Recursive Cheating Strategies for the Relativistic FQ Bit Commitment Protocol

In this paper, we study relativistic bit commitment, which uses timing and location constraints to achieve information theoretic security. Using those constraints, we consider a relativistic bit commitment scheme introduced by Lunghi et al. This protocol was shown secure against classical adversarie...

Full description

Bibliographic Details
Main Authors: Rémi Bricout, André Chailloux
Format: Article
Language:English
Published: MDPI AG 2017-08-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/1/2/14