Verifiable Quantum Anonymous Transmission: Difference between revisions

Jump to navigation Jump to search
m
No edit summary
Line 17: Line 17:


The protocol for quantum anonymous transmission consists of the following steps:
The protocol for quantum anonymous transmission consists of the following steps:
# ''{Receiver notification}: The Sender <math>\mathcal{S}</math> notifies the Receiver <math>R</math> by running <span style="font-variant:small-caps">Notification</span>.
# ''Receiver notification'': The Sender <math>\mathcal{S}</math> notifies the Receiver <math>R</math> by running <span style="font-variant:small-caps">Notification</span>.
# ''{State distribution}: A source, who may be untrusted, distributes a state claiming to be the GHZ state.
# ''State distribution'': A source, who may be untrusted, distributes a state claiming to be the GHZ state.
# ''{Verification or anonymous transmission}: <math>\mathcal{S}</math> anonymously chooses whether to verify the state or use it for anonymous transmission, using <span style="font-variant:small-caps">RandomBit</span>.  
# ''Verification or anonymous transmission'': <math>\mathcal{S}</math> anonymously chooses whether to verify the state or use it for anonymous transmission, using <span style="font-variant:small-caps">RandomBit</span>.  


If verification is chosen, a player is chosen to run <span style="font-variant:small-caps">Verification</span>, using <math>\log_2 n</math> repetitions of  <span style="font-variant:small-caps">RandomBit</span>.  
If verification is chosen, a player is chosen to run <span style="font-variant:small-caps">Verification</span>, using <math>\log_2 n</math> repetitions of  <span style="font-variant:small-caps">RandomBit</span>.  
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu