Bouda, J.; Mateus, P.; Paunkovic, N.; Rasga, J. On the power of quantum tamper-proof devices. (English) Zbl 1151.81307 Int. J. Quantum Inf. 6, No. 2, 281-302 (2008). Summary: We show how quantum tamper-proof devices (QTPD’s) can be used to attack and to develop security protocols. On one hand, we prove that it is possible to transfer proofs of zero-knowledge protocols using QTPD’s. This attack can be extended to other security schemes where privacy is important. On the other hand, we present a fair contract signing protocol using QTPD’s where there is no communication with Judge during the exchange phase (which is impossible classically). In the latter case, we make use of decoherence in the quantum state of the QTPD to implement a global clock over the asynchronous network. QTPD’s seem to be possible to implement with existing quantum hardware, due to the fact that it is hard to isolate quantum memory from interference. These theoretical results contribute to justify the implementation of QTPD’s. Cited in 2 Documents MSC: 81P68 Quantum computation 94A60 Cryptography Keywords:quantum tamper-proof device; zero-knowledge; contract signing PDFBibTeX XMLCite \textit{J. Bouda} et al., Int. J. Quantum Inf. 6, No. 2, 281--302 (2008; Zbl 1151.81307) Full Text: DOI References: [1] DOI: 10.1137/0218012 · Zbl 0677.68062 · doi:10.1137/0218012 [2] DOI: 10.1145/3149.214121 · Zbl 0629.68027 · doi:10.1145/3149.214121 [3] DOI: 10.1109/18.50372 · doi:10.1109/18.50372 [4] Moore C., Theoret. Comput. Sci. 206 pp 275– [5] DOI: 10.1145/116825.116852 · Zbl 0799.68101 · doi:10.1145/116825.116852 [6] DOI: 10.1145/146585.146599 · Zbl 0799.68099 · doi:10.1145/146585.146599 [7] Papadimitriou C. H., Complexity Theory (1994) · Zbl 0833.68049 [8] DOI: 10.1145/146585.146609 · Zbl 0799.68096 · doi:10.1145/146585.146609 [9] DOI: 10.1007/s001459910006 · Zbl 0957.68040 · doi:10.1007/s001459910006 [10] DOI: 10.1080/09500349414552291 · Zbl 0942.81502 · doi:10.1080/09500349414552291 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.