Louka, Hana Almoner Necessity of parameter randomization in quantum contract signing. (English) Zbl 1474.81018 Mat. Vesn. 69, No. 1, 65-74 (2017). Summary: We present a proof that randomization is necessary in quantum contract signing protocol of N. Paunković, J. Bouda and P. Mateus [Phys. Rev. A (3) 84, No. 6, Article ID 062331, 11 p. (2011; doi:10.1103/PhysRevA.84.062331)]. We prove that for any fixed value of the protocol parameter \(\alpha \), for large \(N\) the probability of cheating can be as high as 25%, where \(N\) is the number of messages exchanged between the parties, and thus without randomization the protocol is not fair. Cited in 1 Document MSC: 81P94 Quantum cryptography (quantum-theoretic aspects) 94A60 Cryptography Keywords:contract signing protocol; parameter randomization; qubit PDF BibTeX XML Cite \textit{H. A. Louka}, Mat. Vesn. 69, No. 1, 65--74 (2017; Zbl 1474.81018) Full Text: Link References: [1] REFERENCES [2] [1] N. Asokan, M. Schunter, M. Waidner,Optimistic protocols for fair exchange, Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS 97, pp. 7-17, New York, NY, USA, 1997. [3] [2] M. Ben-Or, O. Goldreich, S. Micali, R. L. Rivest,A fair protocol for signing contracts (extended abstract), In: W. Brauer Ed., ICALP, Vol. 194, Lecture Notes Comp. Sci., pp. 43-52. Springer, 1985. [4] [3] S. Even, Y. Yacobi,Relations among public key signature systems, Technical report, Technicon, 1980. [5] [4] M. J. Fischer, N. A. Lynch, M. S. Paterson,Impossibility of distributed consensus with one faulty process, J. ACM,32(2) (1985), 374-382. · Zbl 0629.68027 [6] [5] W. Hoeffding,Probability inequalities for the sum of bounded random variables. J Amer. Stat. Assoc.58(1963), 13-30. · Zbl 0127.10602 [7] [6] M. A. Nielsen, I. L. Chuang,Quantum Computation and Quantum Information, Cambridge University Press, (2000). · Zbl 1049.81015 [8] [7] N. Paunkovi´c, J. Bouda, P. Mateus,Fair and optimistic quantum contract signing, Physical Review A,84(6) (2011). [9] [8] M. Rabin,Transaction protection by beacons, J. Computer & System Sci.27(1983), 256-267. · Zbl 0576.94016 [10] [9] R. Sedgewick, Ph. Flajolet,An Introduction to the Analysis of Algorithms, 2nd Ed., AddisonWesley Professional, 2013. [12] Faculty of Mathematics, University of Belgrade, Studentski trg 16, Beograd, Serbia [13] E-mail:hanaalmoner@yahoo.com This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.