Verifiable Quantum Anonymous Transmission: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 14: Line 14:
* <span style="font-variant:small-caps">RandomBit</span> \cite{Unnikrishnan}: allows one player to anonymously choose a bit according to a probability distribution, using <span style="font-variant:small-caps">LogicalOR</span>.
* <span style="font-variant:small-caps">RandomBit</span> \cite{Unnikrishnan}: allows one player to anonymously choose a bit according to a probability distribution, using <span style="font-variant:small-caps">LogicalOR</span>.
* <span style="font-variant:small-caps">Verification</span> \cite{Pappa, McCutcheon}: allows one player (the Verifier) to run a test to check if the shared state is the GHZ state. The Verifier instructs each player to measure their qubit in a particular basis and checks the parity of the measurement outcomes.  
* <span style="font-variant:small-caps">Verification</span> \cite{Pappa, McCutcheon}: allows one player (the Verifier) to run a test to check if the shared state is the GHZ state. The Verifier instructs each player to measure their qubit in a particular basis and checks the parity of the measurement outcomes.  
* <span style="font-variant:small-caps">Anonymous Entanglement</span> \cite{Wehner}: $n-2$ nodes (all except for $\mathcal{S}$ and $\mathcal{R}$) measure in the $X$ basis and broadcast their measurement outcome. $\mathcal{S}$ and $\mathcal{R}$ broadcast random dummy bits. The parity of measurement outcomes allows the establishment of an entangled link between $\mathcal{S}$ and $\mathcal{R}$ which is called anonymous entanglement.
* <span style="font-variant:small-caps">Anonymous Entanglement</span> \cite{Wehner}: <math>n-2<math> nodes (all except for <math>\mathcal{S}<math> and <math>\mathcal{R}<math>) measure in the <math>X<math> basis and broadcast their measurement outcome. <math>\mathcal{S}<math> and <math>\mathcal{R}<math> broadcast random dummy bits. The parity of measurement outcomes allows the establishment of an entangled link between <math>\mathcal{S}<math> and <math>\mathcal{R}<math> which is called anonymous entanglement.


The protocol for quantum anonymous transmission consists of the following steps:
The protocol for quantum anonymous transmission consists of the following steps:
# \textit{Receiver notification}: The Sender $\mathcal{S}$ notifies the Receiver $R$ by running <span style="font-variant:small-caps">Notification</span>.
# \textit{Receiver notification}: The Sender <math>\mathcal{S}<math> notifies the Receiver <math>R<math> by running <span style="font-variant:small-caps">Notification</span>.
# \textit{State distribution}: A source, who may be untrusted, distributes a state claiming to be the GHZ state.
# \textit{State distribution}: A source, who may be untrusted, distributes a state claiming to be the GHZ state.
# \textit{Verification or anonymous transmission}: $\mathcal{S}$ anonymously chooses whether to verify the state or use it for anonymous transmission, using <span style="font-variant:small-caps">RandomBit}.  
# \textit{Verification or anonymous transmission}: <math>\mathcal{S}<math> anonymously chooses whether to verify the state or use it for anonymous transmission, using <span style="font-variant:small-caps">RandomBit}.  


If verification is chosen, a player is chosen to run <span style="font-variant:small-caps">Verification</span>, using $\log_2 n$ repetitions of  <span style="font-variant:small-caps">RandomBit</span>.  
If verification is chosen, a player is chosen to run <span style="font-variant:small-caps">Verification</span>, using <math>\log_2 n<math> repetitions of  <span style="font-variant:small-caps">RandomBit</span>.  
If the test passes, the protocol goes back to the \textit{State distribution} stage and runs again. If the test fails, the players abort.  
If the test passes, the protocol goes back to the \textit{State distribution} stage and runs again. If the test fails, the players abort.  


If anonymous transmission is chosen, the players run <span style="font-variant:small-caps">Anonymous Entanglement</span>, establishing an anonymous entanglement link between $\mathcal{S}$ and $\mathcal{R}$.
If anonymous transmission is chosen, the players run <span style="font-variant:small-caps">Anonymous Entanglement</span>, establishing an anonymous entanglement link between <math>\mathcal{S}<math> and <math>\mathcal{R}<math>.
$\mathcal{S}$ then teleports the message state $\ket{\psi}$ to $\mathcal{R}$ using the established anonymous entanglement. The classical message $m$ associated with teleportation is also sent anonymously.
<math>\mathcal{S}<math> then teleports the message state <math>\ket{\psi}<math> to <math>\mathcal{R}<math> using the established anonymous entanglement. The classical message <math>m<math> associated with teleportation is also sent anonymously.


==Notation==
==Notation==
* $n$: number of network nodes taking part in the anonymous transmission.
* <math>n<math>: number of network nodes taking part in the anonymous transmission.
* $t$: number of adversarial network nodes taking part in the anonymous transmission.
* <math>t<math>: number of adversarial network nodes taking part in the anonymous transmission.
* $\ket{\psi}$: quantum message which the Sender wants to send anonymously.
* <math>\ket{\psi}<math>: quantum message which the Sender wants to send anonymously.
* $\ket{GHZ}  = \frac{1}{\sqrt{2</span> (\ket{0^n} + \ket{1^n})$: GHZ state.  
* <math>\ket{GHZ}  = \frac{1}{\sqrt{2</span> (\ket{0^n} + \ket{1^n})<math>: GHZ state.  
* $\ket{\Psi}$: state provided by the untrusted source for anonymous transmission (in the ideal case, this is the GHZ state).
* <math>\ket{\Psi}<math>: state provided by the untrusted source for anonymous transmission (in the ideal case, this is the GHZ state).
* $\mathcal{S}$: the Sender of the quantum message.
* <math>\mathcal{S}<math>: the Sender of the quantum message.
* $\mathcal{R}$: the Receiver of the quantum message.
* <math>\mathcal{R}<math>: the Receiver of the quantum message.
* $q$: the security parameter.
* <math>q<math>: the security parameter.


==Properties==
==Properties==
Line 41: Line 41:
%The pseudocode given below implements anonymous transmission of a quantum message, incorporating a verification stage. Further, the following analysis considers anonymous transmission with a reduced fidelity state rather than a perfect GHZ state.
%The pseudocode given below implements anonymous transmission of a quantum message, incorporating a verification stage. Further, the following analysis considers anonymous transmission with a reduced fidelity state rather than a perfect GHZ state.


Let $C_\epsilon$ be the event that the protocol does not abort and the state used for anonymous transmission is such that, no matter what operation the adversarial players do to their part, the fidelity of the state with the GHZ state is at most $\sqrt{1-\epsilon^2}$. Then,  
Let <math>C_\epsilon<math> be the event that the protocol does not abort and the state used for anonymous transmission is such that, no matter what operation the adversarial players do to their part, the fidelity of the state with the GHZ state is at most <math>\sqrt{1-\epsilon^2}<math>. Then,  
\begin{align*}
\begin{align*}
P[C_\epsilon] \leq 2^{-q} \frac{4n}{1 - \sqrt{1-\epsilon^2}}.
P[C_\epsilon] \leq 2^{-q} \frac{4n}{1 - \sqrt{1-\epsilon^2}}.
Line 47: Line 47:
By doing many repetitions of the protocol, the honest players can ensure that this probability is negligible.
By doing many repetitions of the protocol, the honest players can ensure that this probability is negligible.


If the state used for anonymous transmission is of fidelity at least $\sqrt{1-\epsilon^2}$ with the GHZ state,  
If the state used for anonymous transmission is of fidelity at least <math>\sqrt{1-\epsilon^2}<math> with the GHZ state,  
\begin{align*}
\begin{align*}
P_{\text{guess</span> [\mathcal{S} | C, \mathcal{S} \notin \mathcal{A} ] \leq \frac{1}{n-t} + \epsilon, \\
P_{\text{guess</span> [\mathcal{S} | C, \mathcal{S} \notin \mathcal{A} ] \leq \frac{1}{n-t} + \epsilon, \\
P_{\text{guess</span> [\mathcal{R} | C, \mathcal{S} \notin \mathcal{A} ] \leq \frac{1}{n-t} + \epsilon,
P_{\text{guess</span> [\mathcal{R} | C, \mathcal{S} \notin \mathcal{A} ] \leq \frac{1}{n-t} + \epsilon,
\end{align*}
\end{align*}
where $\mathcal{A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries.  
where <math>\mathcal{A}<math> is the subset of <math>t<math> adversaries among <math>n<math> nodes and <math>C<math> is the register that contains all classical and quantum side information accessible to the adversaries.  


==Pseudocode==
==Pseudocode==


====<span style="font-variant:small-caps">$\epsilon$-anonymous transmission of a quantum message</span>====
====<span style="font-variant:small-caps"><math>\epsilon<math>-anonymous transmission of a quantum message</span>====
\noindent \textit{Input}: Security parameter $q$. \\  
\noindent \textit{Input}: Security parameter <math>q<math>. \\  
\textit{Goal}: $\mathcal{S}$ sends message qubit $\ket{\psi}$ to $\mathcal{R}$ with $\epsilon$-anonymity.  
\textit{Goal}: <math>\mathcal{S}<math> sends message qubit <math>\ket{\psi}<math> to <math>\mathcal{R}<math> with <math>\epsilon<math>-anonymity.  




# {\bf Receiver notification}: \\  
# {\bf Receiver notification}: \\  
Run <span style="font-variant:small-caps">Notification</span> for $\mathcal{S}$ to notify $\mathcal{R}$ as the Receiver.
Run <span style="font-variant:small-caps">Notification</span> for <math>\mathcal{S}<math> to notify <math>\mathcal{R}<math> as the Receiver.


# {\bf Distribution of state}: \\  
# {\bf Distribution of state}: \\  
A source (who may be untrusted) generates a state $\ket{\Psi}$ and distributes it to the players (in the ideal case, $\ket{\Psi}$ is the GHZ state).
A source (who may be untrusted) generates a state <math>\ket{\Psi}<math> and distributes it to the players (in the ideal case, <math>\ket{\Psi}<math> is the GHZ state).


# {\bf $\mathcal{S}$ anonymously chooses verification or anonymous transmission}:  
# {\bf <math>\mathcal{S}<math> anonymously chooses verification or anonymous transmission}:  
## Run <span style="font-variant:small-caps">RandomBit</span>, with the input of $\mathcal{S}$ chosen as follows: she flips $q$ fair classical coins, and if all coins are heads, she inputs 0, else she inputs 1. Let the outcome be $x$.
## Run <span style="font-variant:small-caps">RandomBit</span>, with the input of <math>\mathcal{S}<math> chosen as follows: she flips <math>q<math> fair classical coins, and if all coins are heads, she inputs 0, else she inputs 1. Let the outcome be <math>x<math>.
## If $x=1$,
## If <math>x=1<math>,
### Run <span style="font-variant:small-caps">RandomBit</span> $\log_2 n$ times, with the input of $\mathcal{S}$ chosen according to the uniform random distribution. Let the outcome be $v$.
### Run <span style="font-variant:small-caps">RandomBit</span> <math>\log_2 n<math> times, with the input of <math>\mathcal{S}<math> chosen according to the uniform random distribution. Let the outcome be <math>v<math>.
### Run <span style="font-variant:small-caps">Verification</span> with player $v$ as the Verifier. If she accepts the outcome of the test, return to step 2, otherwise abort.
### Run <span style="font-variant:small-caps">Verification</span> with player <math>v<math> as the Verifier. If she accepts the outcome of the test, return to step 2, otherwise abort.


Else if $x=0$, run <span style="font-variant:small-caps">Anonymous Transmission</span>.
Else if <math>x=0<math>, run <span style="font-variant:small-caps">Anonymous Transmission</span>.


If at any point in the protocol, $\mathcal{S}$ realises someone does not follow the protocol, she stops behaving like the Sender and behaves as any player.
If at any point in the protocol, <math>\mathcal{S}<math> realises someone does not follow the protocol, she stops behaving like the Sender and behaves as any player.




Line 81: Line 81:


====<span style="font-variant:small-caps">Parity</span>====
====<span style="font-variant:small-caps">Parity</span>====
\noindent \textit{Input}: $\{ x_i \}_{i=1}^n$. \\
\noindent \textit{Input}: <math>\{ x_i \}_{i=1}^n<math>. \\
\textit{Goal}: Each player gets $y_i = \bigoplus_{i=1}^n x_i$.
\textit{Goal}: Each player gets <math>y_i = \bigoplus_{i=1}^n x_i<math>.
# Every player $i$ chooses random bits $\{r_i^j \}_{j=1}^n$ such that $\bigoplus_{j=1}^n r_i^j = x_i$.  
# Every player <math>i<math> chooses random bits <math>\{r_i^j \}_{j=1}^n<math> such that <math>\bigoplus_{j=1}^n r_i^j = x_i<math>.  
# Every player $i$ sends their $j$th bit $r_i^j$ to player $j$ ($j$ can equal $i$).  
# Every player <math>i<math> sends their <math>j<math>th bit <math>r_i^j<math> to player <math>j<math> (<math>j<math> can equal <math>i<math>).  
# Every player $j$ computes $z_j=\bigoplus_{i=1}^n r_i^j$ and reports the value in the simultaneous broadcast channel.  
# Every player <math>j<math> computes <math>z_j=\bigoplus_{i=1}^n r_i^j<math> and reports the value in the simultaneous broadcast channel.  
# The value $z=\bigoplus_{j=1}^n z_j$ is computed, which equals $y_i$.
# The value <math>z=\bigoplus_{j=1}^n z_j<math> is computed, which equals <math>y_i<math>.


====<span style="font-variant:small-caps">LogicalOR</span>====
====<span style="font-variant:small-caps">LogicalOR</span>====
\noindent \textit{Input}: $\{ x_i \}_{i=1}^n$, security parameter $q$. \\
\noindent \textit{Input}: <math>\{ x_i \}_{i=1}^n<math>, security parameter <math>q<math>. \\
\textit{Goal}: Each player gets $y_i = \bigvee_{i=1}^n x_i$.
\textit{Goal}: Each player gets <math>y_i = \bigvee_{i=1}^n x_i<math>.
# The players agree on $n$ orderings, with each ordering having a different last participant.  
# The players agree on <math>n<math> orderings, with each ordering having a different last participant.  
# For each ordering:
# For each ordering:
## Each player $i$ picks the value of $p_i$ as follows: if $x_i=0$, then $p_i=0$; if $x_i=1$, then $p_i=1$ with probability $\frac{1}{2}$ and $p_i=0$ with probability $\frac{1}{2}$.  
## Each player <math>i<math> picks the value of <math>p_i<math> as follows: if <math>x_i=0<math>, then <math>p_i=0<math>; if <math>x_i=1<math>, then <math>p_i=1<math> with probability <math>\frac{1}{2}<math> and <math>p_i=0<math> with probability <math>\frac{1}{2}<math>.  
## Run <span style="font-variant:small-caps">Parity</span> with input $\{p_i\}_{i=1}^n$, with a regular broadcast channel rather than simultaneous broadcast, and with the players broadcasting according to the current ordering. If the result is $1$, then $y_i = 1$.  
## Run <span style="font-variant:small-caps">Parity</span> with input <math>\{p_i\}_{i=1}^n<math>, with a regular broadcast channel rather than simultaneous broadcast, and with the players broadcasting according to the current ordering. If the result is <math>1<math>, then <math>y_i = 1<math>.  
## Repeat steps 2(a) - 2(b) $q$ times in total. If the result of <span style="font-variant:small-caps">Parity</span> is never $1$, then $y_i = 0$.
## Repeat steps 2(a) - 2(b) <math>q<math> times in total. If the result of <span style="font-variant:small-caps">Parity</span> is never <math>1<math>, then <math>y_i = 0<math>.


====<span style="font-variant:small-caps">Notification</span>====
====<span style="font-variant:small-caps">Notification</span>====
\noindent \textit{Input}: Security parameter $q$, $\mathcal{S}$'s choice of $\mathcal{R}$ is player $r$. \\
\noindent \textit{Input}: Security parameter <math>q<math>, <math>\mathcal{S}<math>'s choice of <math>\mathcal{R}<math> is player <math>r<math>. \\
\textit{Goal}: $\mathcal{S}$ notifies $\mathcal{R}$. \\
\textit{Goal}: <math>\mathcal{S}<math> notifies <math>\mathcal{R}<math>. \\
For each player $i$:
For each player <math>i<math>:
# For each player $i$:
# For each player <math>i<math>:
## Each player $j \neq i$ picks $p_j$ as follows: if $i = r$ and player $j$ is $S$, then $p_j = 1$ with probability $\frac{1}{2}$ and $p_j = 0$ with probability $\frac{1}{2}$. Otherwise, $p_j = 0$. Let $p_i = 0$.
## Each player <math>j \neq i<math> picks <math>p_j<math> as follows: if <math>i = r<math> and player <math>j<math> is <math>S<math>, then <math>p_j = 1<math> with probability <math>\frac{1}{2}<math> and <math>p_j = 0<math> with probability <math>\frac{1}{2}<math>. Otherwise, <math>p_j = 0<math>. Let <math>p_i = 0<math>.
## Run <span style="font-variant:small-caps">Parity</span> with input $\{p_i\}_{i=1}^n$, with the following differences: player $i$ does not broadcast her value, and they use a regular broadcast channel rather than simultaneous broadcast. If the result is $1$, then $y_i = 1$.
## Run <span style="font-variant:small-caps">Parity</span> with input <math>\{p_i\}_{i=1}^n<math>, with the following differences: player <math>i<math> does not broadcast her value, and they use a regular broadcast channel rather than simultaneous broadcast. If the result is <math>1<math>, then <math>y_i = 1<math>.
## Repeat steps 1(a) - (b) $q$ times. If the result of <span style="font-variant:small-caps">Parity</span> is never 1, then $y_i = 0$.  
## Repeat steps 1(a) - (b) <math>q<math> times. If the result of <span style="font-variant:small-caps">Parity</span> is never 1, then <math>y_i = 0<math>.  
# If player $i$ obtained $y_i = 1$, then she is $\mathcal{R}$.
# If player <math>i<math> obtained <math>y_i = 1<math>, then she is <math>\mathcal{R}<math>.


====<span style="font-variant:small-caps">RandomBit</span>====
====<span style="font-variant:small-caps">RandomBit</span>====
\noindent \textit{Input:} All: parameter $q$. $\mathcal{S}$: distribution $D$. \\
\noindent \textit{Input:} All: parameter <math>q<math>. <math>\mathcal{S}<math>: distribution <math>D<math>. \\
\textit{Goal:} $\mathcal{S}$ chooses a bit according to $D$.
\textit{Goal:} <math>\mathcal{S}<math> chooses a bit according to <math>D<math>.
# The players pick bits $\{ x_i \}_{i=1}^n$ as follows: $\mathcal{S}$ picks bit $x_i$ to be 0 or 1 according to $D$; all other players pick $x_i = 0$.
# The players pick bits <math>\{ x_i \}_{i=1}^n<math> as follows: <math>\mathcal{S}<math> picks bit <math>x_i<math> to be 0 or 1 according to <math>D<math>; all other players pick <math>x_i = 0<math>.
# Run <span style="font-variant:small-caps">LogicalOR</span> with input $\{ x_i \}_{i=1}^n$ and security parameter $q$ and output its outcome.
# Run <span style="font-variant:small-caps">LogicalOR</span> with input <math>\{ x_i \}_{i=1}^n<math> and security parameter <math>q<math> and output its outcome.


====<span style="font-variant:small-caps">Verification</span>====
====<span style="font-variant:small-caps">Verification</span>====
\noindent \textit{Input}: $n$ players share state $\ket{\Psi}$. \\
\noindent \textit{Input}: <math>n<math> players share state <math>\ket{\Psi}<math>. \\
\textit{Goal}: GHZ verification of $\ket{\Psi}$ for $n-t$ honest players.
\textit{Goal}: GHZ verification of <math>\ket{\Psi}<math> for <math>n-t<math> honest players.
# The Verifier generates random angles $\theta_j \in [0,\pi)$ for all players including themselves ($j\in[n]$), such that $\sum_j \theta_j$ is a multiple of $\pi$. The angles are then sent out to all the players in the network.  
# The Verifier generates random angles <math>\theta_j \in [0,\pi)<math> for all players including themselves (<math>j\in[n]<math>), such that <math>\sum_j \theta_j<math> is a multiple of <math>\pi<math>. The angles are then sent out to all the players in the network.  
# Player $j$ measures in the basis $\{\ket{+_{\theta_j</span>,\ket{-_{\theta_j</span>\}=\{\frac{1}{\sqrt{2</span>(\ket{0}+e^{i\theta_j}\ket{1}),\frac{1}{\sqrt{2</span>(\ket{0}-e^{i\theta_j}\ket{1})\}$, and sends the outcome $Y_j=\{0,1\}$ to the Verifier.  
# Player <math>j<math> measures in the basis <math>\{\ket{+_{\theta_j</span>,\ket{-_{\theta_j</span>\}=\{\frac{1}{\sqrt{2</span>(\ket{0}+e^{i\theta_j}\ket{1}),\frac{1}{\sqrt{2</span>(\ket{0}-e^{i\theta_j}\ket{1})\}<math>, and sends the outcome <math>Y_j=\{0,1\}<math> to the Verifier.  
# The state passes the verification test if
# The state passes the verification test if
$
<math>
\bigoplus_j Y_j=\frac{1}{\pi}\sum_j\theta_j\pmod 2.
\bigoplus_j Y_j=\frac{1}{\pi}\sum_j\theta_j\pmod 2.
$
<math>


====<span style="font-variant:small-caps">Anonymous Transmission</span>====
====<span style="font-variant:small-caps">Anonymous Transmission</span>====
\noindent \textit{Input}: $n$ players share a GHZ state. \\
\noindent \textit{Input}: <math>n<math> players share a GHZ state. \\
\textit{Goal}: Anonymous transmission of quantum message $\ket{\psi}$ from $\mathcal{S}$ to $\mathcal{R}$.
\textit{Goal}: Anonymous transmission of quantum message <math>\ket{\psi}<math> from <math>\mathcal{S}<math> to <math>\mathcal{R}<math>.
# $\mathcal{S}$ and $\mathcal{R}$ do not do anything to their part of the state.
# <math>\mathcal{S}<math> and <math>\mathcal{R}<math> do not do anything to their part of the state.
# Every player $j \in [n] \backslash \{ \mathcal{S}, \mathcal{R} \}$:  
# Every player <math>j \in [n] \backslash \{ \mathcal{S}, \mathcal{R} \}<math>:  
## Applies a Hadamard transform to her qubit, \
## Applies a Hadamard transform to her qubit, \
## Measures this qubit in the computational basis with outcome $m_j$,  
## Measures this qubit in the computational basis with outcome <math>m_j<math>,  
## Broadcasts $m_j$.  
## Broadcasts <math>m_j<math>.  
# $\mathcal{S}$ picks a random bit $b \in_R \{ 0, 1 \}$ and broadcasts $b$.  
# <math>\mathcal{S}<math> picks a random bit <math>b \in_R \{ 0, 1 \}<math> and broadcasts <math>b<math>.  
# $\mathcal{S}$ applies a phase flip $Z$ to her qubit if $b=1$.  
# <math>\mathcal{S}<math> applies a phase flip <math>Z<math> to her qubit if <math>b=1<math>.  
# $\mathcal{R}$ picks a random bit $b' \in_R \{ 0, 1 \}$ and broadcasts $b'$.  
# <math>\mathcal{R}<math> picks a random bit <math>b' \in_R \{ 0, 1 \}<math> and broadcasts <math>b'<math>.  
# $\mathcal{R}$ applies a phase flip $Z$ to her qubit, if $b \oplus \underset{j \in [n] \backslash \{ \mathcal{S}, \mathcal{R} \</span>{\bigoplus} m_j = 1$.   
# <math>\mathcal{R}<math> applies a phase flip <math>Z<math> to her qubit, if <math>b \oplus \underset{j \in [n] \backslash \{ \mathcal{S}, \mathcal{R} \</span>{\bigoplus} m_j = 1<math>.   
# $\mathcal{S}$ and $\mathcal{R}$ share $\epsilon$-anonymous entanglement. $\mathcal{S}$ then uses the quantum teleportation circuit with input $\ket{\psi}$, and obtains measurement outcomes $m_0, m_1$.  
# <math>\mathcal{S}<math> and <math>\mathcal{R}<math> share <math>\epsilon<math>-anonymous entanglement. <math>\mathcal{S}<math> then uses the quantum teleportation circuit with input <math>\ket{\psi}<math>, and obtains measurement outcomes <math>m_0, m_1<math>.  
# The players run a protocol to anonymously send bits $m_0, m_1$ from $\mathcal{S}$ to $\mathcal{R}$ (see Further Information for details).  
# The players run a protocol to anonymously send bits <math>m_0, m_1<math> from <math>\mathcal{S}<math> to <math>\mathcal{R}<math> (see Further Information for details).  
# $\mathcal{R}$ applies the transformation described by $m_0, m_1$ on her part of the entangled state and obtains $\ket{\psi}$.
# <math>\mathcal{R}<math> applies the transformation described by <math>m_0, m_1<math> on her part of the entangled state and obtains <math>\ket{\psi}<math>.


==Further Information==
==Further Information==
* For simplicity, the same security parameter $q$ has been used throughout, however this is not required.
* For simplicity, the same security parameter <math>q<math> has been used throughout, however this is not required.
* Although <span style="font-variant:small-caps">Parity</span> requires a simultaneous broadcast channel, only modified versions of <span style="font-variant:small-caps">Parity</span> that remove this requirement are used in the anonymous transmission protocol.
* Although <span style="font-variant:small-caps">Parity</span> requires a simultaneous broadcast channel, only modified versions of <span style="font-variant:small-caps">Parity</span> that remove this requirement are used in the anonymous transmission protocol.
* The protocol assumes there is only one Sender for simplicity. However, if this is not the case, the players can run a classical \cite{Broadbent} or quantum \cite{Wehner} collision detection protocol to deal with multiple Senders.  
* The protocol assumes there is only one Sender for simplicity. However, if this is not the case, the players can run a classical \cite{Broadbent} or quantum \cite{Wehner} collision detection protocol to deal with multiple Senders.  
* To send classical teleportation bits $m_0, m_1$, the players can run <span style="font-variant:small-caps">Fixed Role Anonymous Message Transmission</span> from \cite{Broadbent}, or the anonymous transmission protocol for classical bits with quantum resources from \cite{Wehner}.
* To send classical teleportation bits <math>m_0, m_1<math>, the players can run <span style="font-variant:small-caps">Fixed Role Anonymous Message Transmission</span> from \cite{Broadbent}, or the anonymous transmission protocol for classical bits with quantum resources from \cite{Wehner}.
* <span style="font-variant:small-caps">Verification</span> was experimentally demonstrated for 3- and 4-party GHZ states in \cite{McCutcheon}.
* <span style="font-variant:small-caps">Verification</span> was experimentally demonstrated for 3- and 4-party GHZ states in \cite{McCutcheon}.
* The Broadbent-Tapp protocol \cite{Broadbent} implements classical anonymous  transmission. It requires pairwise authenticated classical channels, and a classical broadcast channel.  
* The Broadbent-Tapp protocol \cite{Broadbent} implements classical anonymous  transmission. It requires pairwise authenticated classical channels, and a classical broadcast channel.  
* The Christandl-Wehner protocol \cite{Wehner} implements both classical and quantum anonymous  transmission. However, this protocol assumes the nodes share a perfect, trusted GHZ state.
* The Christandl-Wehner protocol \cite{Wehner} implements both classical and quantum anonymous  transmission. However, this protocol assumes the nodes share a perfect, trusted GHZ state.
* The Brassard et. al. protocol \cite{Brassard} implements verified quantum anonymous transmission. While their protocol includes a verification stage, it requires each player to perform a size-$n$ quantum circuit and to have access to quantum communication with all other agents.
* The Brassard et. al. protocol \cite{Brassard} implements verified quantum anonymous transmission. While their protocol includes a verification stage, it requires each player to perform a size-<math>n<math> quantum circuit and to have access to quantum communication with all other agents.
* The Lipinska et. al. protocol \cite{Lipinska} implements quantum anonymous transmission with a trusted W state instead of a GHZ state. While this is beneficial in terms of robustness to noise, the protocol proceeds to create anonymous entanglement only probabilistically, whereas GHZ-based anonymous entanglement proceeds deterministically.  
* The Lipinska et. al. protocol \cite{Lipinska} implements quantum anonymous transmission with a trusted W state instead of a GHZ state. While this is beneficial in terms of robustness to noise, the protocol proceeds to create anonymous entanglement only probabilistically, whereas GHZ-based anonymous entanglement proceeds deterministically.  


Write, autoreview, editor, reviewer
3,129

edits

Navigation menu