Write, autoreview, editor, reviewer
3,129
edits
mNo edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
#[[GHZ-based Quantum Anonymous Transmission|Based on the GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | #[[GHZ-based Quantum Anonymous Transmission|Based on the GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
#[[Verifiable Quantum Anonymous Transmission|Based on a verified GHZ state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | |||
#[[W-based Quantum Anonymous Transmission|Based on the W state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | #[[W-based Quantum Anonymous Transmission|Based on the W state]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
#[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | #[[Entanglement Relay Quantum Anonymous Transmission|Entanglement Relay]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] | ||
[[Category: Quantum Memory Network Stage]] | [[Category: Quantum Memory Network Stage]] | ||
* GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise. | * GHZ-based protocol is deterministic, whereas W-based protocol is probabilistic, but the W-based protocol tolerates more noise. | ||
* Verifiable GHZ-based protocol allows an imperfect or untrusted GHZ state, and involves a verification stage. | |||
* Entanglement relay protocol does not require a pre-shared multipartite state, but it creates a 4-partite GHZ state during the protocol. | * Entanglement relay protocol does not require a pre-shared multipartite state, but it creates a 4-partite GHZ state during the protocol. | ||
Line 27: | Line 29: | ||
==Further Information== | ==Further Information== | ||
* The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3] ]]. | * The definitions above guarantee information-theoretic security of the protocol when the resource states are both trusted [[Quantum Anonymous Transmission#References|[4], [1], [2] ]] and not trusted [[Quantum Anonymous Transmission#References|[3], [5] ]]. | ||
==References== | ==References== | ||
#[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)] | #[https://journals.aps.org/pra/abstract/10.1103/PhysRevA.98.052320 Lipinska et al (2018)] | ||
Line 33: | Line 35: | ||
#[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)] | #[https://arxiv.org/abs/quant-ph/0307049 Elliot et al (2007)] | ||
#[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)] | #[https://link.springer.com/chapter/10.1007/11593447_12 Christandl et al (2005)] | ||
#[https://arxiv.org/abs/1811.04729 Unnikrishnan et al (2018)] | |||
<div style='text-align: right;'>''contributed by Victoria Lipinska''</div> | <div style='text-align: right;'>''contributed by Victoria Lipinska''</div> |