Write
14
edits
Line 47: | Line 47: | ||
\tau=\min_{U}\mbox{TD}(|\phi_{0}^{n} \rangle\langle \phi_{0}^{n}|, U|\psi \rangle \langle \psi | U^{\dagger} ) | \tau=\min_{U}\mbox{TD}(|\phi_{0}^{n} \rangle\langle \phi_{0}^{n}|, U|\psi \rangle \langle \psi | U^{\dagger} ) | ||
</math> | </math> | ||
and where TD is the trace distance and <math>U</math> is a quantum operation acting on <math>D</math> the subspace of dishonest parties involved in the protocol (ie a tensor product of an unitary operator on <math>D</math> and the identity operator on the rest). | and where TD is the trace distance and <math>U</math> is a quantum operation acting on <math>D</math> the subspace of dishonest parties involved in the protocol (ie a tensor product of an unitary operator on <math>D</math> and the identity operator on the rest). This means that the further the shared state is from the GHZ state, the less likely the verifier is going to accept it conditioned on any quantum operation that the dishonest party can locally perform to get closer to the GHZ state. | ||
* This protocol still works in the presence of photon losses. | * This protocol still works in the presence of photon losses. | ||
==Pseudo Code== | ==Pseudo Code== |