Write, autoreview, editor, reviewer
3,129
edits
Line 4: | Line 4: | ||
==Assumptions== | ==Assumptions== | ||
*We assume that the adversary has access to a quantum memory that is bounded in size, say the memory is of at most <math>log2(d)</math> qubits. See | *We assume that the adversary has access to a quantum memory that is bounded in size, say the memory is of at most <math>log2(d)</math> qubits. See Bounded/Noisy Storage Model [[Weak String Erasure#References| | ||
in ()]] | |||
* The transmission of qubit is noiseless/lossless. | * The transmission of qubit is noiseless/lossless. | ||
* The preparation devices (for quantum state) are assumed to be fully characterized and trusted. We assume the same for the measurement devices. | * The preparation devices (for quantum state) are assumed to be fully characterized and trusted. We assume the same for the measurement devices. |