Skip to Main content Skip to Navigation
New interface
Journal articles

Recursive cheating strategies for the relativistic $\mathbb F_Q$ bit commitment protocol

Abstract : In this paper, we study relativistic bit commitment, which uses timing and location constraints to achieve information theoretic security. We consider the FQ multi-round bit commitment scheme introduced by Lunghi et al. [LKB + 15]. This protocol was shown secure against classical adversaries as long as the number of rounds m is small compared to √ Q where Q is the size of the used field in the protocol [CCL15, FF16]. In this work, we study classical attacks on this scheme. We use classical strategies for the CHSHQ game described in [BS15] to derive cheating strategies for this protocol. In particular, our cheating strategy shows that if Q is an even power of any prime, then the protocol is not secure when the number of rounds m is of the order of √ Q. For those values of Q, this means that the upper bound of [CCL15, FF16] is essentially optimal.
Complete list of metadata

Cited literature [26 references]  Display  Hide  Download
Contributor : André Chailloux Connect in order to contact the contributor
Submitted on : Tuesday, December 6, 2016 - 1:30:51 PM
Last modification on : Friday, July 8, 2022 - 10:06:20 AM
Long-term archiving on: : Tuesday, March 21, 2017 - 9:08:20 AM


Files produced by the author(s)




Rémi Bricout, André Chailloux. Recursive cheating strategies for the relativistic $\mathbb F_Q$ bit commitment protocol. Cryptography, 2017, ⟨10.3390/cryptography1020014⟩. ⟨hal-01409563⟩



Record views


Files downloads