Write, autoreview, editor, reviewer
3,129
edits
mNo edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
==Outline== | ==Outline== | ||
This verified GHZ-based quantum anonymous transmission protocol is based on the work of \cite{Unnikrishnan}, which uses the following subroutines from \cite{Wehner}, \cite{Broadbent}, \cite{Pappa}, \cite{McCutcheon}: | This verified GHZ-based quantum anonymous transmission protocol is based on the work of \cite{Unnikrishnan}, which uses the following subroutines from [[Verifiable Quantum Anonymous Transmission#References|[6]]] \cite{Wehner}, \cite{Broadbent}, \cite{Pappa}, \cite{McCutcheon}: | ||
* <span style="font-variant:small-caps">Parity</span> \cite{Broadbent}: privately computes the parity of an input string. | * <span style="font-variant:small-caps">Parity</span> \cite{Broadbent}: privately computes the parity of an input string. | ||
* <span style="font-variant:small-caps">LogicalOR</span> \cite{Broadbent}: privately computes the logical OR of an input string, using a modified version of <span style="font-variant:small-caps">Parity</span>. | * <span style="font-variant:small-caps">LogicalOR</span> \cite{Broadbent}: privately computes the logical OR of an input string, using a modified version of <span style="font-variant:small-caps">Parity</span>. |