Gottesman and Chuang Quantum Digital Signature: Difference between revisions

Line 18: Line 18:
*Sending m bits message uses O(m) quantum bits for each recipient.
*Sending m bits message uses O(m) quantum bits for each recipient.
*The public keys can be used only once.
*The public keys can be used only once.
*Only limited (T) distribution of public keys should be allowed, such that <math>T < L/n</math>, where quantum public key is an 'n' qubit state and L is the length of classical bit string.
* Unlike some classical information-theoretic (unconditional security) schemes which require secure anonymous broadcast channel or noisy channel, which are hard to achieve resources, the quantum scheme provides information-theoretic security by only demanding plausible quantum channels and modest interaction between parties involved.
* Unlike some classical information-theoretic (unconditional security) schemes which require secure anonymous broadcast channel or noisy channel, which are hard to achieve resources, the quantum scheme provides information-theoretic security by only demanding plausible quantum channels and modest interaction between parties involved.


Write, autoreview, editor, reviewer
3,129

edits