Search results

Jump to navigation Jump to search
  • ==Protocols== * All of the protocols under this technique broadly have two methods of state estimation from meas
    2 KB (300 words) - 16:40, 20 September 2019
  • There are entanglement routing protocols that are specifically designed for certain network topology e.g: linear, ri The main goal of entanglement routing is to develop efficient routing protocols to enable long distance entanglement.
    7 KB (982 words) - 20:02, 6 January 2022
  • '''Tags:''' [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Cl [[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific
    9 KB (1,525 words) - 16:34, 16 October 2019
  • ...quantum networks. It provides a compact and canonical way to explore such protocols. Moreover, it allows for easy communication among computer scientists, engi **[https://github.com/quantumprotocolzoo/protocols Codes Repository]</div>
    4 KB (660 words) - 21:41, 15 January 2024
  • '''Tags''' [[Category: Two Party Protocols]] [[:Category: Two Party Protocols|Two Party]], [[Category: Universal Task]][[:Category: Universal Task|Univer
    7 KB (1,021 words) - 16:36, 16 October 2019
  • '''Tags:''' [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Functionality|Quantum Functionality]], [[:Category:U *Both protocols have provable non-trivial security in the quantum random oracle model. Info
    7 KB (1,033 words) - 19:56, 11 January 2022
  • '''Tags:''' [[Category: Two Party Protocols]] [[:Category: Two Party Protocols|Two Party]], [[Category: Universal Task]][[:Category: Universal Task|Univer ...tum output from the Server. Like all the other delegated quantum computing protocols, this protocol is also divided into two stages, Preparation and Computation
    9 KB (1,388 words) - 13:06, 25 October 2019
  • ...ounds they produce approximately similar copies, or they are probabilistic protocols which means that probabilistically they produce the exact copies. ==Protocols==
    4 KB (523 words) - 22:04, 17 April 2019
  • ...'' model where entanglement production start when a request is made. Their protocols work on any network topology but are analyzed in the ring, grid and recursi '''Tags:''' [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].
    8 KB (1,174 words) - 20:03, 6 January 2022
  • '''Tags:''' [[:Category:Multi Party Protocols|Multi Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Cl [[Category:Multi Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Universal
    5 KB (847 words) - 11:51, 16 July 2019
  • '''Tags:''' [[Category: Two Party Protocols]] [[:Category: Two Party Protocols|Two Party]], [[Category: Universal Task]][[:Category: Universal Task|Univer ...e construction of brickwork state with classical input/output computation. Protocols 1b and 1c are extensions to accommodate quantum inputs and quantum outputs,
    9 KB (1,317 words) - 16:39, 16 October 2019
  • ...entially better with such computational problems, thus rendering classical protocols insecure.
    1 KB (191 words) - 15:42, 16 October 2019
  • ...), the benchmark can be related to the average gate fidelity, rendering RB protocols flexible certification tools. To this end, a group structure of the gate se ==Protocols==
    3 KB (340 words) - 10:04, 31 May 2020
  • ...that, in general, this machine acts much better than the [[Quantum Cloning#Protocols|universal cloning]] protocol for two special set of states. '''Tags:''' [[Quantum Cloning#Protocols|Non-Universal Cloning]], [[Phase Variant Cloning]], [[Category: Building Bl
    6 KB (984 words) - 13:01, 12 July 2019
  • '''Tags:''' [[:Category:Multi Party Protocols|Multi Party (three)]], [[:Category:Quantum Enhanced Classical Functionality [[Category:Multi Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific
    7 KB (1,138 words) - 16:27, 16 October 2019
  • ...ut their analysis is only concerned with the 2D grid network. They develop protocols for multipath routing of a single entanglement flow with global or local s '''Tags:''' [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].
    13 KB (2,120 words) - 20:03, 6 January 2022
  • ...nality]], [[:Category:Specific Task|Specific Task]], [[:Category:Two Party Protocols|Two Party Protocol]], [[Two Round Protocol]], [[Information-Theoretic Secur
    9 KB (1,444 words) - 17:49, 26 July 2021
  • '''Tags:''' [[:Category: Multi Party Protocols|Multi Party (three)]], [[:Category: Quantum Enhanced Classical Functionalit ...hich is the most general class of attacks [[Quantum Key Distribution|QKD]] protocols are vulnerable to, due to experimental realisation.
    12 KB (1,884 words) - 16:25, 16 October 2019
  • ==Protocols== * All of the protocols under this technique broadly have two methods of state estimation from meas
    2 KB (319 words) - 14:32, 2 October 2019
  • ...-Send Verifiable Universal Blind Quantum Computation|VUBQC]] and for other protocols like Quantum Money, Quantum Digital Signatures etc.. which need user to sha ...ey-distribution, quantum money, quantum coin-flipping, quantum signatures, two-party quantum computation, multiparty quantum computation etc.
    14 KB (2,246 words) - 16:44, 16 October 2019
View ( | ) (20 | 50 | 100 | 250 | 500)