Write
262
edits
Line 4: | Line 4: | ||
==Assumptions== | ==Assumptions== | ||
*We assume that the adversary has access to a quantum memory that is bounded in size, say the memory is of at most <math>log_2(d)</math> qubits. See Bounded/Noisy Storage Model in [[Weak String Erasure#References| | *We assume that the adversary has access to a quantum memory that is bounded in size, say the memory is of at most <math>\log_2(d)</math> qubits. See Bounded/Noisy Storage Model in [[Weak String Erasure#References| | ||
[4]/[3] ]] | [4]/[3] ]] | ||
* The transmission of qubit is noiseless/lossless. | * The transmission of qubit is noiseless/lossless. |