Category:Prepare and Measure Network Stage: Difference between revisions

From Quantum Protocol Zoo
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
This stage is the �first to offer end-to-end quantum functionality. Any node
The second network stage offers end-to-end connection between nodes. Any node here is allowed to prepare one qubit state and transmit the resulting state to any other node, which then can receive and measure it. In this case, the other node can either measure the qubit or conclude that it is lost. </br>
here is allowed to prepare one qubit state and transmit the resulting state to
 
any other node, which then receives and measures it. In this case, the other
Transmissions and measurements can be [https://en.wikipedia.org/wiki/Postselection post-selected], a signal that the qubit is lost may be generated instead. For instance, the receiving node is allowed to ignore non-detection events and conclude that such qubits are lost. If the sender can prepare an entangled state of two qubits then this stage also includes the case in which the sender can prepare an entangled state and send the two entangled qubits to two different nodes in the network. This entanglement distribution is also post-selected. However this post selected prepare and measure functionality is not equivalent to transmitting arbitrary qubits over the network.
node can either measure the qubit or conclude that it is lost. Transmissions
==Applications==
and measurements can be post-selected, a signal that the qubit is lost may
This stage allows tasks like [[Quantum Key Distribution|QKD]]. Another class of protocols in this stage is in the domain of two-party cryptography. Here, there is no eavesdropper, but rather Alice and Bob themselves do not trust each other.
be generated instead. For instance, the receiving node is allowed to ignore
==Relevant Parameters==
non-detection events and conclude that such qubits are lost.
If the sender can prepare an entangled state of two qubits then this stage
also includes the case in which the sender can prepare an entangled state and
send the two entangled qubits to two di�erent nodes in the network. This
entanglement distribution is also post-selected. However this post selected
prepare and measure functionality is not equivalent to transmitting arbitrary
qubits over the network.
Applications:
This stage allows tasks like QKD, where a secure private key can be gener-
ated between two nodes, which is secure against any eavesdropper having any
kind of computational power. Nodes can have their password veri�ed without
leaking it.
Another class of protocols in this stage is in the domain of two-party cryp-
tography. Here, there is no eavesdropper, but rather Alice and Bob themselves
do not trust each other. An example of such a task is secure identi�cation,
in which Alice (a potentially impersonating user) may wish to identify herself
to Bob (a potentially malicious server or automated teller machine) without
revealing her authentication credentials. Provable security can be achieved in
this case.
Other known protocols in this stage include (position veri�cation) (link here)
which is weakened forms of two party cryptographic tasks that can form building blocks, such as imperfect bit commitments (link here) and coin-flipping
(link here)
[[Category:Network Stages]]
[[Category:Network Stages]]

Revision as of 01:10, 11 July 2019

The second network stage offers end-to-end connection between nodes. Any node here is allowed to prepare one qubit state and transmit the resulting state to any other node, which then can receive and measure it. In this case, the other node can either measure the qubit or conclude that it is lost.

Transmissions and measurements can be post-selected, a signal that the qubit is lost may be generated instead. For instance, the receiving node is allowed to ignore non-detection events and conclude that such qubits are lost. If the sender can prepare an entangled state of two qubits then this stage also includes the case in which the sender can prepare an entangled state and send the two entangled qubits to two different nodes in the network. This entanglement distribution is also post-selected. However this post selected prepare and measure functionality is not equivalent to transmitting arbitrary qubits over the network.

Applications

This stage allows tasks like QKD. Another class of protocols in this stage is in the domain of two-party cryptography. Here, there is no eavesdropper, but rather Alice and Bob themselves do not trust each other.

Relevant Parameters