Weak String Erasure: Difference between revisions

Jump to navigation Jump to search
Line 4: Line 4:


==Assumptions==
==Assumptions==
*We assume that the adversary has access to a quantum memory that is bounded in size, say the memory is of at most <math>log2(d)</math> qubits. See [[Bounded/Noisy Storage Model]]
*We assume that the adversary has access to a quantum memory that is bounded in size, say the memory is of at most <math>log2(d)</math> qubits. See Bounded/Noisy Storage Model [[Weak String Erasure#References|
in ()]]
* The transmission of qubit is noiseless/lossless.
* The transmission of qubit is noiseless/lossless.
* The preparation devices (for quantum state) are assumed to be fully characterized and trusted. We assume the same for the measurement devices.
* The preparation devices (for quantum state) are assumed to be fully characterized and trusted. We assume the same for the measurement devices.
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu