - Quantum cryptography
KW - Real quantum processor
UR - https://www.scopus.com/pages/publications/85076818268
U2 - 10.1007/s11128-019-2543-8
DO - 10.1007/s11128-019-2543-8
M3 - Article
AN - SCOPUS:85076818268
SN - 1570-0755
VL - 19
JO - Quantum Information Processing
JF - Quantum Information Processing
IS - 2
M1 - 55
ER -