Abstract
We propose the idea of a quantum cheque scheme, a cryptographic protocol in which any legitimate client of a trusted bank can issue a cheque, that cannot be counterfeited or altered in anyway, and can be verified by a bank or any of its branches. We formally define a quantum cheque and present the first unconditionally secure quantum cheque scheme and show it to be secure against any no-signalling adversary. The proposed quantum cheque scheme can been perceived as the quantum analog of Electronic Data Interchange, as an alternate for current e-Payment Gateways.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Wooters, W., Zurek, W.: Quantum no-cloning theorem. Nature 299, 802 (1982)
Wiesner, S.: Conjugate coding. ACM Sigact News 15(1), 78–88 (1983)
Bennett, C.H., Brassard, G., Breidbart, S., Wiesner, S.: Quantum cryptography, or unforgeable subway tokens. In: Advances in Cryptology, pp. 267–275. Springer (1983)
Lutomirski, A.: An online attack against wiesner’s quantum money. arXiv:1010.0256 (2010)
Molina, A., Vidick, T., Watrous, J.: Optimal counterfeiting attacks and generalizations for wiesners quantum money. In: Theory of Quantum Computation, Communication, and Cryptography, 2012, pp. 45–64. Springer (2013)
Brodutch, A., Nagaj, D., Sattath, O., Unruh, D.: An adaptive attack on wiesner’s quantum money. arXiv:1404.1507 (2014)
Aaronson, S.: Quantum copy-protection and quantum money. In: Proceedings of 24th Annual IEEE Conference on Computational Complexity (CCC), 2009, pp. 229–242. IEEE (2009)
Lutomirski, A., Aaronson, S., Farhi, E., Gosset, D., Hassidim, A., Kelner, J., Shor, P.: Breaking and making quantum money: toward a new quantum cryptographic protocol. arXiv:0912.3825 (2009)
Farhi, E., Gosset, D., Hassidim, A., Lutomirski, A., Shor, P.: Quantum money from knots. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 276–289. ACM (2012)
Aaronson, S., Christiano, P.: Quantum money from hidden subspaces. In: Proceedings of the 44th Annual ACM Symposium on Theory of Computing, pp. 41–60. ACM (2012)
Mosca, M., Stebila, D.: Quantum coins. Error Correct. Codes Finite Geom. Cryptogr. 523, 35–47 (2010)
Biham, E., Huttner, B., Mor, T.: Quantum cryptographic network based on quantum memories. Phys. Rev. A 54(4), 2651 (1996)
Kimble, H.: The quantum internet. Nature 453(7198), 1023–1030 (2008)
Duan, L.M., Monroe, C.: Colloquium: quantum networks with trapped ions. Rev. Mod. Phys. 82(2), 1209 (2010)
Anderson, R.: Security Engineering. Wiley, New York (2008)
Trugenberger, C.A.: Probabilistic quantum memories. Phys. Rev. Lett. 87(6), 067901 (2001)
Simon, C., Afzelius, M., Appel, J., Boyer de La Giroday, A., Dewhurst, S., Gisin, N., Hu, C., Jelezko, F., Kröll, S., Müller, J., et al.: Quantum memories. Eur. Phys. J. D 58(1), 1–22 (2010)
Munro, W., Stephens, A., Devitt, S., Harrison, K., Nemoto, K.: Quantum communication without the necessity of quantum memories. Nat. Photonics 6(11), 777–781 (2012)
Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032 (2001)
Chuang, I., Gottesman, D.: Quantum digital signatures (July 17 2007) US Patent 7,246,240
Buhrman, H., Cleve, R., Watrous, J., deWolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)
Holevo, A.: Problems in the mathematical theory of quantum communication channels. Rep. Math. Phys. 12(2), 273–278 (1977)
Hanaoka, G., Shikata, J., Zheng, Y., Imai, H.: Unconditionally secure digital signature schemes admitting transferability. In: Advances in Cryptology-ASIACRYPT 2000, pp. 130–142. Springer (2000)
Chaum, D., Roijakkers, S.: Unconditionally-secure digital signatures. In: Advances in Cryptology-CRYPTO90, pp. 206–214. Springer (1991)
Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)
Bužek, V., Hillery, M.: Quantum copying: beyond the no-cloning theorem. Phys. Rev. A 54(3), 1844 (1996)
Gisin, N., Massar, S.: Optimal quantum cloning machines. Phys. Rev. Lett. 79(11), 2153 (1997)
Bruß, D., DiVincenzo, D.P., Ekert, A., Fuchs, C.A., Macchiavello, C., Smolin, J.A.: Optimal universal and state-dependent quantum cloning. Phys. Rev. A 57(4), 2368 (1998)
Devi, A.U., Rajagopal, A., et al.: Monogamy of quantum correlations in three-qubit pure states. Phys. Rev. A 85(1), 012103 (2012)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)
Noh, T.G.: Counterfactual quantum cryptography. Phys. Rev. Lett. 103(23), 230501 (2009)
Acknowledgments
S.R.M. thanks Robin Kothari (MIT) for his helpful references to the literature of imperfect cloning and Madhur Srivastava (Cornell) and Anirban Dey for helpful discussions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Moulick, S.R., Panigrahi, P.K. Quantum cheques. Quantum Inf Process 15, 2475–2486 (2016). https://doi.org/10.1007/s11128-016-1273-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-016-1273-4