Editing Anonymous Transmission
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 8: | Line 8: | ||
#[[GHZ-based Quantum Anonymous Transmission|Based on the GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | #[[GHZ-based Quantum Anonymous Transmission|Based on the GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
#[[Verifiable Quantum Anonymous Transmission|Based on a verified GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | |||
#[[W-based Quantum Anonymous Transmission|Based on the W state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | #[[W-based Quantum Anonymous Transmission|Based on the W state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
#[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | #[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
[[Category: Quantum Memory Network Stage]] | [[Category: Quantum Memory Network Stage]] | ||
* GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise. | * GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise. | ||
Line 30: | Line 30: | ||
==Further Information== | ==Further Information== | ||
* The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3], [5] ]]. | * The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3], [5] ]]. | ||
==References== | ==References== | ||
#[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)] | #[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)] | ||
Line 43: | Line 35: | ||
#[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)] | #[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)] | ||
#[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)] | #[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)] | ||
#[https:// | #[https://arxiv.org/abs/1811.04729 Unnikrishnan et al (2018)] | ||
<div style='text-align: right;'>''contributed by Victoria Lipinska''</div> | <div style='text-align: right;'>''contributed by Victoria Lipinska''</div> |