Optimal counterfeiting attacks and generalizations for Wiesner's quantum money

Abel Molina, Thomas Vidick, John Watrous

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

We present an analysis of Wiesner's quantum money scheme, as well as some natural generalizations of it, based on semidefinite programming. For Wiesner's original scheme, it is determined that the optimal probability for a counterfeiter to create two copies of a bank note from one, where both copies pass the bank's test for validity, is (3/4)n for n being the number of qubits used for each note. Generalizations in which other ensembles of states are substituted for the one considered by Wiesner are also discussed, including a scheme recently proposed by Pastawski, Yao, Jiang, Lukin, and Cirac, as well as schemes based on higher dimensional quantum systems. In addition, we introduce a variant of Wiesner's quantum money in which the verification protocol for bank notes involves only classical communication with the bank. We show that the optimal probability with which a counterfeiter can succeed in two independent verification attempts, given access to a single valid n-qubit bank note, is (3/4+ √ 2/8)n. We also analyze extensions of this variant to higher-dimensional schemes.

Original languageEnglish
Title of host publicationTheory of Quantum Computation, Communication, and Cryptography - 7th Conference, TQC 2012, Revised Selected Papers
Pages45-64
Number of pages20
DOIs
StatePublished - 2013
Externally publishedYes
Event7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012 - Tokyo, Japan
Duration: 17 May 201219 May 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7582 LNCS

Conference

Conference7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012
Country/TerritoryJapan
CityTokyo
Period17/05/1219/05/12

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Optimal counterfeiting attacks and generalizations for Wiesner's quantum money'. Together they form a unique fingerprint.

Cite this