Write, autoreview, editor, reviewer
3,129
edits
Line 52: | Line 52: | ||
*The protocol is unconditionally secure i.e. no matter what Server does he cannot learn Client's inputs/outputs/computation. | *The protocol is unconditionally secure i.e. no matter what Server does he cannot learn Client's inputs/outputs/computation. | ||
== Pseudo-Code | == Pseudo-Code== | ||
=== Notations=== | === Notations=== | ||
* φ, measurement angle for given MBQC pattern to implement the required computation | * φ, measurement angle for given MBQC pattern to implement the required computation | ||
Line 61: | Line 61: | ||
* {math missing}, randomly chosen parameter for bit flip in order to hide quantum input | * {math missing}, randomly chosen parameter for bit flip in order to hide quantum input | ||
* δ, final measurement angle | * δ, final measurement angle | ||
=== Universal Blind Quantum Computation- Protocols 1a, 1b, 1c === | |||
*Unless given specific mention in [.], following steps apply to all the three protocols 1a-1c | *Unless given specific mention in [.], following steps apply to all the three protocols 1a-1c | ||