Verifiable Quantum Anonymous Transmission: Difference between revisions

no edit summary
No edit summary
Line 163: Line 163:
* The Lipinska et. al. protocol \cite{Lipinska} implements quantum anonymous transmission with a trusted W state instead of a GHZ state. While this is beneficial in terms of robustness to noise, the protocol proceeds to create anonymous entanglement only probabilistically, whereas GHZ-based anonymous entanglement proceeds deterministically.  
* The Lipinska et. al. protocol \cite{Lipinska} implements quantum anonymous transmission with a trusted W state instead of a GHZ state. While this is beneficial in terms of robustness to noise, the protocol proceeds to create anonymous entanglement only probabilistically, whereas GHZ-based anonymous entanglement proceeds deterministically.  


\begin{thebibliography}{9}
==References==
\bibitem{Unnikrishnan}
#{Unnikrishnan} A. Unnikrishnan, I. J. MacFarlane, R. Yi, E. Diamanti, D. Markham, and I. Kerenidis. ''{Anonymity for practical quantum networks.} To be published in Physical Review Letters. arXiv:1811.04729 (2018).
A. Unnikrishnan, I. J. MacFarlane, R. Yi, E. Diamanti, D. Markham, and I. Kerenidis. ''{Anonymity for practical quantum networks.} To be published in Physical Review Letters. arXiv:1811.04729 (2018).
#{Wehner} M. Christandl and S. Wehner. ''{Quantum anonymous transmissions.} Proceedings of ASIACRYPT (2005).
\bibitem{Wehner}  
#{Broadbent} A. Broadbent and A. Tapp. ''{Information-theoretic security without an honest majority.} Proceedings of ASIACRYPT (2007).
M. Christandl and S. Wehner. ''{Quantum anonymous transmissions.} Proceedings of ASIACRYPT (2005).
#{Pappa} A. Pappa, A. Chailloux, S. Wehner, E. Diamanti, and I. Kerenidis. ''{Multipartite entanglement verification resistant against dishonest parties.} Physical Review Letters, 108 (2012).
\bibitem{Broadbent}  
#{McCutcheon} W. McCutcheon, A. Pappa, B. A. Bell, A. McMillan, A. Chailloux, T. Lawson, M. Mafu, D. Markham, E. Diamanti, I. Kerenidis, J. G. Rarity, and M. S. Tame. ''{Experimental verification of multipartite entanglement in quantum networks.} Nature Communications (2016).
A. Broadbent and A. Tapp. ''{Information-theoretic security without an honest majority.} Proceedings of ASIACRYPT (2007).
#{Brassard} G. Brassard, A. Broadbent, J. Fitzsimons, S. Gambs, and A. Tapp. ''{Anonymous quantum communication.} Proceedings of ASIACRYPT (2007).  
\bibitem{Pappa}  
#{Lipinska} V. Lipinska, G. Murta, and S. Wehner. ''{Anonymous transmission in a noisy quantum network using the W state.} Physical Review A, 98 (2018).
A. Pappa, A. Chailloux, S. Wehner, E. Diamanti, and I. Kerenidis. ''{Multipartite entanglement verification resistant against dishonest parties.} Physical Review Letters, 108 (2012).
\bibitem{McCutcheon}
W. McCutcheon, A. Pappa, B. A. Bell, A. McMillan, A. Chailloux, T. Lawson, M. Mafu, D. Markham, E. Diamanti, I. Kerenidis, J. G. Rarity, and M. S. Tame. ''{Experimental verification of multipartite entanglement in quantum networks.} Nature Communications (2016).
\bibitem{Brassard}
G. Brassard, A. Broadbent, J. Fitzsimons, S. Gambs, and A. Tapp. ''{Anonymous quantum communication.} Proceedings of ASIACRYPT (2007).  
\bibitem{Lipinska}
V. Lipinska, G. Murta, and S. Wehner. ''{Anonymous transmission in a noisy quantum network using the W state.} Physical Review A, 98 (2018).
 
\end{thebibliography}
Write, autoreview, editor, reviewer
3,125

edits