Editing Protocol Library
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 11: | Line 11: | ||
|rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]] | |rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]] | ||
|- | |- | ||
|rowspan=" | |rowspan="5"|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]] | ||
|- | |- | ||
|[[Polynomial Code based Quantum Authentication]] | |[[Polynomial Code based Quantum Authentication]] | ||
Line 18: | Line 18: | ||
|- | |- | ||
|[[Trap Code for Quantum Authentication]] | |[[Trap Code for Quantum Authentication]] | ||
|- | |- | ||
|[[Naive approach using Quantum Teleportation]] | |[[Naive approach using Quantum Teleportation]] |