Quantum Fingerprinting: Difference between revisions

No edit summary
Line 14: Line 14:
** The client prepares the fingerprint of initial input which is sized <math>n</math>-bits. This fingerprint has a length of <math>\log_{}n</math> bits.  
** The client prepares the fingerprint of initial input which is sized <math>n</math>-bits. This fingerprint has a length of <math>\log_{}n</math> bits.  
** This fingerprint is prepared using particular error correcting codes, which converts the <math>n</math>-bit input to <math>m</math>-bits, where <math>m</math> is greater than <math>n</math>, and the two outputs of any two distinct inputs can be equal at atmost <math>\delta m</math> positions, where <math>\delta < 0</math>. The fingerprint has the length to be <math>log_{} m+1</math>
** This fingerprint is prepared using particular error correcting codes, which converts the <math>n</math>-bit input to <math>m</math>-bits, where <math>m</math> is greater than <math>n</math>, and the two outputs of any two distinct inputs can be equal at atmost <math>\delta m</math> positions, where <math>\delta < 0</math>. The fingerprint has the length to be <math>log_{} m+1</math>
** Hence for this purpose [https://ieeexplore.ieee.org/document/1054893|Justesen codes] are used.  
** Hence for this purpose [https://ieeexplore.ieee.org/document/1054893 Justesen codes] are used.  
** The client now sends this fingerprint to the server through a quantum channel. Both the clients do this process simultaneously.
** The client now sends this fingerprint to the server through a quantum channel. Both the clients do this process simultaneously.


Write, autoreview, editor, reviewer
3,129

edits