<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Charlie</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Charlie"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/Charlie"/>
	<updated>2026-04-18T12:18:06Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Universal_Blind_Quantum_Computation&amp;diff=3446</id>
		<title>Prepare-and-Send Universal Blind Quantum Computation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Universal_Blind_Quantum_Computation&amp;diff=3446"/>
		<updated>2019-07-09T13:10:38Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [https://arxiv.org/abs/0807.4154 example protocol] achieves the functionality assigning universal quantum computation to an untrusted device while maintaining privacy of the computation. Following description deals with a method which involves quantum offline and classical online communication, called Blind Quantum Computation. &lt;br /&gt;
&amp;lt;/br&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[Category: Two Party Protocols]] [[:Category: Two Party Protocols|Two Party]], [[Category: Universal Task]][[:Category: Universal Task|Universal Task]], [[Category: Quantum Functionality]] [[:Category: Quantum Functionality|Quantum Functionality]], Quantum Offline communication, Classical Online communication, [[Supplementary Information#Measurement Based Quantum Computation|Measurement Based Quantum Computation (MBQC)]], [[Measurement-Only Universal Blind Quantum Computation|Measurement Only UBQC]], [[Pseudo-Secret Random Qubit Generator (PSQRG)]], [[Prepare-and-Send Verifiable Universal Blind Quantum Computation|Prepare and Send Verifiable Universal Blind Quantum Computation (VUBQC)]].&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The following Universal Blind Quantum Computation (UBQC) protocol uses the unique feature of Measurement Based Quantum Computation [[Supplementary Information#Measurement Based Quantum Computation (MBQC)|(MBQC)]] that separates the classical and quantum parts of a computation. MBQC requires a set of initial entangled states, called graph states for computation. Here, we shall use a special family of graph states, [[Supplementary Information#Brickwork States|brickwork states]] which are universal (can implement any quantum operation) for X-Y measurements and do not leak any specific data about the computation during preparation. The protocol can be divided into three stages: preparation, computation and output correction.&amp;lt;br/&amp;gt;&lt;br /&gt;
Preparation stage includes a partially quantum Client preparing and sending quantum states to the Server who constructs the required brickwork state. Computation stage involves interaction. Output Correction involves retrieval of correct output from the results sent by the Server. We shall discuss below three protocols with different attributes but same functionality. All UBQC protocols discussed below require Client to prepare the required quantum states for computation and send those to the Server, hence the name &#039;&#039;Prepare and Send UBQC&#039;&#039;. Protocol 1a deals with a partially quantum Client capable of preparing initial quantum states for the construction of brickwork state with classical input/output computation. Protocols 1b and 1c are extensions to accommodate quantum inputs and quantum outputs, respectively.&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Client’s preparation&#039;&#039;&#039; Client sends the initial qubits for construction of brickwork state to Server in this step. Client has in her mind a quantum computation as a measurement pattern on the brickwork state. She prepares m x n single qubit states with randomly chosen local phase in order to hide her classical inputs later.&lt;br /&gt;
*	&#039;&#039;&#039;Server’s preparation&#039;&#039;&#039; Server prepares brickwork state of m rows and n columns. It entangles all the received qubits as per Client’s instructions. Thus, ends preparation stage.&lt;br /&gt;
*	&#039;&#039;&#039;Interaction and Measurement&#039;&#039;&#039; Client and Server interact to perform operations needed for computation. For a given computation and graph state, MBQC provides a measurement angle and some extra Pauli X, Z corrections, for each qubit. The correction sets (also called Dependency sets), unique for every graph state are based on previous measurement outcomes and can be obtained from &#039;&#039;&#039;[[Supplementary Information#Flow Construction-Determinism|flow construction]]&#039;&#039;&#039;. Also, as Client’s input state has random local phase, the same should be added to the measurement angle for computation along with Pauli Corrections to get the correct outcome. Now, in order to hide the output, Client randomly chooses to add a π rotation or not. The final measurement angle includes all the above parameters and hence, is sent to the Server. When Server returns the classical outcome, Client gets the correct outcome by taking into account the random π rotation and then uses it to calculate measurement angle for for the next qubit. The step is repeated until every qubit has been measured. Server returns measurement outcomes for the last column to Client. Client deciphers this outcome to get the final result. This ends the computation stage.&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
**&amp;lt;math&amp;gt;\phi&amp;lt;/math&amp;gt;, measurement angle for given MBQC pattern to implement the required computation&lt;br /&gt;
**&amp;lt;math&amp;gt;\phi_0&amp;lt;/math&amp;gt;, measurement angle including Pauli X,Z corrections&lt;br /&gt;
**&amp;lt;math&amp;gt;s_X,s_Z&amp;lt;/math&amp;gt; Dependency sets for Pauli X and Pauli Z corrections, respectively (obtained from flow construction).&lt;br /&gt;
**&amp;lt;math&amp;gt;\theta&amp;lt;/math&amp;gt;, randomly chosen angles by Client in order to hide classical input&lt;br /&gt;
** r &amp;lt;math&amp;gt;\epsilon_R\{0,1\}&amp;lt;/math&amp;gt;, randomly chosen parameter for &amp;lt;math&amp;gt;\pi&amp;lt;/math&amp;gt; rotation in order to hide classical output&lt;br /&gt;
**&amp;lt;math&amp;gt;\delta&amp;lt;/math&amp;gt;, final measurement angle&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
[[File:Prepare-and-Send Universal Blind Quantum Computation.png|center|Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*(m,n) define dimensions of the brickwork state&lt;br /&gt;
*This protocol is secure/blind in every setting (universal)&lt;br /&gt;
*The Protocol needs Client to be able to prepare given initial quantum states&lt;br /&gt;
*The Protocols needs a quantum channel from Client to Server to transfer initial quantum states&lt;br /&gt;
*This protocol requires no quantum memory for the Client&lt;br /&gt;
*&#039;&#039;Universality&#039;&#039; As brickwork states are universal for X-Y plane measurements, the protocol is universal. This protocol uses approximate universality although exact universality can be achieved if Client if allowed to communicate real numbers.&lt;br /&gt;
*&#039;&#039;Correctness&#039;&#039; If Client and Server follow the protocol as described above, the outcome will be correct.&lt;br /&gt;
*&#039;&#039;Blindness&#039;&#039; The protocol is blind while leaking at most (m,n) to the Server&lt;br /&gt;
&lt;br /&gt;
== Pseudocode==&lt;br /&gt;
[https://github.com/cgmcintyr/SimulaQron/tree/develop/examples/ubqc &amp;lt;u&amp;gt;click here for SimulaQron code&amp;lt;/u&amp;gt;]&lt;br /&gt;
===&#039;&#039;&#039;Stage 1:&#039;&#039;&#039; Preparation===&lt;br /&gt;
*Input: Client: Dimensions of Brickwork State (m,n), Input States (ψ0,y) [Protocol 1b only], Auxilliary Input States (ψx,y)&lt;br /&gt;
*Output: Server: Brickwork State &amp;lt;math&amp;gt;G_{\text{mxn}}&amp;lt;/math&amp;gt;&lt;br /&gt;
**&#039;&#039;&#039;Client’s preparation&#039;&#039;&#039; &lt;br /&gt;
##For each column x = 1,...,n&lt;br /&gt;
###For each row y = 1,...,m&lt;br /&gt;
#### Client prepares  and sends the qubits to Server.&lt;br /&gt;
**&#039;&#039;&#039;Server’s preparation&#039;&#039;&#039;&lt;br /&gt;
#Server creates an entangled state from all received qubits, according to their indices, by applying CTRL-Z gates between the qubits in order to create a brickwork state &amp;lt;math&amp;gt;G_{\text{n x m}}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Stage 2:&#039;&#039;&#039; Computation Stage===&lt;br /&gt;
*Input: Client: Measurement Angle: δx,y&lt;br /&gt;
*Output: Server: Measurement Outcome: sx,y&lt;br /&gt;
**&#039;&#039;&#039;Interaction and measurement&#039;&#039;&#039;&lt;br /&gt;
#For each column x = 1,...,n &lt;br /&gt;
##For each row y = 1,...,m&lt;br /&gt;
###Client computes φ0x,y where{equation missing} &amp;lt;br/&amp;gt;&lt;br /&gt;
###	Client chooses rx,y ∈R {0,1} and computes .&lt;br /&gt;
###	Client transmits δx,y to Server. Server measures in the basis {|+δx,yi,|−δx,yi}.&lt;br /&gt;
###	Server transmits the result sx,y ∈ {0,1} to Client.&lt;br /&gt;
###	If rx,y = 1 above, Client flips sx,y; otherwise she does nothing.&lt;br /&gt;
**&#039;&#039;&#039;Output Correction [only for quantum outputs]&#039;&#039;&#039;&lt;br /&gt;
#	Server sends to Client all qubits in the last layer.&lt;br /&gt;
#	Client performs the final Pauli corrections .&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Universal_Blind_Quantum_Computation&amp;diff=3445</id>
		<title>Prepare-and-Send Universal Blind Quantum Computation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Universal_Blind_Quantum_Computation&amp;diff=3445"/>
		<updated>2019-07-09T13:08:47Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [https://arxiv.org/abs/0807.4154 example protocol] achieves the functionality of [[Secure Client - Server Universal Delegated Computation|Delegated Computation]] is the task of assigning quantum computation to an untrusted device while maintaining privacy of the computation. Following description deals with a method which involves quantum offline and classical online communication, called Blind Quantum Computation. It comes with the properties of correctness i.e. if both parties follow the protocol the final outcome is correct, blindness i.e. the Client to have Server carry out a quantum computation for her (Client) such that the Client’s inputs, outputs and circuit used for computation remain perfectly private from the Server and Universality i.e. the following protocol can implement any quantum computation.&amp;lt;/br&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[Category: Two Party Protocols]] [[:Category: Two Party Protocols|Two Party]], [[Category: Universal Task]][[:Category: Universal Task|Universal Task]], [[Category: Quantum Functionality]] [[:Category: Quantum Functionality|Quantum Functionality]], Quantum Offline communication, Classical Online communication, [[Supplementary Information#Measurement Based Quantum Computation|Measurement Based Quantum Computation (MBQC)]], [[Measurement-Only Universal Blind Quantum Computation|Measurement Only UBQC]], [[Pseudo-Secret Random Qubit Generator (PSQRG)]], [[Prepare-and-Send Verifiable Universal Blind Quantum Computation|Prepare and Send Verifiable Universal Blind Quantum Computation (VUBQC)]].&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The following Universal Blind Quantum Computation (UBQC) protocol uses the unique feature of Measurement Based Quantum Computation [[Supplementary Information#Measurement Based Quantum Computation (MBQC)|(MBQC)]] that separates the classical and quantum parts of a computation. MBQC requires a set of initial entangled states, called graph states for computation. Here, we shall use a special family of graph states, [[Supplementary Information#Brickwork States|brickwork states]] which are universal (can implement any quantum operation) for X-Y measurements and do not leak any specific data about the computation during preparation. The protocol can be divided into three stages: preparation, computation and output correction.&amp;lt;br/&amp;gt;&lt;br /&gt;
Preparation stage includes a partially quantum Client preparing and sending quantum states to the Server who constructs the required brickwork state. Computation stage involves interaction. Output Correction involves retrieval of correct output from the results sent by the Server. We shall discuss below three protocols with different attributes but same functionality. All UBQC protocols discussed below require Client to prepare the required quantum states for computation and send those to the Server, hence the name &#039;&#039;Prepare and Send UBQC&#039;&#039;. Protocol 1a deals with a partially quantum Client capable of preparing initial quantum states for the construction of brickwork state with classical input/output computation. Protocols 1b and 1c are extensions to accommodate quantum inputs and quantum outputs, respectively.&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Client’s preparation&#039;&#039;&#039; Client sends the initial qubits for construction of brickwork state to Server in this step. Client has in her mind a quantum computation as a measurement pattern on the brickwork state. She prepares m x n single qubit states with randomly chosen local phase in order to hide her classical inputs later.&lt;br /&gt;
*	&#039;&#039;&#039;Server’s preparation&#039;&#039;&#039; Server prepares brickwork state of m rows and n columns. It entangles all the received qubits as per Client’s instructions. Thus, ends preparation stage.&lt;br /&gt;
*	&#039;&#039;&#039;Interaction and Measurement&#039;&#039;&#039; Client and Server interact to perform operations needed for computation. For a given computation and graph state, MBQC provides a measurement angle and some extra Pauli X, Z corrections, for each qubit. The correction sets (also called Dependency sets), unique for every graph state are based on previous measurement outcomes and can be obtained from &#039;&#039;&#039;[[Supplementary Information#Flow Construction-Determinism|flow construction]]&#039;&#039;&#039;. Also, as Client’s input state has random local phase, the same should be added to the measurement angle for computation along with Pauli Corrections to get the correct outcome. Now, in order to hide the output, Client randomly chooses to add a π rotation or not. The final measurement angle includes all the above parameters and hence, is sent to the Server. When Server returns the classical outcome, Client gets the correct outcome by taking into account the random π rotation and then uses it to calculate measurement angle for for the next qubit. The step is repeated until every qubit has been measured. Server returns measurement outcomes for the last column to Client. Client deciphers this outcome to get the final result. This ends the computation stage.&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
**&amp;lt;math&amp;gt;\phi&amp;lt;/math&amp;gt;, measurement angle for given MBQC pattern to implement the required computation&lt;br /&gt;
**&amp;lt;math&amp;gt;\phi_0&amp;lt;/math&amp;gt;, measurement angle including Pauli X,Z corrections&lt;br /&gt;
**&amp;lt;math&amp;gt;s_X,s_Z&amp;lt;/math&amp;gt; Dependency sets for Pauli X and Pauli Z corrections, respectively (obtained from flow construction).&lt;br /&gt;
**&amp;lt;math&amp;gt;\theta&amp;lt;/math&amp;gt;, randomly chosen angles by Client in order to hide classical input&lt;br /&gt;
** r &amp;lt;math&amp;gt;\epsilon_R\{0,1\}&amp;lt;/math&amp;gt;, randomly chosen parameter for &amp;lt;math&amp;gt;\pi&amp;lt;/math&amp;gt; rotation in order to hide classical output&lt;br /&gt;
**&amp;lt;math&amp;gt;\delta&amp;lt;/math&amp;gt;, final measurement angle&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
[[File:Prepare-and-Send Universal Blind Quantum Computation.png|center|Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*(m,n) define dimensions of the brickwork state&lt;br /&gt;
*This protocol is secure/blind in every setting (universal)&lt;br /&gt;
*The Protocol needs Client to be able to prepare given initial quantum states&lt;br /&gt;
*The Protocols needs a quantum channel from Client to Server to transfer initial quantum states&lt;br /&gt;
*This protocol requires no quantum memory for the Client&lt;br /&gt;
*&#039;&#039;Universality&#039;&#039; As brickwork states are universal for X-Y plane measurements, the protocol is universal. This protocol uses approximate universality although exact universality can be achieved if Client if allowed to communicate real numbers.&lt;br /&gt;
*&#039;&#039;Correctness&#039;&#039; If Client and Server follow the protocol as described above, the outcome will be correct.&lt;br /&gt;
*&#039;&#039;Blindness&#039;&#039; The protocol is blind while leaking at most (m,n) to the Server&lt;br /&gt;
&lt;br /&gt;
== Pseudocode==&lt;br /&gt;
[https://github.com/cgmcintyr/SimulaQron/tree/develop/examples/ubqc &amp;lt;u&amp;gt;click here for SimulaQron code&amp;lt;/u&amp;gt;]&lt;br /&gt;
===&#039;&#039;&#039;Stage 1:&#039;&#039;&#039; Preparation===&lt;br /&gt;
*Input: Client: Dimensions of Brickwork State (m,n), Input States (ψ0,y) [Protocol 1b only], Auxilliary Input States (ψx,y)&lt;br /&gt;
*Output: Server: Brickwork State &amp;lt;math&amp;gt;G_{\text{mxn}}&amp;lt;/math&amp;gt;&lt;br /&gt;
**&#039;&#039;&#039;Client’s preparation&#039;&#039;&#039; &lt;br /&gt;
##For each column x = 1,...,n&lt;br /&gt;
###For each row y = 1,...,m&lt;br /&gt;
#### Client prepares  and sends the qubits to Server.&lt;br /&gt;
**&#039;&#039;&#039;Server’s preparation&#039;&#039;&#039;&lt;br /&gt;
#Server creates an entangled state from all received qubits, according to their indices, by applying CTRL-Z gates between the qubits in order to create a brickwork state &amp;lt;math&amp;gt;G_{\text{n x m}}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Stage 2:&#039;&#039;&#039; Computation Stage===&lt;br /&gt;
*Input: Client: Measurement Angle: δx,y&lt;br /&gt;
*Output: Server: Measurement Outcome: sx,y&lt;br /&gt;
**&#039;&#039;&#039;Interaction and measurement&#039;&#039;&#039;&lt;br /&gt;
#For each column x = 1,...,n &lt;br /&gt;
##For each row y = 1,...,m&lt;br /&gt;
###Client computes φ0x,y where{equation missing} &amp;lt;br/&amp;gt;&lt;br /&gt;
###	Client chooses rx,y ∈R {0,1} and computes .&lt;br /&gt;
###	Client transmits δx,y to Server. Server measures in the basis {|+δx,yi,|−δx,yi}.&lt;br /&gt;
###	Server transmits the result sx,y ∈ {0,1} to Client.&lt;br /&gt;
###	If rx,y = 1 above, Client flips sx,y; otherwise she does nothing.&lt;br /&gt;
**&#039;&#039;&#039;Output Correction [only for quantum outputs]&#039;&#039;&#039;&lt;br /&gt;
#	Server sends to Client all qubits in the last layer.&lt;br /&gt;
#	Client performs the final Pauli corrections .&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Universal_Blind_Quantum_Computation&amp;diff=3444</id>
		<title>Prepare-and-Send Universal Blind Quantum Computation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Universal_Blind_Quantum_Computation&amp;diff=3444"/>
		<updated>2019-07-09T13:05:34Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [https://arxiv.org/abs/0807.4154 example protocol] achieves the functionality of [[Secure Client- Server Delegated Computation|Delegated Computation]] is the task of assigning quantum computation to an untrusted device while maintaining privacy of the computation. Following description deals with a method which involves quantum offline and classical online communication, called Blind Quantum Computation. It comes with the properties of correctness i.e. if both parties follow the protocol the final outcome is correct, blindness i.e. the Client to have Server carry out a quantum computation for her (Client) such that the Client’s inputs, outputs and circuit used for computation remain perfectly private from the Server and Universality i.e. the following protocol can implement any quantum computation.&amp;lt;/br&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[Category: Two Party Protocols]] [[:Category: Two Party Protocols|Two Party]], [[Category: Universal Task]][[:Category: Universal Task|Universal Task]], [[Category: Quantum Functionality]] [[:Category: Quantum Functionality|Quantum Functionality]], Quantum Offline communication, Classical Online communication, [[Supplementary Information#Measurement Based Quantum Computation|Measurement Based Quantum Computation (MBQC)]], [[Measurement-Only Universal Blind Quantum Computation|Measurement Only UBQC]], [[Pseudo-Secret Random Qubit Generator (PSQRG)]], [[Prepare-and-Send Verifiable Universal Blind Quantum Computation|Prepare and Send Verifiable Universal Blind Quantum Computation (VUBQC)]].&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The following Universal Blind Quantum Computation (UBQC) protocol uses the unique feature of Measurement Based Quantum Computation [[Supplementary Information#Measurement Based Quantum Computation (MBQC)|(MBQC)]] that separates the classical and quantum parts of a computation. MBQC requires a set of initial entangled states, called graph states for computation. Here, we shall use a special family of graph states, [[Supplementary Information#Brickwork States|brickwork states]] which are universal (can implement any quantum operation) for X-Y measurements and do not leak any specific data about the computation during preparation. The protocol can be divided into three stages: preparation, computation and output correction.&amp;lt;br/&amp;gt;&lt;br /&gt;
Preparation stage includes a partially quantum Client preparing and sending quantum states to the Server who constructs the required brickwork state. Computation stage involves interaction. Output Correction involves retrieval of correct output from the results sent by the Server. We shall discuss below three protocols with different attributes but same functionality. All UBQC protocols discussed below require Client to prepare the required quantum states for computation and send those to the Server, hence the name &#039;&#039;Prepare and Send UBQC&#039;&#039;. Protocol 1a deals with a partially quantum Client capable of preparing initial quantum states for the construction of brickwork state with classical input/output computation. Protocols 1b and 1c are extensions to accommodate quantum inputs and quantum outputs, respectively.&lt;br /&gt;
&lt;br /&gt;
*	&#039;&#039;&#039;Client’s preparation&#039;&#039;&#039; Client sends the initial qubits for construction of brickwork state to Server in this step. Client has in her mind a quantum computation as a measurement pattern on the brickwork state. She prepares m x n single qubit states with randomly chosen local phase in order to hide her classical inputs later.&lt;br /&gt;
*	&#039;&#039;&#039;Server’s preparation&#039;&#039;&#039; Server prepares brickwork state of m rows and n columns. It entangles all the received qubits as per Client’s instructions. Thus, ends preparation stage.&lt;br /&gt;
*	&#039;&#039;&#039;Interaction and Measurement&#039;&#039;&#039; Client and Server interact to perform operations needed for computation. For a given computation and graph state, MBQC provides a measurement angle and some extra Pauli X, Z corrections, for each qubit. The correction sets (also called Dependency sets), unique for every graph state are based on previous measurement outcomes and can be obtained from &#039;&#039;&#039;[[Supplementary Information#Flow Construction-Determinism|flow construction]]&#039;&#039;&#039;. Also, as Client’s input state has random local phase, the same should be added to the measurement angle for computation along with Pauli Corrections to get the correct outcome. Now, in order to hide the output, Client randomly chooses to add a π rotation or not. The final measurement angle includes all the above parameters and hence, is sent to the Server. When Server returns the classical outcome, Client gets the correct outcome by taking into account the random π rotation and then uses it to calculate measurement angle for for the next qubit. The step is repeated until every qubit has been measured. Server returns measurement outcomes for the last column to Client. Client deciphers this outcome to get the final result. This ends the computation stage.&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
**&amp;lt;math&amp;gt;\phi&amp;lt;/math&amp;gt;, measurement angle for given MBQC pattern to implement the required computation&lt;br /&gt;
**&amp;lt;math&amp;gt;\phi_0&amp;lt;/math&amp;gt;, measurement angle including Pauli X,Z corrections&lt;br /&gt;
**&amp;lt;math&amp;gt;s_X,s_Z&amp;lt;/math&amp;gt; Dependency sets for Pauli X and Pauli Z corrections, respectively (obtained from flow construction).&lt;br /&gt;
**&amp;lt;math&amp;gt;\theta&amp;lt;/math&amp;gt;, randomly chosen angles by Client in order to hide classical input&lt;br /&gt;
** r &amp;lt;math&amp;gt;\epsilon_R\{0,1\}&amp;lt;/math&amp;gt;, randomly chosen parameter for &amp;lt;math&amp;gt;\pi&amp;lt;/math&amp;gt; rotation in order to hide classical output&lt;br /&gt;
**&amp;lt;math&amp;gt;\delta&amp;lt;/math&amp;gt;, final measurement angle&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
[[File:Prepare-and-Send Universal Blind Quantum Computation.png|center|Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
*(m,n) define dimensions of the brickwork state&lt;br /&gt;
*This protocol is secure/blind in every setting (universal)&lt;br /&gt;
*The Protocol needs Client to be able to prepare given initial quantum states&lt;br /&gt;
*The Protocols needs a quantum channel from Client to Server to transfer initial quantum states&lt;br /&gt;
*This protocol requires no quantum memory for the Client&lt;br /&gt;
*&#039;&#039;Universality&#039;&#039; As brickwork states are universal for X-Y plane measurements, the protocol is universal. This protocol uses approximate universality although exact universality can be achieved if Client if allowed to communicate real numbers.&lt;br /&gt;
*&#039;&#039;Correctness&#039;&#039; If Client and Server follow the protocol as described above, the outcome will be correct.&lt;br /&gt;
*&#039;&#039;Blindness&#039;&#039; The protocol is blind while leaking at most (m,n) to the Server&lt;br /&gt;
&lt;br /&gt;
== Pseudocode==&lt;br /&gt;
[https://github.com/cgmcintyr/SimulaQron/tree/develop/examples/ubqc &amp;lt;u&amp;gt;click here for SimulaQron code&amp;lt;/u&amp;gt;]&lt;br /&gt;
===&#039;&#039;&#039;Stage 1:&#039;&#039;&#039; Preparation===&lt;br /&gt;
*Input: Client: Dimensions of Brickwork State (m,n), Input States (ψ0,y) [Protocol 1b only], Auxilliary Input States (ψx,y)&lt;br /&gt;
*Output: Server: Brickwork State &amp;lt;math&amp;gt;G_{\text{mxn}}&amp;lt;/math&amp;gt;&lt;br /&gt;
**&#039;&#039;&#039;Client’s preparation&#039;&#039;&#039; &lt;br /&gt;
##For each column x = 1,...,n&lt;br /&gt;
###For each row y = 1,...,m&lt;br /&gt;
#### Client prepares  and sends the qubits to Server.&lt;br /&gt;
**&#039;&#039;&#039;Server’s preparation&#039;&#039;&#039;&lt;br /&gt;
#Server creates an entangled state from all received qubits, according to their indices, by applying CTRL-Z gates between the qubits in order to create a brickwork state &amp;lt;math&amp;gt;G_{\text{n x m}}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Stage 2:&#039;&#039;&#039; Computation Stage===&lt;br /&gt;
*Input: Client: Measurement Angle: δx,y&lt;br /&gt;
*Output: Server: Measurement Outcome: sx,y&lt;br /&gt;
**&#039;&#039;&#039;Interaction and measurement&#039;&#039;&#039;&lt;br /&gt;
#For each column x = 1,...,n &lt;br /&gt;
##For each row y = 1,...,m&lt;br /&gt;
###Client computes φ0x,y where{equation missing} &amp;lt;br/&amp;gt;&lt;br /&gt;
###	Client chooses rx,y ∈R {0,1} and computes .&lt;br /&gt;
###	Client transmits δx,y to Server. Server measures in the basis {|+δx,yi,|−δx,yi}.&lt;br /&gt;
###	Server transmits the result sx,y ∈ {0,1} to Client.&lt;br /&gt;
###	If rx,y = 1 above, Client flips sx,y; otherwise she does nothing.&lt;br /&gt;
**&#039;&#039;&#039;Output Correction [only for quantum outputs]&#039;&#039;&#039;&lt;br /&gt;
#	Server sends to Client all qubits in the last layer.&lt;br /&gt;
#	Client performs the final Pauli corrections .&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Secure_Client-_Server_Delegated_Computation&amp;diff=3443</id>
		<title>Secure Client- Server Delegated Computation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Secure_Client-_Server_Delegated_Computation&amp;diff=3443"/>
		<updated>2019-07-09T13:01:20Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Functionality Description==&lt;br /&gt;
&lt;br /&gt;
Delegated Computation is the task of assigning computation on hidden data to a powerful untrusted party (a device) by a weak (in terms of computational powers) party/parties while maintaining privacy of hidden data from the powerful party. Protocols under this functionality are commonly called Client-Server protocols. Delegated Quantum Computation (DQC) protocols involve partially or fully classical client(s) delegating a quantum computation to fully powerful single/multiple quantum server(s). All DQC protocols involve three main stages, Preparation Stage, Computation Stage and Output Correction Stage. The roles of client(s) and server(s) in the different stages may differ according to the type of communication used see Protocols list.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[Category:Two Party Protocols]][[:Category: Two Party Protocols|Two Party]],[[Category:Two Party Protocols]][[:Category: Multi Party Protocols|Multi Party]],[[Category: Quantum Functionality]] [[:Category:Quantum Functionality|Quantum Functionality]], [[Category: Quantum Enhanced Classical Functionality]][[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]],[[Category: Universal Task]][[:Category: Universal Task|Universal Task]]&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
This functionality has been further divided into protocols on the basis of type of communication, number of clients (two party/multi party) and type of delegated tasks (classical/quantum). Types of communication involve &#039;&#039;&#039;online&#039;&#039;&#039; or active use of communication channels during the entire protocol, and &#039;&#039;&#039;offline&#039;&#039;&#039; or one time use of communication channel during preparation stage and output correction stage.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Task&lt;br /&gt;
!width=&amp;quot;20%&amp;quot;|No. of Parties&lt;br /&gt;
!width=&amp;quot;20%&amp;quot;|Type of Communication&lt;br /&gt;
!width=&amp;quot;20%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;6&amp;quot;|Delegated Quantum Computation||rowspan=&amp;quot;5&amp;quot;|Two/Three (Single Client-Single Server/Single Client-Entangled Servers)||Classical Online Communication-Quantum Offline Communication||[[Prepare-and-Send Universal Blind Quantum Computation|Prepare and Send UBQC]], [[Prepare-and-Send Verifiable Universal Blind Quantum Computation|Prepare and Send VUBQC]].&lt;br /&gt;
|-&lt;br /&gt;
|Classical Online Communication-Quantum Online Communication||[[Measurement Only-Universal Blind Quantum Computation|Measurement Only UBQC]], [[Measurement-Only Verifiable Universal Blind Quantum Computation|Measurement Only VUBQC]]&lt;br /&gt;
|-&lt;br /&gt;
|Classical Online Communication-No Quantum Communication||[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|Classical Offline Communication-Quantum Offline Communication||[[Prepare and Send Quantum Fully Homomorphic Encryption|Prepare and Send QFHE]], [[Prepare and Send Verifiable Quantum Fully Homomorphic Encryption|Prepare and Send VQFHE]]&lt;br /&gt;
|-&lt;br /&gt;
|Classical Offline Communication-No Quantum Communication||Quantum Capable Classical Fully Homomorphic Encryption [[Classical Fully Homomorphic Encryption for Quantum Circuits|(FHE) for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|Multi Party (Multiple Clients-Single Server)|| ||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|Delegated Classical Computation||Two/Three (Single Client-Single Server/Single Client-Entangled Servers)|| ||[[Secure Client-Server Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|Multi Party (Multiple Clients-Single Server)|| ||[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3442</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3442"/>
		<updated>2019-07-09T12:46:31Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Outline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[bit commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;).&lt;br /&gt;
Information-theoretic secure bit commitment cannot be done with non-relativistic schemes see this review paper [https://arxiv.org/abs/quant-ph/9712023]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], &lt;br /&gt;
[[:Category:Information-theoretic security|Information-theoretic security]],&lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
[[Category:Information-theoretic security]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly chosen from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3441</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3441"/>
		<updated>2019-07-09T12:44:29Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[bit commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;).&lt;br /&gt;
Information-theoretic secure bit commitment cannot be done with non-relativistic schemes see this review paper [https://arxiv.org/abs/quant-ph/9712023]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], &lt;br /&gt;
[[:Category:Information-theoretic security|Information-theoretic security]],&lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
[[Category:Information-theoretic security]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3440</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3440"/>
		<updated>2019-07-09T12:44:07Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[Bit Commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;).&lt;br /&gt;
Information-theoretic secure bit commitment cannot be done with non-relativistic schemes see this review paper [https://arxiv.org/abs/quant-ph/9712023]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], &lt;br /&gt;
[[:Category:Information-theoretic security|Information-theoretic security]],&lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
[[Category:Information-theoretic security]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Category:Information-theoretic_security&amp;diff=3439</id>
		<title>Category:Information-theoretic security</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Category:Information-theoretic_security&amp;diff=3439"/>
		<updated>2019-07-09T12:40:56Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Following is a list of [https://en.wikipedia.org/wiki/Information-theoretic_security Information-theoretic secure] Protocols.&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Category:Information-theoretic_security&amp;diff=3438</id>
		<title>Category:Information-theoretic security</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Category:Information-theoretic_security&amp;diff=3438"/>
		<updated>2019-07-09T12:40:00Z</updated>

		<summary type="html">&lt;p&gt;Charlie: Created page with &amp;quot;Following is a list of [Information-theoretic secure https://en.wikipedia.org/wiki/Information-theoretic_security] Protocols.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Following is a list of [Information-theoretic secure https://en.wikipedia.org/wiki/Information-theoretic_security] Protocols.&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3437</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3437"/>
		<updated>2019-07-09T12:38:09Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[Bit Commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;).&lt;br /&gt;
Bit commitment cannot be done with non-relativistic schemes as proved by Mayers in his [https://arxiv.org/abs/quant-ph/9605044 paper]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], &lt;br /&gt;
[[:Category:Information-theoretic security|Information-theoretic security]],&lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
[[Category:Information-theoretic security]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3436</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3436"/>
		<updated>2019-07-09T12:37:35Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[Bit Commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;).&lt;br /&gt;
Bit commitment cannot be done with non-relativistic schemes as proved by Mayers in his [https://arxiv.org/abs/quant-ph/9605044 paper]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], &lt;br /&gt;
[[Category:Information-theoretic security|Information-theoretic security]],&lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
[[Category:Information-theoretic security]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3435</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3435"/>
		<updated>2019-07-09T12:32:27Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[Bit Commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;).&lt;br /&gt;
Bit commitment cannot be done with non-relativistic schemes as proved by Mayers in his [https://arxiv.org/abs/quant-ph/9605044 paper]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], &lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
[[Category:Information-theoretic security]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commmiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3434</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3434"/>
		<updated>2019-07-09T12:30:04Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[Bit Commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;).&lt;br /&gt;
Bit commitment cannot be done with non-relativistic schemes as proved by Mayers in his [https://arxiv.org/abs/quant-ph/9605044 paper]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], Unconditional Security&lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commmiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3433</id>
		<title>Quantum Bit Commitment</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Bit_Commitment&amp;diff=3433"/>
		<updated>2019-07-09T12:29:49Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://arxiv.org/abs/1108.2879 example protocol] achieves the task of [[Bit Commitment]] securely by using a relativistic scheme.&lt;br /&gt;
In bit commitment, the commiter &amp;quot;commits&amp;quot; to a particular bit value.&lt;br /&gt;
The receiver knows nothing about the committed bit value until the commiter chooses to do so (&#039;&#039;hiding property&#039;&#039;).&lt;br /&gt;
The receiver has a guarantee that once committed, the commiter cannot change the committed bit value (&#039;&#039;binding property&#039;&#039;.&lt;br /&gt;
Bit commitment cannot be done with non-relativistic schemes as proved by Mayers in his [https://arxiv.org/abs/quant-ph/9605044 paper]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], Unconditional Security&lt;br /&gt;
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Quantum theory is correct.&lt;br /&gt;
* The background space-time is approximately Minkowski.&lt;br /&gt;
* The commmiter can signal at precisely light speed.&lt;br /&gt;
* All information processing is instantaneous.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The receiver securely pre-prepares a set of qubits randomly from the BB84 states and sends them to the commiter.&lt;br /&gt;
To commit to the bit 0, the commiter measures the received qubits in the standard basis and in Hadamard basis to commit to 1.&lt;br /&gt;
The commiter then sends the outcomes to their agents over secure classical channels.&lt;br /&gt;
To unveil the committed bit, the commiter&#039;s agents reveal the outcomes to the receiver&#039;s agents.&lt;br /&gt;
The receiver&#039;s agents then check if the outcomes they have received are the same and consistent with the states sent to the commiter.&lt;br /&gt;
If the check passes, the receiver accepts the commitment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;: Number of random qubits used in the commitment.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi_i\rangle&amp;lt;/math&amp;gt;: Random BB84 qubit with index &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;: Space-time origin point for the Minkowski space.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt;: Commiter&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt;: Commiter&#039;s second agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_0&amp;lt;/math&amp;gt;: Receiver&#039;s first agent.&lt;br /&gt;
* &amp;lt;math&amp;gt;Q^{&#039;}_1&amp;lt;/math&amp;gt;: Receiver&#039;s second agent.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
* Secure classical channels between the parties and their agents.&lt;br /&gt;
* Basic state preparation abilities for the receiver.&lt;br /&gt;
* Instantaneous measurement capabilities for the commiter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Quantum Bit Commitment.png|center|Quantum Bit Commitment]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* There is no need of quantum memory for the parties.&lt;br /&gt;
* The protocol is unconditionally secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudocode==&lt;br /&gt;
&lt;br /&gt;
The commiter and the receiver agree on the space-time origin point P and two light-like separated points where the two agents of each party will be stationed.&lt;br /&gt;
&lt;br /&gt;
===Commitment Phase===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Prepare a set of &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; qubits &amp;lt;math&amp;gt;|\psi_i\rangle_{i=1}^N&amp;lt;/math&amp;gt; chosen independently and randomly from the BB84 states - &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle, |+\rangle, |-\rangle\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# Send the qubits to the commiter at point P.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Commiter&#039;&#039;&lt;br /&gt;
# To commit to 0, measure in the &amp;lt;math&amp;gt;\{|0\rangle, |1\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# To commit to 1, measure in the &amp;lt;math&amp;gt;\{|+\rangle, |-\rangle\}&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
# Send the measurement outcomes to the agents &amp;lt;math&amp;gt;Q_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q_1&amp;lt;/math&amp;gt; via the secure classical channels.&lt;br /&gt;
&lt;br /&gt;
===Unveiling Phase===    &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Committer&#039;&#039;&lt;br /&gt;
# The committer&#039;s agents reveal the measurement outcomes to the receiver&#039;s agents &amp;lt;math&amp;gt;Q&#039;_0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Q&#039;_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Receiver&#039;&#039;&lt;br /&gt;
# Check if the revealed outcomes of both the agents are same, if not, then abort.&lt;br /&gt;
# Check if the revealed outcomes are consistent with the sent states, if not, then abort.&lt;br /&gt;
# If the checks pass, accept the commitment.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Protocol_Zoo:About&amp;diff=3401</id>
		<title>Quantum Protocol Zoo:About</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Protocol_Zoo:About&amp;diff=3401"/>
		<updated>2019-06-28T14:57:40Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*&#039;&#039;&#039;THE ZOO FOUNDERS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;div id=&amp;quot;2a&amp;quot;&amp;gt;&amp;lt;div id=&amp;quot;2b&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li style=&amp;quot;display: inline-block;&amp;quot;&amp;gt; [[File:Elham Kashefi.jpg|frame|300px|[https://ekashefi.wordpress.com/ Elham Kashefi] ]]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li style=&amp;quot;display: inline-block;&amp;quot;&amp;gt; [[File:Shraddha Singh.jpg|frame|500px|[https://linkedin.com/in/shraddha-singh-161566176/ Shraddha Singh]]] &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;THE ZOO REVIEWERS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
# Céline Chevalier &lt;br /&gt;
# Marc Kaplan &lt;br /&gt;
# Elham Kashefi &lt;br /&gt;
# Niraj Kumar &lt;br /&gt;
# Atul Mantri &lt;br /&gt;
# Harold Ollivier&lt;br /&gt;
# Shraddha Singh &lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;THE ZOO CONTRIBUTORS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
# Mashid Delavar&lt;br /&gt;
# Bas Dirke&lt;br /&gt;
# Mina Doosti&lt;br /&gt;
# Victoria Lipinska&lt;br /&gt;
# Natansh Mathur&lt;br /&gt;
# Gláucia Murta&lt;br /&gt;
# Rhea Parekh&lt;br /&gt;
# Jérémy Ribeiro&lt;br /&gt;
# Shraddha Singh&lt;br /&gt;
# Gozde Ustun &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;THE ZOO SPONSORS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://anr.fr/Project-ANR-17-CE24-0035 ANR VanQuTe]&lt;br /&gt;
[[File:VeriQloud.png|200px|link=https://veriqloud.com/]]&lt;br /&gt;
[[File:EPSRC.png|400px|link=https://epsrc.ukri.org/]]&lt;br /&gt;
[[File:QIA.png|400px|link=http://quantum-internet.team/]]&lt;br /&gt;
[[File:Flagship.jpg|300px|link=https://qt.eu/]]&lt;br /&gt;
[[File:EU.jpg|200px|link=https://cordis.europa.eu/project/rcn/218486/factsheet/en]]&amp;lt;br/&amp;gt; This project (QIA) has received funding from&lt;br /&gt;
the European Union&#039;s Horizon 2020 research&lt;br /&gt;
and innovation programme under grant agreement No 820445.&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Protocol_Zoo:About&amp;diff=3400</id>
		<title>Quantum Protocol Zoo:About</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Protocol_Zoo:About&amp;diff=3400"/>
		<updated>2019-06-28T14:57:26Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*&#039;&#039;&#039;THE ZOO FOUNDERS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;div id=&amp;quot;2a&amp;quot;&amp;gt;&amp;lt;div id=&amp;quot;2b&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li style=&amp;quot;display: inline-block;&amp;quot;&amp;gt; [[File:Elham Kashefi.jpg|frame|300px|[https://ekashefi.wordpress.com/ Elham Kashefi] ]]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li style=&amp;quot;display: inline-block;&amp;quot;&amp;gt; [[File:Shraddha Singh.jpg|frame|500px|[https://linkedin.com/in/shraddha-singh-161566176/ Shraddha Singh]]] &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;THE ZOO REVIEWERS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
# Céline Chevalier &lt;br /&gt;
# Marc Kaplan &lt;br /&gt;
# Elham Kashefi &lt;br /&gt;
# Niraj Kumar &lt;br /&gt;
# Atul Mantri &lt;br /&gt;
# Harold Ollivier&lt;br /&gt;
# Shraddha Singh &lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;THE ZOO CONTRIBUTORS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
# Mashid Delavar&lt;br /&gt;
# Bas Dirke&lt;br /&gt;
# Mina Doosti&lt;br /&gt;
# Victoria Lipinska&lt;br /&gt;
# Natansh Mathur&lt;br /&gt;
# Gláucia Murta&lt;br /&gt;
# Rhea Parekh&lt;br /&gt;
# Jérémy Ribeiro&lt;br /&gt;
# Shraddha Singh&lt;br /&gt;
# Gozde Ustun &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;THE ZOO SPONSORS&#039;&#039;&#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://anr.fr/Project-ANR-17-CE24-0035 ANR VanQuTe]&lt;br /&gt;
[[File:VeriQloud.png|200px|link=https://veriqloud.com/]]&lt;br /&gt;
[[File:EPSRC.png|400px|link=https://epsrc.ukri.org/]]&lt;br /&gt;
[[File:QIA.png|400px|link=http://quantum-internet.team/]]&lt;br /&gt;
[[File:Flagship.jpg|300px|link=https://qt.eu/]]&lt;br /&gt;
[[File:EU.jpg|200px|link=https://cordis.europa.eu/project/rcn/218486/factsheet/en]]&amp;lt;br/&amp;gt; This project (QIA) has received funding from&lt;br /&gt;
the European Union&#039;s Horizon 2020 research&lt;br /&gt;
and innovation programme under grant agreement No 820445.&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Main_Page&amp;diff=3367</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Main_Page&amp;diff=3367"/>
		<updated>2019-06-18T08:44:26Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* The goal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &#039;&#039;&#039;Welcome to The Quantum Protocol Zoo -&#039;&#039;&#039; &#039;&#039;Explore, Learn, Code and Implement Quantum Protocols&#039;&#039;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;The quantum protocol zoo is an open repository of protocols for quantum networks. It provides a compact and canonical way to explore such protocols. Moreover, it allows for easy communication among computer scientists, engineers, and physicists on a single platform.&lt;br /&gt;
*[[Quantum Protocol Zoo:About|About us]]&lt;br /&gt;
*[[Quantum Protocol Zoo:General disclaimer| Disclaimer]]&lt;br /&gt;
*[[Quantum Protocol Zoo:Copyrights|Copyrights]]&lt;br /&gt;
== Getting started ==&lt;br /&gt;
Quantum Protocol Zoo is a repository of protocols for quantum networks. It presents a wiki of protocols for various functionalities classified in terms of the [[:Category: Network Stages|network stages]] for a quantum internet. It is important to note that, although there are several different ways of defining a protocol, we characterise it as something that involves more than one party. In particular, we define a protocol as a sequence of steps, specifically designed to accomplish a task. It may or may not involve an algorithm and could be run between trusted parties as well as parties who don&#039;t trust each other. &lt;br /&gt;
&lt;br /&gt;
The wiki consists of two types of pages: The first type is a functionality page, describing a general task which can be realised in a quantum network (the &amp;quot;what&amp;quot;). The second type of page is a protocol page, which describes a specific protocol implementing the defined functionality (the &amp;quot;how&amp;quot;). These pages are listed in [[Protocol Library]]. Furthermore, a page on [[Supplementary Information]] has been provided for background information about quantum theory. Any information on [[How to Submit]] or contact can be found in the Navigation menu on the sidebar. Every page has a Discussion section, where users are welcome to leave their comments.&lt;br /&gt;
&lt;br /&gt;
== The goal ==&lt;br /&gt;
The goal of this project is multifold. First, it aims to provide a compact and precise review of all the existing protocols in one place, such that it is accessible to both the young researchers motivated to enter into the field as well as quantum enthusiasts. Second, our platform enables the experts from academia and industry to find real-life use cases for the listed protocols and at the same time innovate on (or compose) the existing ones to tailor-made new protocol for a desired task. Finally, our main intention is to also develop standardised form for protocol descriptions to make the community quantum-internet ready. At the same time, we emphasise that our purpose is not to point out the strengths or weaknesses of any particular protocol or functionality. &lt;br /&gt;
&lt;br /&gt;
As a direct consequence of this effort, hosting and analysing the protocols in this fashion provides an underlying link between several protocols and would enable everyone to gain a deeper understanding of their working. With the rapid progress in quantum technologies and improvements in the current protocols, it is extremely beneficial to have a resource for all the quantum protocols in one place that can be regularly updated to keep track of the advancements, something that can not be achieved with the review articles or a book. We, therefore, invite everyone from the quantum information science community to join and contribute to this initiative in collectively making the quantum protocol zoo a crucial source for quantum protocols.&lt;br /&gt;
&lt;br /&gt;
== Wonder what&#039;s the format for contribution? ==&lt;br /&gt;
&lt;br /&gt;
We welcome contributions from various fields, here we give the format of the kinds of pages, the wiki is composed of. A more detailed set of guidelines for submissions can be found on the [[How to Submit]] page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Functionality Page===&lt;br /&gt;
----&lt;br /&gt;
Functionality page describes a general task which can be realized in a quantum network (the &amp;quot;what&amp;quot;). It consists of the following sections.&lt;br /&gt;
&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color: white; border: solid thin black;title=Functionality Description;&amp;quot;&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Functionality Description&#039;&#039;&#039; A lucid definition of functionality in discussion.&lt;br /&gt;
----&lt;br /&gt;
* &#039;&#039;&#039;Tags&#039;&#039;&#039; Any related page or list of protocols is connected by this section&lt;br /&gt;
----&lt;br /&gt;
* &#039;&#039;&#039;Use Case&#039;&#039;&#039; (if available) compares security, efficiency and practicality of quantum protocols with its available classical analogues; connects protocols with real world applications.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Protocols&#039;&#039;&#039; List of different types of example protocol achieving the functionality (each protocol in this list is written in the format given below) depending on the task achieved or [[:Category: Network Stages|Network Stages]] required to achieve the same functionality&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Properties&#039;&#039;&#039; All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Further Information&#039;&#039;&#039; Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. &lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Protocol Page ===&lt;br /&gt;
----&lt;br /&gt;
Protocol page describes a specific protocol implementing the defined functionality (the &amp;quot;how&amp;quot;). It consists of the following sections.&lt;br /&gt;
&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color: white; border: solid thin black;title=Functionality Description;&amp;quot;&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Link&#039;&#039;&#039; to the corresponding functionality together with a short description of the method used and properties satisfied by a protocol.&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Tags&#039;&#039;&#039; Any related page or list of protocols is connected by this section&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Assumptions&#039;&#039;&#039; It describes the setting in which the protocol will be successful. Any assumption on the setup for the protocol below is listed in this section.&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Outline&#039;&#039;&#039; A non-mathematical detailed outline which provides a rough idea of the concerned protocol. A figure is accommodated for most protocols. &lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Notation&#039;&#039;&#039; Connects the non-mathematical outline with further sections.&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Component requirements&#039;&#039;&#039; Order of digits related to threshold values, QBit Error Rate (QBER), parameters, etc.. are illustrated in this section. A figure demonstrating the physical resources, nodal subroutines, and other protocols being used is accommodated here.&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Properties&#039;&#039;&#039; A list of important information extracted from the protocol such as parameters (threshold values), security claim, success probability,  etc..&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Pseudocode&#039;&#039;&#039; Mathematical step-wise protocol algorithm helpful to write a subroutine.&lt;br /&gt;
----&lt;br /&gt;
*&#039;&#039;&#039;Further Information&#039;&#039;&#039; Any useful information that could not find its place in the above description goes here. Also, some pages on protocols might include a short description as below for a list of protocols in the same class of functionality and network stage that are easy to interpret after reading the concerned formal description (or are variants of the protocol discussed above):&lt;br /&gt;
*Theoretical Papers: &lt;br /&gt;
**How is it different from the above protocol&lt;br /&gt;
**Requirements&lt;br /&gt;
**Security&lt;br /&gt;
*Experimental Papers: &lt;br /&gt;
**Which paper or protocol does it implement&lt;br /&gt;
**Benchmark values for this demonstration&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2254</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2254"/>
		<updated>2019-04-25T10:48:14Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Further Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Money is issued by one party (bank) to a prover (client) such that when he presents it to a verifier&lt;br /&gt;
(merchant), he/she is satisfied that the money presented by client comes from the bank. It comes&lt;br /&gt;
with the property of [[unforgeability]] and [[transferrability]]. Unforgeability means that there should exist&lt;br /&gt;
no method to produce an identical copy by anyone but the bank, and transferrability, allows that this&lt;br /&gt;
money can be used by the verifier as a client himself in the next round.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Multi Party Protocols|Multi Party Protocols]], non local games, [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]] &lt;br /&gt;
[[Category: Prepare and Measure Network Stage]]&lt;br /&gt;
[[Category: Specific Tasks]]&lt;br /&gt;
[[Category: Quantum Enhanced Classical Functionality]]&lt;br /&gt;
[[Category: Multi Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Money is physically transferred to the holders&lt;br /&gt;
* If &amp;lt;math&amp;gt;F^{cv}_{tol} &amp;gt; (1+1/\sqrt{2})/2&amp;lt;/math&amp;gt; , a dishonest user is exponentially unlikely to be authenticated by two independent verifiers (success in cheating to use same ticket for two independent verifiers by measuring in intermediate basis between the two bases, asked by the verifiers individually).&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol can be divided into three parts&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039; Bank prepares few rows of qubit-pairs chosen from two different non-orthogonal sets of basis. Each pair has at least one state from both bases, such that the qubit pair states are non-orthogonal. It associates each such chosen set with a serial number and shares the classical information about the choices for respective serial number with trusted merchants.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039; This step involves challenge questions by verifier to prove that he has a valid token, by playing part of a [[non-local game]]. In this game, the merchant asks client to measure in one of the two bases in from which the qubit pairs were chosen. As each qubit pair contains at least one state from each basis chosen, after the measurement one of the qubits (encoded in the basis chosen by the merchant) would give the correct result. &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039; The merchant compares this qubit outcome whose encoding basis matches with merchant&#039;s basis for the game. Merchant accepts the ticket if the ratio of number of valid outcomes to total number of qubits measured is more than or equal to a certain threshold fidelity value.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;N=n*r*2&amp;lt;/math&amp;gt;, total number of qubits&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}:&amp;lt;/math&amp;gt; is the tolerance fidelity set by the verifiers&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}(r*2) &amp;lt; F^{exp}:&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt; F^{exp}&amp;lt;/math&amp;gt; is the average experimental fidelity&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*Network stage: [[:Category: Quantum Memory Network Stage|quantum memory network]][[Category:Quantum Memory Network Stage]].&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* Challenge questions reveal no information about the token&lt;br /&gt;
* No quantum communication is needed&lt;br /&gt;
* Tokens are remotely verifiable/ classically verifiable&lt;br /&gt;
* A dishonest user is exponentially unlikely to succeed with probability at most, &amp;lt;math&amp;gt;p_d = e^{ND}(2F^{cv}_{tol}-1||2/3)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;(2F^{cv}_{tol}-1)&amp;lt;/math&amp;gt; is the fraction of qubits to be copied in order to forge a ticket and 2/3 is the average fidelity of copies produced by optimal cloning map, D being relative entropy.&lt;br /&gt;
* An honest user is exponentially likely to succeed with probability at least, &amp;lt;math&amp;gt;p^{cv}_h = e^{ND}(F^{exp}||F^{cv}_{tol})&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pseudo-Code==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; (Bank) &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt;, Qubit-pairs &amp;lt;math&amp;gt;\epsilon_R\{(0,+),(0,-),(1,+),(1,-),(+,0),(-,0),(+,1),(-,1)\}&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; (Merchant) accept or reject&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 1&#039;&#039;&#039;&amp;lt;/u&amp;gt; Preparation &amp;lt;/br&amp;gt;&lt;br /&gt;
# Bank prepares Token&amp;lt;math&amp;gt;_S&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt; qubit pairs&lt;br /&gt;
# Bank distributes tickets to clients&lt;br /&gt;
# Bank distributes the classical record of states corresponding to S to trusted&lt;br /&gt;
verifiers (merchants)&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 2&#039;&#039;&#039;&amp;lt;/u&amp;gt; Interaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant asks client to measure a few qubit-pairs(say, a row) in a randomly chosen basis M \epsilon_R \{X,Z\}&lt;br /&gt;
# Client returns measurement outcome (m) for all qubit pairs asked to measure&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 3&#039;&#039;&#039;&amp;lt;/u&amp;gt; Transaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant compares the number of qubit pairs with the valid outcome for the qubit which was&lt;br /&gt;
generated in M basis as k.&lt;br /&gt;
# Merchant accepts if &amp;lt;math&amp;gt;k/(r*2)&amp;gt;F^{cv}_{tol}&amp;lt;/math&amp;gt; else he rejects&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
# [https://arxiv.org/abs/1705.01428 BOTZKD-QMoney (2018)] replaces qubits with [[coherent states]] and it implements the quantum money on the fly (i.e. without quantum memory). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2253</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2253"/>
		<updated>2019-04-25T10:44:05Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Further Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Money is issued by one party (bank) to a prover (client) such that when he presents it to a verifier&lt;br /&gt;
(merchant), he/she is satisfied that the money presented by client comes from the bank. It comes&lt;br /&gt;
with the property of [[unforgeability]] and [[transferrability]]. Unforgeability means that there should exist&lt;br /&gt;
no method to produce an identical copy by anyone but the bank, and transferrability, allows that this&lt;br /&gt;
money can be used by the verifier as a client himself in the next round.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Multi Party Protocols|Multi Party Protocols]], non local games, [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]] &lt;br /&gt;
[[Category: Prepare and Measure Network Stage]]&lt;br /&gt;
[[Category: Specific Tasks]]&lt;br /&gt;
[[Category: Quantum Enhanced Classical Functionality]]&lt;br /&gt;
[[Category: Multi Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Money is physically transferred to the holders&lt;br /&gt;
* If &amp;lt;math&amp;gt;F^{cv}_{tol} &amp;gt; (1+1/\sqrt{2})/2&amp;lt;/math&amp;gt; , a dishonest user is exponentially unlikely to be authenticated by two independent verifiers (success in cheating to use same ticket for two independent verifiers by measuring in intermediate basis between the two bases, asked by the verifiers individually).&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol can be divided into three parts&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039; Bank prepares few rows of qubit-pairs chosen from two different non-orthogonal sets of basis. Each pair has at least one state from both bases, such that the qubit pair states are non-orthogonal. It associates each such chosen set with a serial number and shares the classical information about the choices for respective serial number with trusted merchants.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039; This step involves challenge questions by verifier to prove that he has a valid token, by playing part of a [[non-local game]]. In this game, the merchant asks client to measure in one of the two bases in from which the qubit pairs were chosen. As each qubit pair contains at least one state from each basis chosen, after the measurement one of the qubits (encoded in the basis chosen by the merchant) would give the correct result. &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039; The merchant compares this qubit outcome whose encoding basis matches with merchant&#039;s basis for the game. Merchant accepts the ticket if the ratio of number of valid outcomes to total number of qubits measured is more than or equal to a certain threshold fidelity value.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;N=n*r*2&amp;lt;/math&amp;gt;, total number of qubits&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}:&amp;lt;/math&amp;gt; is the tolerance fidelity set by the verifiers&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}(r*2) &amp;lt; F^{exp}:&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt; F^{exp}&amp;lt;/math&amp;gt; is the average experimental fidelity&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*Network stage: [[:Category: Quantum Memory Network Stage|quantum memory network]][[Category:Quantum Memory Network Stage]].&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* Challenge questions reveal no information about the token&lt;br /&gt;
* No quantum communication is needed&lt;br /&gt;
* Tokens are remotely verifiable/ classically verifiable&lt;br /&gt;
* A dishonest user is exponentially unlikely to succeed with probability at most, &amp;lt;math&amp;gt;p_d = e^{ND}(2F^{cv}_{tol}-1||2/3)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;(2F^{cv}_{tol}-1)&amp;lt;/math&amp;gt; is the fraction of qubits to be copied in order to forge a ticket and 2/3 is the average fidelity of copies produced by optimal cloning map, D being relative entropy.&lt;br /&gt;
* An honest user is exponentially likely to succeed with probability at least, &amp;lt;math&amp;gt;p^{cv}_h = e^{ND}(F^{exp}||F^{cv}_{tol})&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pseudo-Code==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; (Bank) &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt;, Qubit-pairs &amp;lt;math&amp;gt;\epsilon_R\{(0,+),(0,-),(1,+),(1,-),(+,0),(-,0),(+,1),(-,1)\}&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; (Merchant) accept or reject&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 1&#039;&#039;&#039;&amp;lt;/u&amp;gt; Preparation &amp;lt;/br&amp;gt;&lt;br /&gt;
# Bank prepares Token&amp;lt;math&amp;gt;_S&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt; qubit pairs&lt;br /&gt;
# Bank distributes tickets to clients&lt;br /&gt;
# Bank distributes the classical record of states corresponding to S to trusted&lt;br /&gt;
verifiers (merchants)&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 2&#039;&#039;&#039;&amp;lt;/u&amp;gt; Interaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant asks client to measure a few qubit-pairs(say, a row) in a randomly chosen basis M \epsilon_R \{X,Z\}&lt;br /&gt;
# Client returns measurement outcome (m) for all qubit pairs asked to measure&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 3&#039;&#039;&#039;&amp;lt;/u&amp;gt; Transaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant compares the number of qubit pairs with the valid outcome for the qubit which was&lt;br /&gt;
generated in M basis as k.&lt;br /&gt;
# Merchant accepts if &amp;lt;math&amp;gt;k/(r*2)&amp;gt;F^{cv}_{tol}&amp;lt;/math&amp;gt; else he rejects&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
# [https://arxiv.org/abs/1705.01428 BOTZKD-QMoney (2018)] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh and Mathieu Bozzio&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Coin&amp;diff=2252</id>
		<title>Quantum Coin</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Coin&amp;diff=2252"/>
		<updated>2019-04-25T10:36:30Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Quantum Money is a unique object generated by a Trusted Third Party (TTP). Then, it is circulated among untrusted clients (Transferability property). Each client should be able to prove the authenticity of his owned quantum money to a verifier. On the other hand, an adversary must fail in counterfeiting the quantum money with overwhelmingly high probability (Unforgeability property). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags&#039;&#039;&#039;: Multiparty, Quantum Enhanced Classical functionality, prepare (bank) and measure (client)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Outline ==&lt;br /&gt;
In this scheme, a Trusted Third Party (TTP) and a coin holder run the following procedure for generating and verifying a quantum coin:&amp;lt;br&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Quantum coin Generation&#039;&#039;&#039; - The TTP chooses k random 4-bit strings, keeps them in secret and produce k quantum states. A newly issued quantum coin consists of a piece of paper glued to k quantum registers that hold k quantum states. The piece of paper contains a unique identification tag and k initially unmarked positions, where the i-th position has to be marked in k-bit classical register P when the corresponding quantum state is used in the verification protocol.&lt;br /&gt;
* &#039;&#039;&#039;Quantum coin Verification&#039;&#039;&#039; - To verify a quantum coin through classical communication with the TTP, its holder sends the identification number of the quantum coin to the TTP. Then, the TTP and the coin holder exchange some classical information for choosing some quantum registers. The coin holder measures the chosen registers and sends their corresponding classical information to the TTP. The TTP verifies the authenticity of the coin by the secret information he possesses.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*Network stage: [[:Category: Quantum Memory Network Stage|quantum memory network]][[Category:Quantum Memory Network Stage]].&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Parameters&#039;&#039;&#039;: HMP&amp;lt;sub&amp;gt;4&amp;lt;/sub&amp;gt;-states, Let x &amp;amp;isin; {0, 1}&amp;lt;sup&amp;gt;4&amp;lt;/sup&amp;gt;. The corresponding HMP&amp;lt;sub&amp;gt;4&amp;lt;/sub&amp;gt;-states is &amp;lt;math&amp;gt;|\alpha(x)\rangle=\dfrac{1}{2}\sum_{1\leq i\leq4}(-1)^{x_i}|i\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;General Features&#039;&#039;&#039;:&lt;br /&gt;
** No need to quantum communication for quantum coin verification.&lt;br /&gt;
** The classical communication channel used for verification can be unencrypted.&lt;br /&gt;
** The database of the bank is static, and therefore many de-centralized “verification branches” can exist that do not have to communicate with one another.&lt;br /&gt;
** The number of verifications that a quantum coin can go through is limited.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Security Claims&#039;&#039;&#039;:&lt;br /&gt;
**The coins are exponentially hard to counterfeit.&lt;br /&gt;
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin.&lt;br /&gt;
&lt;br /&gt;
== Protocol ==&lt;br /&gt;
&#039;&#039;&#039;Stage 1: Quantum coin generation&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Input&#039;&#039;: A secret record consists of &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; entries &amp;lt;math&amp;gt;x_1, . . . , x_k&amp;lt;/math&amp;gt;,&amp;lt;math&amp;gt; x_i\in \{0,1\}^4&amp;lt;/math&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Output&#039;&#039;: A “fresh” quantum coin&amp;lt;br&amp;gt;&lt;br /&gt;
The Trusted Third Party (TTP) chooses &amp;lt;math&amp;gt;x_1, . . . , x_k\in\{{0, 1}\}^4&amp;lt;/math&amp;gt; at random, keeps them in secret and produces quantum states &amp;lt;math&amp;gt;|\alpha(x_1)\rangle, . . . , |\alpha(x_k)\rangle&amp;lt;/math&amp;gt;. &lt;br /&gt;
A “fresh” quantum coin corresponding to this record consists of:&lt;br /&gt;
* &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; quantum registers consisting of 2 qubits each, where the &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;-th register contains &amp;lt;math&amp;gt;|\alpha(x_i)\rangle&amp;lt;/math&amp;gt;;&lt;br /&gt;
* a &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;-bit classical register &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;, that is initially set to &amp;lt;math&amp;gt;0^k&amp;lt;/math&amp;gt;;&lt;br /&gt;
* a unique identification number.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stage 2: Quantum coin verification&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Input&#039;&#039;: the identification number of the quantum coin&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Output&#039;&#039;: Accept or Reject&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This stage is run as follows:&lt;br /&gt;
* The holder sends the identification number of the quantum coin to the TTP.&lt;br /&gt;
* The TTP chooses uniformly at random a set &amp;lt;math&amp;gt;L_{bn}\subset[k]&amp;lt;/math&amp;gt; of size &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;, and sends it to the coin holder.&lt;br /&gt;
* The holder consults with P and chooses uniformly at random a set &amp;lt;math&amp;gt;L_{hl} \subset L_{bn}&amp;lt;/math&amp;gt; consisting of &amp;lt;math&amp;gt;2t/3&amp;lt;/math&amp;gt; yet unmarked positions. He sends &amp;lt;math&amp;gt;L_{hl}&amp;lt;/math&amp;gt; to the bank and marks in &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt; all the elements of &amp;lt;math&amp;gt;L_{hl}&amp;lt;/math&amp;gt; as used.&lt;br /&gt;
* The TTP chooses at random &amp;lt;math&amp;gt;2t/3&amp;lt;/math&amp;gt; values &amp;lt;math&amp;gt;m_i \in\{{0, 1}\}&amp;lt;/math&amp;gt;, one for each &amp;lt;math&amp;gt;i \in L_{hl}&amp;lt;/math&amp;gt; , and sends them to the coin holder.&lt;br /&gt;
* The holder measures the quantum registers corresponding to the elements of &amp;lt;math&amp;gt;L_{hl}&amp;lt;/math&amp;gt; in order to produce &amp;lt;math&amp;gt;2t/3&amp;lt;/math&amp;gt; pairs &amp;lt;math&amp;gt;(a_i, b_i)&amp;lt;/math&amp;gt;, such that &amp;lt;math&amp;gt;(x_i,m_i, a_i, b_i)\in HMP_4&amp;lt;/math&amp;gt; for all &amp;lt;math&amp;gt;i \in L_{hl}&amp;lt;/math&amp;gt;. He sends the list of &amp;lt;math&amp;gt;(a_i, b_i)&amp;lt;/math&amp;gt;s to the TTP.&lt;br /&gt;
* The TTP checks whether &amp;lt;math&amp;gt;(x_i,m_i, a_i, b_i)\in HMP_4&amp;lt;/math&amp;gt; for all &amp;lt;math&amp;gt;i \in L_{hl}&amp;lt;/math&amp;gt;, in which case it confirms validity of the quantum coin. Otherwise, the coin is declared to be a counterfeit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Coin&amp;diff=2251</id>
		<title>Quantum Coin</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Coin&amp;diff=2251"/>
		<updated>2019-04-25T10:36:09Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Quantum Money is a unique object generated by a Trusted Third Party (TTP). Then, it is circulated among untrusted clients (Transferability property). Each client should be able to prove the authenticity of his owned quantum money to a verifier. On the other hand, an adversary must fail in counterfeiting the quantum money with overwhelmingly high probability (Unforgeability property). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags&#039;&#039;&#039;: Multiparty, Quantum Enhanced Classical functionality, prepare (bank) and measure (client)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Outline ==&lt;br /&gt;
In this scheme, a Trusted Third Party (TTP) and a coin holder run the following procedure for generating and verifying a quantum coin:&amp;lt;br&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Quantum coin Generation&#039;&#039;&#039; - The TTP chooses k random 4-bit strings, keeps them in secret and produce k quantum states. A newly issued quantum coin consists of a piece of paper glued to k quantum registers that hold k quantum states. The piece of paper contains a unique identification tag and k initially unmarked positions, where the i-th position has to be marked in k-bit classical register P when the corresponding quantum state is used in the verification protocol.&lt;br /&gt;
* &#039;&#039;&#039;Quantum coin Verification&#039;&#039;&#039; - To verify a quantum coin through classical communication with the TTP, its holder sends the identification number of the quantum coin to the TTP. Then, the TTP and the coin holder exchange some classical information for choosing some quantum registers. The coin holder measures the chosen registers and sends their corresponding classical information to the TTP. The TTP verifies the authenticity of the coin by the secret information he possesses.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*Network stage: [[:Category: Quantum Memory Network Stage|quantum memory network]][[Category:Quantum Memory Network Stage]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Parameters&#039;&#039;&#039;: HMP&amp;lt;sub&amp;gt;4&amp;lt;/sub&amp;gt;-states, Let x &amp;amp;isin; {0, 1}&amp;lt;sup&amp;gt;4&amp;lt;/sup&amp;gt;. The corresponding HMP&amp;lt;sub&amp;gt;4&amp;lt;/sub&amp;gt;-states is &amp;lt;math&amp;gt;|\alpha(x)\rangle=\dfrac{1}{2}\sum_{1\leq i\leq4}(-1)^{x_i}|i\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;General Features&#039;&#039;&#039;:&lt;br /&gt;
** No need to quantum communication for quantum coin verification.&lt;br /&gt;
** The classical communication channel used for verification can be unencrypted.&lt;br /&gt;
** The database of the bank is static, and therefore many de-centralized “verification branches” can exist that do not have to communicate with one another.&lt;br /&gt;
** The number of verifications that a quantum coin can go through is limited.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Security Claims&#039;&#039;&#039;:&lt;br /&gt;
**The coins are exponentially hard to counterfeit.&lt;br /&gt;
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin.&lt;br /&gt;
&lt;br /&gt;
== Protocol ==&lt;br /&gt;
&#039;&#039;&#039;Stage 1: Quantum coin generation&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Input&#039;&#039;: A secret record consists of &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; entries &amp;lt;math&amp;gt;x_1, . . . , x_k&amp;lt;/math&amp;gt;,&amp;lt;math&amp;gt; x_i\in \{0,1\}^4&amp;lt;/math&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Output&#039;&#039;: A “fresh” quantum coin&amp;lt;br&amp;gt;&lt;br /&gt;
The Trusted Third Party (TTP) chooses &amp;lt;math&amp;gt;x_1, . . . , x_k\in\{{0, 1}\}^4&amp;lt;/math&amp;gt; at random, keeps them in secret and produces quantum states &amp;lt;math&amp;gt;|\alpha(x_1)\rangle, . . . , |\alpha(x_k)\rangle&amp;lt;/math&amp;gt;. &lt;br /&gt;
A “fresh” quantum coin corresponding to this record consists of:&lt;br /&gt;
* &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; quantum registers consisting of 2 qubits each, where the &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;-th register contains &amp;lt;math&amp;gt;|\alpha(x_i)\rangle&amp;lt;/math&amp;gt;;&lt;br /&gt;
* a &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;-bit classical register &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt;, that is initially set to &amp;lt;math&amp;gt;0^k&amp;lt;/math&amp;gt;;&lt;br /&gt;
* a unique identification number.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stage 2: Quantum coin verification&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Input&#039;&#039;: the identification number of the quantum coin&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;Output&#039;&#039;: Accept or Reject&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This stage is run as follows:&lt;br /&gt;
* The holder sends the identification number of the quantum coin to the TTP.&lt;br /&gt;
* The TTP chooses uniformly at random a set &amp;lt;math&amp;gt;L_{bn}\subset[k]&amp;lt;/math&amp;gt; of size &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;, and sends it to the coin holder.&lt;br /&gt;
* The holder consults with P and chooses uniformly at random a set &amp;lt;math&amp;gt;L_{hl} \subset L_{bn}&amp;lt;/math&amp;gt; consisting of &amp;lt;math&amp;gt;2t/3&amp;lt;/math&amp;gt; yet unmarked positions. He sends &amp;lt;math&amp;gt;L_{hl}&amp;lt;/math&amp;gt; to the bank and marks in &amp;lt;math&amp;gt;P&amp;lt;/math&amp;gt; all the elements of &amp;lt;math&amp;gt;L_{hl}&amp;lt;/math&amp;gt; as used.&lt;br /&gt;
* The TTP chooses at random &amp;lt;math&amp;gt;2t/3&amp;lt;/math&amp;gt; values &amp;lt;math&amp;gt;m_i \in\{{0, 1}\}&amp;lt;/math&amp;gt;, one for each &amp;lt;math&amp;gt;i \in L_{hl}&amp;lt;/math&amp;gt; , and sends them to the coin holder.&lt;br /&gt;
* The holder measures the quantum registers corresponding to the elements of &amp;lt;math&amp;gt;L_{hl}&amp;lt;/math&amp;gt; in order to produce &amp;lt;math&amp;gt;2t/3&amp;lt;/math&amp;gt; pairs &amp;lt;math&amp;gt;(a_i, b_i)&amp;lt;/math&amp;gt;, such that &amp;lt;math&amp;gt;(x_i,m_i, a_i, b_i)\in HMP_4&amp;lt;/math&amp;gt; for all &amp;lt;math&amp;gt;i \in L_{hl}&amp;lt;/math&amp;gt;. He sends the list of &amp;lt;math&amp;gt;(a_i, b_i)&amp;lt;/math&amp;gt;s to the TTP.&lt;br /&gt;
* The TTP checks whether &amp;lt;math&amp;gt;(x_i,m_i, a_i, b_i)\in HMP_4&amp;lt;/math&amp;gt; for all &amp;lt;math&amp;gt;i \in L_{hl}&amp;lt;/math&amp;gt;, in which case it confirms validity of the quantum coin. Otherwise, the coin is declared to be a counterfeit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2250</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2250"/>
		<updated>2019-04-25T10:35:38Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Hardware Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Money is issued by one party (bank) to a prover (client) such that when he presents it to a verifier&lt;br /&gt;
(merchant), he/she is satisfied that the money presented by client comes from the bank. It comes&lt;br /&gt;
with the property of [[unforgeability]] and [[transferrability]]. Unforgeability means that there should exist&lt;br /&gt;
no method to produce an identical copy by anyone but the bank, and transferrability, allows that this&lt;br /&gt;
money can be used by the verifier as a client himself in the next round.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Multi Party Protocols|Multi Party Protocols]], non local games, [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]] &lt;br /&gt;
[[Category: Prepare and Measure Network Stage]]&lt;br /&gt;
[[Category: Specific Tasks]]&lt;br /&gt;
[[Category: Quantum Enhanced Classical Functionality]]&lt;br /&gt;
[[Category: Multi Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Money is physically transferred to the holders&lt;br /&gt;
* If &amp;lt;math&amp;gt;F^{cv}_{tol} &amp;gt; (1+1/\sqrt{2})/2&amp;lt;/math&amp;gt; , a dishonest user is exponentially unlikely to be authenticated by two independent verifiers (success in cheating to use same ticket for two independent verifiers by measuring in intermediate basis between the two bases, asked by the verifiers individually).&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol can be divided into three parts&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039; Bank prepares few rows of qubit-pairs chosen from two different non-orthogonal sets of basis. Each pair has at least one state from both bases, such that the qubit pair states are non-orthogonal. It associates each such chosen set with a serial number and shares the classical information about the choices for respective serial number with trusted merchants.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039; This step involves challenge questions by verifier to prove that he has a valid token, by playing part of a [[non-local game]]. In this game, the merchant asks client to measure in one of the two bases in from which the qubit pairs were chosen. As each qubit pair contains at least one state from each basis chosen, after the measurement one of the qubits (encoded in the basis chosen by the merchant) would give the correct result. &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039; The merchant compares this qubit outcome whose encoding basis matches with merchant&#039;s basis for the game. Merchant accepts the ticket if the ratio of number of valid outcomes to total number of qubits measured is more than or equal to a certain threshold fidelity value.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;N=n*r*2&amp;lt;/math&amp;gt;, total number of qubits&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}:&amp;lt;/math&amp;gt; is the tolerance fidelity set by the verifiers&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}(r*2) &amp;lt; F^{exp}:&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt; F^{exp}&amp;lt;/math&amp;gt; is the average experimental fidelity&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*Network stage: [[:Category: Quantum Memory Network Stage|quantum memory network]][[Category:Quantum Memory Network Stage]].&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* Challenge questions reveal no information about the token&lt;br /&gt;
* No quantum communication is needed&lt;br /&gt;
* Tokens are remotely verifiable/ classically verifiable&lt;br /&gt;
* A dishonest user is exponentially unlikely to succeed with probability at most, &amp;lt;math&amp;gt;p_d = e^{ND}(2F^{cv}_{tol}-1||2/3)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;(2F^{cv}_{tol}-1)&amp;lt;/math&amp;gt; is the fraction of qubits to be copied in order to forge a ticket and 2/3 is the average fidelity of copies produced by optimal cloning map, D being relative entropy.&lt;br /&gt;
* An honest user is exponentially likely to succeed with probability at least, &amp;lt;math&amp;gt;p^{cv}_h = e^{ND}(F^{exp}||F^{cv}_{tol})&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pseudo-Code==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; (Bank) &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt;, Qubit-pairs &amp;lt;math&amp;gt;\epsilon_R\{(0,+),(0,-),(1,+),(1,-),(+,0),(-,0),(+,1),(-,1)\}&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; (Merchant) accept or reject&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 1&#039;&#039;&#039;&amp;lt;/u&amp;gt; Preparation &amp;lt;/br&amp;gt;&lt;br /&gt;
# Bank prepares Token&amp;lt;math&amp;gt;_S&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt; qubit pairs&lt;br /&gt;
# Bank distributes tickets to clients&lt;br /&gt;
# Bank distributes the classical record of states corresponding to S to trusted&lt;br /&gt;
verifiers (merchants)&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 2&#039;&#039;&#039;&amp;lt;/u&amp;gt; Interaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant asks client to measure a few qubit-pairs(say, a row) in a randomly chosen basis M \epsilon_R \{X,Z\}&lt;br /&gt;
# Client returns measurement outcome (m) for all qubit pairs asked to measure&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 3&#039;&#039;&#039;&amp;lt;/u&amp;gt; Transaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant compares the number of qubit pairs with the valid outcome for the qubit which was&lt;br /&gt;
generated in M basis as k.&lt;br /&gt;
# Merchant accepts if &amp;lt;math&amp;gt;k/(r*2)&amp;gt;F^{cv}_{tol}&amp;lt;/math&amp;gt; else he rejects&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2249</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2249"/>
		<updated>2019-04-25T10:34:49Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Hardware Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Money is issued by one party (bank) to a prover (client) such that when he presents it to a verifier&lt;br /&gt;
(merchant), he/she is satisfied that the money presented by client comes from the bank. It comes&lt;br /&gt;
with the property of [[unforgeability]] and [[transferrability]]. Unforgeability means that there should exist&lt;br /&gt;
no method to produce an identical copy by anyone but the bank, and transferrability, allows that this&lt;br /&gt;
money can be used by the verifier as a client himself in the next round.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Multi Party Protocols|Multi Party Protocols]], non local games, [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]] &lt;br /&gt;
[[Category: Prepare and Measure Network Stage]]&lt;br /&gt;
[[Category: Specific Tasks]]&lt;br /&gt;
[[Category: Quantum Enhanced Classical Functionality]]&lt;br /&gt;
[[Category: Multi Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Money is physically transferred to the holders&lt;br /&gt;
* If &amp;lt;math&amp;gt;F^{cv}_{tol} &amp;gt; (1+1/\sqrt{2})/2&amp;lt;/math&amp;gt; , a dishonest user is exponentially unlikely to be authenticated by two independent verifiers (success in cheating to use same ticket for two independent verifiers by measuring in intermediate basis between the two bases, asked by the verifiers individually).&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol can be divided into three parts&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039; Bank prepares few rows of qubit-pairs chosen from two different non-orthogonal sets of basis. Each pair has at least one state from both bases, such that the qubit pair states are non-orthogonal. It associates each such chosen set with a serial number and shares the classical information about the choices for respective serial number with trusted merchants.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039; This step involves challenge questions by verifier to prove that he has a valid token, by playing part of a [[non-local game]]. In this game, the merchant asks client to measure in one of the two bases in from which the qubit pairs were chosen. As each qubit pair contains at least one state from each basis chosen, after the measurement one of the qubits (encoded in the basis chosen by the merchant) would give the correct result. &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039; The merchant compares this qubit outcome whose encoding basis matches with merchant&#039;s basis for the game. Merchant accepts the ticket if the ratio of number of valid outcomes to total number of qubits measured is more than or equal to a certain threshold fidelity value.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;N=n*r*2&amp;lt;/math&amp;gt;, total number of qubits&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}:&amp;lt;/math&amp;gt; is the tolerance fidelity set by the verifiers&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}(r*2) &amp;lt; F^{exp}:&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt; F^{exp}&amp;lt;/math&amp;gt; is the average experimental fidelity&lt;br /&gt;
&lt;br /&gt;
==Hardware Requirements==&lt;br /&gt;
*Network stage: [[:Category: Quantum Memory Network Stage|quantum memory network]][[Category:Quantum Memory Network Stage]].&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* Challenge questions reveal no information about the token&lt;br /&gt;
* No quantum communication is needed&lt;br /&gt;
* Tokens are remotely verifiable/ classically verifiable&lt;br /&gt;
* A dishonest user is exponentially unlikely to succeed with probability at most, &amp;lt;math&amp;gt;p_d = e^{ND}(2F^{cv}_{tol}-1||2/3)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;(2F^{cv}_{tol}-1)&amp;lt;/math&amp;gt; is the fraction of qubits to be copied in order to forge a ticket and 2/3 is the average fidelity of copies produced by optimal cloning map, D being relative entropy.&lt;br /&gt;
* An honest user is exponentially likely to succeed with probability at least, &amp;lt;math&amp;gt;p^{cv}_h = e^{ND}(F^{exp}||F^{cv}_{tol})&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pseudo-Code==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; (Bank) &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt;, Qubit-pairs &amp;lt;math&amp;gt;\epsilon_R\{(0,+),(0,-),(1,+),(1,-),(+,0),(-,0),(+,1),(-,1)\}&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; (Merchant) accept or reject&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 1&#039;&#039;&#039;&amp;lt;/u&amp;gt; Preparation &amp;lt;/br&amp;gt;&lt;br /&gt;
# Bank prepares Token&amp;lt;math&amp;gt;_S&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt; qubit pairs&lt;br /&gt;
# Bank distributes tickets to clients&lt;br /&gt;
# Bank distributes the classical record of states corresponding to S to trusted&lt;br /&gt;
verifiers (merchants)&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 2&#039;&#039;&#039;&amp;lt;/u&amp;gt; Interaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant asks client to measure a few qubit-pairs(say, a row) in a randomly chosen basis M \epsilon_R \{X,Z\}&lt;br /&gt;
# Client returns measurement outcome (m) for all qubit pairs asked to measure&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 3&#039;&#039;&#039;&amp;lt;/u&amp;gt; Transaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant compares the number of qubit pairs with the valid outcome for the qubit which was&lt;br /&gt;
generated in M basis as k.&lt;br /&gt;
# Merchant accepts if &amp;lt;math&amp;gt;k/(r*2)&amp;gt;F^{cv}_{tol}&amp;lt;/math&amp;gt; else he rejects&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2248</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2248"/>
		<updated>2019-04-25T10:32:34Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Hardware Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Money is issued by one party (bank) to a prover (client) such that when he presents it to a verifier&lt;br /&gt;
(merchant), he/she is satisfied that the money presented by client comes from the bank. It comes&lt;br /&gt;
with the property of [[unforgeability]] and [[transferrability]]. Unforgeability means that there should exist&lt;br /&gt;
no method to produce an identical copy by anyone but the bank, and transferrability, allows that this&lt;br /&gt;
money can be used by the verifier as a client himself in the next round.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Multi Party Protocols|Multi Party Protocols]], non local games, [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]] &lt;br /&gt;
[[Category: Prepare and Measure Network Stage]]&lt;br /&gt;
[[Category: Specific Tasks]]&lt;br /&gt;
[[Category: Quantum Enhanced Classical Functionality]]&lt;br /&gt;
[[Category: Multi Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Money is physically transferred to the holders&lt;br /&gt;
* If &amp;lt;math&amp;gt;F^{cv}_{tol} &amp;gt; (1+1/\sqrt{2})/2&amp;lt;/math&amp;gt; , a dishonest user is exponentially unlikely to be authenticated by two independent verifiers (success in cheating to use same ticket for two independent verifiers by measuring in intermediate basis between the two bases, asked by the verifiers individually).&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol can be divided into three parts&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039; Bank prepares few rows of qubit-pairs chosen from two different non-orthogonal sets of basis. Each pair has at least one state from both bases, such that the qubit pair states are non-orthogonal. It associates each such chosen set with a serial number and shares the classical information about the choices for respective serial number with trusted merchants.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039; This step involves challenge questions by verifier to prove that he has a valid token, by playing part of a [[non-local game]]. In this game, the merchant asks client to measure in one of the two bases in from which the qubit pairs were chosen. As each qubit pair contains at least one state from each basis chosen, after the measurement one of the qubits (encoded in the basis chosen by the merchant) would give the correct result. &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039; The merchant compares this qubit outcome whose encoding basis matches with merchant&#039;s basis for the game. Merchant accepts the ticket if the ratio of number of valid outcomes to total number of qubits measured is more than or equal to a certain threshold fidelity value.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;N=n*r*2&amp;lt;/math&amp;gt;, total number of qubits&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}:&amp;lt;/math&amp;gt; is the tolerance fidelity set by the verifiers&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}(r*2) &amp;lt; F^{exp}:&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt; F^{exp}&amp;lt;/math&amp;gt; is the average experimental fidelity&lt;br /&gt;
&lt;br /&gt;
==Hardware Requirements==&lt;br /&gt;
&#039;&#039;&#039;Network Stage&#039;&#039;&#039;: [[:Category: Quantum Memory Network Stage|Quantum Memory]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* Challenge questions reveal no information about the token&lt;br /&gt;
* No quantum communication is needed&lt;br /&gt;
* Tokens are remotely verifiable/ classically verifiable&lt;br /&gt;
* A dishonest user is exponentially unlikely to succeed with probability at most, &amp;lt;math&amp;gt;p_d = e^{ND}(2F^{cv}_{tol}-1||2/3)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;(2F^{cv}_{tol}-1)&amp;lt;/math&amp;gt; is the fraction of qubits to be copied in order to forge a ticket and 2/3 is the average fidelity of copies produced by optimal cloning map, D being relative entropy.&lt;br /&gt;
* An honest user is exponentially likely to succeed with probability at least, &amp;lt;math&amp;gt;p^{cv}_h = e^{ND}(F^{exp}||F^{cv}_{tol})&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pseudo-Code==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; (Bank) &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt;, Qubit-pairs &amp;lt;math&amp;gt;\epsilon_R\{(0,+),(0,-),(1,+),(1,-),(+,0),(-,0),(+,1),(-,1)\}&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; (Merchant) accept or reject&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 1&#039;&#039;&#039;&amp;lt;/u&amp;gt; Preparation &amp;lt;/br&amp;gt;&lt;br /&gt;
# Bank prepares Token&amp;lt;math&amp;gt;_S&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt; qubit pairs&lt;br /&gt;
# Bank distributes tickets to clients&lt;br /&gt;
# Bank distributes the classical record of states corresponding to S to trusted&lt;br /&gt;
verifiers (merchants)&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 2&#039;&#039;&#039;&amp;lt;/u&amp;gt; Interaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant asks client to measure a few qubit-pairs(say, a row) in a randomly chosen basis M \epsilon_R \{X,Z\}&lt;br /&gt;
# Client returns measurement outcome (m) for all qubit pairs asked to measure&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 3&#039;&#039;&#039;&amp;lt;/u&amp;gt; Transaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant compares the number of qubit pairs with the valid outcome for the qubit which was&lt;br /&gt;
generated in M basis as k.&lt;br /&gt;
# Merchant accepts if &amp;lt;math&amp;gt;k/(r*2)&amp;gt;F^{cv}_{tol}&amp;lt;/math&amp;gt; else he rejects&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Blind_Delegation_of_Quantum_Digital_Signature&amp;diff=2247</id>
		<title>Blind Delegation of Quantum Digital Signature</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Blind_Delegation_of_Quantum_Digital_Signature&amp;diff=2247"/>
		<updated>2019-04-25T10:29:42Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Hardware Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This protocol performs the task of Quantum Digital Signature such that the Signer does not get to know the content of the message being signed.&lt;br /&gt;
It ensures that the owner cannot deny at a later stage having signed the message, a receiver cannot fake or alter the QDS and the verifier can use the above two properties to verify if the sent message is signed by the genuine sender, thus, satisfying properties of transferability, non-repudiation, and unforgeability.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&lt;br /&gt;
* Honest majority assumption: assumes that more than half the number of participating parties are honest. In the present case, at least two parties are honest.&lt;br /&gt;
* It requires authenticated classical channel and insecure quantum channels.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The Blind QDS Protocol consists of 5 stages: setup, key distribution, message blinding, signing and verification.&lt;br /&gt;
Each pair of participants share a unique key using Simon et al.&#039;s QKD Algorithm.&lt;br /&gt;
&lt;br /&gt;
====Setup====&lt;br /&gt;
There are 3 participants. The owner is the one who will transform the message into a matrix form and blind it.&lt;br /&gt;
The signer will sign it. The verifier is the one who checks if a signature matches a message. &lt;br /&gt;
&lt;br /&gt;
====Key Distribution====&lt;br /&gt;
All three pairs establish their pairwise quantum key matrices using the QKD protocol.&lt;br /&gt;
&lt;br /&gt;
====Message Blinding====&lt;br /&gt;
The owner of the message now converts the message into matrix format.&lt;br /&gt;
Then (s)he blinds the message matrix using the key shared with the verifier by multiplying the matrices.&lt;br /&gt;
Now, (s)he encrypts the blind message with the key shared with the signer by multiplying the matrices.&lt;br /&gt;
Finally, (s)he sends the encrypted matrix and the determinant of the blinded matrix to the signer and only the determinant of the message matrix to the verifier.&lt;br /&gt;
&lt;br /&gt;
====Signing====&lt;br /&gt;
The signer creates a signature for the blinded message which means that he does not know the message matrix.&lt;br /&gt;
He decrypts the encrypted message with his shared key to obtain the blinded message and checks its authenticity by comparing its determinant value with the received value.&lt;br /&gt;
He then creates the signature using the blinded message and the key shared with the verifier and sends it to the verifier.&lt;br /&gt;
&lt;br /&gt;
====Verification====&lt;br /&gt;
The verifier decrypts the signature using his key shared with the signer.&lt;br /&gt;
Next, he un-blinds the blinded message using the key shared with the owner.&lt;br /&gt;
He verifies the message matrix by comparing its determinant value with the received value.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notations==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;K_{AB}&amp;lt;/math&amp;gt;: Set of quantum key matrices shared between Owner and Signer.&lt;br /&gt;
* &amp;lt;math&amp;gt;K_{BC}&amp;lt;/math&amp;gt;: Set of quantum key matrices shared between Signer and Verifier.&lt;br /&gt;
* &amp;lt;math&amp;gt;K_{AC}&amp;lt;/math&amp;gt;: Set of quantum key matrices shared between Owner and Verifier.&lt;br /&gt;
* &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt;: Set of message matrices to be signed.&lt;br /&gt;
* &amp;lt;math&amp;gt;M&#039;&amp;lt;/math&amp;gt;: Set of Blinded message matrices.&lt;br /&gt;
* &amp;lt;math&amp;gt;M&#039;&#039;&amp;lt;/math&amp;gt;: Set of Blinded and Encrypted message matrices.&lt;br /&gt;
* &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;: Set of Signature matrices.&lt;br /&gt;
* &amp;lt;math&amp;gt;\alpha&amp;lt;/math&amp;gt;: Number of elements in every set.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Hardware Requirements==&lt;br /&gt;
&lt;br /&gt;
* Requires any QKD setup.&lt;br /&gt;
* Insecure quantum and authenticated classical channels.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&lt;br /&gt;
* The protocol provides security against both the forgery and repudiation attacks.&lt;br /&gt;
* The protocol can sign long messages and is not restricted to binary ones.&lt;br /&gt;
* The protocol has the ability to detect errors due to the usage of Fibonacci, Lucas and Fibonacci-Lucas matrices.&lt;br /&gt;
* The protocol uses the setup of Simon et al.&#039;s QKD algorithm to distribute quantum keys.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pseudo Code==&lt;br /&gt;
&lt;br /&gt;
Every pair of parties share different quantum key matrices &amp;lt;math&amp;gt;K_{AB}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;K_{AC}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;K_{BC}&amp;lt;/math&amp;gt; respectively using Simon et al.’s QKD algorithm.&lt;br /&gt;
The key matrices &amp;lt;math&amp;gt;K_{AB}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;K_{AC}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;K_{BC}&amp;lt;/math&amp;gt; are either Fibonacci or Lucas or Fibonacci-Lucas matrices.&lt;br /&gt;
The protocol consists of 5 stages:&lt;br /&gt;
&lt;br /&gt;
# Setup&lt;br /&gt;
## The owner who transforms the message into an &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-square matrix and blinds the matrix.&lt;br /&gt;
## The signer who signs the blind message.&lt;br /&gt;
## The verifier who checks if a signature matches the message.&lt;br /&gt;
# Key Distribution&lt;br /&gt;
## Every pair uses Simon et al.&#039;s QKD protocol to establish their pairwise key matrices &amp;lt;math&amp;gt;\{K_{AB}^1, K_{AB}^2,..., K_{AB}^\alpha\} = K_{AB}&amp;lt;/math&amp;gt; between Owner and Signer; &amp;lt;math&amp;gt;\{K_{BC}^1, K_{BC}^2,..., K_{BC}^\alpha\} = K_{BC}&amp;lt;/math&amp;gt; between Signer and Verifier; &amp;lt;math&amp;gt;\{K_{AC}^1, K_{AC}^2,..., K_{AC}^\alpha\} = K_{AC}&amp;lt;/math&amp;gt; between Owner and Verifier.&lt;br /&gt;
# Message Blinding&lt;br /&gt;
## The Owner transforms the message into matrices &amp;lt;math&amp;gt;(M_1, M_2,..., M_\alpha) = M&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;M_k = (m_{tj})_{n\times n}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;k \in \{1,2,..., \alpha\}, t,j \in \{1,2,..., n\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
## The Owner blinds the message matrix using &amp;lt;math&amp;gt;K_{AC}&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt; M&#039;_k = M_k \times K^k_{AC} k \in \{1,2,...,\alpha\} &amp;lt;/math&amp;gt;&lt;br /&gt;
## The Owner now encrypts the message matrix using &amp;lt;math&amp;gt;K_{AB}&amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt; M&#039;&#039;_k = M&#039;_k \times K^k_{AB} k \in \{1,2,...,\alpha\} &amp;lt;/math&amp;gt;&lt;br /&gt;
## Finally, the Owner sends &amp;lt;math&amp;gt;(M&#039;&#039;_k, det(M&#039;_k))&amp;lt;/math&amp;gt; to the Signer, and &amp;lt;math&amp;gt;det(M_k)&amp;lt;/math&amp;gt; to the Verifier.&lt;br /&gt;
# Signing&lt;br /&gt;
## The Signer decrypts &amp;lt;math&amp;gt;M&#039;&#039;_k&amp;lt;/math&amp;gt; with the key &amp;lt;math&amp;gt;K^k_{AB}&amp;lt;/math&amp;gt; to obtain &amp;lt;math&amp;gt;M&#039;_k&amp;lt;/math&amp;gt;. &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt;M&#039;_k = M&#039;&#039;_k \times (K_{AB}^k)^{-1} &amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt; where &amp;lt;math&amp;gt;(K_{AB}^k)^{-1}&amp;lt;/math&amp;gt; denotes the inverse matrix of &amp;lt;math&amp;gt;K_{AB}^k&amp;lt;/math&amp;gt;.&lt;br /&gt;
## If the determinant of &amp;lt;math&amp;gt;M&#039;_k&amp;lt;/math&amp;gt; recovered by the Signer is not equal to the value of the determinant obtained from the Owner, the Signer aborts the protocol. Otherwise, he performs the next step.&lt;br /&gt;
## He signs the blind message &amp;lt;math&amp;gt;M&#039;_k&amp;lt;/math&amp;gt; using &amp;lt;math&amp;gt;K_{BC}^k&amp;lt;/math&amp;gt;. The signature is &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt; S^k = M&#039;_k \times K_{BC}^k &amp;lt;/math&amp;gt;&lt;br /&gt;
## He then sends the signature &amp;lt;math&amp;gt;S = \{S^1, S^2,..., S^\alpha\}&amp;lt;/math&amp;gt; to the Verifier.&lt;br /&gt;
# Verification&lt;br /&gt;
## The Verifier decrypts the signature &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; using &amp;lt;math&amp;gt;K_{BC}^k&amp;lt;/math&amp;gt; to obtain the blind message &amp;lt;math&amp;gt;M&#039;&amp;lt;/math&amp;gt;. &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt; M&#039;_k = S^k \times (K_{BC}^k)^{-1} &amp;lt;/math&amp;gt;&lt;br /&gt;
## The Verifier then un-blinds the message &amp;lt;math&amp;gt;M&#039;&amp;lt;/math&amp;gt; using &amp;lt;math&amp;gt;K_{AC}^k&amp;lt;/math&amp;gt; to obtain the message &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt;. &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt; M_k = M&#039;_k \times (K_{AC}^k)^{-1} &amp;lt;/math&amp;gt;&lt;br /&gt;
## He then checks if the determinant of &amp;lt;math&amp;gt;M&amp;lt;/math&amp;gt; obtained from the signature is the same as &amp;lt;math&amp;gt;det(M)&amp;lt;/math&amp;gt; obtained from the Owner. If it holds, he verifies the following equations: &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt; det(S^k) = det(M&#039;_kK_{BC}^k) = det(M&#039;_k) \times det(T^n_p) &amp;lt;/math&amp;gt; &amp;lt;br/&amp;gt; &amp;lt;math&amp;gt; = (-1)^ndet(M&#039;_k) = (-1)^{2n}det(M_k) &amp;lt;/math&amp;gt;&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Natansh Mathur&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2246</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2246"/>
		<updated>2019-04-25T10:28:03Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner Quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
*[[Unforgeable Quantum Token]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
For verification, Merchant performs local quantum operations depending on the public key of the money to reject or accept the money.&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A QMoney scheme is &#039;&#039;&#039;correct&#039;&#039;&#039; if an original quantum money issued by Ming is accepted by the verifier with unit probability.&lt;br /&gt;
*A QMoney scheme is Information-theoretically or Computationally &#039;&#039;&#039;secure&#039;&#039;&#039; if no adversarial holder with unlimited or computational power can pass verification with different Merchants or Banks at the same time with high probability. &lt;br /&gt;
* A QMoney is &#039;&#039;&#039;reusable&#039;&#039;&#039; if an honest Holder can pass verification with different Merchants or Banks at different times.&lt;br /&gt;
&lt;br /&gt;
== Further Information ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mahshid Delavar and Mathieu Bozzio&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2245</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2245"/>
		<updated>2019-04-25T10:27:33Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner Quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
*[[Unforgeable Quantum Token]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
For verification, Merchant performs local quantum operations depending on the public key of the money to reject or accept the money.&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A QMoney scheme is &#039;&#039;&#039;correct&#039;&#039;&#039; if an original quantum money issued by Ming is accepted by the verifier with unit probability.&lt;br /&gt;
*A QMoney scheme is Information-theoretically or Computationally &#039;&#039;&#039;secure&#039;&#039;&#039; if no adversarial holder with unlimited or computational power can pass verification with different Merchants or Banks at the same time with high probability. &lt;br /&gt;
* A QMoney is &#039;&#039;&#039;reusable&#039;&#039;&#039; if an honest Holder can pass verification with different Merchants or Banks at different times.&lt;br /&gt;
&lt;br /&gt;
-- Further Information --&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mahshid Delavar and Mathieu Bozzio&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2244</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2244"/>
		<updated>2019-04-25T10:27:05Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Properties */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner Quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
*[[Unforgeable Quantum Token]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
For verification, Merchant performs local quantum operations depending on the public key of the money to reject or accept the money.&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A QMoney scheme is &#039;&#039;&#039;correct&#039;&#039;&#039; if an original quantum money issued by Ming is accepted by the verifier with unit probability.&lt;br /&gt;
*A QMoney scheme is Information-theoretically or Computationally &#039;&#039;&#039;secure&#039;&#039;&#039; if no adversarial holder with unlimited or computational power can pass verification with different Merchants or Banks at the same time with high probability. &lt;br /&gt;
* A QMoney is &#039;&#039;&#039;reusable&#039;&#039;&#039; if an honest Holder can pass verification with different Merchants or Banks at different times.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mahshid Delavar and Mathieu Bozzio&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Digital_Signature&amp;diff=2243</id>
		<title>Quantum Digital Signature</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Digital_Signature&amp;diff=2243"/>
		<updated>2019-04-25T10:10:37Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Properties */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Functionality==&lt;br /&gt;
Digital Signatures (QDS) allow the exchange of classical messages from sender to multiple recipients, with a guarantee that the signature has come from a genuine sender. Additionally, it comes with the properties of (i) [[Quantum Digital Signature#Properties|transferability]] i.e. messages with DS can be forwarded from one recipient to another such that DS is verifiable to have come from the original sender, (ii) [[Quantum Digital Signature#Properties|non-repudiation]] i.e at any stage after sending the message to one recipient, sender cannot deny having sent the message and corresponding DS, and (iii) [[Quantum Digital Signature#Properties|unforgeability]] i.e. a dishonest recipient cannot alter or fake the sender&#039;s DS and forward it to other recipients successfully. In contrast, classical digital signatures rely on authentication (taken as an assumption for some QDS protocols) i.e. the message has come from the claimed party; integrity i.e. the message has not been altered (if authentication is confirmed, this property is unforgeability) and non-repudiation (same as QDS). &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party (three)]],  [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]],  [[:Category: Specific Task|Specific Task]], [[Blind Quantum Digital Signature]], [[Arbitrated Signature]], [[Quantum Proxy Signature]], [[Designated Verifiable Quantum Signature]], [[Limited Delegation of Quantum Signature]]&lt;br /&gt;
[[Category: Multi Party Protocols]],  [[Category: Quantum Enhanced Classical Functionality]],  [[Category:Specific Task]]&lt;br /&gt;
&lt;br /&gt;
==Use Case==&lt;br /&gt;
* Classical task&lt;br /&gt;
* Classical analogue: RSA, Post-Quantum Secure analogue: XMSS&lt;br /&gt;
*QDS implementation specifications (best achieved) per half bit message (0 or 1):&lt;br /&gt;
** best estimated time: 3.5 secs&lt;br /&gt;
**key length: 2Mbits&lt;br /&gt;
** maximum transmission distance: 200 kms&lt;br /&gt;
** scalability: linear in time, not linear in key length&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&lt;br /&gt;
*[[Prepare and Measure Quantum Digital Signature]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]]&lt;br /&gt;
*[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]: [[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]]&lt;br /&gt;
*[[Quantum Digital Signature with Quantum Memory]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
All QDS protocols are divided into two phases, distribution and messaging. Distribution phase enables sender to generate private keys (kept secret with sender) and public keys (information distributed to recipients) while messaging phase enables exchange of messages using the above keys. For simlicity, most protocols use the case of three parties, one sender (Seller) and two recipients (Buyer and Verifier) exchanging one-bit classical messages signed by Quantum Digital Signatures (QDS).  &lt;br /&gt;
&lt;br /&gt;
*A QDS scheme is correct if a message signed by a genuine sender is accepted by a recipient with unit probability.&lt;br /&gt;
*A QDS scheme is secure if no one but the sender can sign a message such that it is accepted by a recipient with non-negligible probability. &lt;br /&gt;
*&#039;&#039;&#039;Transferability&#039;&#039;&#039; means that at any point a recipient (buyer) can prove it to another recipient (verifier) that the concerned message has been signed by the claimed sender (Seller).&lt;br /&gt;
*&#039;&#039;&#039;Unforgeability&#039;&#039;&#039; ensures that a dishonest recipient (buyer) can neither alter a DS nor sign a message with a fake DS (DS that has not come from a genuine sender) and forward it to other recipients (verifier) successfully. &lt;br /&gt;
*&#039;&#039;&#039;Non-Repudiation&#039;&#039;&#039; implies that at any point a dishonest sender (seller) cannot deny having signed the message sent to a genuine recipient (Buyer).&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
Quantum Digital Signatures provide unconditional security, not relying on any computational assumption which is its basic advantage over the classical schemes. However, over time classical unconditionally secure digital signature schemes have been realized. These classical protocols take some assumptions like trusted omnipotent (one who distributes everyone signatures) thus giving one party extra power, or authenticated message broadcast. QDS does not require any such assumption. Yet, the low key rate could render QDS impractical over classical digital signature schemes. At the same time, there exist post quantum secure Digital signature schemes based on hash-key cryptography which cannot be broken by quantum computers.  Still, if someone requires a lifetime security without the above mentioned assumptions, QDS is the answer. Areas to improve QDS could be addressing the key rate and scalability of key length with length of message.&lt;br /&gt;
&lt;br /&gt;
===Review Papers===&lt;br /&gt;
#[https://www.semanticscholar.org/paper/Unconditionally-Secure-Quantum-Signatures-Amiri-Andersson/2c9a298c9e902c5162496cc13f5d560427873412 AA (2015)] Discusses various classical and quantum digital signature schemes&lt;br /&gt;
#Wallden P. (2018) (In preparation): Discusses the development of Quantum Digital Signatures from the first protocol by Gottesman and Chuang, elaborating advancements in further protocols to turn it into a practical QDS scheme.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2242</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2242"/>
		<updated>2019-04-25T10:09:04Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Protocols */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner Quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
*[[Unforgeable Quantum Token]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
For verification, Merchant performs local quantum operations depending on the public key of the money to reject or accept the money.&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2241</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2241"/>
		<updated>2019-04-25T10:05:44Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Protocols */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
*[[Unforgeable Quantum Token]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
For verification, Merchant performs local quantum operations depending on the public key of the money to reject or accept the money.&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2240</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2240"/>
		<updated>2019-04-25T10:03:26Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Private Key with Classical Verification */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
*[[Unforgeable Quantum Token]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[Prepare and Measure Quantum Digital Signature]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]]&lt;br /&gt;
*[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]: [[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]]&lt;br /&gt;
*[[Quantum Digital Signature with Quantum Memory]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2239</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2239"/>
		<updated>2019-04-25T10:03:08Z</updated>

		<summary type="html">&lt;p&gt;Charlie: Removed redirect to Quantum Token&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Money is issued by one party (bank) to a prover (client) such that when he presents it to a verifier&lt;br /&gt;
(merchant), he/she is satisfied that the money presented by client comes from the bank. It comes&lt;br /&gt;
with the property of [[unforgeability]] and [[transferrability]]. Unforgeability means that there should exist&lt;br /&gt;
no method to produce an identical copy by anyone but the bank, and transferrability, allows that this&lt;br /&gt;
money can be used by the verifier as a client himself in the next round.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Multi Party Protocols|Multi Party Protocols]], non local games, [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]] &lt;br /&gt;
[[Category: Prepare and Measure Network Stage]]&lt;br /&gt;
[[Category: Specific Tasks]]&lt;br /&gt;
[[Category: Quantum Enhanced Classical Functionality]]&lt;br /&gt;
[[Category: Multi Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Money is physically transferred to the holders&lt;br /&gt;
* If &amp;lt;math&amp;gt;F^{cv}_{tol} &amp;gt; (1+1/\sqrt{2})/2&amp;lt;/math&amp;gt; , a dishonest user is exponentially unlikely to be authenticated by two independent verifiers (success in cheating to use same ticket for two independent verifiers by measuring in intermediate basis between the two bases, asked by the verifiers individually).&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol can be divided into three parts&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039; Bank prepares few rows of qubit-pairs chosen from two different non-orthogonal sets of basis. Each pair has at least one state from both bases, such that the qubit pair states are non-orthogonal. It associates each such chosen set with a serial number and shares the classical information about the choices for respective serial number with trusted merchants.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039; This step involves challenge questions by verifier to prove that he has a valid token, by playing part of a [[non-local game]]. In this game, the merchant asks client to measure in one of the two bases in from which the qubit pairs were chosen. As each qubit pair contains at least one state from each basis chosen, after the measurement one of the qubits (encoded in the basis chosen by the merchant) would give the correct result. &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039; The merchant compares this qubit outcome whose encoding basis matches with merchant&#039;s basis for the game. Merchant accepts the ticket if the ratio of number of valid outcomes to total number of qubits measured is more than or equal to a certain threshold fidelity value.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;N=n*r*2&amp;lt;/math&amp;gt;, total number of qubits&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}:&amp;lt;/math&amp;gt; is the tolerance fidelity set by the verifiers&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}(r*2) &amp;lt; F^{exp}:&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt; F^{exp}&amp;lt;/math&amp;gt; is the average experimental fidelity&lt;br /&gt;
&lt;br /&gt;
==Hardware Requirements==&lt;br /&gt;
&#039;&#039;&#039;Network Stage&#039;&#039;&#039;: [[:Category: Prepare and Measure Network Stage|Prepare and Measure]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* Challenge questions reveal no information about the token&lt;br /&gt;
* No quantum communication is needed&lt;br /&gt;
* Tokens are remotely verifiable/ classically verifiable&lt;br /&gt;
* A dishonest user is exponentially unlikely to succeed with probability at most, &amp;lt;math&amp;gt;p_d = e^{ND}(2F^{cv}_{tol}-1||2/3)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;(2F^{cv}_{tol}-1)&amp;lt;/math&amp;gt; is the fraction of qubits to be copied in order to forge a ticket and 2/3 is the average fidelity of copies produced by optimal cloning map, D being relative entropy.&lt;br /&gt;
* An honest user is exponentially likely to succeed with probability at least, &amp;lt;math&amp;gt;p^{cv}_h = e^{ND}(F^{exp}||F^{cv}_{tol})&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pseudo-Code==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; (Bank) &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt;, Qubit-pairs &amp;lt;math&amp;gt;\epsilon_R\{(0,+),(0,-),(1,+),(1,-),(+,0),(-,0),(+,1),(-,1)\}&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; (Merchant) accept or reject&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 1&#039;&#039;&#039;&amp;lt;/u&amp;gt; Preparation &amp;lt;/br&amp;gt;&lt;br /&gt;
# Bank prepares Token&amp;lt;math&amp;gt;_S&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;n*r*2&amp;lt;/math&amp;gt; qubit pairs&lt;br /&gt;
# Bank distributes tickets to clients&lt;br /&gt;
# Bank distributes the classical record of states corresponding to S to trusted&lt;br /&gt;
verifiers (merchants)&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 2&#039;&#039;&#039;&amp;lt;/u&amp;gt; Interaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant asks client to measure a few qubit-pairs(say, a row) in a randomly chosen basis M \epsilon_R \{X,Z\}&lt;br /&gt;
# Client returns measurement outcome (m) for all qubit pairs asked to measure&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 3&#039;&#039;&#039;&amp;lt;/u&amp;gt; Transaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant compares the number of qubit pairs with the valid outcome for the qubit which was&lt;br /&gt;
generated in M basis as k.&lt;br /&gt;
# Merchant accepts if &amp;lt;math&amp;gt;k/(r*2)&amp;gt;F^{cv}_{tol}&amp;lt;/math&amp;gt; else he rejects&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Talk:Unforgeable_Quantum_Token&amp;diff=2238</id>
		<title>Talk:Unforgeable Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Talk:Unforgeable_Quantum_Token&amp;diff=2238"/>
		<updated>2019-04-25T10:00:20Z</updated>

		<summary type="html">&lt;p&gt;Charlie: Charlie moved page Talk:Unforgeable Quantum Token to Talk:Quantum Token&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Talk:Quantum Token]]&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Talk:Quantum_Token&amp;diff=2237</id>
		<title>Talk:Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Talk:Quantum_Token&amp;diff=2237"/>
		<updated>2019-04-25T10:00:20Z</updated>

		<summary type="html">&lt;p&gt;Charlie: Charlie moved page Talk:Unforgeable Quantum Token to Talk:Quantum Token&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;comments/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2236</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=2236"/>
		<updated>2019-04-25T10:00:20Z</updated>

		<summary type="html">&lt;p&gt;Charlie: Charlie moved page Unforgeable Quantum Token to Quantum Token&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Quantum Token]]&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2234</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2234"/>
		<updated>2019-04-25T09:59:24Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
*[[Quantum Token]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[Prepare and Measure Quantum Digital Signature]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]]&lt;br /&gt;
*[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]: [[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]]&lt;br /&gt;
*[[Quantum Digital Signature with Quantum Memory]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2232</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2232"/>
		<updated>2019-04-25T09:53:06Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Protocols */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[Prepare and Measure Quantum Digital Signature]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]]&lt;br /&gt;
*[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]: [[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]]&lt;br /&gt;
*[[Quantum Digital Signature with Quantum Memory]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2230</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2230"/>
		<updated>2019-04-25T09:52:47Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Private Key with Classical Verification */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[Prepare and Measure Quantum Digital Signature]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]]&lt;br /&gt;
*[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]: [[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]]&lt;br /&gt;
*[[Quantum Digital Signature with Quantum Memory]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2229</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2229"/>
		<updated>2019-04-25T09:52:19Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant performs local quantum operations on the money and sends classical data to Bank who accepts or rejects based on the secret key they holds. &lt;br /&gt;
&lt;br /&gt;
*[[Quantum Coin]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[Prepare and Measure Quantum Digital Signature]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]]&lt;br /&gt;
*[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]: [[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]]&lt;br /&gt;
*[[Quantum Digital Signature with Quantum Memory]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2228</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2228"/>
		<updated>2019-04-25T09:41:50Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum money is a unique (e.g. has a serial number) and unforgeable (e.g. unclonable) physical object that is created by a third party called Mint (that could be trusted or not trusted). Then, it is circulated among potentially untrusted parties, Holder, who might attempt to forge it for double spending. However a Merchant, upon receiving it, should be able to verify the money has not been forged and originated from Mint. There are various verification schemes based on different types of communication they use and type of key encryption used by Mint see Protocols.  &lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
It involves a trusted party called Bank, who shares secrete key with Mint for all distributed money. For verification, Merchant sends quantum money to Bank through a quantum channel. Bank performs local quantum operations depending on the secret key they hold to reject or accept the money. &lt;br /&gt;
&lt;br /&gt;
*[[Wiesner quantum Money]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Private Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Quantum Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Public Key with Classical Verification ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[Prepare and Measure Quantum Digital Signature]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]]&lt;br /&gt;
*[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]: [[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]]&lt;br /&gt;
*[[Quantum Digital Signature with Quantum Memory]]: [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
reusable&lt;br /&gt;
correctness &lt;br /&gt;
Transferability&lt;br /&gt;
Unforgeability&lt;br /&gt;
verifiability&lt;br /&gt;
Security &lt;br /&gt;
Authenticity&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Secure_Client-_Server_Delegated_Computation&amp;diff=2216</id>
		<title>Secure Client- Server Delegated Computation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Secure_Client-_Server_Delegated_Computation&amp;diff=2216"/>
		<updated>2019-04-25T09:01:55Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Functionality Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Functionality Description==&lt;br /&gt;
&lt;br /&gt;
Delegated Computation is the task of assigning computation on hidden data to a powerful untrusted party (a device) by a weak (in terms of computational powers) party while maintaining privacy of hidden data from the powerful party. Protocols under this functionality are commonly called Client-Server protocols. Delegated Quantum Computation (DQC) protocols involve partially or fully classical Client delegating a quantum computation to fully powerful single/multiple quantum Server/Servers. All DQC protocols involve three main stages, Preparation Stage, Computation Stage and Output Correction Stage. The roles of Client and Server in the different stages may differ according to the type of communication used see Protocols list.&lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
===Classical Online Communication-Quantum Offline Communication===&lt;br /&gt;
It involves a partially quantum Client who can prepare and send quantum states use quantum offline communication to send input to the Server, in the preparation Stage and to receive outputs from the Server, during output correction. Client and Server then use classical online communication to exchange classical messages during computation phase. Universal Blind Quantum Computation (UBQC) falls under this category, where Client hides his input, output and computation from the Server using [[Supplementary Information#Measurement Based Quantum Computation|&#039;&#039;&#039;MBQC&#039;&#039;&#039;]].  If the task performed by Server can be verified by the Client, it is Verifiable Universal Blind Quantum Computation (VUBQC). Classes of protocols under this category are:&lt;br /&gt;
*[[Prepare and Send-Universal Blind Quantum Computation|&#039;&#039;&#039;Prepare and Send UBQC&#039;&#039;&#039;]]&lt;br /&gt;
*[[Prepare and Send Verifiable Universal Blind Quantum Computation|&#039;&#039;&#039;Prepare and Send VUBQC&#039;&#039;&#039;]].&lt;br /&gt;
[[Category:Two Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
===Classical Online Communication-Quantum Online Communication===&lt;br /&gt;
It involves a partially quantum Client who can measure quantum states use quantum and classical communication throughout the protocol. Client performs the hidden [[Supplementary Information|MBQC]] on states prepared by Server using her measurement device in the computation Stage. She then corrects her classical outcomes in Correction Stage. Classes of protocols under this category are:&lt;br /&gt;
*[[Measurement Only-Universal Blind Quantum Computation|&#039;&#039;&#039;Measurement Only UBQC&#039;&#039;&#039;]] &lt;br /&gt;
*[[Measurement Only Verifiable Universal Blind Quantum Computation|&#039;&#039;&#039;Measurement Only VUBQC&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
===Classical Online Communication-No Quantum Communication===&lt;br /&gt;
It involves a fully classical Client with no quantum power exchanging classical messages with the server throughout. This can be done using protocols for generating secret random qubits, under the functionality, Secret Random Qubit Generator (SQRG). One could append SQRG with UBQC to eliminate quantum communication. A verification protocol using SQRG is still an open question. Class of protocols for SQRG:&lt;br /&gt;
*[[Pseudo-Secret Random Qubit Generator|&#039;&#039;&#039;Pseudo-Secret Random Qubit Generator (PSRQG)&#039;&#039;&#039;]].&lt;br /&gt;
&lt;br /&gt;
===Classical Offline Communication-Quantum Offline Communication=== &lt;br /&gt;
It involves a partially classical Client who can generate entanglement, use both classical and quantum communication with the Server during the preparation stage and output correction. There is no communication between the two parties during computation stage. Quantum Fully Homomorphic Encryption (QFHE) falls under this category, where Client hides her input states with the help of classical [[Supplementary Information#Homomorphic Encryption|&#039;&#039;&#039;Homomorphic Encryption&#039;&#039;&#039;]]. In addition to this she also prepares some quantum gadgets (using [[Supplementary Information#entanglement|entanglement]]) which she sends with the encrypted state to Server, in the prepapration stage. Server uses the quantum gadgets for computation on the encrypted state. Such gadgets require steps which cannot be realized by classical HE scheme. Later Client decrypts/deciphers the outcome sent by Server to get the correct result, in the correction Stage. If the task performed by the Server can be verified by the Client, the protocol is called, Verifiable Quantum Fully Homomorphic Encryption (VQFHE). Classes of protocols under this category are:&lt;br /&gt;
*[[Prepare and Send Quantum Fully Homomorphic Encryption|&#039;&#039;&#039;Prepare and Send QFHE&#039;&#039;&#039;]] &lt;br /&gt;
*[[Prepare and Send Verifiable Quantum Fully Homomorphic Encryption|&#039;&#039;&#039;Prepare and Send VQFHE&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
===Classical Offline Communication-No Quantum Communication===&lt;br /&gt;
It involves a fully classical Client assign quantum computation to a Server on her classical input/output using only classical communication during the preparation stage and output correction. There is no communication between the two parties during computation stage. It uses only classical [[Supplementary Information#Homomorphic Encryption|Homomorphic Encryption]] and no quantum gadgets to realize a quantum function/computation. Quantum offline communication would be needed in case of quantum input/output. A verification scheme for such protocols is still an open question. Class of protocols under this category are:&lt;br /&gt;
*Quantum Capable Classical Fully Homomorphic Encryption [[Classical Fully Homomorphic Encryption for Quantum Circuits|&#039;&#039;&#039;(FHE) for Quantum Circuits&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;Tags:&#039;&#039;&#039; [[Two Party Protocols|Two Party]], [[Universal Task|Universal Task]], [[Multiparty Delegated Quantum Computation|Multiparty Delegated Quantum Computation]], [[Quantum Enhanced Classical Delegated Computation|Quantum Enhanced Classical Delegated Computation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Universal Task]]&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Secure_Client-_Server_Delegated_Computation&amp;diff=2215</id>
		<title>Secure Client- Server Delegated Computation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Secure_Client-_Server_Delegated_Computation&amp;diff=2215"/>
		<updated>2019-04-25T08:48:02Z</updated>

		<summary type="html">&lt;p&gt;Charlie: /* Functionality Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Functionality Description==&lt;br /&gt;
Delegated Computation is the task of assigning computation on hidden data to a powerful untrusted party (a device) by a weak (in terms of computational powers) party while maintaining privacy of hidden data from the powerful party. Protocols under this functionality are commonly called Client (weak party)-Server (powerful party) protocols. Delegated Quantum Computation (DQC) protocols involve partially/fully classical Client delegating a quantum computation to fully powerful single/multiple quantum Server/Servers. All DQC protocols involve three main stages, Preparation Stage, Computation Stage and Output Correction Stage. The roles of Client and Server in the different stages may differ according to the type of communication used. It can be performed via classical and quantum communication. If it is carried out only during Preparation and Correction stage, it is called offline communication else if the communication is carried out during the computation stage, it is online communication. If the outcome can be verified by the Client it is a verifiable delegated quantum computation protocol. Hence, based on the above requirements, DQC protocols can be classified as follows.&lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
===Classical Online Communication-Quantum Offline Communication===&lt;br /&gt;
It involves a partially quantum Client who can prepare and send quantum states use quantum offline communication to send input to the Server, in the preparation Stage and to receive outputs from the Server, during output correction. Client and Server then use classical online communication to exchange classical messages during computation phase. Universal Blind Quantum Computation (UBQC) falls under this category, where Client hides his input, output and computation from the Server using [[Supplementary Information#Measurement Based Quantum Computation|&#039;&#039;&#039;MBQC&#039;&#039;&#039;]].  If the task performed by Server can be verified by the Client, it is Verifiable Universal Blind Quantum Computation (VUBQC). Classes of protocols under this category are:&lt;br /&gt;
*[[Prepare and Send-Universal Blind Quantum Computation|&#039;&#039;&#039;Prepare and Send UBQC&#039;&#039;&#039;]]&lt;br /&gt;
*[[Prepare and Send Verifiable Universal Blind Quantum Computation|&#039;&#039;&#039;Prepare and Send VUBQC&#039;&#039;&#039;]].&lt;br /&gt;
[[Category:Two Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
===Classical Online Communication-Quantum Online Communication===&lt;br /&gt;
It involves a partially quantum Client who can measure quantum states use quantum and classical communication throughout the protocol. Client performs the hidden [[Supplementary Information|MBQC]] on states prepared by Server using her measurement device in the computation Stage. She then corrects her classical outcomes in Correction Stage. Classes of protocols under this category are:&lt;br /&gt;
*[[Measurement Only-Universal Blind Quantum Computation|&#039;&#039;&#039;Measurement Only UBQC&#039;&#039;&#039;]] &lt;br /&gt;
*[[Measurement Only Verifiable Universal Blind Quantum Computation|&#039;&#039;&#039;Measurement Only VUBQC&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
===Classical Online Communication-No Quantum Communication===&lt;br /&gt;
It involves a fully classical Client with no quantum power exchanging classical messages with the server throughout. This can be done using protocols for generating secret random qubits, under the functionality, Secret Random Qubit Generator (SQRG). One could append SQRG with UBQC to eliminate quantum communication. A verification protocol using SQRG is still an open question. Class of protocols for SQRG:&lt;br /&gt;
*[[Pseudo-Secret Random Qubit Generator|&#039;&#039;&#039;Pseudo-Secret Random Qubit Generator (PSRQG)&#039;&#039;&#039;]].&lt;br /&gt;
&lt;br /&gt;
===Classical Offline Communication-Quantum Offline Communication=== &lt;br /&gt;
It involves a partially classical Client who can generate entanglement, use both classical and quantum communication with the Server during the preparation stage and output correction. There is no communication between the two parties during computation stage. Quantum Fully Homomorphic Encryption (QFHE) falls under this category, where Client hides her input states with the help of classical [[Supplementary Information#Homomorphic Encryption|&#039;&#039;&#039;Homomorphic Encryption&#039;&#039;&#039;]]. In addition to this she also prepares some quantum gadgets (using [[Supplementary Information#entanglement|entanglement]]) which she sends with the encrypted state to Server, in the prepapration stage. Server uses the quantum gadgets for computation on the encrypted state. Such gadgets require steps which cannot be realized by classical HE scheme. Later Client decrypts/deciphers the outcome sent by Server to get the correct result, in the correction Stage. If the task performed by the Server can be verified by the Client, the protocol is called, Verifiable Quantum Fully Homomorphic Encryption (VQFHE). Classes of protocols under this category are:&lt;br /&gt;
*[[Prepare and Send Quantum Fully Homomorphic Encryption|&#039;&#039;&#039;Prepare and Send QFHE&#039;&#039;&#039;]] &lt;br /&gt;
*[[Prepare and Send Verifiable Quantum Fully Homomorphic Encryption|&#039;&#039;&#039;Prepare and Send VQFHE&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
===Classical Offline Communication-No Quantum Communication===&lt;br /&gt;
It involves a fully classical Client assign quantum computation to a Server on her classical input/output using only classical communication during the preparation stage and output correction. There is no communication between the two parties during computation stage. It uses only classical [[Supplementary Information#Homomorphic Encryption|Homomorphic Encryption]] and no quantum gadgets to realize a quantum function/computation. Quantum offline communication would be needed in case of quantum input/output. A verification scheme for such protocols is still an open question. Class of protocols under this category are:&lt;br /&gt;
*Quantum Capable Classical Fully Homomorphic Encryption [[Classical Fully Homomorphic Encryption for Quantum Circuits|&#039;&#039;&#039;(FHE) for Quantum Circuits&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;Tags:&#039;&#039;&#039; [[Two Party Protocols|Two Party]], [[Universal Task|Universal Task]], [[Multiparty Delegated Quantum Computation|Multiparty Delegated Quantum Computation]], [[Quantum Enhanced Classical Delegated Computation|Quantum Enhanced Classical Delegated Computation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Universal Task]]&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2208</id>
		<title>Quantum Money</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Money&amp;diff=2208"/>
		<updated>2019-04-25T08:22:33Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quantum Money is a quantum cryptographic scheme that was first introduced by Wiesner [Wie83] in 1983. Informally, a quantum coin is a unique object that is created by a Trusted Third Party (TTP). Then, it is circulated among untrusted clients (Transferability property). Each client should be able to verify it and confirm that it is authentic if it has been circulated according to the prescribed rules. On the other hand, an adversary must fail in counterfeiting it with overwhelmingly high probability (Unforgeability property).&lt;br /&gt;
The quantum money schemes can be classified in two categories: Public Quantum Money and Private Quantum Money.&lt;br /&gt;
&lt;br /&gt;
== Outline ==&lt;br /&gt;
&lt;br /&gt;
Assume a TTP (eg. a bank), a verifier (eg. a merchant) and a prover (eg. a client) are involved in a quantum money scheme. Also, assume there is only one circulating quantum coin. They follow the following procedure:&amp;lt;/br&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039;: TTP prepares n qubits for each quantum coin with a serial number S. It stores the classical information about the qubits corresponding to S in a database and handover the quantum coin to a prover.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039;: In this step, the prover wants to transfer the quantum coin to a verifier. So, the authenticity of the quantum coin shall be verified by the verifier. To this end, the verifier sends a challenge to the prover and gets the serial number $SN$ of the quantum coin and the prepared qubits for it.  &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039;: The verifier accepts the coin if the received qubits corresponds to the stored information in the database regarding the serial number and classical information of the quantum coin. If the verifier can do the verification process by his own, the quantum money scheme is called public quantum money. Otherwise, if he needs to communicate with the TTP to verify the quantum coin, the scheme is called private quantum money.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mashid Delavar&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Protocol_Zoo:Copyrights&amp;diff=2202</id>
		<title>Quantum Protocol Zoo:Copyrights</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Protocol_Zoo:Copyrights&amp;diff=2202"/>
		<updated>2019-04-25T08:15:39Z</updated>

		<summary type="html">&lt;p&gt;Charlie: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
All material presented in the Zoo are either created originally by the contributor or taken from the other sources that are cited in the page. As an open source collection, we encourage everyone to use these materials however this should be properly cited both to the Zoo and the original Paper that the contribution is based on.&lt;/div&gt;</summary>
		<author><name>Charlie</name></author>
	</entry>
</feed>