Quantum cheques

We propose the idea of a quantum cheque scheme, a cryptographic protocol in which any legitimate client of a trusted bank can issue a cheque, that cannot be counterfeited or altered in anyway, and can be verified by a bank or any of its branches. We formally define a quantum cheque and present the first unconditionally secure quantum cheque scheme and show it to be secure against any no-signalling adversary. The proposed quantum cheque scheme can been perceived as the quantum analog of Electronic Data Interchange, as an alternate for current e-Payment Gateways.

[1]  H. J. Kimble,et al.  The quantum internet , 2008, Nature.

[2]  Andrew Lutomirski,et al.  An online attack against Wiesner's quantum money , 2010, 1010.0256.

[3]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[4]  David Chaum,et al.  Unconditionally Secure Digital Signatures , 1990, CRYPTO.

[5]  Luming Duan,et al.  Colloquium: Quantum networks with trapped ions , 2010 .

[6]  Sudha,et al.  Monogamy of quantum correlations in three-qubit pure states , 2011, 1110.3026.

[7]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[8]  Kae Nemoto,et al.  Quantum communication without the necessity of quantum memories , 2012, Nature Photonics.

[9]  Junji Shikata,et al.  Unconditionally Secure Digital Signature Schemes Admitting Transferability , 2000, ASIACRYPT.

[10]  A. Holevo Problems in the mathematical theory of quantum communication channels , 1977 .

[11]  Abel Molina,et al.  Optimal Counterfeiting Attacks and Generalizations for Wiesner's Quantum Money , 2012, TQC.

[12]  Dominique Unruh,et al.  An adaptive attack on Wiesner's quantum money , 2014, Quantum Inf. Comput..

[13]  Avinatan Hassidim,et al.  Quantum money from knots , 2010, ITCS '12.

[14]  Gilles Brassard,et al.  Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.

[15]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[16]  Scott Aaronson,et al.  Quantum money from hidden subspaces , 2012, STOC '12.

[17]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[18]  T. Noh Counterfactual quantum cryptography. , 2008, Physical review letters.

[19]  Buzek,et al.  Quantum copying: Beyond the no-cloning theorem. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[20]  J. H. Müller,et al.  Quantum memories , 2010, 1003.1107.

[21]  D. Bruß,et al.  Optimal universal and state-dependent quantum cloning , 1997, quant-ph/9705038.

[22]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[23]  Biham,et al.  Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[24]  Scott Aaronson,et al.  Quantum Copy-Protection and Quantum Money , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.

[25]  C. Trugenberger Probabilistic quantum memories. , 2000, Physical review letters.

[26]  Avinatan Hassidim,et al.  Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol , 2009, ICS.

[27]  S. Massar,et al.  Optimal Quantum Cloning Machines , 1997, quant-ph/9705046.