Experimental Quantum Coin Tossing

PRL 94, 040501 (2005)
week ending
4 FEBRUARY 2005
PHYSICAL REVIEW LETTERS
Experimental Quantum Coin Tossing
G. Molina-Terriza,1,* A. Vaziri,1,† R. Ursin,1 and A. Zeilinger1,2
1
Institut für Experimentalphysik, Universität Wien, Boltzmanngasse 5, A-1090, Vienna, Austria
Institute for Quantum Optics and Quantum Information, Austrian Academy of Sciences, Vienna, Austria
(Received 1 March 2004; published 31 January 2005)
2
In this Letter we present the first implementation of a quantum coin-tossing protocol. This protocol
belongs to a class of ‘‘two-party’’ cryptographic problems, where the communication partners distrust
each other. As with a number of such two-party protocols, the best implementation of the quantum coin
tossing requires qutrits, resulting in a higher security than using qubits. In this way, we have also
performed the first complete quantum communication protocol with qutrits. In our experiment the two
partners succeeded to remotely toss a row of coins using photons entangled in the orbital angular
momentum. We also show the experimental bounds of a possible cheater and the ways of detecting him.
DOI: 10.1103/PhysRevLett.94.040501
PACS numbers: 03.67.Hk, 03.67.Dd, 42.65.Lm
In the original ‘‘coin-tossing’’ protocol, Alice and Bob
had just divorced and did not want to ever see each other
again but they had to decide who kept the dog [1]. As they
did not trust any third party as a referee, they agreed to toss
a coin. How could Bob be sure that Alice is honest when
she said ‘‘It was tails. . .you lost’’ if he could not see the
outcome of the toss? This protocol belongs to a set of novel
cryptographic problems like mail certification, remote contract signing, and mental poker, where, instead of ruling
out an eavesdropper, the problem is that the communicating partners do not trust each other. Other examples of this
so called ‘‘post cold war’’ protocols are ‘‘bit commitment’’
or the computation of a function with distributed inputs [2].
This kind of protocol is receiving increased attention
from the cryptographic and quantum information communities. Although the perfect security of some ‘‘twoparty’’ protocols seems impossible [3], it is unclear which
bounds can be imposed on the security. Also, it has been
suggested that quantum mechanics can be derived from
purely quantum information postulates, like the security of
quantum key distribution and the impossibility of perfect
quantum bit commitment [4].
In a solution for coin tossing Alice throws the coin, locks
it in a ‘‘box’’ and sends it to Bob, who has the proof that the
coin was thrown, but cannot see the actual result. Bob
makes his bet and, upon receiving it, Alice sends the key
to Bob, who unlocks the result [5]. In general, there is no
classical protocol which allows unrestricted security
against cheating for the coin-tossing protocols.
In quantum coin tossing [7,6,8–10], we replace the box
by a quantum state. Alice encodes the result of the throw of
the coin by choosing one among a series of nonorthogonal
states and sends it to Bob. Without previous knowledge,
Bob cannot know with certainty which of the states he
possesses. At this point, Bob makes his bet. To ‘‘unlock’’
the state, Alice now tells Bob which state she sent and then
he measures it to check Alice’s honesty.
If Bob’s measurement identifies Alice’s predicted state,
the protocol is a success. Otherwise, Alice and Bob con0031-9007=05=94(4)=040501(4)$23.00
sider the throw as a ‘‘failure’’. Contrary to the classical
case, this coin tossing scheme limits the chances of a
cheater to succeed. We will show that cheating can be
detected when the failures increase over the statistical
errors.
Our implemented protocol is based on a proposal by
Ambainis [6] using three-dimensional quantum states
(‘‘qutrits’’). The series of states that Alice can send and
the correspondent throw of the coin are presented in the
table shown in Fig. 1. Alice’s states are divided into two
sets, each of them containing two orthogonal states. States
of one set have a nonvanishing projection onto states of the
other set. Bob needs two different measuring bases in order
to determine the state of each possible photon sent by
Alice. Each of Bob’s bases (Fig. 1) contains, besides
Set Label Alice’s States
1
Coin
√
A11 (|0 + |1 )/ 2 Heads (1)
Bob’s Bases Label
√
(|0 + |1 )/ 2 B11
(|0
1
2
2
A12 (|0
√
1 )/ 2 Heads (1)
√
1 )/ 2 B12
|2
B13
√
(|0 + |2 )/ 2 B21
√
A21 (|0 + |2 )/ 2 Tails (0)
√
(|0
2 )/ 2 B22
√
A22 (|0
2 )/ 2 Tails (0)
|1
B23
FIG. 1. Here we show the four different states sent by Alice
and the bases used by Bob to properly characterize the incoming
photon. The Alice’s states are divided into two sets of two states.
Each set represents a particular side of the coin. Bob uses two
bases, corresponding to Alice’s states, each expanded by one
further orthogonal state. The label of the states eases their
recognition in Fig. 2.
040501-1
 2005 The American Physical Society
PHYSICAL REVIEW LETTERS
PRL 94, 040501 (2005)
Alice’s states of the corresponding set, a third orthogonal
state. These additional states are crucial for increasing the
chances to detect cheating, as we will show below.
The maximum probability that one of the partners biases
the result without being noticed is 25% [6]. This limits the
theoretical probability of a cheater to win to 75% since in
any coin tossing the probability to win is 50% anyway.
Spekkens and Rudolph [7] proofed that no similar protocol, i.e., strong coin-tossing protocols based on bit commitment where Alice supplies the state, can improve the
security and, in particular, using qubits instead of qutrits
will always make the protocol more insecure. On the other
hand the effect of noise in any protocol reduces the security
[11]. For example a noisy qutrit protocol can be less secure
than a perfect qubit protocol. We will show below that our
experiment was robust enough to noise and was more
secure than any similar qubit protocol. It is yet unclear if
new protocols based on completely different schemes
could perform better, either with qunits or with qubits.
This raises the interesting question of which problems
can be more efficiently solved with higher dimensional
states [12].
In our proof of principle experiment (Fig. 2), Alice
possesses a source of orbital angular momentum entangled
photons [13,14]. She keeps one photon of each pair and
sends the other one to Bob. By projecting her photon onto a
certain state, she nonlocally projects Bob’s photon onto
any state of the states shown in Fig. 1. The detection of the
photon by Alice is the signal which confirms that a suitable
photon carrying an orbital angular momentum qutrit has
been sent to Bob [15]. Alice sends the electronic triggering
signal to Bob. Once Bob receives the signal, he sends his
bet to Alice. Now she tells Bob which was the state. Then
B11
Bob
B23 B22
Bob measures the state of the photon and verifies the
honesty of Alice. A final coincidence measurement between the electronic signals from Alice and Bob is needed
to check if all the steps were performed correctly.
An argon-ion laser pumps a 1.5-mm-thick -bariumborate crystal cut for Type I phase matching. The crystal
emits down-converted pairs of identically polarized photons ( 702 nm) at an angle of 4 off the pump direction. These photons are entangled in the orbital angular
momentum. We use the substate ’ 0:7j0A 0B i 0:5j1A 1B i 0:5j2A 2B i, where j0A i and j0B i correspond to
Gaussian beams and j1A i and j2B i (j2A i and j1B i) are
Laguerre Gaussian beams with azimuthal index m 1
(m 1) [16]. With a series of beam splitters, whose
reflectances were chosen so that the photons were equally
distributed among the final paths, both parties direct their
photons probabilistically to holograms and single mode
fibers, each projecting the photon onto a certain state [17].
Bob’s photons were directed randomly to a projection
onto one of his six possible states. The detections were
electronically discriminated with the information provided
by Alice by a coincidence measurement. We programmed
the logic to only consider those photons detected by Bob
which are exactly timed with Alice’s electronic signal and
to disregard the photons on Bob’s side going to the wrong
basis.
Alice and Bob decided to try their coin-tossing protocol
with a row of throws. In this experiment they obtained 50%
heads (1) and 44% tails (0). As Bob’s guesses were random, he won in half of the throws. The overall failures in
the protocol around 6% of the throws are mainly due to
slight misalignments. In Fig. 3(a) we present the typical
experimental probabilities. In Fig. 4(a), we show a set of
1
B21
B12
B13
Pump beam
Set 1
BBO
(a)
(b)
|0〉+|1〉 |2〉 |0〉−|1〉
|0〉+|2〉 |1〉 |0〉−|2〉
Set 2
A21
A11
Alice
week ending
4 FEBRUARY 2005
0
A22
A12
FIG. 2 (color online). Diagram of the setup. Alice possesses a
source of entangled photons. Using beam splitters, she projects
probabilistically one of the photons onto one of the four possible
states shown in the table in Fig. 1. This state is transferred
nonlocally to the other photon, which is on its way to Bob. Bob’s
photon is projected randomly onto one of the six possible
elements of the two bases. Photons going to a wrong basis are
not considered.
FIG. 3 (color online). Statistics of Bob’s measurements. Red
(gray) bars correspond to failures of the protocol. Black (heads)
and white (tails) bars correspond to proper throws and indicate
the result ofpthe
tossing. In (a) Alice is honest. She sends the state
j0i j1i= 2 (Heads). The errors in this case are due to
misalignments of the setup and are intrinsic to it. In (b) Alice
is cheating. She always sends a mixture of two states. After Bob
makes his bet, she decides which state she must
ptell
him. In this
case she claims to have sent state j0i j2i= 2.
040501-2
PRL 94, 040501 (2005)
PHYSICAL REVIEW LETTERS
FIG. 4 (color online). Two different ordered rows of throws.
Upper left corner: first throw, lower right corner: last throw. The
color of a square represents the result of the throw, as Alice
communicates it to Bob, black: head, white: tail and red (gray):
Failure. Left image, Bob and Alice are honest: Heads 50%, tails
44%, failures 6%. The difference between heads and tails is due
to different efficiencies of the detectors and the failures are due
to imperfections of the setup. Right image, Bob honest and Alice
cheats: Heads 26%, tails 28%, failures 46%. One can clearly see
how the failures increase due to the fact that Alice is cheating.
the actual throws. Every square of the image represents a
throw of the coin.
The level of security of the protocol is given by the noise
of our experiment [7,11]. The security against Alice cheating depends on the trace distance (D) and the security
against Bob cheating depends on the fidelity (F) between
the density matrices sending a ‘‘1’’ and sending a ‘‘0’’. In
our kind of protocols, using qubits limits the possible states
to D F2 > 1 [12]. Values of D and F, violating this
inequality mean that we are accessing a security not allowed by qubits. If our experiment were noiseless we
would obtain D 0:5 and F 0:5 which is the best
security achievable up to now. By modeling the 6% noise
found in our experiment as completely incoherent we
obtain D F2 0:91 which is still better than the security
that could be achieved with any similar protocol using
qubits, even a noiseless one. One fact which helped to
bound the security was the use of a fair protocol, where
Alice and Bob have the same chances of cheating.
We further experimentally explored the security of our
implementation. For us it was a harder problem to devise a
cheating procedure than to prepare the honest protocol.
The best way we could find for Alice to cheat was the
following one. Alice always sends
p a random symmetric
mixture
of
the
state
j0i
j1i=
2 and the state j0i p
j2i= 2, which is a random mixture of heads or tails [18].
When Bob makes his bet, Alice always tells him that he
lost, and then, Bob has to measure in the corresponding
basis. For example, if Bob says that it was tails,pAlice’s
answer is that the state was heads (j0i j1i= 2), and
Bob measures in this basis. It is an easy task to check that
Alice will win in 62.5% of the throws only, which is below
the theoretical maximum of 75% [7,6]. This strategy resembles a biased coin which can be flipped even after Bob
made his choice.
week ending
4 FEBRUARY 2005
In order to force Alice to cheat, we changed states A11
and A22 to be identical to states A21 and A12, respectively. Alice does not need to keep a record of which state
is being sent. In this way she sends a probabilistic mixture
of the two states. Her strategy is to tell Bob that the state
sent was exactly the opposite of Bob’s bet.
In practice it is even harder for Alice to win, because she
cannot turn off the statistical errors which also happen in
the honest protocol. In our case the number of failures,
when Alice cheats in this way, was 46% of the throws. The
difference with the expected failures is mainly due to the
fact that Alice is not sending a perfect mixture of the two
states. Figure 3(b) shows Bob’s results for one of the two
states Alice claimed she was sending. Also, we present the
actual row of throws in Fig. 4(b). By comparing the results
presented in images (a) and (b) it was very easy for Bob to
discover that in (b) the protocol was not followed honestly.
Also, it was a little bit suspicious to him that in all the
proper throws of Fig. 4(b), Alice won.
At this point, let us turn back to Fig. 3(b). We note that
the state in which most of the failures go is precisely the
one outside the plane defined by the elements of Alice’s
set. Evidently in this case, the use of a three-dimensional
space is necessary in order that Bob can detect Alice
cheating.
We now discuss a few details of our implementation. In a
proper protocol, the detection of the photon by Bob should
be delayed until after he sent his bet to Alice. In our setup,
it was difficult to prepare such a delay and so we simulated
it by software. Future implementations should include an
optical delay.
Another difference with respect to an ideal implementation is that both Alice and Bob could not deterministically
project their photon onto a given state. Although this is not
a problem for an honest Alice, who chooses at random
which state to send among the possible four, it might
present a security hazard when one of the parties cannot
be trusted. A closer look shows that this is not the case.
Photons going to the wrong basis or photons simply not
detected are considered as failures in our scheme thus they
cannot increase the odds of winning by a dishonest player.
A possible problem of this implementation would be if
too many photons are lost in a game were only one coin is
played. Then the players cannot reach any conclusion even
if they both play fairly because the likelihood that a failure
comes from cheating would be low. This problem can be
solved using better detectors, fast optical switches and
mode sorters [19] to avoid the loss of photons. This will
also increase the signal to noise ratio, improving the security. A better method would be a protocol where the two
parties throw a large row of coins [20]. As in our case, Bob
will project randomly the incoming photon onto different
bases and store the result, even if the photon went to a
wrong bases. Then Bob can use a tomographic estimation
to check the states Alice announced. Both Bob and Alice
040501-3
PRL 94, 040501 (2005)
PHYSICAL REVIEW LETTERS
can also count the photons lost during the communication
and check if their number corresponds to the known experimental loses.
In conclusion, we have experimentally demonstrated a
‘‘quantum coin-tossing’’ protocol. To our knowledge, this
is the first two-party communication protocol which is
solved using the laws of quantum physics to encode the
communication. Contrary to the usual ‘‘key distribution’’
protocols, here the information shared by Alice and Bob is
directly exchanged through the quantum states. Also, this
protocol is the first one implemented where the use of more
than two dimensions presents a clear advantage. Using our
setup we were able to share a few tens of thousands of coin
throws in a few seconds between two parties. We also
allowed one party to try to cheat, which was easily detected
through a significant increase of failures. We hope that this
work triggers systematic investigations of the possibilities
open to dishonest parties. We showed that, although the
application of such a protocol in a single coin throw
experiment to settle the ‘‘who keeps the dog problem’’ is
of a confined interest, in a more elaborated application
where many random bits are needed it would be easy to
detect a cheater. This kind of system could include the case
were Alice is the dealer of coins to many different Bob’s.
All the players should be able to see what the previous
results were. Our test experiment was confined to the
dimensions of an optical table. In order to send the information over long distances one should use more elaborated
systems using, e.g., adaptative optics or specially designed
fibers.
This work was supported by the Austrian Sciences
Foundation (F.W.F) and the European Commission
through the Marie-Curie program and the RAMBO-Q
project of the IST program. Discussions with M.
Aspelmeyer and K. Resch are gratefully appreciated. We
are also indebted to Terry Rudolph for commenting on
earlier versions of the manuscript.
*Present address: ICFO, Barcelona, Spain
†
Present address: Atomic Physics Division, NIST, USA
[1] M. Blum, in Coin Flipping by Phone (CRYPTO Report
No. 1981, p. 11, 1981).
week ending
4 FEBRUARY 2005
[2] For a review on cryptographic protocols and their relation
to quantum mechanics, see D. Gottesman and J.-K. Lo,
Phys. Today 53, 22 (2000).
[3] H.-K. Lo, and H. F. Chau, Phys. Rev. Lett. 78, 3410
(1997); D. Mayers, ibid. 78, 3414 (1997).
[4] R. Clifton, J. Bub, and H. Halvorson, Found. Phys. 33,
1561 (2001).
[5] For the sake of simplicity we explain a weak coin tossing
(WCT), but we actually implemented strong coin tossing
(SCT). In SCT, Alice locks in the box a bit b. After
receiving the box, Bob sends to Alice a bit b0 . The toss
of the coin results from the operation b b0 . A WCT can
be produced trivially from a SCT and as shown, a SCT can
be implemented from bit commitment. For definitions and
properties of WCT and SCT, see Ref. [7]. For a review on
quantum bit commitment see J. Bub, Found. Phys. 31, 735
(2001).
[6] A. Ambainis, in Proceedings of 33rd Annual Symposium
on Theory of Computing, 2001 (ACM, New York, 2001),
p. 134.
[7] R. W. Spekkens and T. Rudolph, Phys. Rev. A 65, 012310
(2001); Phys. Rev. Lett. 89, 227901 ( 2002).
[8] C. H. Bennett and G. Brassard, Proceedings of IEEE
International Conference on Computers, Systems, and
Signal Processing (IEEE, Bangalore, India, 1984), p. 175.
[9] H.-K. Lo and H. F. Chau, Physica D (Amsterdam) 120,
177 (1998).
[10] D. Aharonov, A. Ta-Shma, U. Vazirani, and A. Yao, in
Proceedings of the 32nd Annual Symposium on Theory of
Computing 2000 (Association for Computing Machinery,
New York, 2000), p. 705.
[11] N. K. Langford et al., Phys. Rev. Lett. 93, 053601 (2004).
[12] A. D. Greentree et al., Phys. Rev. Lett. 92, 097901 (2004).
[13] A. Mair et al., Nature (London) 412, 313 (2001).
[14] G. Molina-Terriza, J. P. Torres, and L. Torner, Phys. Rev.
Lett. 88, 013601 (2002).
[15] G. Molina-Terriza et al., Phys. Rev. Lett. 92, 167903
(2004).
[16] A. E. Siegman, Lasers, (University Science, Sausalito,
1986).
[17] A. Vaziri, G. Weihs, and A. Zeilinger, J. Opt. B 4, S47
(2002).
[18] A better cheating strategy for Alice was sent to us by T.
Rudolph, after the submission of theppaper.
Alice should
prepare the state 2j0i j1ip j2i= 6 and tell
that
pBob
she sends either j0i j1i= 2 or j0i j2i= 2.
[19] J. Leach, et al., Phys. Rev. Lett. 88, 257901 (2002).
[20] J. Barrett et al., Phys. Rev. A 69, 022322 (2004).
040501-4