20
edits
No edit summary |
No edit summary |
||
Line 30: | Line 30: | ||
==Further Information== | ==Further Information== | ||
* The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3], [5] ]]. | * The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3], [5] ]]. | ||
==Use-cases== | |||
* [[Aggregation of sensitive data]] | |||
* [[Toward regulation for security and privacy]] | |||
==Knowledge Graph== | ==Knowledge Graph== |