<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=137.226.108.44</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=137.226.108.44"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/137.226.108.44"/>
	<updated>2026-04-19T03:28:50Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4404</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4404"/>
		<updated>2021-12-10T18:41:08Z</updated>

		<summary type="html">&lt;p&gt;137.226.108.44: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Trap Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Naive approach using Quantum Teleportation]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|[[Copy Protection]]||[[Copy Protection of Compute and Compare Programs]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Universal Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Entanglement Routing]]||[[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;/div&gt;</summary>
		<author><name>137.226.108.44</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Trap_Code_for_Quantum_Authentication&amp;diff=4401</id>
		<title>Trap Code for Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Trap_Code_for_Quantum_Authentication&amp;diff=4401"/>
		<updated>2021-12-08T17:24:39Z</updated>

		<summary type="html">&lt;p&gt;137.226.108.44: Created page with &amp;quot;==Notation== *&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: 1-qubit input state   ==Protocol Description== *&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Encoding:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; #Input: &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, pair of keys &amp;lt;math&amp;gt;k=(k_1, k_2)&amp;lt;/math&amp;gt; #Apply a...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: 1-qubit input state&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Encoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#Input: &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, pair of keys &amp;lt;math&amp;gt;k=(k_1, k_2)&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply an &amp;lt;math&amp;gt;[[n,1,d]]&amp;lt;/math&amp;gt; error correction code (corrects up to &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt; errors, &amp;lt;math&amp;gt;d=2t+1&amp;lt;/math&amp;gt;)&lt;br /&gt;
#Append an additional trap register of &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|0\rangle\langle 0|^{\otimes n}&amp;lt;/math&amp;gt;&lt;br /&gt;
#Append a second additional trap register of &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|+\rangle\langle +|^{\otimes n}&amp;lt;/math&amp;gt;&lt;br /&gt;
#Permute the total &amp;lt;math&amp;gt;3n&amp;lt;/math&amp;gt;-qubit register by &amp;lt;math&amp;gt;\pi_{k_1}&amp;lt;/math&amp;gt; according to the key &amp;lt;math&amp;gt;k_1&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply a Pauli encryption &amp;lt;math&amp;gt;P_{k_2}&amp;lt;/math&amp;gt; according to key &amp;lt;math&amp;gt;k_2&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Decoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#Input: &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt; (state after encoding), pair of keys &amp;lt;math&amp;gt;k=(k_1, k_2)&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply &amp;lt;math&amp;gt;P_{k_2}&amp;lt;/math&amp;gt; according to key &amp;lt;math&amp;gt;k_2&amp;lt;/math&amp;gt;&lt;br /&gt;
#Apply inverse permutation &amp;lt;math&amp;gt;\pi_{k_1}^\dagger&amp;lt;/math&amp;gt; according to the key &amp;lt;math&amp;gt;k_1&amp;lt;/math&amp;gt;&lt;br /&gt;
#Measure the last &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in the Hadamard basis&lt;br /&gt;
#Measure the second last &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in the computational basis &amp;lt;/br&amp;gt;a. If the two measurements result in &amp;lt;math&amp;gt;|+\rangle\langle +|&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|0\rangle\langle 0|&amp;lt;/math&amp;gt;, an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle\langle\mathrm{ACC}|&amp;lt;/math&amp;gt; is appended and the quantum message is decoded according to the error correction code &amp;lt;/br&amp;gt;b. Otherwise, an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{REJ}\rangle\langle\mathrm{REJ}|&amp;lt;/math&amp;gt; is appended and the (disturbed) encoded quantum message is replaced by a fixed state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/1211.1080.pdf| Broadbent et al. (2012)]&lt;br /&gt;
#[https://arxiv.org/pdf/1607.03075.pdf| Broadbent and Wainewright (2016).]&lt;/div&gt;</summary>
		<author><name>137.226.108.44</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Polynomial_Code_based_Quantum_Authentication&amp;diff=4400</id>
		<title>Polynomial Code based Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Polynomial_Code_based_Quantum_Authentication&amp;diff=4400"/>
		<updated>2021-12-08T17:24:32Z</updated>

		<summary type="html">&lt;p&gt;137.226.108.44: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The paper [https://arxiv.org/pdf/quant-ph/0205128.pdf Authentication of Quantum Messages by Barnum et al.] provides a non-interactive scheme for the sender to encrypt as well as [[Authentication of Quantum Messages|authenticate quantum messages]]. It was the first protocol designed to achieve the task of authentication for quantum states, i.e. it gives the guarantee that the message sent by a party (suppliant) over a communication line is received by a party on the other end (authenticator) as it is and, has not been tampered with or modified by the dishonest party (eavesdropper).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
*The sender and the receiver share a private, classical random key drawn from a probability distribution&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;: suppliant (sender)&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;: authenticator (prover)&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: quantum message to be sent&lt;br /&gt;
*&amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;: number of qubits in the message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;\{Q_k\}&amp;lt;/math&amp;gt;: [[Stabilizer Purity Testing Code | stabilizer purity testing code]], each stabilizer code is identified by index &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;: number of qubits used to encode the message with &amp;lt;math&amp;gt;\{Q_k\}&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;: random binary &amp;lt;math&amp;gt;2m&amp;lt;/math&amp;gt;-bit key&lt;br /&gt;
*&amp;lt;math&amp;gt;s&amp;lt;/math&amp;gt;: security parameter&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*For a &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message, the protocol requires &amp;lt;math&amp;gt;m+s&amp;lt;/math&amp;gt; qubits to encode the quantum message.&lt;br /&gt;
*The protocol requires a private key of size &amp;lt;math&amp;gt;2m+O(s)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Preprocessing:&#039;&#039;&#039;&#039;&#039; &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; agree on some [[Stabilizer Purity Testing Code | stabilizer purity testing code]] &amp;lt;math&amp;gt;\{Q_k\}&amp;lt;/math&amp;gt; and some private and random binary strings &amp;lt;math&amp;gt;k, x, y&amp;lt;/math&amp;gt;.&lt;br /&gt;
**&amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; is used to choose a random stabilizer code &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt;&lt;br /&gt;
**&amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; is a &amp;lt;math&amp;gt;2m&amp;lt;/math&amp;gt;-bit random key used for q-encryption&lt;br /&gt;
**&amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt; is a random syndrome&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Encryption and encoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; q-encrypts the &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit original message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; as &amp;lt;math&amp;gt;\tau&amp;lt;/math&amp;gt; using the classical key &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and a [[Quantum One-Time Pad | quantum one-time pad]]. This encryption is given by &amp;lt;math&amp;gt;\tau = \sigma_x^{\vec{t}_1}\sigma_z^{\vec{t}_2}\rho\sigma_z^{\vec{1}_1}\sigma_x^{\vec{t}_1}&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\vec{t}_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\vec{t}_2&amp;lt;/math&amp;gt; are &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-bit vectors and given by the random binary key &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; then encodes &amp;lt;math&amp;gt;\tau&amp;lt;/math&amp;gt; according to &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; with syndrome &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt;, which results in the &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-qubit state &amp;lt;math&amp;gt;\sigma&amp;lt;/math&amp;gt;. This means &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; encodes &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; in &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits using &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt;, and then &amp;quot;applies&amp;quot; errors according to the random syndrome.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; sends &amp;lt;math&amp;gt;\sigma&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Decoding and decryption:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; receives the &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits, whose state is denoted by &amp;lt;math&amp;gt;\sigma^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the syndrome &amp;lt;math&amp;gt;y^\prime&amp;lt;/math&amp;gt; of the code &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; on his &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;\sigma^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; compares the syndromes &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;y^\prime&amp;lt;/math&amp;gt; and aborts the process if they are different.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; decodes his &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-qubit word according to &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; obtaining &amp;lt;math&amp;gt;\tau^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; q-decrypts &amp;lt;math&amp;gt;\tau^\prime&amp;lt;/math&amp;gt; using the random binary strings &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; obtaining &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/0205128.pdf| Barnum et al. (2002).]&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Isabel Nha Minh Le&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>137.226.108.44</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Clifford_Code_for_Quantum_Authentication&amp;diff=4399</id>
		<title>Clifford Code for Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Clifford_Code_for_Quantum_Authentication&amp;diff=4399"/>
		<updated>2021-12-08T17:22:12Z</updated>

		<summary type="html">&lt;p&gt;137.226.108.44: Created page with &amp;quot;The Clifford Authentication Scheme was introduced in the paper [https://arxiv.org/pdf/0810.5375.pdf| Interactive Proofs For Quantum Computations by Aharanov et al.].  ==Outlin...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Clifford Authentication Scheme was introduced in the paper [https://arxiv.org/pdf/0810.5375.pdf| Interactive Proofs For Quantum Computations by Aharanov et al.].&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The Clifford code encodes a &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message by appending an auxiliary register with &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; qubits in &amp;lt;math&amp;gt;|0\rangle&amp;lt;/math&amp;gt;. It then applies a random Clifford operator on all &amp;lt;math&amp;gt;m+d&amp;lt;/math&amp;gt; qubits. By measuring only the auxiliary register, the authenticator decides, whether to accept the received state or whether to abort.&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;: suppliant (sender)&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;: authenticator (prover)&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit state to be transmitted&lt;br /&gt;
*&amp;lt;math&amp;gt;d\in\mathbb{N}&amp;lt;/math&amp;gt;: security parameter defining the number of qubits in the auxiliary register&lt;br /&gt;
*&amp;lt;math&amp;gt;n=m+d&amp;lt;/math&amp;gt;: total number of qubits used&lt;br /&gt;
*&amp;lt;math&amp;gt;\{C_k\}&amp;lt;/math&amp;gt;: set of Clifford operations on &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits labelled by key &amp;lt;math&amp;gt;k\in\mathcal{K}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*The Clifford code is quantum authentication scheme with security &amp;lt;math&amp;gt;2^{-d}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Encoding:&#039;&#039;&#039;&#039;&#039; &amp;lt;math&amp;gt;\mathcal{E}_k: \rho \mapsto C_k\left( \rho \otimes |0\rangle\langle 0|^{\otimes d} \right)C_k^\dagger&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; appends an auxiliary register of &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|0\rangle\langle 0|&amp;lt;/math&amp;gt; to the quantum message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, which results in &amp;lt;math&amp;gt;\rho\otimes|0\rangle\langle0|^{\otimes d}&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; then applies &amp;lt;math&amp;gt;C_k&amp;lt;/math&amp;gt; for a uniformly random &amp;lt;math&amp;gt;k\in\mathcal{K}&amp;lt;/math&amp;gt; on the total state.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; sends the result to &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Decoding:&#039;&#039;&#039;&#039;&#039; Mathematically, the decoding process is described by &amp;lt;math display=block&amp;gt;\mathcal{D}_k: \rho^\prime \mapsto \mathrm{tr}_0\left( \mathcal{P}_\mathrm{acc} C_k^\dagger (\rho^\prime) C_k \mathcal{P}_\mathrm{acc}^\dagger \right) \otimes |\mathrm{ACC}\rangle\langle \mathrm{ACC}| + \mathrm{tr}\left( \mathcal{P}_\mathrm{rej} C_k^\dagger (\rho^\prime) C_k \mathcal{P}_\mathrm{rej}^\dagger \right) \Omega \otimes |\mathrm{REJ}\rangle\langle\mathrm{REJ}|&amp;lt;/math&amp;gt; In the above, &amp;lt;math&amp;gt;\mathrm{tr}_0&amp;lt;/math&amp;gt; is the trace over the auxiliary register only, and &amp;lt;math&amp;gt;\mathrm{tr}&amp;lt;/math&amp;gt; is the trace over the quantum message system and the auxiliary system. Furthermore, &amp;lt;math&amp;gt;\mathcal{P}_\mathrm{acc}=\mathbb{1}^{\otimes n} \otimes |0\rangle\langle 0|^{\otimes d}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{P}_\mathrm{rej}=\mathbb{1}^{\otimes (n+d)} - \mathcal{P}_\mathrm{acc}&amp;lt;/math&amp;gt; are projective measurement operators.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; applies the inverse Clifford &amp;lt;math&amp;gt;C_k^\dagger&amp;lt;/math&amp;gt; to the received state, which is denoted by &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the auxiliary register in the computational basis.&amp;lt;/br&amp;gt;a. If all &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; auxiliary qubits are 0, the state is accepted and an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle\langle\mathrm{ACC}|&amp;lt;/math&amp;gt; is appended.&amp;lt;/br&amp;gt;b. Otherwise, the remaining system is traced out and replaced with a fixed &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt; and an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{REJ}\rangle\langle \mathrm{REJ}|&amp;lt;/math&amp;gt; is appended.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/0810.5375.pdf| Aharanov et al. (2008).]&lt;br /&gt;
#[https://arxiv.org/pdf/1607.03075.pdf| Broadbent and Wainewright (2016).]&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Isabel Nha Minh Le&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>137.226.108.44</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Authentication_of_Quantum_Messages&amp;diff=4398</id>
		<title>Authentication of Quantum Messages</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Authentication_of_Quantum_Messages&amp;diff=4398"/>
		<updated>2021-12-08T17:21:37Z</updated>

		<summary type="html">&lt;p&gt;137.226.108.44: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Functionality==&lt;br /&gt;
Quantum authentication allows the exchange of quantum messages between two parties over a insecure quantum channel with the guarantee that the received quantum information is the same as the initially sent quantum message. Imagine a person sends some quantum information to another person over an insecure channel, where a dishonest party has access to the channel. How can it be guaranteed that in the end the receiver has the same quantum information and not something modified or replaced by the dishonest party? Schemes for authentication of quantum channels/quantum states/quantum messages are families of keyed encoding and decoding maps that provide this guarantee to the users of a quantum communication line/ channel. The sender is called the suppliant (prover) and the receiver is called the authenticator. The quantum message is encoded using a quantum error correction code. Since using only one particular quantum error correction code would enable a third party to introduce an error, which is not detectable by this particular code, it is necessary to choose a random quantum error correction code from a set of codes. &amp;lt;br/&amp;gt; &amp;lt;br/&amp;gt;Note that, it is different from the functionality of [[Quantum Digital Signature|digital signatures]], a multi-party (more than two) protocol, which comes with additional properties (non-repudiation, unforgeability and transferability). Authenticating quantum states is possible, but signing quantum states is impossible, as concluded in [[Authentication of Quantum Messages#References|(1)]]. &lt;br /&gt;
Also, unlike [[Authentication of Classical Messages|classical message authentication]], quantum message authentication requires encryption. However, classical messages can be publicly readable (not encrypted) and yet authenticated.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[Quantum Digital Signature]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Use Case==&lt;br /&gt;
*No classical analogue&lt;br /&gt;
==Protocols==&lt;br /&gt;
&#039;&#039;&#039;Non-interactive Protocols:&#039;&#039;&#039;&lt;br /&gt;
*[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
*[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
*[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
*[[Trap Code for Quantum Authentication]]&lt;br /&gt;
&#039;&#039;&#039;Interactive Protocols:&#039;&#039;&#039;&lt;br /&gt;
*[[Naive approach using Quantum Teleportation]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*Any scheme, which authenticates quantum messages must also encrypt them [[Authentication of Quantum Messages#References|(1)]]. This is inherently different to the classical scenario, where encryption and authentication are two independent procedures.&lt;br /&gt;
*&#039;&#039;&#039;Definition: Quantum Authentication Scheme (QAS)&#039;&#039;&#039; &amp;lt;br/&amp;gt;A quantum authentication scheme (QAS) consists of a suppliant &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;, an authenticator &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; and a set of classical private keys &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt;. &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; are each polynomial time quantum algorithms. The following is fullfilled:&lt;br /&gt;
# &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; takes as input a &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message system &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt; and a key &amp;lt;math&amp;gt;k\in K&amp;lt;/math&amp;gt; and outputs a transmitted system &amp;lt;math&amp;gt;T&amp;lt;/math&amp;gt; of &amp;lt;math&amp;gt;m + t&amp;lt;/math&amp;gt; qubits.&lt;br /&gt;
# &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; takes as input the (possibly altered) transmitted system &amp;lt;math&amp;gt;T^\prime&amp;lt;/math&amp;gt; and a classical key &amp;lt;math&amp;gt;k\in K&amp;lt;/math&amp;gt; and outputs two systems: a &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message state &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt;, and a single qubit &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; which indicates acceptance or rejection. The classical basis states of &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; are called &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle, |\mathrm{REJ}\rangle&amp;lt;/math&amp;gt; by convention. &amp;lt;/br&amp;gt;For any fixed key &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;, we denote the corresponding super-operators by &amp;lt;math&amp;gt;S_k&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;A_k&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&#039;&#039;&#039;Definition: Security of a QAS&#039;&#039;&#039; &amp;lt;br/&amp;gt;For non-interactive protocols, a QAS is secure with error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; if it is complete for all states &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; and has a soundness error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; for all states &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;. These two conditions are met if:&lt;br /&gt;
#&#039;&#039;Completeness:&#039;&#039; A QAS is complete for a specific quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; if &amp;lt;math&amp;gt;\forall k\in K: A_k(S_k(|\psi\rangle \langle\psi|)=|\psi\rangle \langle\psi| \otimes |\mathrm{ACC}\rangle \langle \mathrm{ACC}|.&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt;This means if no adversary has acted on the encoded quantum message &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;, the quantum information received by &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; is the same initially sent by &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and the single qubit &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; is in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle \langle \mathrm{ACC}|&amp;lt;/math&amp;gt;. To this end, we assume that the channel between &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; is noiseless if no adversary intervention appeared.&lt;br /&gt;
#&#039;&#039;Soundness:&#039;&#039; For all super-operators &amp;lt;math&amp;gt;\mathcal{O}&amp;lt;/math&amp;gt;, let &amp;lt;math&amp;gt;\rho_\text{auth}&amp;lt;/math&amp;gt; be the state output by &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; when the adversary’s intervention is characterized by &amp;lt;math&amp;gt;\mathcal{O}&amp;lt;/math&amp;gt;, that is: &amp;lt;math display=block&amp;gt;\rho_\text{auth}=\mathbf{E}_k\left[ \mathcal{A}_k\left( \mathcal{O}(\mathcal{S}(|\psi\rangle \langle\psi |)) \right) \right] = \frac{1}{|K|}\sum_k \mathcal{A}_k\left( \mathcal{O}(\mathcal{S}_k(|\psi\rangle \langle\psi |)) \right),&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt; where again we consider a specific input state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;. Here, &amp;lt;math&amp;gt;\mathbf{E}_k&amp;lt;/math&amp;gt; means the expectation when &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; is chosen uniformly at random from &amp;lt;math&amp;gt;K.&amp;lt;/math&amp;gt; The QAS then has a soundness error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; for &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; if &amp;lt;math display=block&amp;gt;\mathrm{Tr}\left( P_1^{|\psi\rangle}\rho_\text{auth} \right)\geq 1-\epsilon,&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;where &amp;lt;math&amp;gt;P_1^{|\psi\rangle}&amp;lt;/math&amp;gt; is the projector &amp;lt;math display=block&amp;gt;P_1^{|\psi\rangle} = |\psi\rangle \langle\psi | \otimes I_V + I_M \otimes |\mathrm{REJ}\rangle \langle \mathrm{REJ}| - |\psi\rangle \langle \psi| \otimes |\mathrm{REJ}\rangle \langle \mathrm{REJ}|.&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/0205128.pdf| Barnum et al. (2002).] First protocol on authentication of quantum messages. It is also used later for verification of quantum computation in [[Interactive Proofs for Quantum Computation]]. Protocol file for this article is given as the [[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Isabel Nha Minh Le&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>137.226.108.44</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Authentication_of_Quantum_Messages&amp;diff=4395</id>
		<title>Authentication of Quantum Messages</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Authentication_of_Quantum_Messages&amp;diff=4395"/>
		<updated>2021-11-28T15:48:45Z</updated>

		<summary type="html">&lt;p&gt;137.226.108.44: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Functionality==&lt;br /&gt;
Imagine a person sends some quantum information to another pereson over an insecure channel, where a dishonest party has access to the channel. How can it be guaranteed that in the end the receiver has the same quantum information and not something modified or replaced by the dishonest party? Authentication of quantum channels/quantum states/quantum messages provides this guarantee to the users of a quantum communication line/ channel. The sender is called the suppliant (prover) and the receiver is called the authenticator. &amp;lt;br/&amp;gt; &amp;lt;br/&amp;gt;Note that, it is different from the functionality of [[Quantum Digital Signature|digital signatures]], a multi-party (more than two) protocol, which comes with additional properties (non-repudiation, unforgeability and transferability). Authenticating quantum states is possible, but signing quantum states is impossible, as concluded in [[Authentication of Quantum Messages#References|(1)]]. &lt;br /&gt;
Also, unlike [[Authentication of Classical Messages|classical message authentication]], quantum message authentication requires encryption. However, classical messages can be publicly readable (not encrypted) and yet authenticated.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[Quantum Digital Signature]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Use Case==&lt;br /&gt;
*No classical analogue&lt;br /&gt;
==Protocols==&lt;br /&gt;
&#039;&#039;&#039;Non-interactive Protocols:&#039;&#039;&#039;&lt;br /&gt;
*[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
*[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
*[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
&#039;&#039;&#039;Interactive Protocols:&#039;&#039;&#039;&lt;br /&gt;
*tbd&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*Any scheme, which authenticates quantum messages must also encrypt them [[Authentication of Quantum Messages#References|(1)]].&lt;br /&gt;
*&#039;&#039;&#039;Definition: Quantum Authentication Scheme (QAS)&#039;&#039;&#039; &amp;lt;br/&amp;gt;A quantum authentication scheme (QAS) consists of a suppliant &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;, an authenticator &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; and a set of classical keys &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt;. &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; are each polynomial time quantum algorithms. The following is fullfilled:&lt;br /&gt;
# &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; takes as input an &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message system &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt; and a key &amp;lt;math&amp;gt;k\in K&amp;lt;/math&amp;gt; and outputs a transmitted system &amp;lt;math&amp;gt;T&amp;lt;/math&amp;gt; of &amp;lt;math&amp;gt;m + t&amp;lt;/math&amp;gt; qubits.&lt;br /&gt;
# &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; takes as input the (possibly altered) transmitted system &amp;lt;math&amp;gt;T^\prime&amp;lt;/math&amp;gt; and a classical key &amp;lt;math&amp;gt;k\in K&amp;lt;/math&amp;gt; and outputs two systems: a &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message state &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt;, and a single qubit &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; which indicates acceptance or rejection. The classical basis states of &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; are called &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle, |\mathrm{REJ}\rangle&amp;lt;/math&amp;gt; by convention. &amp;lt;/br&amp;gt;For any fixed key &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;, we denote the corresponding super-operators by &amp;lt;math&amp;gt;S_k&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;A_k&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&#039;&#039;&#039;Definition: Security of a QAS&#039;&#039;&#039; &amp;lt;br/&amp;gt;For non-interactive protocols, a QAS is secure with error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; if it is complete for all states &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; and has a soundness error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; for all states &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;. The latter is the case (for a specific state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;) if:&lt;br /&gt;
#&#039;&#039;Completeness:&#039;&#039; &amp;lt;math&amp;gt;\forall k\in K: A_k(S_k(|\psi\rangle \langle\psi|)=|\psi\rangle \langle\psi| \otimes |\mathrm{ACC}\rangle \langle \mathrm{ACC}|&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt;This means if no adversary has acted on the encoded quantum message &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;, the quantum information received by &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; is the same initially sent by &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and the single qubit &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; is in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle \langle \mathrm{ACC}|&amp;lt;/math&amp;gt;. To this end, we assume that the channel between &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; is noiseless if no adversary intervention appeared.&lt;br /&gt;
#&#039;&#039;Soundness:&#039;&#039; For all super-operators &amp;lt;math&amp;gt;\mathcal{O}&amp;lt;/math&amp;gt;, let &amp;lt;math&amp;gt;\rho_\text{auth}&amp;lt;/math&amp;gt; be the state output by &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; when the adversary’s intervention is characterized by &amp;lt;math&amp;gt;\mathcal{O}&amp;lt;/math&amp;gt;, that is: &amp;lt;math display=block&amp;gt;\rho_\text{auth}=\mathbf{E}_k\left[ \mathcal{A}_k\left( \mathcal{O}(\mathcal{S}(|\psi\rangle \langle\psi |)) \right) \right] = \frac{1}{|K|}\sum_k \mathcal{A}_k\left( \mathcal{O}(\mathcal{S}_k(|\psi\rangle \langle\psi |)) \right).&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt;Here, &amp;lt;math&amp;gt;\mathbf{E}_k&amp;lt;/math&amp;gt; means the expectation when &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; is chosen uniformly at random from &amp;lt;math&amp;gt;K.&amp;lt;/math&amp;gt; The QAS then has a soundness error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; for &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; if &amp;lt;math display=block&amp;gt;\mathrm{Tr}\left( P_1^{|\psi\rangle}\rho_\text{auth} \right)\geq 1-\epsilon,&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;where &amp;lt;math&amp;gt;P_1^{|\psi\rangle}&amp;lt;/math&amp;gt; is the projector &amp;lt;math display=block&amp;gt;P_1^{|\psi\rangle} = |\psi\rangle \langle\psi | \otimes I_V + I_M \otimes |\mathrm{REJ}\rangle \langle \mathrm{REJ}| - |\psi\rangle \langle \psi| \otimes |\mathrm{REJ}\rangle \langle \mathrm{REJ}|.&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/0205128.pdf Barnum et al (2002)] First protocol on authentication of quantum messages. It is also used later for verification of quantum computation in [[Interactive Proofs for Quantum Computation]]. Protocol file for this article is given as the [[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Isabel Nha Minh Le&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>137.226.108.44</name></author>
	</entry>
</feed>