Polynomial Code based Quantum Authentication
The example protocol provides a non-interactive scheme for the sender to encrypt as well as authenticate quantum messages. It was the first protocol designed to achieve the task of authentication for quantum states.
Assumptions
- The sender and the receiver share a classical key drawn from a probability distribution.
Outline
Notations
Properties
Pseudo Code
Further Information
References
contributed by Shraddha Singh