On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments

We consider the related notions of two-prover and of relativistic commitment schemes. In recent work, Lunghi eti¾?al. proposed a new relativistic commitment scheme with a multi-round sustain phase that keeps the binding property alive as long as the sustain phase is running. They prove security of their scheme against classical attacks; however, the proven bound on the error parameter is very weak: it blows up double exponentially in the number of rounds. In this work, we give a new analysis of the multi-round scheme of Lunghi eti¾?al., and we show a linear growth of the error parameter instead also considering classical attacks only. Our analysis is based on a new composition theorem for two-prover commitment schemes. The proof of our composition theorem is based on a better understanding of the binding property of two-prover commitments that we provide in the form of new definitions and relations among them. As an additional consequence of these new insights, our analysis is actually with respect to a strictly stronger notion of security than considered by Lunghi eti¾?al.

[1]  S. Wehner,et al.  Experimental bit commitment based on quantum communication and special relativity. , 2013, Physical review letters.

[2]  T Lunghi,et al.  Practical Relativistic Bit Commitment. , 2014, Physical review letters.

[3]  Louis Salvail,et al.  Two Provers in Isolation , 2011, ASIACRYPT.

[4]  Dominic Mayers Unconditionally secure quantum bit commitment is impossible , 1997 .

[5]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[6]  Adrian Kent,et al.  Unconditionally Secure Bit Commitment , 1998, quant-ph/9810068.

[7]  Adrian Kent,et al.  Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes , 2011, Physical review letters.

[8]  Hoi-Kwong Lo,et al.  Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.

[9]  Serge Fehr,et al.  Multi-prover Commitments Against Non-signaling Attacks , 2015, CRYPTO.

[10]  Iordanis Kerenidis,et al.  Strong connections between quantum encodings, non-locality and quantum cryptography , 2013, 1304.0983.

[11]  Adrian Kent,et al.  Secure Classical Bit Commitment Using Fixed Capacity Communication Channels , 1999, Journal of Cryptology.

[12]  Kaushik Chakraborty,et al.  Arbitrarily long relativistic bit commitment , 2015, Physical review letters.

[13]  R. Augusiak,et al.  XOR games with $d$ outcomes and the task of non-local computation , 2015, 1502.02974.

[14]  Marco Tomamichel,et al.  Secure Bit Commitment From Relativistic Constraints , 2012, IEEE Transactions on Information Theory.

[15]  Peter W. Shor,et al.  Information Causality, Szemerédi-Trotter and Algebraic Variants of CHSH , 2013, ITCS.