Protocol Library: Difference between revisions

Jump to navigation Jump to search
m (Added link to Copy Protection for Compute and Compare Programs)
(Add a protocol page to the Entanglement Routing Functionality)
Line 10: Line 10:
|rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]
|rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]
|-
|-
|rowspan="1"|[[Authentication of Quantum Messages]]||[[Polynomial Code based Quantum Authentication]]
|rowspan="5"|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]]
|-
|[[Polynomial Code based Quantum Authentication]]
|-
|[[Clifford Code for Quantum Authentication]]
|-
|[[Trap Code for Quantum Authentication]]
|-
|[[Naive approach using Quantum Teleportation]]
|-
|-
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]
Line 134: Line 142:
||-||[[Weak String Erasure]]
||-||[[Weak String Erasure]]
|-
|-
|rowspan="1"|[[Entanglement Routing]]||[[Distributing Graph States Over Arbitrary Quantum Networks]]
|rowspan="2"|[[Entanglement Routing]]||[[Routing Entanglement in the Quantum Internet]]
|-
|[[Distributing Graph States Over Arbitrary Quantum Networks]]