<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=5.146.195.0</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=5.146.195.0"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/5.146.195.0"/>
	<updated>2026-04-16T10:54:13Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Trap_Code_for_Quantum_Authentication&amp;diff=4441</id>
		<title>Trap Code for Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Trap_Code_for_Quantum_Authentication&amp;diff=4441"/>
		<updated>2022-01-16T17:50:12Z</updated>

		<summary type="html">&lt;p&gt;5.146.195.0: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;Trap Code&#039;&#039; is a non-interactive scheme for [[Authentication of Quantum Messages|quantum authentication]]. It appends two additional trap registers in a fixed state, on which a Pauli twirl or a permutation is acted on. It furthermore makes use of error correction codes for encoding the quantum message.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The &#039;&#039;trap code&#039;&#039; requires a shared pair of secret classical keys. It makes use of an error correction code to encode the quantum message. Consequently, two so-called trap registers in the fixed states &amp;lt;math&amp;gt;|0\rangle\langle 0|&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|+\rangle\langle +|&amp;lt;/math&amp;gt; are appended. The total register is then encrypted by applying a permutation and a Pauli twirl, each according to the classical keys. The receiver then applies the inverse Pauli twirl and permutation and consequently measures the two trap registers in the computational or Hadamard basis respectively to decide whether to accept or abort the process.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
*The sender and receiver share a secret classical pair of keys&lt;br /&gt;
*The sender and receiver have agreed on an &amp;lt;math&amp;gt;[[n,k,d]]&amp;lt;/math&amp;gt; error correction code&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;: suppliant (sender)&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;: authenticator (prover)&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: 1-qubit input state&lt;br /&gt;
*&amp;lt;math&amp;gt;[[n,k,d]]&amp;lt;/math&amp;gt;: an error correction code that corrects up &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt; errors errors by encoding &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; logical qubits in &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; physical qubits, where &amp;lt;math&amp;gt;d=2t+1&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;\{\pi_{i}\}&amp;lt;/math&amp;gt;: a set of permutations indexed by &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;\{P_{i}\}&amp;lt;/math&amp;gt;: a set of Pauli operations indexed by &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, pair of secret classical keys &amp;lt;math&amp;gt;k=(k_1, k_2)&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum state &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt; if the protocol accepts; fixed quantum state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt; if the protocol aborts&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Encoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; applies an &amp;lt;math&amp;gt;[[n,1,d]]&amp;lt;/math&amp;gt; error correction code&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; appends an additional trap register of &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|0\rangle\langle 0|^{\otimes n}&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; appends a second additional trap register of &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|+\rangle\langle +|^{\otimes n}&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; permutes the total &amp;lt;math&amp;gt;3n&amp;lt;/math&amp;gt;-qubit register by &amp;lt;math&amp;gt;\pi_{k_1}&amp;lt;/math&amp;gt; according to the key &amp;lt;math&amp;gt;k_1&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; applies a Pauli encryption &amp;lt;math&amp;gt;P_{k_2}&amp;lt;/math&amp;gt; according to key &amp;lt;math&amp;gt;k_2&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Mathematical Encoding Description:&#039;&#039;&#039;&#039;&#039; &amp;lt;/br&amp;gt;Mathematically, the encoding process is given by &amp;lt;math display=block&amp;gt;\mathcal{E}_k: \rho \mapsto P_{k_2}\pi_{k_1}\left( \text{Enc}(\rho) \otimes |0\rangle\langle 0|^{\otimes n} \otimes |+\rangle\langle +|^{\otimes n}\right)\pi_{k_1}^\dagger P_{k_2}.&amp;lt;/math&amp;gt; In the above, &amp;lt;math&amp;gt;\text{Enc}(\rho)&amp;lt;/math&amp;gt; denotes the quantum message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; after applying the error correction code for encoding (see step 1).&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Decoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; applies &amp;lt;math&amp;gt;P_{k_2}&amp;lt;/math&amp;gt; according to key &amp;lt;math&amp;gt;k_2&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; applies inverse permutation &amp;lt;math&amp;gt;\pi_{k_1}^\dagger&amp;lt;/math&amp;gt; according to the key &amp;lt;math&amp;gt;k_1&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the last &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in the Hadamard basis &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the second last &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in the computational basis &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;a. If the two measurements in step 3 and 4 result in &amp;lt;math&amp;gt;|+\rangle\langle +|&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|0\rangle\langle 0|&amp;lt;/math&amp;gt;, an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle\langle\mathrm{ACC}|&amp;lt;/math&amp;gt; is appended and the quantum message is decoded according to the error correction code &amp;lt;/br&amp;gt;b. Otherwise, an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{REJ}\rangle\langle\mathrm{REJ}|&amp;lt;/math&amp;gt; is appended and the (disturbed) encoded quantum message is replaced by a fixed state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Mathematical Decoding Description:&#039;&#039;&#039;&#039;&#039; &amp;lt;/br&amp;gt;Mathematically, the decoding process is given by &amp;lt;math display=block&amp;gt;\mathcal{D}_k: \rho^\prime \mapsto \text{Dec }\mathrm{tr}_{0,+}\left( \mathcal{P}_\text{acc} \pi_{k_1}^\dagger P_{k_2}(\rho^\prime) P_{k_2} \pi_{k_1} \mathcal{P}_\text{acc}^\dagger \right) \otimes |\mathrm{acc}\rangle \langle \mathrm{acc}| + \mathrm{tr}_{0,+} \left(\mathcal{P}_\text{rej} \pi_{k_1}^\dagger P_{k_2}(\rho^\prime) P_{k_2} \pi_{k_1} \mathcal{P}_\text{acc}^\dagger \right) \Omega \otimes |\text{rej}\rangle\langle \text{rej}|.&amp;lt;/math&amp;gt; In the above, &amp;lt;math&amp;gt;\text{Dec}&amp;lt;/math&amp;gt; refers to decoding of the error correction code (see step 4a) and &amp;lt;math&amp;gt;\mathrm{tr}_{0,+}&amp;lt;/math&amp;gt; denotes the trace over the two trap registers. Moreover, &amp;lt;math&amp;gt;\mathcal{P}_\text{acc}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{P}_\text{rej}&amp;lt;/math&amp;gt; refer to the measurement projectors that determine whether the protocol accepts or aborts the received quantum message. It is &amp;lt;math display=block&amp;gt;\mathcal{P}_\text{acc} = I^{\otimes n}\otimes |0\rangle\langle 0|^{\otimes n}\otimes |+\rangle\langle +|,&amp;lt;/math&amp;gt; and &amp;lt;math display=block&amp;gt;\mathcal{P}_\text{rej} = I^{\otimes 3n} - \mathcal{P}_\text{acc}.&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/1211.1080.pdf| Broadbent et al. (2012)]&lt;br /&gt;
#[https://arxiv.org/pdf/1607.03075.pdf| Broadbent and Wainewright (2016).]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Isabel Nha Minh Le and Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;This page was created within the [https://www.qosf.org/qc_mentorship/| QOSF Mentorship Program Cohort 4]&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>5.146.195.0</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Clifford_Code_for_Quantum_Authentication&amp;diff=4440</id>
		<title>Clifford Code for Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Clifford_Code_for_Quantum_Authentication&amp;diff=4440"/>
		<updated>2022-01-16T17:49:48Z</updated>

		<summary type="html">&lt;p&gt;5.146.195.0: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;Clifford Authentication Scheme&#039;&#039; is a non-interactive protocol for [[Authentication of Quantum Messages|quantum authentication]] and was introduced in the paper [https://arxiv.org/pdf/0810.5375.pdf| Interactive Proofs For Quantum Computations by Aharanov et al.]. It applies a random Clifford operator to the quantum message and an auxiliary register and then measures the auxiliary register to decide whether or not a eavesdropper has tampered the original quantum message.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The &#039;&#039;Clifford code&#039;&#039; encodes a quantum message by appending an auxiliary register with each qubit in state &amp;lt;math&amp;gt;|0\rangle&amp;lt;/math&amp;gt; and then applying a random Clifford operator on all qubits. The authenticator then measures only the auxiliary register. If all qubits in the auxiliary register are still in state &amp;lt;math&amp;gt;|0\rangle&amp;lt;/math&amp;gt;, the authenticator accepts and decodes the quantum message. Otherwise, the original quantum message was tampered by a third party and the authenticator aborts the process.&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;: suppliant (sender)&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;: authenticator (prover)&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit state to be transmitted&lt;br /&gt;
*&amp;lt;math&amp;gt;d\in\mathbb{N}&amp;lt;/math&amp;gt;: security parameter defining the number of qubits in the auxiliary register&lt;br /&gt;
*&amp;lt;math&amp;gt;\{C_k\}&amp;lt;/math&amp;gt;: set of Clifford operations on &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits labelled by a classical key &amp;lt;math&amp;gt;k\in\mathcal{K}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*The Clifford code makes use of &amp;lt;math&amp;gt;n=m+d+1&amp;lt;/math&amp;gt; qubits&lt;br /&gt;
*The Clifford code is [[Authentication of Quantum Messages|quantum authentication]] scheme with security &amp;lt;math&amp;gt;2^{-d}&amp;lt;/math&amp;gt;&lt;br /&gt;
*The qubit registers used can be divided into a message register with &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; qubits, an auxiliary register with &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; qubits, and a flag register with &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt; qubit.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum state &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt; if the protocol accepts; fixed quantum state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt; if the protocol aborts&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Encoding:&#039;&#039;&#039;&#039;&#039; &lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; appends an auxiliary register of &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;|0\rangle\langle 0|&amp;lt;/math&amp;gt; to the quantum message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;, which results in &amp;lt;math&amp;gt;\rho\otimes|0\rangle\langle0|^{\otimes d}&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; then applies &amp;lt;math&amp;gt;C_k&amp;lt;/math&amp;gt; for a uniformly random &amp;lt;math&amp;gt;k\in\mathcal{K}&amp;lt;/math&amp;gt; on the total state.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; sends the result to &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Mathematical Encoding Description:&#039;&#039;&#039;&#039;&#039;&amp;lt;/br&amp;gt;Mathematically, the encoding process can be described by &amp;lt;math display=block&amp;gt;\mathcal{E}_k: \rho \mapsto C_k\left( \rho \otimes |0\rangle\langle 0|^{\otimes d} \right)C_k^\dagger&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Decoding:&#039;&#039;&#039;&#039;&#039; &lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; applies the inverse Clifford &amp;lt;math&amp;gt;C_k^\dagger&amp;lt;/math&amp;gt; to the received state, which is denoted by &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the auxiliary register in the computational basis.&amp;lt;/br&amp;gt;a. If all &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; auxiliary qubits are 0, the state is accepted and an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle\langle\mathrm{ACC}|&amp;lt;/math&amp;gt; is appended.&amp;lt;/br&amp;gt;b. Otherwise, the remaining system is traced out and replaced with a fixed &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit state &amp;lt;math&amp;gt;\Omega&amp;lt;/math&amp;gt; and an additional flag qubit in state &amp;lt;math&amp;gt;|\mathrm{REJ}\rangle\langle \mathrm{REJ}|&amp;lt;/math&amp;gt; is appended.&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Mathematical Decoding Description:&#039;&#039;&#039;&#039;&#039; &amp;lt;/br&amp;gt;Mathematically, the decoding process is described by &amp;lt;math display=block&amp;gt;\mathcal{D}_k: \rho^\prime \mapsto \mathrm{tr}_0\left( \mathcal{P}_\mathrm{acc} C_k^\dagger (\rho^\prime) C_k \mathcal{P}_\mathrm{acc}^\dagger \right) \otimes |\mathrm{ACC}\rangle\langle \mathrm{ACC}| + \mathrm{tr}\left( \mathcal{P}_\mathrm{rej} C_k^\dagger (\rho^\prime) C_k \mathcal{P}_\mathrm{rej}^\dagger \right) \Omega \otimes |\mathrm{REJ}\rangle\langle\mathrm{REJ}|.&amp;lt;/math&amp;gt; In the above, &amp;lt;math&amp;gt;\mathrm{tr}_0&amp;lt;/math&amp;gt; is the trace over the auxiliary register only, and &amp;lt;math&amp;gt;\mathrm{tr}&amp;lt;/math&amp;gt; is the trace over the quantum message system and the auxiliary system. Furthermore, &amp;lt;math&amp;gt;\mathcal{P}_\mathrm{acc}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{P}_\mathrm{rej}&amp;lt;/math&amp;gt; refer to the measurement projectors that determine whether the protocol accepts or aborts the received quantum message. It is &amp;lt;math display=block&amp;gt;\mathcal{P}_\mathrm{acc}=\mathbb{1}^{\otimes n} \otimes |0\rangle\langle 0|^{\otimes d}&amp;lt;/math&amp;gt; and &amp;lt;math display=block&amp;gt;\mathcal{P}_\mathrm{rej}=\mathbb{1}^{\otimes (n+d)} - \mathcal{P}_\mathrm{acc}.&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/0810.5375.pdf| Aharanov et al. (2008).]&lt;br /&gt;
#[https://arxiv.org/pdf/1607.03075.pdf| Broadbent and Wainewright (2016).]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Isabel Nha Minh Le and Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;This page was created within the [https://www.qosf.org/qc_mentorship/| QOSF Mentorship Program Cohort 4]&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>5.146.195.0</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Polynomial_Code_based_Quantum_Authentication&amp;diff=4439</id>
		<title>Polynomial Code based Quantum Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Polynomial_Code_based_Quantum_Authentication&amp;diff=4439"/>
		<updated>2022-01-16T17:49:31Z</updated>

		<summary type="html">&lt;p&gt;5.146.195.0: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The paper [https://arxiv.org/pdf/quant-ph/0205128.pdf Authentication of Quantum Messages by Barnum et al.] provides a non-interactive scheme with classical keys for the sender to encrypt as well as [[Authentication of Quantum Messages|authenticate quantum messages]]. It was the first protocol designed to achieve the task of authentication for quantum states, i.e. it gives the guarantee that the message sent by a party (suppliant) over a communication line is received by a party on the other end (authenticator) without having been tampered with or modified by the dishonest party (eavesdropper).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The polynomial code consists of three steps: preprocessing, encryption and encoding, and decoding and decryption. Within the preprocessing, sender and receiver agree on a [[Stabilizer Purity Testing Code | stabilizer purity testing code]] and three private, random binary keys. Within the encryption and encoding step, the sender uses one of these keys to encrypt the original message. Consequently, a second key is used to choose a specific quantum error correction code out of the [[Stabilizer Purity Testing Code | stabilizer purity testing code]]. The chosen quantum error correction code is then used, together with the last key, to encode the encrypted quantum message. Within the last step, the decoding and decryption step, the respective keys are used by the receiver to decide whether to abort or not, and if not, to decode and decrypt the received quantum message.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
*The sender and the receiver share a private, classical random key drawn from a probability distribution&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;: suppliant (sender)&lt;br /&gt;
*&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;: authenticator (prover)&lt;br /&gt;
*&amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;: quantum message to be sent&lt;br /&gt;
*&amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;: number of qubits in the message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;\{Q_k\}&amp;lt;/math&amp;gt;: [[Stabilizer Purity Testing Code | stabilizer purity testing code]], each stabilizer code is identified by index &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;: number of qubits used to encode the message with &amp;lt;math&amp;gt;\{Q_k\}&amp;lt;/math&amp;gt;&lt;br /&gt;
*&amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;: random binary &amp;lt;math&amp;gt;2m&amp;lt;/math&amp;gt;-bit key&lt;br /&gt;
*&amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt;: random syndrome for a specific &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; owned by &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;; &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt; shared among &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Receiver accepts or aborts the quantum state &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Encryption and encoding:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; q-encrypts the &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit original message &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; as &amp;lt;math&amp;gt;\tau&amp;lt;/math&amp;gt; using the classical key &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; and a [[Quantum One-Time Pad | quantum one-time pad]]. This encryption is given by &amp;lt;math&amp;gt;\tau = \sigma_x^{\vec{t}_1}\sigma_z^{\vec{t}_2}\rho\sigma_z^{\vec{1}_1}\sigma_x^{\vec{t}_1}&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\vec{t}_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\vec{t}_2&amp;lt;/math&amp;gt; are &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-bit vectors and given by the random binary key &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; then encodes &amp;lt;math&amp;gt;\tau&amp;lt;/math&amp;gt; according to &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; with syndrome &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt;, which results in the &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-qubit state &amp;lt;math&amp;gt;\sigma&amp;lt;/math&amp;gt;. This means &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; encodes &amp;lt;math&amp;gt;\rho&amp;lt;/math&amp;gt; in &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits using &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt;, and then &amp;quot;applies&amp;quot; errors according to the random syndrome.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; sends &amp;lt;math&amp;gt;\sigma&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Decoding and decryption:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; receives the &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits, whose state is denoted by &amp;lt;math&amp;gt;\sigma^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; measures the syndrome &amp;lt;math&amp;gt;y^\prime&amp;lt;/math&amp;gt; of the code &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; on his &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubits in state &amp;lt;math&amp;gt;\sigma^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; compares the syndromes &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;y^\prime&amp;lt;/math&amp;gt; and aborts the process if they are different.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; decodes his &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-qubit word according to &amp;lt;math&amp;gt;Q_k&amp;lt;/math&amp;gt; obtaining &amp;lt;math&amp;gt;\tau^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
#&amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; q-decrypts &amp;lt;math&amp;gt;\tau^\prime&amp;lt;/math&amp;gt; using the random binary strings &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; obtaining &amp;lt;math&amp;gt;\rho^\prime&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
#[https://ieeexplore.ieee.org/abstract/document/4031361?casa_token=j0BWLVeqOZkAAAAA:T19kamFiwuoLaEbL_bESvUendLVhWzsXWZpegOxPADA_PjSobjg4Wyo8ZmV92qvfVF3Pc7_v| Ben-Or et al. (2006).]&lt;br /&gt;
#[https://arxiv.org/pdf/0810.5375.pdf%7C| Aharonov et al. (2008).]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/0205128.pdf| Barnum et al. (2002).]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Isabel Nha Minh Le and Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;This page was created within the [https://www.qosf.org/qc_mentorship/| QOSF Mentorship Program Cohort 4]&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>5.146.195.0</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Authentication_of_Quantum_Messages&amp;diff=4437</id>
		<title>Authentication of Quantum Messages</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Authentication_of_Quantum_Messages&amp;diff=4437"/>
		<updated>2022-01-16T17:49:05Z</updated>

		<summary type="html">&lt;p&gt;5.146.195.0: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Functionality==&lt;br /&gt;
Quantum authentication allows the exchange of quantum messages between two parties over a insecure quantum channel with the guarantee that the received quantum information is the same as the initially sent quantum message. Imagine a person sends some quantum information to another person over an insecure channel, where a dishonest party has access to the channel. How can it be guaranteed that in the end the receiver has the same quantum information and not something modified or replaced by the dishonest party? Schemes for authentication of quantum channels/quantum states/quantum messages are families of keyed encoding and decoding maps that provide this guarantee to the users of a quantum communication line/ channel. The sender is called the suppliant (prover) and the receiver is called the authenticator. The quantum message is encoded using a quantum error correction code. Since using only one particular quantum error correction code would enable a third party to introduce an error, which is not detectable by this particular code, it is necessary to choose a random quantum error correction code from a set of codes. &amp;lt;br/&amp;gt; &amp;lt;br/&amp;gt;Note that, it is different from the functionality of [[Quantum Digital Signature|digital signatures]], a multi-party (more than two) protocol, which comes with additional properties (non-repudiation, unforgeability and transferability). Authenticating quantum states is possible, but signing quantum states is impossible, as concluded in [[Authentication of Quantum Messages#References|(1)]]. &lt;br /&gt;
Also, unlike [[Authentication of Classical Messages|classical message authentication]], quantum message authentication requires encryption. However, classical messages can be publicly readable (not encrypted) and yet authenticated.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocol]][[Category:Two Party Protocols]], [[Quantum Digital Signature]], [[:Category:Quantum Functionality|Quantum Functionality]][[Category:Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[:Category:Building Blocks|Building Block]][[Category:Building Blocks]]&lt;br /&gt;
&lt;br /&gt;
==Use Case==&lt;br /&gt;
*No classical analogue&lt;br /&gt;
==Protocols==&lt;br /&gt;
&#039;&#039;&#039;Non-interactive Protocols:&#039;&#039;&#039;&lt;br /&gt;
*[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
*[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
*[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
*[[Trap Code for Quantum Authentication]]&lt;br /&gt;
*[[Auth-QFT-Auth Scheme]]&lt;br /&gt;
*[[Unitary Design Scheme]]&lt;br /&gt;
&#039;&#039;&#039;Interactive Protocols:&#039;&#039;&#039;&lt;br /&gt;
*[[Naive approach using Quantum Teleportation]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*Any scheme, which authenticates quantum messages must also encrypt them [[Authentication of Quantum Messages#References|(1)]]. This is inherently different to the classical scenario, where encryption and authentication are two independent procedures.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Definition: Quantum Authentication Scheme (QAS)&#039;&#039;&#039; &amp;lt;br/&amp;gt;A quantum authentication scheme (QAS) consists of a suppliant &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt;, an authenticator &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; and a set of classical private keys &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt;. &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; are each polynomial time quantum algorithms. The following is fullfilled:&lt;br /&gt;
# &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; takes as input a &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message system &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt; and a key &amp;lt;math&amp;gt;k\in K&amp;lt;/math&amp;gt; and outputs a transmitted system &amp;lt;math&amp;gt;T&amp;lt;/math&amp;gt; of &amp;lt;math&amp;gt;m + t&amp;lt;/math&amp;gt; qubits.&lt;br /&gt;
# &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; takes as input the (possibly altered) transmitted system &amp;lt;math&amp;gt;T^\prime&amp;lt;/math&amp;gt; and a classical key &amp;lt;math&amp;gt;k\in K&amp;lt;/math&amp;gt; and outputs two systems: a &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;-qubit message state &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt;, and a single qubit &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; which indicates acceptance or rejection. The classical basis states of &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; are called &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle, |\mathrm{REJ}\rangle&amp;lt;/math&amp;gt; by convention. &amp;lt;/br&amp;gt;For any fixed key &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;, we denote the corresponding super-operators by &amp;lt;math&amp;gt;S_k&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;A_k&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Definition: Security of a QAS&#039;&#039;&#039; &amp;lt;br/&amp;gt;For non-interactive protocols, a QAS is secure with error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; if it is complete for all states &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; and has a soundness error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; for all states &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;. These two conditions are met if:&lt;br /&gt;
#&#039;&#039;Completeness:&#039;&#039; A QAS is complete for a specific quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; if &amp;lt;math&amp;gt;\forall k\in K: A_k(S_k(|\psi\rangle \langle\psi|)=|\psi\rangle \langle\psi| \otimes |\mathrm{ACC}\rangle \langle \mathrm{ACC}|.&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt;This means if no adversary has acted on the encoded quantum message &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;, the quantum information received by &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; is the same initially sent by &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and the single qubit &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; is in state &amp;lt;math&amp;gt;|\mathrm{ACC}\rangle \langle \mathrm{ACC}|&amp;lt;/math&amp;gt;. To this end, we assume that the channel between &amp;lt;math&amp;gt;\mathcal{S}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; is noiseless if no adversary intervention appeared.&lt;br /&gt;
#&#039;&#039;Soundness:&#039;&#039; For all super-operators &amp;lt;math&amp;gt;\mathcal{O}&amp;lt;/math&amp;gt;, let &amp;lt;math&amp;gt;\rho_\text{auth}&amp;lt;/math&amp;gt; be the state output by &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; when the adversary’s intervention is characterized by &amp;lt;math&amp;gt;\mathcal{O}&amp;lt;/math&amp;gt;, that is: &amp;lt;math display=block&amp;gt;\rho_\text{auth}=\mathbf{E}_k\left[ \mathcal{A}_k\left( \mathcal{O}(\mathcal{S}(|\psi\rangle \langle\psi |)) \right) \right] = \frac{1}{|K|}\sum_k \mathcal{A}_k\left( \mathcal{O}(\mathcal{S}_k(|\psi\rangle \langle\psi |)) \right),&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt; where again we consider a specific input state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;. Here, &amp;lt;math&amp;gt;\mathbf{E}_k&amp;lt;/math&amp;gt; means the expectation when &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; is chosen uniformly at random from &amp;lt;math&amp;gt;K.&amp;lt;/math&amp;gt; The QAS then has a soundness error &amp;lt;math&amp;gt;\epsilon&amp;lt;/math&amp;gt; for &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; if &amp;lt;math display=block&amp;gt;\mathrm{Tr}\left( P_1^{|\psi\rangle}\rho_\text{auth} \right)\geq 1-\epsilon,&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;where &amp;lt;math&amp;gt;P_1^{|\psi\rangle}&amp;lt;/math&amp;gt; is the projector &amp;lt;math display=block&amp;gt;P_1^{|\psi\rangle} = |\psi\rangle \langle\psi | \otimes I_V + I_M \otimes |\mathrm{REJ}\rangle \langle \mathrm{REJ}| - |\psi\rangle \langle \psi| \otimes |\mathrm{REJ}\rangle \langle \mathrm{REJ}|.&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
#[https://arxiv.org/pdf/quant-ph/0205128.pdf| Barnum et al. (2002).] First protocol on authentication of quantum messages. It is also used later for verification of quantum computation in [[Interactive Proofs for Quantum Computation]]. Protocol file for this article is given as the [[Polynomial Code based Quantum Authentication]].&lt;br /&gt;
#[https://arxiv.org/pdf/1607.03075.pdf%7C| Broadbent et al. (2016).] Paper on efficient simulation of authentication of quantum messages.&lt;br /&gt;
#[https://link.springer.com/chapter/10.1007/978-3-319-56617-7_12| Portmann (2017).] Paper on quantum authentication with full key recycling in the case of acceptance and partial key recycling in the case of tampering detection.&lt;br /&gt;
#[https://link.springer.com/article/10.1007%2Fs11047-014-9454-5| Damgård et al. (2014).] Quantum authentication with fully re-usable keys in the case of acceptance using a quantum computer.&lt;br /&gt;
#[https://link.springer.com/chapter/10.1007/978-3-319-56617-7_11| Fehr et al. (2017).] More efficient quantum authentication with fully re-usable keys in the case of acceptance without the need of quantum computers.&lt;br /&gt;
#[https://link.springer.com/chapter/10.1007/978-3-319-63715-0_12| Garg (2017).] New class of security definitions for quantum authentication and protocols fullfilling these definitions: [[Auth-QFT-Auth Scheme]], [[Unitary Design Scheme]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Isabel Nha Minh Le and Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;This page was created within the [https://www.qosf.org/qc_mentorship/| QOSF Mentorship Program Cohort 4]&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>5.146.195.0</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4438</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4438"/>
		<updated>2026-04-16T10:54:13Z</updated>

		<summary type="html">&lt;p&gt;5.146.195.0: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;7&amp;quot;|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Trap Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Auth-QFT-Auth Scheme for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Unitary Design Scheme for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Naive approach using Quantum Teleportation]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|[[Copy Protection]]||[[Copy Protection of Compute and Compare Programs]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Verification of Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Practical Quantum Electronic Voting]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Entanglement Routing]]||[[Routing Entanglement in the Quantum Internet]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Routing in a Quantum Internet]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Quantum Conference Key Agreement]]||[[Anonymous Conference Key Agreement using GHZ states]]&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>5.146.195.0</name></author>
	</entry>
</feed>