Write, autoreview, editor, reviewer
3,129
edits
No edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
==Outline== | ==Outline== | ||
This verified GHZ-based quantum anonymous transmission protocol is based on the work of \cite{Unnikrishnan}, which uses the following subroutines from [[Verifiable Quantum Anonymous Transmission#References|[ | This verified GHZ-based quantum anonymous transmission protocol is based on the work of \cite{Unnikrishnan}, which uses the following subroutines from [[Verifiable Quantum Anonymous Transmission#References|[2]]], [[Verifiable Quantum Anonymous Transmission#References|[3]]], [[Verifiable Quantum Anonymous Transmission#References|[4]]]. [[Verifiable Quantum Anonymous Transmission#References|[5]]] : | ||
* <span style="font-variant:small-caps">Parity</span> | * <span style="font-variant:small-caps">Parity</span> [[Verifiable Quantum Anonymous Transmission#References|[3]]]: privately computes the parity of an input string. | ||
* <span style="font-variant:small-caps">LogicalOR</span> | * <span style="font-variant:small-caps">LogicalOR</span> [[Verifiable Quantum Anonymous Transmission#References|[3]]]: privately computes the logical OR of an input string, using a modified version of <span style="font-variant:small-caps">Parity</span>. | ||
* <span style="font-variant:small-caps">Notification</span> | * <span style="font-variant:small-caps">Notification</span> [[Verifiable Quantum Anonymous Transmission#References|[3]]]: allows one player to anonymously notify another player, using <span style="font-variant:small-caps">LogicalOR</span>. | ||
* <span style="font-variant:small-caps">RandomBit</span> | * <span style="font-variant:small-caps">RandomBit</span> [[Verifiable Quantum Anonymous Transmission#References|[1]]]: allows one player to anonymously choose a bit according to a probability distribution, using <span style="font-variant:small-caps">LogicalOR</span>. | ||
* <span style="font-variant:small-caps">Verification</span> | * <span style="font-variant:small-caps">Verification</span> [[Verifiable Quantum Anonymous Transmission#References|[4,5]]]: allows one player (the Verifier) to run a test to check if the shared state is the GHZ state. The Verifier instructs each player to measure their qubit in a particular basis and checks the parity of the measurement outcomes. | ||
* <span style="font-variant:small-caps">Anonymous Entanglement</span> | * <span style="font-variant:small-caps">Anonymous Entanglement</span> [[Verifiable Quantum Anonymous Transmission#References|[2]]]: <math>n-2</math> nodes (all except for <math>\mathcal{S}</math> and <math>\mathcal{R}</math>) measure in the <math>X</math> basis and broadcast their measurement outcome. <math>\mathcal{S}</math> and <math>\mathcal{R}</math> broadcast random dummy bits. The parity of measurement outcomes allows the establishment of an entangled link between <math>\mathcal{S}</math> and <math>\mathcal{R}</math> which is called anonymous entanglement. | ||
The protocol for quantum anonymous transmission consists of the following steps: | The protocol for quantum anonymous transmission consists of the following steps: | ||
Line 155: | Line 155: | ||
* For simplicity, the same security parameter <math>q</math> has been used throughout, however, this is not required. | * For simplicity, the same security parameter <math>q</math> has been used throughout, however, this is not required. | ||
* Although <span style="font-variant:small-caps">Parity</span> requires a simultaneous broadcast channel, only modified versions of <span style="font-variant:small-caps">Parity</span> that remove this requirement are used in the anonymous transmission protocol. | * Although <span style="font-variant:small-caps">Parity</span> requires a simultaneous broadcast channel, only modified versions of <span style="font-variant:small-caps">Parity</span> that remove this requirement are used in the anonymous transmission protocol. | ||
* The protocol assumes there is only one Sender for simplicity. However, if this is not the case, the players can run a classical | * The protocol assumes there is only one Sender for simplicity. However, if this is not the case, the players can run a classical [[Verifiable Quantum Anonymous Transmission#References|[3]]] or quantum [[Verifiable Quantum Anonymous Transmission#References|[2]]] collision detection protocol to deal with multiple Senders. | ||
* To send classical teleportation bits <math>m_0, m_1</math>, the players can run <span style="font-variant:small-caps">Fixed Role Anonymous Message Transmission</span> from | * To send classical teleportation bits <math>m_0, m_1</math>, the players can run <span style="font-variant:small-caps">Fixed Role Anonymous Message Transmission</span> from [[Verifiable Quantum Anonymous Transmission#References|[3]]], or the anonymous transmission protocol for classical bits with quantum resources from [[Verifiable Quantum Anonymous Transmission#References|[2]]]. | ||
* <span style="font-variant:small-caps">Verification</span> was experimentally demonstrated for 3- and 4-party GHZ states in | * <span style="font-variant:small-caps">Verification</span> was experimentally demonstrated for 3- and 4-party GHZ states in [[Verifiable Quantum Anonymous Transmission#References|[5]]]. | ||
* The Broadbent-Tapp protocol | * The Broadbent-Tapp protocol [[Verifiable Quantum Anonymous Transmission#References|[3]]] implements classical anonymous transmission. It requires pairwise authenticated classical channels and a classical broadcast channel. | ||
* The Christandl-Wehner protocol | * The Christandl-Wehner protocol [[Verifiable Quantum Anonymous Transmission#References|[2]]] implements both classical and quantum anonymous transmission. However, this protocol assumes the nodes share a perfect, trusted GHZ state. | ||
* The Brassard et. al. protocol | * The Brassard et. al. protocol [[Verifiable Quantum Anonymous Transmission#References|[6]]] implements verified quantum anonymous transmission. While their protocol includes a verification stage, it requires each player to perform a size-<math>n</math> quantum circuit and to have access to quantum communication with all other agents. | ||
* The Lipinska et. al. protocol | * The Lipinska et. al. protocol [[Verifiable Quantum Anonymous Transmission#References|[7]]] implements quantum anonymous transmission with a trusted W state instead of a GHZ state. While this is beneficial in terms of robustness to noise, the protocol proceeds to create anonymous entanglement only probabilistically, whereas GHZ-based anonymous entanglement proceeds deterministically. | ||
==References== | ==References== |