Protocol Library: Difference between revisions

262 bytes removed ,  30 January 2019
m
no edit summary
No edit summary
mNo edit summary
Line 4: Line 4:
!width="60%"|Protocols
!width="60%"|Protocols
|-
|-
|[[Classical Delegated Computing]]
|[[Classical Delegated Computing using Quantum Resources]]
|-
|-
|colspan="2"|[[Quantum Anonymous Transmission]]
|colspan="2"|[[Classical Multiparty Computing using Quantum Resources]]
|-
|colspan="2"|[[Quantum Byzantine Agreement]]
|-
|-
|rowspan="5"|[[Quantum Cloning]]||[[Asymmetric Universal 1-2 Cloning]]
|rowspan="5"|[[Quantum Cloning]]||[[Asymmetric Universal 1-2 Cloning]]
Line 35: Line 33:
|-
|-
|[[Device Independent Quantum Key Distribution]]
|[[Device Independent Quantum Key Distribution]]
|-
|[[Six State Quantum Key Distribution]]
|-
|-
|colspan="2"|[[Quantum Leader Election]]
|colspan="2"|[[Quantum Leader Election]]
Line 43: Line 39:
|-
|-
|[[Quantum Position Verification]]
|[[Quantum Position Verification]]
|-
|colspan="2"|[[Quantum Random Number Generator]]
|-
|colspan="2"|[[Quantum Secret Sharing]]
|-
|colspan="2"|[[Quantum Superposition]]
|-
|colspan="2"|[[Quantum Teleportation]]
|-  
|-  
|Random Qubit Generator||[[Pseudo-Secret Random Qubit Generator (PSQRG)]]
|Random Qubit Generator||[[Pseudo-Secret Random Qubit Generator (PSQRG)]]
Line 65: Line 53:
|-
|-
|[[Verification of Quantum Computation]]
|[[Verification of Quantum Computation]]
|-
|colspan="2"|[[Weak String Erasure]]
Write, autoreview, editor, reviewer
3,129

edits