1,188 research outputs found

    Using quantum oblivious transfer to cheat sensitive quantum bit commitment

    Get PDF
    It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independently by Aharonov et al. [STOC, 2000] and Hardy and Kent [Phys. Rev. Lett. 92 (2004)] is investigated. In this variant, the parties require some nonzero probability of detecting a cheating, i.e. if Bob, who commits a bit b to Alice, changes his mind during the revealing phase then Alice detects the cheating with a positive probability (we call this property binding); and if Alice gains information about the committed bit before the revealing phase then Bob discovers this with positive probability (sealing). In our paper we give quantum bit commitment scheme that is simultaneously binding and sealing and we show that if a cheating gives epsilon advantage to a malicious Alice then Bob can detect the cheating with a probability Omega(epsilon^2). If Bob cheats then Alice's probability of detecting the cheating is greater than some fixed constant lambda>0. This improves the probabilities of cheating detections shown by Hardy and Kent and the scheme by Aharonov et al. who presented a protocol that is either binding or sealing, but not simultaneously both. To construct a cheat sensitive quantum bit commitment scheme we use a protocol for a weak quantum one-out-of-two oblivious transfer

    Practical private database queries based on a quantum key distribution protocol

    Get PDF
    Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum key distribution protocol, with changes only in the classical post-processing of the key. This approach makes our scheme both easy to implement and loss-tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved, relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both user and database. We think that there is scope for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.Comment: 7 pages, 2 figures, new and improved version, clarified claims, expanded security discussio

    Muddled Boundaries of Digital Shrines

    Get PDF
    International audienceBased on an online ethnography study of 274 YouTube videos posted during the Virginia Tech or the Newtown massacres, this article discusses how users resort to participatory media during such mediatized events to create a digital spontaneous shrine. The assemblage of this sanctuary on a website hosting billions of user-generated contents is made possible by means of folksonomy and website architecture, and a two-fold social dynamic based on participatory commitment and the institutionalization of a collective entity. Unlike “physical” spontaneous shrines erected in public spaces, these digital shrines connect the bereaved with provocative or outrageous contributions, notably tributes from school shooting fans using participatory media to commemorate the killer’s memory. This side effect, generated by the technical properties of the platform, compromises the tranquility of the memorial and muddles the boundaries and the contents of such sanctuaries
    corecore