Editing Verifiable Quantum Anonymous Transmission
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
This [https:// | This [https://arxiv.org/abs/1811.04729 example protocol] implements the task of [[Anonymous Transmission]] in a multi-node quantum network. The protocol uses an untrusted <math>n</math>-partite GHZ state to enable two nodes, Sender and Receiver, to establish a link which they use to transmit a quantum message. In addition to adversarial nodes, the source of the GHZ state may be controlled by an adversary. To address this, the protocol includes verification of the GHZ state. It incorporates a reduced fidelity GHZ state used for anonymous transmission, resulting in a notion of anonymity for imperfect scenarios called <math>\epsilon</math>-anonymity. | ||
==Assumptions== | ==Assumptions== | ||
Line 168: | Line 168: | ||
==References== | ==References== | ||
# [https:// | # [https://arxiv.org/abs/1811.04729 Unnikrishnan et al (2018)] | ||
# [https://link.springer.com/chapter/10.1007/11593447_12 Christandl and Wehner (2005)] | # [https://link.springer.com/chapter/10.1007/11593447_12 Christandl and Wehner (2005)] | ||
# [https://arxiv.org/abs/0706.2010 Broadbent and Tapp (2007)] | # [https://arxiv.org/abs/0706.2010 Broadbent and Tapp (2007)] |