Write, autoreview, editor, reviewer
3,129
edits
Line 19: | Line 19: | ||
'''Tags:''' Any related page or list of protocols is connected by this section | '''Tags:''' Any related page or list of protocols is connected by this section | ||
---- | ---- | ||
*'''Use Case''' | *'''Use Case''' (if available) | ||
---- | ---- | ||
# | #compares security, efficiency and practicality of quantum protocols with its available classical analogues. | ||
*'''Protocols''' | |||
---- | |||
List of one example protocol in different network stages (Each protocol in this list is written in the format given below) | |||
*'''Properties''' | *'''Properties''' | ||
---- | ---- | ||
All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols. | All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols. | ||
*'''Discussion'''</br> | *'''Discussion'''</br> | ||
---- | ---- | ||
Any issue that | Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. | ||
</div> | </div> | ||
</br> | </br> | ||
*Protocol Format | *Protocol Format | ||
</br> | </br> | ||
<div style="background-color: white; border: solid thin black;;"> | <div style="background-color: white; border: solid thin black;;"> | ||
Link to the functionality achieved with a short description of the method used and properties satisfied by a protocol (link). A one line user-friendly description might be included, if possible. | |||
'''Tags:''' Any related page or list of protocols is connected by this section | '''Tags:''' Any related page or list of protocols is connected by this section | ||
---- | ---- | ||
*''' | *'''Model Assumptions''' Any assumption on the setup for the protocol below is listed in this section. | ||
---- | ---- | ||
*'''Outline''' A non-mathematical detailed outline which provides a rough idea of the concerned protocol. A figure is accommodated for most protocols. | |||
**'''Figure''' A figure explicitly describing an example of the protocol outlined | |||
*''' | |||
---- | ---- | ||
*'''Notations used''' Connects the non-mathematical outline with further sections | |||
*'''Hardware requirements''' | |||
# Order of digits related to threshold values, QBit Error Rate (QBER), parameters, etc.. are illustrated in this section. | |||
*'''Properties''' A list of important information extracted from the protocol such as, parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | |||
#'''Pseudo Code''' Mathematical step-wise protocol algorithm helpful to write a subroutine. | #'''Pseudo Code''' Mathematical step-wise protocol algorithm helpful to write a subroutine. | ||
*''' | *'''Discussion''' | ||
---- | ---- | ||
Any useful information that could not find its place in the above description goes here. Also, some pages on protocols might include short description as below for list of protocols in the same class of functionality and network stage that are easy to interpret after reading the concerned formal description (or are variants of the protocol discussed above), in chronological order with the following point wise description for each: | |||
*Theoretical Papers: | *Theoretical Papers: | ||
**How is it different from the above protocol | **How is it different from the above protocol |