{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:57:35Z","timestamp":1760241455905,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>This paper proposes a different approach to pinpoint the causes for which an unconditionally secure quantum bit commitment protocol cannot be realized, beyond the technical details on which the proof of Mayers\u2019 no-go theorem is constructed. We have adopted the tools of quantum entropy analysis to investigate the conditions under which the security properties of quantum bit commitment can be circumvented. Our study has revealed that cheating the binding property requires the quantum system acting as the safe to harbor the same amount of uncertainty with respect to both observers (Alice and Bob) as well as the use of entanglement. Our analysis also suggests that the ability to cheat one of the two fundamental properties of bit commitment by any of the two participants depends on how much information is leaked from one side of the system to the other and how much remains hidden from the other participant.<\/jats:p>","DOI":"10.3390\/e20030193","type":"journal-article","created":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T13:37:21Z","timestamp":1520948241000},"page":"193","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Information-Theoretic Perspective on the Quantum Bit Commitment Impossibility Theorem"],"prefix":"10.3390","volume":"20","author":[{"given":"Marius","family":"Nagy","sequence":"first","affiliation":[{"name":"College of Computer Engineering and Science, Prince Mohammad Bin Fahd University, Al Khobar 31952, Saudi Arabia"},{"name":"School of Computing, Queen\u2019s University, Kingston, ON K7L 2N8, Canada"}]},{"given":"Naya","family":"Nagy","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam 34212, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"ref_1","unstructured":"Mayers, D. (1996, January 22\u201324). Unconditionally secure quantum bit commitment is impossible. Proceedings of the Fourth Workshop on Physics and Computation\u2014PhysComp \u201996, Boston, MA, USA."},{"key":"ref_2","unstructured":"Nielsen, M.A., and Chuang, I.L. (2000). Quantum Computation and Quantum Information, Cambridge University Press."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","article-title":"Unconditionally secure quantum bit commitment is impossible","volume":"78","author":"Mayers","year":"1997","journal-title":"Phys. Rev. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","article-title":"Is quantum bit commitment really possible?","volume":"78","author":"Lo","year":"1997","journal-title":"Phys. Rev. Lett."},{"key":"ref_5","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India."},{"key":"ref_6","unstructured":"Brown, J. (2001). The Quest for the Quantum Computer, Simon & Schuster."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s00145-005-0011-3","article-title":"A proof of the security of quantum key distribution","volume":"19","author":"Biham","year":"2006","journal-title":"J. Cryptol."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., and Kilian, J. (1988, January 22\u201326). Achieving oblivious transfer using weakened security assumptions. Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, White Plains, NY, USA.","DOI":"10.1109\/SFCS.1988.21920"},{"key":"ref_9","unstructured":"Brassard, G., Cr\u00e9peau, C., Jozsa, R., and Langlois, D. (1993, January 3\u20135). A quantum bit commitment scheme provably unbreakable by both parties. Proceedings of the 34th Annual IEEE Symposium on Foundations of Computer Science, Palo Alto, CA, USA."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/235666.235669","article-title":"25 years of quantum cryptography","volume":"27","author":"Brassard","year":"1996","journal-title":"SIGACT News"},{"key":"ref_11","unstructured":"Cr\u00e9peau, C. (October, January 30). What is going on with quantum bit commitment?. Proceedings of the Pragocrypt \u201996: 1st International Conference on the Theory and Applications of Cryptology, Prague, Czech Republic."},{"key":"ref_12","unstructured":"Kent, A. (arXiv, 1997). Permanently secure quantum bit commitment protocol from a temporary computation bound, arXiv."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"012310","DOI":"10.1103\/PhysRevA.65.012310","article-title":"Degrees of concealment and bindingness in quantum bit commitment protocols","volume":"65","author":"Spekkens","year":"2001","journal-title":"Phys. Rev. A"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1038\/ncomms2268","article-title":"Experimental implementation of bit commitment in the noisy-storage model","volume":"3","author":"Ng","year":"2012","journal-title":"Nat. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"113015","DOI":"10.1088\/1367-2630\/13\/11\/113015","article-title":"Unconditionally secure bit commitment with flying qudits","volume":"13","author":"Kent","year":"2011","journal-title":"New J. Phys."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"180504","DOI":"10.1103\/PhysRevLett.111.180504","article-title":"Experimental bit commitment based on quantum communication and special relativity","volume":"111","author":"Lunghi","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"022315","DOI":"10.1103\/PhysRevA.92.022315","article-title":"Device-independent relativistic quantum bit commitment","volume":"92","author":"Adlam","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"157901","DOI":"10.1103\/PhysRevLett.92.157901","article-title":"Cheat sensitive quantum bit commitment","volume":"92","author":"Hardy","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"022316","DOI":"10.1103\/PhysRevA.78.022316","article-title":"Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment","volume":"78","author":"Buhrman","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"022308","DOI":"10.1103\/PhysRevA.84.022308","article-title":"Cheat-sensitive commitment of a classical bit coded in a block of m \u00d7 n round-trip qubits","volume":"84","author":"Shimizu","year":"2011","journal-title":"Phys. Rev. A"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"056301","DOI":"10.1103\/PhysRevA.89.056301","article-title":"Comment on \u201cCheat-sensitive commitment of a classical bit coded in a block of m \u00d7 n round-trip qubits\u201d","volume":"89","author":"He","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11128-013-0566-0","article-title":"Cheat sensitive quantum bit commitment via pre- and post-selected quantum states","volume":"13","author":"Li","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"135302","DOI":"10.1088\/1751-8113\/48\/13\/135302","article-title":"Quantum bit commitment with cheat sensitive binding and approximate sealing","volume":"48","author":"Li","year":"2015","journal-title":"J. Phys. A Math. Theor."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1637","DOI":"10.1007\/BF02302261","article-title":"Relational quantum mechanics","volume":"35","author":"Rovelli","year":"1996","journal-title":"Int. J. Theor. Phys."},{"key":"ref_25","unstructured":"Grinbaum, A. (2004). The Significance of Information in Quantum Theory. [Ph.D. Thesis, Ecole Polytechnique]."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/3\/193\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:56:50Z","timestamp":1760194610000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/3\/193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":25,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,3]]}},"alternative-id":["e20030193"],"URL":"https:\/\/doi.org\/10.3390\/e20030193","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2018,3,13]]}}}