Editing Anonymous Transmission
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 7: | Line 7: | ||
==Protocols== | ==Protocols== | ||
#[[GHZ-based Quantum Anonymous Transmission| | #[[GHZ-based Quantum Anonymous Transmission|GHZ-based]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
#[[W-based Quantum Anonymous Transmission| | #[[W-based Quantum Anonymous Transmission|W-based]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
#[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | #[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
[[Category: Quantum Memory Network Stage]] | [[Category: Quantum Memory Network Stage]] | ||
* GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise. | * GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise. | ||
* Entanglement relay protocol does not require a preshared multipartite state, but it creates a 4-partite GHZ state during the protocol. | |||
* Entanglement relay protocol does not require a | |||
==Properties== | ==Properties== | ||
Line 20: | Line 18: | ||
*'''Guessing probability''' Let <math>\mathcal{A}</math> be a subset of adversaries among <math>n</math> nodes. Let <math>C</math> be the register that contains all classical and quantum side information accessible to the adversaries. Then, the probability of adversaries guessing the sender is given by | *'''Guessing probability''' Let <math>\mathcal{A}</math> be a subset of adversaries among <math>n</math> nodes. Let <math>C</math> be the register that contains all classical and quantum side information accessible to the adversaries. Then, the probability of adversaries guessing the sender is given by | ||
<math> P_{\text{guess}}[S|C, S\notin \mathcal{A}] = \max_{\{M^i\}} \sum_{i \in [n]} P[S=i|S\notin \mathcal{A}] \text{Tr}[M^i \cdot \rho_{C|S=i} ],</math></br> | <math> P_{\text{guess}}[S|C, S\notin \mathcal{A}] = \max_{\{M^i\}} \sum_{i \in [n]} P[S=i|S\notin \mathcal{A}] \text{Tr}[M^i \cdot \rho_{C|S=i} ],</math></br> | ||
where the | where the maximization is taken over the set of POVMs <math>{\{M^i\}}</math> for the adversaries and <math>\rho_{C|S=i}</math> is the state of the adversaries at the end of the protocol, given that node <math>i</math> is the sender | ||
*'''Sender-security''' We say that an anonymous transmission protocol is ''sender-secure'' if, given that the sender is honest, the probability of the adversary guessing the sender is </br> | *'''Sender-security''' We say that an anonymous transmission protocol is ''sender-secure'' if, given that the sender is honest, the probability of the adversary guessing the sender is </br> | ||
<math>P_{\text{guess}}[S|C,S\notin \mathcal{A}] \leq \max_{i\in[n]} P[S=i|S\notin \mathcal{A}].</math></br> | <math>P_{\text{guess}}[S|C,S\notin \mathcal{A}] \leq \max_{i\in[n]} P[S=i|S\notin \mathcal{A}].</math></br> | ||
Line 29: | Line 27: | ||
==Further Information== | ==Further Information== | ||
* The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and | * The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and untrusted [[Quantum Anonymous Transmission#References|[3] ]]. | ||
==References== | ==References== | ||
#[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)] | #[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)] | ||
Line 43: | Line 33: | ||
#[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)] | #[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)] | ||
#[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)] | #[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)] | ||
<div style='text-align: right;'>''contributed by Victoria Lipinska''</div> | <div style='text-align: right;'>''contributed by Victoria Lipinska''</div> |