Write, autoreview, editor, reviewer
3,125
edits
Line 5: | Line 5: | ||
This stage allows tasks like [[Quantum Key Distribution|QKD]]. Another class of protocols in this stage is in the domain of two-party cryptography. Here, there is no eavesdropper, but rather Alice and Bob themselves do not trust each other. | This stage allows tasks like [[Quantum Key Distribution|QKD]]. Another class of protocols in this stage is in the domain of two-party cryptography. Here, there is no eavesdropper, but rather Alice and Bob themselves do not trust each other. | ||
==Relevant Parameters== | ==Relevant Parameters== | ||
*Distances <math>\epsilon_T</math> and <math>\epsilon_M</math> from the ideal transmission and measurement operations. These distances are diamond norm distance between the ideal quantum channels, measurement and real (noisy) quantum channels and measurement. | *Distances <math>\epsilon_T</math> and <math>\epsilon_M</math> from the ideal transmission and measurement operations. These distances are diamond norm distance between the states obtained from ideal quantum channels, measurement and real (noisy) quantum channels and measurement. | ||
*Probability <math>p</math> that the state is not lost. | *Probability <math>p</math> that the state is not lost. | ||
[[Category:Network Stages]] | [[Category:Network Stages]] |