Anonymous Transmission: Difference between revisions

no edit summary
mNo edit summary
No edit summary
Line 8: Line 8:


#[[GHZ-based Quantum Anonymous Transmission|Based on the GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]  
#[[GHZ-based Quantum Anonymous Transmission|Based on the GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]  
#[[Verifiable Quantum Anonymous Transmission|Based on a verified GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]
#[[W-based Quantum Anonymous Transmission|Based on the W state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]
#[[W-based Quantum Anonymous Transmission|Based on the W state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]
#[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]
#[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]
  [[Category: Quantum Memory Network Stage]]
  [[Category: Quantum Memory Network Stage]]
* GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise.
* GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise.
* Verifiable GHZ-based protocol allows an imperfect or untrusted GHZ state, and involves a verification stage.
* Entanglement relay protocol does not require a pre-shared multipartite state, but it creates a 4-partite GHZ state during the protocol.
* Entanglement relay protocol does not require a pre-shared multipartite state, but it creates a 4-partite GHZ state during the protocol.


Line 27: Line 29:


==Further Information==
==Further Information==
* The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3] ]].
* The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3], [5] ]].
==References==
==References==
#[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)]
#[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)]
Line 33: Line 35:
#[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)]
#[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)]
#[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)]
#[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)]
#[https://arxiv.org/abs/1811.04729 Unnikrishnan et al (2018)]


<div style='text-align: right;'>''contributed by Victoria Lipinska''</div>
<div style='text-align: right;'>''contributed by Victoria Lipinska''</div>
Write, autoreview, editor, reviewer
3,129

edits