Main Page: Difference between revisions
Line 29: | Line 29: | ||
---- | ---- | ||
Revision as of 14:52, 7 November 2018
Welcome to The Quantum Protocol Zoo- Explore, Learn and Implement Quantum Protocols
The Quantum Protocol Zoo is open repository of quantum protocols which provides a medium to explore all such protocols presented in a compressed form in order to communicate with the computer scientists, engineers and physicists on one platform.
Getting started
Quantum Protocol Zoo encompasses a set of General Functionality Descriptions of different quantum and classical functionalities achieved by various quantum protocols. This description elicits the different methods used by various protocols. Each such method is described by a formal description illustrating a simple yet detailed outline of the method, its properties and relevant papers. The description is written keeping a general audience in mind and a mathematical algorithm of the same is also provided. The section on relevant papers encompass all the various protocols published so far which imply similar method and properties. The different descriptions are interlinked by means of related terms called "tags". Some use case and technological readiness of the method are also highlighted to indicate any near term implementation or scope of the protocol. Finally, all esoteric concepts used in any description are explained via links to Appendix.
'*'Each page is independent and does not require any extra information yet links are provided for better understanding of some concepts in all such descriptions. Following is the structure for all formal descriptions available on Quantum Protocol Zoo.
Structure
- Functionality Description
A lucid definition of functionality achieved and properties satisfied by the method used.
- Use Case
Bridges the gap between users and protocol designers.
Tags: Any related page or list of protocols is connected by this section
- Outline
A non-mathematical detailed outline which provides a rough idea of the method described. A figure is accommodated for most protocols.
- Requirements
- Network Stage:
- Technological Readiness:
- Example: link to the example paper to be discussed below is provided here
- Properties A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see Quantum Adversary Definitions), setup assumptions, etc..
- Pseudo Code Mathematical step-wise protocol algorithm
- Relevant papers
Protocols easy to interpret after reading the concerned formal description, listed in chronological order.