Write, autoreview, editor, reviewer
3,129
edits
Line 15: | Line 15: | ||
*Sending m bits message uses O(m) quantum bits for each recipient. | *Sending m bits message uses O(m) quantum bits for each recipient. | ||
*The public keys can be used only once. | *The public keys can be used only once. | ||
* | * Unlike some classical information-theoretic (unconditional security) schemes which require secure anonymous broadcast channel or noisy channel, which are hard to achieve resources, the quantum scheme provides information-theoretic security by only demanding plausible quantum channels and modest interaction between parties involved. | ||
== Requirements == | == Requirements == |