{"id":"https://openalex.org/W2513066445","doi":"https://doi.org/10.3390/cryptography1020014","title":"Recursive Cheating Strategies for the Relativistic FQ Bit Commitment Protocol","display_name":"Recursive Cheating Strategies for the Relativistic FQ Bit Commitment Protocol","publication_year":2017,"publication_date":"2017-08-24","ids":{"openalex":"https://openalex.org/W2513066445","doi":"https://doi.org/10.3390/cryptography1020014","mag":"2513066445"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography1020014","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography1020014","pdf_url":"https://www.mdpi.com/2410-387X/1/2/14/pdf?version=1503579019","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/1/2/14/pdf?version=1503579019","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001827669","display_name":"R\u00e9mi Bricout","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"R\u00e9mi Bricout","raw_affiliation_strings":["\u00c9cole Normale Sup\u00e9rieure, 45 Rue d\u2019Ulm, 75005 Paris, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"\u00c9cole Normale Sup\u00e9rieure, 45 Rue d\u2019Ulm, 75005 Paris, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069646107","display_name":"Andr\u00e9 Chailloux","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Andr\u00e9 Chailloux","raw_affiliation_strings":["Secret Project Team, Inria de Paris, 2 rue Simone Iff, 75018 Paris, France","\u00c9cole Normale Sup\u00e9rieure, 45 Rue d\u2019Ulm, 75005 Paris, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Secret Project Team, Inria de Paris, 2 rue Simone Iff, 75018 Paris, France","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"\u00c9cole Normale Sup\u00e9rieure, 45 Rue d\u2019Ulm, 75005 Paris, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001827669"],"corresponding_institution_ids":[],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00476104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":"2","first_page":"14","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cheating","display_name":"Cheating","score":0.9127625226974487},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6035350561141968},{"id":"https://openalex.org/keywords/prime-power","display_name":"Prime power","score":0.5603400468826294},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5059191584587097},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4630254805088043},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4507911801338196},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.41617342829704285},{"id":"https://openalex.org/keywords/prime","display_name":"Prime (order theory)","score":0.36479899287223816},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3523704409599304},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.3291581869125366},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07889336347579956}],"concepts":[{"id":"https://openalex.org/C2778024590","wikidata":"https://www.wikidata.org/wiki/Q2357432","display_name":"Cheating","level":2,"score":0.9127625226974487},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6035350561141968},{"id":"https://openalex.org/C174072685","wikidata":"https://www.wikidata.org/wiki/Q1667469","display_name":"Prime power","level":3,"score":0.5603400468826294},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5059191584587097},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4630254805088043},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4507911801338196},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.41617342829704285},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.36479899287223816},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3523704409599304},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.3291581869125366},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07889336347579956},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/cryptography1020014","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography1020014","pdf_url":"https://www.mdpi.com/2410-387X/1/2/14/pdf?version=1503579019","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1608.03820","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1608.03820","pdf_url":"https://arxiv.org/pdf/1608.03820","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2513066445","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1608.03820.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:doaj.org/article:21743ffed9e14d909bc3e318a7d993ce","is_oa":true,"landing_page_url":"https://doaj.org/article/21743ffed9e14d909bc3e318a7d993ce","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 1, Iss 2, p 14 (2017)","raw_type":"article"},{"id":"doi:10.48550/arxiv.1608.03820","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1608.03820","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography1020014","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography1020014","pdf_url":"https://www.mdpi.com/2410-387X/1/2/14/pdf?version=1503579019","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G1003609521","display_name":null,"funder_award_id":"ANR-16-CE39-0001","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"}],"funders":[{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2513066445.pdf","grobid_xml":"https://content.openalex.org/works/W2513066445.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W114324309","https://openalex.org/W145176944","https://openalex.org/W794377109","https://openalex.org/W1745189120","https://openalex.org/W1782172301","https://openalex.org/W1840167064","https://openalex.org/W1861107511","https://openalex.org/W1973365331","https://openalex.org/W1975408841","https://openalex.org/W1996360405","https://openalex.org/W2012040904","https://openalex.org/W2015179126","https://openalex.org/W2024775074","https://openalex.org/W2034651647","https://openalex.org/W2041320071","https://openalex.org/W2061102029","https://openalex.org/W2075695434","https://openalex.org/W2080578129","https://openalex.org/W2095058629","https://openalex.org/W2120979175","https://openalex.org/W2162381006","https://openalex.org/W2199001409","https://openalex.org/W2231503117","https://openalex.org/W2394909752","https://openalex.org/W2607024923","https://openalex.org/W2761012467","https://openalex.org/W2949557655","https://openalex.org/W2952443109","https://openalex.org/W2987687226","https://openalex.org/W3098020313","https://openalex.org/W3103903430","https://openalex.org/W4232836212","https://openalex.org/W6990014865"],"related_works":["https://openalex.org/W2111666331","https://openalex.org/W2315779300","https://openalex.org/W2614068026","https://openalex.org/W3115679599","https://openalex.org/W1605507583","https://openalex.org/W2741718559","https://openalex.org/W1589423906","https://openalex.org/W2120033653","https://openalex.org/W2067378208","https://openalex.org/W3127603781","https://openalex.org/W1548741289","https://openalex.org/W2949823070","https://openalex.org/W3121757572","https://openalex.org/W2949383301","https://openalex.org/W2080975816","https://openalex.org/W2975847199","https://openalex.org/W2346111487","https://openalex.org/W3202488239","https://openalex.org/W3088164060","https://openalex.org/W1968182724"],"abstract_inverted_index":{"In":[0,57],"this":[1,58,65,72,89],"paper,":[2],"we":[3,22,60],"study":[4,61],"relativistic":[5,25],"bit":[6,26],"commitment,":[7],"which":[8],"uses":[9],"timing":[10],"and":[11,74,103],"location":[12],"constraints":[13],"to":[14],"achieve":[15],"information":[16],"theoretic":[17],"security.":[18],"Using":[19],"those":[20],"constraints,":[21],"consider":[23],"a":[24,79],"commitment":[27],"scheme":[28],"introduced":[29],"by":[30],"Lunghi":[31],"et":[32],"al.":[33],"This":[34],"protocol":[35,52,73],"was":[36],"shown":[37],"secure":[38],"against":[39],"classical":[40,62],"adversaries":[41],"as":[42,44],"long":[43],"the":[45,51,69,75,82,94,106,109,112],"number":[46,113],"of":[47,81,101,108,114],"rounds":[48,115],"performed":[49],"in":[50,111],"is":[53,78,116],"not":[54],"too":[55],"large.":[56],"work,":[59],"attacks":[63],"on":[64],"scheme.":[66],"We":[67],"use":[68],"correspondence":[70],"between":[71],"CHSHQ":[76],"game\u2014which":[77],"variant":[80],"CHSH":[83],"game\u2014to":[84],"derive":[85],"cheating":[86],"strategies":[87],"for":[88,98],"protocol.":[90],"Our":[91],"attack":[92],"matches":[93],"existing":[95],"security":[96,110],"bound":[97],"some":[99],"range":[100],"parameters":[102],"shows":[104],"that":[105],"scaling":[107],"essentially":[117],"optimal.":[118]},"counts_by_year":[],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
