<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=91.35.144.136</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=91.35.144.136"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/91.35.144.136"/>
	<updated>2026-04-19T00:13:44Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Trap_Code_for_Quantum_Authentication&amp;diff=4426</id>
		<title>Trap Code for Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Trap_Code_for_Quantum_Authentication&amp;diff=4426"/>
		<updated>2021-12-22T11:42:54Z</updated>

		<summary type="html">&lt;p&gt;91.35.144.136: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: 1-qubit input state&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Encoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#Input: &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, pair of keys &amp;lt;math&amp;gt;k=(k_1, k_2)&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply an &amp;lt;math&amp;gt;[[n,1,d]]&amp;lt;/math&amp;gt; error correction code (corrects up to &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt; errors, &amp;lt;math&amp;gt;d=2t+1&amp;lt;/math&amp;gt;)&lt;br /&gt;
#Append an additional trap register of &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|0\rangle\langle 0|^{\otimes n}&amp;lt;/math&amp;gt;&lt;br /&gt;
#Append a second additional trap register of &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|+\rangle\langle +|^{\otimes n}&amp;lt;/math&amp;gt;&lt;br /&gt;
#Permute the total &amp;lt;math&amp;gt;3n&amp;lt;/math&amp;gt;-qubit register by &amp;lt;math&amp;gt;\pi_{k_1}&amp;lt;/math&amp;gt; according to the key &amp;lt;math&amp;gt;k_1&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply a Pauli encryption &amp;lt;math&amp;gt;P_{k_2}&amp;lt;/math&amp;gt; according to key &amp;lt;math&amp;gt;k_2&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Decoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#Input: &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt; (state after encoding), pair of keys &amp;lt;math&amp;gt;k=(k_1, k_2)&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply &amp;lt;math&amp;gt;P_{k_2}&amp;lt;/math&amp;gt; according to key &amp;lt;math&amp;gt;k_2&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply inverse permutation &amp;lt;math&amp;gt;\pi_{k_1}^\dagger&amp;lt;/math&amp;gt; according to the key &amp;lt;math&amp;gt;k_1&amp;lt;/math&amp;gt;&lt;br /&gt;
#Measure the last &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in the Hadamard basis&lt;br /&gt;
#Measure the second last &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in the computational basis &amp;lt;/br&amp;gt;a. If the two measurements result in &amp;lt;math&amp;gt;|+\rangle\langle +|&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|0\rangle\langle 0|&amp;lt;/math&amp;gt;, an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle\langle\mathrm{ACC}|&amp;lt;/math&amp;gt; is appended and the quantum message is decoded according to the error correction code &amp;lt;/br&amp;gt;b. Otherwise, an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{REJ}\rangle\langle\mathrm{REJ}|&amp;lt;/math&amp;gt; is appended and the (disturbed) encoded quantum message is replaced by a fixed state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/1211.1080.pdf| Broadbent et al. (2012)]&lt;br /&gt;
#[https://arxiv.org/pdf/1607.03075.pdf| Broadbent and Wainewright (2016).]&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Isabel Nha Minh Le&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>91.35.144.136</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Clifford_Code_for_Quantum_Authentication&amp;diff=4425</id>
		<title>Clifford Code for Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Clifford_Code_for_Quantum_Authentication&amp;diff=4425"/>
		<updated>2021-12-22T11:41:52Z</updated>

		<summary type="html">&lt;p&gt;91.35.144.136: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Clifford Authentication Scheme was introduced in the paper [https://arxiv.org/pdf/0810.5375.pdf| Interactive Proofs For Quantum Computations by Aharanov et al.]. It applies a random Clifford operator to the quantum message and an auxiliary register and then measures the auxiliary register to decide whether to accept or abort for [[Authentication of Quantum Messages|quantum authentication]].&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The Clifford code encodes a quantum message by appending an auxiliary register with each qubit in state &amp;lt;math&amp;gt;|0\rangle&amp;lt;/math&amp;gt; and then applying a random Clifford operator on all qubits. The authenticator then measures only the auxiliary register. If all qubits in the auxiliary register are still in state &amp;lt;math&amp;gt;|0\rangle&amp;lt;/math&amp;gt;, the authenticator accepts and decodes the quantum message. Otherwise, the authenticator aborts the process.&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;: suppliant (sender)&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;: authenticator (prover)&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit state to be transmitted&lt;br /&gt;
*&amp;lt;math&amp;gt;d\in\mathbb{N}&amp;lt;/math&amp;gt;: security parameter defining the number of qubits in the auxiliary register&lt;br /&gt;
*&amp;lt;math&amp;gt;\{C_k\}&amp;lt;/math&amp;gt;: set of Clifford operations on &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits labelled by a classical key &amp;lt;math&amp;gt;k\in\mathcal{K}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*The Clifford code makes use of &amp;lt;math&amp;gt;n=m+d+1&amp;lt;/math&amp;gt; qubits&lt;br /&gt;
*The Clifford code is [[Authentication of Quantum Messages|quantum authentication]] scheme with security &amp;lt;math&amp;gt;2^{-d}&amp;lt;/math&amp;gt;&lt;br /&gt;
*The qubit registers used can be divided into a message register with &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; qubits, an auxiliary register with &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; qubits, and a flag register with &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt; qubit.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
*&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Output:&#039;&#039;&#039; Receiver accepts or rejects&lt;br /&gt;
**&#039;&#039;&#039;&#039;&#039;Encoding:&#039;&#039;&#039;&#039;&#039; &amp;lt;math&amp;gt;\mathcal{E}_k: \rho \mapsto C_k\left( \rho \otimes |0\rangle\langle 0|^{\otimes d} \right)C_k^\dagger&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; appends an auxiliary register of &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|0\rangle\langle 0|&amp;lt;/math&amp;gt; to the quantum message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, which results in &amp;lt;math&amp;gt;\rho\otimes|0\rangle\langle0|^{\otimes d}&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; then applies &amp;lt;math&amp;gt;C_k&amp;lt;/math&amp;gt; for a uniformly random &amp;lt;math&amp;gt;k\in\mathcal{K}&amp;lt;/math&amp;gt; on the total state.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; sends the result to &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;.&lt;br /&gt;
**&#039;&#039;&#039;&#039;&#039;Decoding:&#039;&#039;&#039;&#039;&#039; Mathematically, the decoding process is described by &amp;lt;math display=block&amp;gt;\mathcal{D}_k: \rho^\prime \mapsto \mathrm{tr}_0\left( \mathcal{P}_\mathrm{acc} C_k^\dagger (\rho^\prime) C_k \mathcal{P}_\mathrm{acc}^\dagger \right) \otimes |\mathrm{ACC}\rangle\langle \mathrm{ACC}| + \mathrm{tr}\left( \mathcal{P}_\mathrm{rej} C_k^\dagger (\rho^\prime) C_k \mathcal{P}_\mathrm{rej}^\dagger \right) \Omega \otimes |\mathrm{REJ}\rangle\langle\mathrm{REJ}|&amp;lt;/math&amp;gt; In the above, &amp;lt;math&amp;gt;\mathrm{tr}_0&amp;lt;/math&amp;gt; is the trace over the auxiliary register only, and &amp;lt;math&amp;gt;\mathrm{tr}&amp;lt;/math&amp;gt; is the trace over the quantum message system and the auxiliary system. Furthermore, &amp;lt;math&amp;gt;\mathcal{P}_\mathrm{acc}=\mathbb{1}^{\otimes n} \otimes |0\rangle\langle 0|^{\otimes d}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{P}_\mathrm{rej}=\mathbb{1}^{\otimes (n+d)} - \mathcal{P}_\mathrm{acc}&amp;lt;/math&amp;gt; are projective measurement operators.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; applies the inverse Clifford &amp;lt;math&amp;gt;C_k^\dagger&amp;lt;/math&amp;gt; to the received state, which is denoted by &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the auxiliary register in the computational basis.&amp;lt;/br&amp;gt;a. If all &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; auxiliary qubits are 0, the state is accepted and an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle\langle\mathrm{ACC}|&amp;lt;/math&amp;gt; is appended.&amp;lt;/br&amp;gt;b. Otherwise, the remaining system is traced out and replaced with a fixed &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt; and an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{REJ}\rangle\langle \mathrm{REJ}|&amp;lt;/math&amp;gt; is appended.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/0810.5375.pdf| Aharanov et al. (2008).]&lt;br /&gt;
#[https://arxiv.org/pdf/1607.03075.pdf| Broadbent and Wainewright (2016).]&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Isabel Nha Minh Le&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>91.35.144.136</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Polynomial_Code_based_Quantum_Authentication&amp;diff=4424</id>
		<title>Polynomial Code based Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Polynomial_Code_based_Quantum_Authentication&amp;diff=4424"/>
		<updated>2021-12-22T11:38:05Z</updated>

		<summary type="html">&lt;p&gt;91.35.144.136: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The paper [https://arxiv.org/pdf/quant-ph/0205128.pdf Authentication of Quantum Messages by Barnum et al.] provides a non-interactive scheme with classical keys for the sender to encrypt as well as [[Authentication of Quantum Messages|authenticate quantum messages]]. It was the first protocol designed to achieve the task of authentication for quantum states, i.e. it gives the guarantee that the message sent by a party (suppliant) over a communication line is received by a party on the other end (authenticator) without having been tampered with or modified by the dishonest party (eavesdropper).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The polynomial code consists of three steps: preprocessing, encryption and encoding, and decoding and decryption. Within the preprocessing, sender and receiver agree on a [[Stabilizer Purity Testing Code | stabilizer purity testing code]] and three private, random binary keys. Within the encryption and encoding step, the sender uses one of these keys to encrypt the original message. Consequently, a second key is used to choose a specific quantum error correction code out of the [[Stabilizer Purity Testing Code | stabilizer purity testing code]]. The chosen quantum error correction code is then used, together with the last key, to encode the encrypted quantum message. Within the last step, the decoding and decryption step, the respective keys are used by the receiver to decide whether to abort or not, and if not, to decode and decrypt the received quantum message.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
*The sender and the receiver share a private, classical random key drawn from a probability distribution&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;: suppliant (sender)&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;: authenticator (prover)&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: quantum message to be sent&lt;br /&gt;
*&amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;: number of qubits in the message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;\{Q_k\}&amp;lt;/math&amp;gt;: [[Stabilizer Purity Testing Code | stabilizer purity testing code]], each stabilizer code is identified by index &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;: number of qubits used to encode the message with &amp;lt;math&amp;gt;\{Q_k\}&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;: random binary &amp;lt;math&amp;gt;2m&amp;lt;/math&amp;gt;-bit key&lt;br /&gt;
*&amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt;: random syndrome for a specific &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
Add Input and Output for each subroutine&lt;br /&gt;
*&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; owned by &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;; &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt; shared among &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Output:&#039;&#039;&#039; Receiver: accepts or aborts &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;&lt;br /&gt;
**&#039;&#039;&#039;&#039;&#039;Encryption and encoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; q-encrypts the &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit original message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; as &amp;lt;math&amp;gt;\tau&amp;lt;/math&amp;gt; using the classical key &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and a [[Quantum One-Time Pad | quantum one-time pad]]. This encryption is given by &amp;lt;math&amp;gt;\tau = \sigma_x^{\vec{t}_1}\sigma_z^{\vec{t}_2}\rho\sigma_z^{\vec{1}_1}\sigma_x^{\vec{t}_1}&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\vec{t}_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\vec{t}_2&amp;lt;/math&amp;gt; are &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-bit vectors and given by the random binary key &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; then encodes &amp;lt;math&amp;gt;\tau&amp;lt;/math&amp;gt; according to &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; with syndrome &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt;, which results in the &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-qubit state &amp;lt;math&amp;gt;\sigma&amp;lt;/math&amp;gt;. This means &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; encodes &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; in &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits using &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt;, and then &amp;quot;applies&amp;quot; errors according to the random syndrome.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; sends &amp;lt;math&amp;gt;\sigma&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;.&lt;br /&gt;
**&#039;&#039;&#039;&#039;&#039;Decoding and decryption:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; receives the &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits, whose state is denoted by &amp;lt;math&amp;gt;\sigma^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the syndrome &amp;lt;math&amp;gt;y^\prime&amp;lt;/math&amp;gt; of the code &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; on his &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;\sigma^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; compares the syndromes &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;y^\prime&amp;lt;/math&amp;gt; and aborts the process if they are different.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; decodes his &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-qubit word according to &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; obtaining &amp;lt;math&amp;gt;\tau^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; q-decrypts &amp;lt;math&amp;gt;\tau^\prime&amp;lt;/math&amp;gt; using the random binary strings &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; obtaining &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/0205128.pdf| Barnum et al. (2002).]&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Isabel Nha Minh Le&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>91.35.144.136</name></author>
	</entry>
</feed>