Write, autoreview, editor, reviewer
3,129
edits
No edit summary |
|||
Line 14: | Line 14: | ||
** The client prepares the fingerprint of initial input which is sized <math>n</math>-bits. This fingerprint has a length of <math>\log_{}n</math> bits. | ** The client prepares the fingerprint of initial input which is sized <math>n</math>-bits. This fingerprint has a length of <math>\log_{}n</math> bits. | ||
** This fingerprint is prepared using particular error correcting codes, which converts the <math>n</math>-bit input to <math>m</math>-bits, where <math>m</math> is greater than <math>n</math>, and the two outputs of any two distinct inputs can be equal at atmost <math>\delta m</math> positions, where <math>\delta < 0</math>. The fingerprint has the length to be <math>log_{} m+1</math> | ** This fingerprint is prepared using particular error correcting codes, which converts the <math>n</math>-bit input to <math>m</math>-bits, where <math>m</math> is greater than <math>n</math>, and the two outputs of any two distinct inputs can be equal at atmost <math>\delta m</math> positions, where <math>\delta < 0</math>. The fingerprint has the length to be <math>log_{} m+1</math> | ||
** Hence for this purpose [https://ieeexplore.ieee.org/document/1054893 | ** Hence for this purpose [https://ieeexplore.ieee.org/document/1054893 Justesen codes] are used. | ||
** The client now sends this fingerprint to the server through a quantum channel. Both the clients do this process simultaneously. | ** The client now sends this fingerprint to the server through a quantum channel. Both the clients do this process simultaneously. | ||