Write, autoreview, editor, reviewer
3,129
edits
No edit summary |
m (→Outline) |
||
Line 17: | Line 17: | ||
The protocol for quantum anonymous transmission consists of the following steps: | The protocol for quantum anonymous transmission consists of the following steps: | ||
# '' | # ''Receiver notification'': The Sender <math>\mathcal{S}</math> notifies the Receiver <math>R</math> by running <span style="font-variant:small-caps">Notification</span>. | ||
# '' | # ''State distribution'': A source, who may be untrusted, distributes a state claiming to be the GHZ state. | ||
# '' | # ''Verification or anonymous transmission'': <math>\mathcal{S}</math> anonymously chooses whether to verify the state or use it for anonymous transmission, using <span style="font-variant:small-caps">RandomBit</span>. | ||
If verification is chosen, a player is chosen to run <span style="font-variant:small-caps">Verification</span>, using <math>\log_2 n</math> repetitions of <span style="font-variant:small-caps">RandomBit</span>. | If verification is chosen, a player is chosen to run <span style="font-variant:small-caps">Verification</span>, using <math>\log_2 n</math> repetitions of <span style="font-variant:small-caps">RandomBit</span>. |