<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Harold</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Harold"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/Harold"/>
	<updated>2026-04-18T17:16:19Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4392</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4392"/>
		<updated>2021-11-12T07:10:45Z</updated>

		<summary type="html">&lt;p&gt;Harold: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1]]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
The &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes first ensure that a single one is willing to send information. They go on with notifying the receiver of its role. They use a trusted source of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; states to share entanglement between the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes. This is done via a measurement performed by all nodes except the sender and receiver. Entanglement is only established probabilistically, but when it is successful, it can be used to teleport an arbitrary quantum state chosen by &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;. The classical communication for teleporting the state is performed anonymously.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Knowledge Graph==&lt;br /&gt;
Add this part if the protocol is already in the graph &lt;br /&gt;
{{graph}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
The protocol is sender and receiver secure in the semi-active scenario.&lt;br /&gt;
It is able to retain its security in the presence of noise affecting the &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state distribution under the assumption that each qubit experiences the same noise map.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; Collision detection&lt;br /&gt;
: Nodes run the classical collision detection protocol [9] to determine a single sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;.  All nodes input 1 if they do wish to be the sender and 0 otherwise.  If a single node wants to be the sender, continue.&lt;br /&gt;
; Receiver notification&lt;br /&gt;
: Nodes run the classical receiver notification protocol [9], where the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; is notified of her role.&lt;br /&gt;
; State distribution&lt;br /&gt;
: A trusted source distributes the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state.&lt;br /&gt;
; Measurement&lt;br /&gt;
: All nodes except for &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; measure in the {|0〉,|1〉} basis.&lt;br /&gt;
; Anonymous announcement of outcomes&lt;br /&gt;
: Nodes use the classical veto protocol [9] which outputs 0 if all the &amp;lt;math&amp;gt;N-2&amp;lt;/math&amp;gt; measurement outcomes are 0, and 1 otherwise. If the output is 0 then anonymous entanglement is established, else abort.&lt;br /&gt;
; Teleportation&lt;br /&gt;
: Sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; teleports the message state |ψ〉 to the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;. Classical messagemassociated with teleportationis sent anonymously. The communication is carried outusing the classical logical OR protocol [9] which computes &amp;lt;math&amp;gt;m \oplus rand&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;rand&amp;lt;/math&amp;gt; is a random 2-bit string input by the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Simulation and benchmark==&lt;br /&gt;
A simulation code for benchmarking the Snonymous transmission protocol is available [https://github.com/LiaoChinTe/netsquid-simulation/tree/main/AnonymousTransmission here].&lt;br /&gt;
Hardware parameter analysis can be found in the following [https://cloud.veriqloud.fr/index.php/s/iiw1SxU4D22FyQ7 preprint]&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4391</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4391"/>
		<updated>2021-11-12T07:10:23Z</updated>

		<summary type="html">&lt;p&gt;Harold: /* Knowledge Graph */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1]]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
The &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes first ensure that a single one is willing to send information. They go on with notifying the receiver of its role. They use a trusted source of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; states to share entanglement between the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes. This is done via a measurement performed by all nodes except the sender and receiver. Entanglement is only established probabilistically, but when it is successful, it can be used to teleport an arbitrary quantum state chosen by &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;. The classical communication for teleporting the state is performed anonymously.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Knowledge Graph==&lt;br /&gt;
Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
{{graph}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
The protocol is sender and receiver secure in the semi-active scenario.&lt;br /&gt;
It is able to retain its security in the presence of noise affecting the &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state distribution under the assumption that each qubit experiences the same noise map.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; Collision detection&lt;br /&gt;
: Nodes run the classical collision detection protocol [9] to determine a single sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;.  All nodes input 1 if they do wish to be the sender and 0 otherwise.  If a single node wants to be the sender, continue.&lt;br /&gt;
; Receiver notification&lt;br /&gt;
: Nodes run the classical receiver notification protocol [9], where the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; is notified of her role.&lt;br /&gt;
; State distribution&lt;br /&gt;
: A trusted source distributes the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state.&lt;br /&gt;
; Measurement&lt;br /&gt;
: All nodes except for &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; measure in the {|0〉,|1〉} basis.&lt;br /&gt;
; Anonymous announcement of outcomes&lt;br /&gt;
: Nodes use the classical veto protocol [9] which outputs 0 if all the &amp;lt;math&amp;gt;N-2&amp;lt;/math&amp;gt; measurement outcomes are 0, and 1 otherwise. If the output is 0 then anonymous entanglement is established, else abort.&lt;br /&gt;
; Teleportation&lt;br /&gt;
: Sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; teleports the message state |ψ〉 to the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;. Classical messagemassociated with teleportationis sent anonymously. The communication is carried outusing the classical logical OR protocol [9] which computes &amp;lt;math&amp;gt;m \oplus rand&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;rand&amp;lt;/math&amp;gt; is a random 2-bit string input by the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Simulation and benchmark==&lt;br /&gt;
A simulation code for benchmarking the Snonymous transmission protocol is available [https://github.com/LiaoChinTe/netsquid-simulation/tree/main/AnonymousTransmission here].&lt;br /&gt;
Hardware parameter analysis can be found in the following [https://cloud.veriqloud.fr/index.php/s/iiw1SxU4D22FyQ7 preprint]&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4390</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4390"/>
		<updated>2021-11-12T07:09:58Z</updated>

		<summary type="html">&lt;p&gt;Harold: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1]]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
The &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes first ensure that a single one is willing to send information. They go on with notifying the receiver of its role. They use a trusted source of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; states to share entanglement between the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes. This is done via a measurement performed by all nodes except the sender and receiver. Entanglement is only established probabilistically, but when it is successful, it can be used to teleport an arbitrary quantum state chosen by &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;. The classical communication for teleporting the state is performed anonymously.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
The protocol is sender and receiver secure in the semi-active scenario.&lt;br /&gt;
It is able to retain its security in the presence of noise affecting the &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state distribution under the assumption that each qubit experiences the same noise map.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; Collision detection&lt;br /&gt;
: Nodes run the classical collision detection protocol [9] to determine a single sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;.  All nodes input 1 if they do wish to be the sender and 0 otherwise.  If a single node wants to be the sender, continue.&lt;br /&gt;
; Receiver notification&lt;br /&gt;
: Nodes run the classical receiver notification protocol [9], where the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; is notified of her role.&lt;br /&gt;
; State distribution&lt;br /&gt;
: A trusted source distributes the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state.&lt;br /&gt;
; Measurement&lt;br /&gt;
: All nodes except for &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; measure in the {|0〉,|1〉} basis.&lt;br /&gt;
; Anonymous announcement of outcomes&lt;br /&gt;
: Nodes use the classical veto protocol [9] which outputs 0 if all the &amp;lt;math&amp;gt;N-2&amp;lt;/math&amp;gt; measurement outcomes are 0, and 1 otherwise. If the output is 0 then anonymous entanglement is established, else abort.&lt;br /&gt;
; Teleportation&lt;br /&gt;
: Sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; teleports the message state |ψ〉 to the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;. Classical messagemassociated with teleportationis sent anonymously. The communication is carried outusing the classical logical OR protocol [9] which computes &amp;lt;math&amp;gt;m \oplus rand&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;rand&amp;lt;/math&amp;gt; is a random 2-bit string input by the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Simulation and benchmark==&lt;br /&gt;
A simulation code for benchmarking the Snonymous transmission protocol is available [https://github.com/LiaoChinTe/netsquid-simulation/tree/main/AnonymousTransmission here].&lt;br /&gt;
Hardware parameter analysis can be found in the following [https://cloud.veriqloud.fr/index.php/s/iiw1SxU4D22FyQ7 preprint]&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4389</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4389"/>
		<updated>2021-11-12T07:07:57Z</updated>

		<summary type="html">&lt;p&gt;Harold: /* Properties */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1]]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
The &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes first ensure that a single one is willing to send information. They go on with notifying the receiver of its role. They use a trusted source of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; states to share entanglement between the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes. This is done via a measurement performed by all nodes except the sender and receiver. Entanglement is only established probabilistically, but when it is successful, it can be used to teleport an arbitrary quantum state chosen by &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;. The classical communication for teleporting the state is performed anonymously.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
The protocol is sender and receiver secure in the semi-active scenario.&lt;br /&gt;
It is able to retain its security in the presence of noise affecting the &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state distribution under the assumption that each qubit experiences the same noise map.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; Collision detection&lt;br /&gt;
: Nodes run the classical collision detection protocol [9] to determine a single sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;.  All nodes input 1 if they do wish to be the sender and 0 otherwise.  If a single node wants to be the sender, continue.&lt;br /&gt;
; Receiver notification&lt;br /&gt;
: Nodes run the classical receiver notification protocol [9], where the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; is notified of her role.&lt;br /&gt;
; State distribution&lt;br /&gt;
: A trusted source distributes the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state.&lt;br /&gt;
; Measurement&lt;br /&gt;
: All nodes except for &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; measure in the {|0〉,|1〉} basis.&lt;br /&gt;
; Anonymous announcement of outcomes&lt;br /&gt;
: Nodes use the classical veto protocol [9] which outputs 0 if all the &amp;lt;math&amp;gt;N-2&amp;lt;/math&amp;gt; measurement outcomes are 0, and 1 otherwise. If the output is 0 then anonymous entanglement is established, else abort.&lt;br /&gt;
; Teleportation&lt;br /&gt;
: Sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; teleports the message state |ψ〉 to the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;. Classical messagemassociated with teleportationis sent anonymously. The communication is carried outusing the classical logical OR protocol [9] which computes &amp;lt;math&amp;gt;m \oplus rand&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;rand&amp;lt;/math&amp;gt; is a random 2-bit string input by the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4388</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4388"/>
		<updated>2021-11-12T07:05:02Z</updated>

		<summary type="html">&lt;p&gt;Harold: /* Protocol Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1]]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
The &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes first ensure that a single one is willing to send information. They go on with notifying the receiver of its role. They use a trusted source of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; states to share entanglement between the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes. This is done via a measurement performed by all nodes except the sender and receiver. Entanglement is only established probabilistically, but when it is successful, it can be used to teleport an arbitrary quantum state chosen by &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;. The classical communication for teleporting the state is performed anonymously.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; Collision detection&lt;br /&gt;
: Nodes run the classical collision detection protocol [9] to determine a single sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;.  All nodes input 1 if they do wish to be the sender and 0 otherwise.  If a single node wants to be the sender, continue.&lt;br /&gt;
; Receiver notification&lt;br /&gt;
: Nodes run the classical receiver notification protocol [9], where the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; is notified of her role.&lt;br /&gt;
; State distribution&lt;br /&gt;
: A trusted source distributes the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state.&lt;br /&gt;
; Measurement&lt;br /&gt;
: All nodes except for &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; measure in the {|0〉,|1〉} basis.&lt;br /&gt;
; Anonymous announcement of outcomes&lt;br /&gt;
: Nodes use the classical veto protocol [9] which outputs 0 if all the &amp;lt;math&amp;gt;N-2&amp;lt;/math&amp;gt; measurement outcomes are 0, and 1 otherwise. If the output is 0 then anonymous entanglement is established, else abort.&lt;br /&gt;
; Teleportation&lt;br /&gt;
: Sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; teleports the message state |ψ〉 to the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;. Classical messagemassociated with teleportationis sent anonymously. The communication is carried outusing the classical logical OR protocol [9] which computes &amp;lt;math&amp;gt;m \oplus rand&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;rand&amp;lt;/math&amp;gt; is a random 2-bit string input by the receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4387</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4387"/>
		<updated>2021-11-12T06:32:37Z</updated>

		<summary type="html">&lt;p&gt;Harold: /* Outline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1]]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
The &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes first ensure that a single one is willing to send information. They go on with notifying the receiver of its role. They use a trusted source of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; states to share entanglement between the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; nodes. This is done via a measurement performed by all nodes except the sender and receiver. Entanglement is only established probabilistically, but when it is successful, it can be used to teleport an arbitrary quantum state chosen by &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;. The classical communication for teleporting the state is performed anonymously.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4386</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4386"/>
		<updated>2021-11-12T06:24:27Z</updated>

		<summary type="html">&lt;p&gt;Harold: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1]]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
#A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4385</id>
		<title>Anonymous transmission in a noisy quantum network using the W state</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Anonymous_transmission_in_a_noisy_quantum_network_using_the_W_state&amp;diff=4385"/>
		<updated>2021-11-12T06:22:08Z</updated>

		<summary type="html">&lt;p&gt;Harold: Created page with &amp;quot;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;   &amp;lt;!-- Intro: brief description of the protocol --&amp;gt; &amp;lt;!--Tags: related pages or category --&amp;gt; The protocol allows a...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
The protocol allows a sender &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; to transmit an arbitrary quantum state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; to a receiver &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; in an anonymous way and uses the &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt;-partite &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; state as a quantum resource.&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
The protocol relies on a set of classical subroutines (collision detection, receiver notification, veto and logical OR). Their proposed implementation [[Anonymous transmission in a noisy quantum network using the W state#References|[1] ]] has been shown to be information-theoretically secure in the classical regime, even with an arbitrary number of corrupted participants, assuming the parties share pairwise authenticated private channels and a broadcast channel.&lt;br /&gt;
&lt;br /&gt;
The protocol assumes that the implementations listed above remain secure even in the presence of a quantum adversary.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# A. Broadbent and A. Tapp, inAdvances in Cryptology– ASIACRYPT 2007, edited by K. Kurosawa (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007) pp. 410–426.&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Verifiable_Universal_Blind_Quantum_Computation&amp;diff=4384</id>
		<title>Prepare-and-Send Verifiable Universal Blind Quantum Computation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Prepare-and-Send_Verifiable_Universal_Blind_Quantum_Computation&amp;diff=4384"/>
		<updated>2021-11-12T06:07:33Z</updated>

		<summary type="html">&lt;p&gt;Harold: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [https://arxiv.org/abs/1203.5217 example protocol] achieves the functionality of [[Secure Verifiable Client-Server Delegated Quantum Computation|Secure Verifiable Delegated Quantum Computation]] which enables a client with limited quantum technology to delegate a computation to an untrusted but powerful quantum server in such a manner, where the privacy of the computation is maintained. This protocol introduces verifiability as a property and allows the client to verify the correctness of [[Prepare-and-Send Universal Blind Quantum Computation]]. The client has an ability to verify whether the server has followed the instructions of the protocol and also can check if the server tried to deviate from the protocol which would have resulted in an incorrect output state.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[Category: Two Party Protocols]] [[:Category: Two Party Protocols|Two Party]], [[Category: Universal Task]][[:Category: Universal Task|Universal Task]], [[Category: Quantum Functionality]] [[:Category: Quantum Functionality|Quantum Functionality]], Quantum Offline communication, Classical Online communication, [[Supplementary Information#Measurement Based Quantum Computation|Measurement Based Quantum Computation (MBQC)]], [[Measurement-Only Universal Blind Quantum Computation|Measurement Only UBQC]], [[Pseudo-Secret Random Qubit Generator (PSQRG)]], [[Prepare-and-Send Universal Blind Quantum Computation]].&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* The protocol assumes perfect state preparation, transmissions, and measurements.&lt;br /&gt;
* The client never deviates from the protocol.&lt;br /&gt;
* The position of the trap qubit always remains hidden from the server.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
This protocol is a modified version of [[Prepare-and-Send Universal Blind Quantum Computation]], which is based on [[Supplementary Information#Measurement Based Quantum Computation (MBQC)|(MBQC)]]. Here a powerful adversarial server is delegated with quantum computation which maintains the privacy of the computation. Any computational deviations by this server are detected by high probability. This is achieved by insertion of randomly prepared and blindly isolated single qubits in the computation, which act as a trap (trap qubits), hence assisting the client in verification.&lt;br /&gt;
&lt;br /&gt;
MBQC required a set of the initial state for computation. The [[Glossary#Brickwork States|brickwork states]] used in [[Prepare-and-Send Universal Blind Quantum Computation]] are modified to [[Glossary#Cylinder Brickwork States|cylinder brickwork states]] which enables the client to embed a trap qubit surrounded by multiple dummy qubits without disrupting the computation. This state is universal and maintains the privacy of the client&#039;s preparation. The dummy qubits here do not take part in the actual computation as they are disentangled from the rest of the qubits of the graph state. Hence by adding them to the neighboring nodes of the trap qubits, they are blindly isolated and thus do not interfere with the actual computation. The dummy qubits are added next to the trap qubit in a tape format as seen in [[Glossary#Cylinder Brickwork States|cylinder brickwork states]]. &lt;br /&gt;
&lt;br /&gt;
This protocol is divided into four stages: Client&#039;s preparation, server&#039;s preparation, interaction and measurement, verification.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Client&#039;s preparation&#039;&#039;&#039;: The partially quantum client prepares the quantum states with embedded traps qubits and sends them to the server for creation of the cylinder brickwork state. &lt;br /&gt;
** For the server to create a cylinder brickwork state, the client prepares &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; single qubit states. The first &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubit input states are specially encoded and [[Supplementary Information#Quantum One Time Pad|Quantum one time pad]] is applied to these states with randomly chosen keys.&lt;br /&gt;
** Then the client randomly selects one qubit as the trap qubit and corresponding to the graph of cylinder brickwork state, all the other qubits in the tape are set as the dummy qubits. The trap qubit is prepared with the local phase angle set to &amp;lt;math&amp;gt;0&amp;lt;/math&amp;gt;. The dummy qubits isolate the trap qubit from the graph state.&lt;br /&gt;
** The remaining non-input qubit states (not including the dummy states and trap qubit) are prepared with randomly chosen local phase angles.&lt;br /&gt;
** The client then sends all the prepared qubits in the respective order to the server so the graph state can be constructed.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Server&#039;s Preparation&#039;&#039;&#039;: The server receives the qubits in a sequential order of rows and columns till all &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; qubits are received. The server then entangles them according to the cylinder brickwork state (using CZ gate).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Interaction and Measurement&#039;&#039;&#039;: This step is exactly the same as for [[Prepare-and-Send Universal Blind Quantum Computation]].&lt;br /&gt;
** For a specific computation, MBQC decides which measurement angle is selected along with some extra Pauli X, Z corrections for every qubit. The correction sets are unique for every graph state and depend on the previous measurement. These can obtained from &#039;&#039;&#039;[[Supplementary Information#Flow Construction-Determinism|flow construction]]&#039;&#039;&#039;. The qubits have a randomly chosen local phase angle and hence the same local phase angle is used for computation as well as for output correction. To hide the state, a randomly chosen &amp;lt;math&amp;gt;\pi&amp;lt;/math&amp;gt; rotation which may or may not be added. From all the above-mentioned conditions, a final measurement angle is formed and the client sends a classical message to the server to inform the server about the final measurement basis (in (X, Y) plane) in which they should measure the corresponding qubit. Thus it reveals no information about the underlying computation.&lt;br /&gt;
** The server sends the classical output of each non-input qubit&#039;s measurement to the client. The client considers the &amp;lt;math&amp;gt;\pi&amp;lt;/math&amp;gt; rotation to get the corrected output. The client also uses this to calculate the measurement angle for the next qubit and thus repeats the process until the last output qubits are reached.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Verification&#039;&#039;&#039;: The verification is carried on by the client by comparing the outcome of the trap qubit measurements with the expected outcome.&lt;br /&gt;
**&#039;&#039;&#039;For Quantum outputs&#039;&#039;&#039;:&lt;br /&gt;
*** The server sends all the output qubits to the client.&lt;br /&gt;
*** From these output qubits, the client performs a measurement on the trap qubit. If the output is equal to the expected outcome, the computation is verified. Otherwise, it is rejected.&lt;br /&gt;
*** If the computation is accepted, output correction is performed on the other output qubits (except the trap qubit).&lt;br /&gt;
**&#039;&#039;&#039;For Classical outputs&#039;&#039;&#039;:&lt;br /&gt;
*** The server continues performing measurements on the output qubits with the measurement angles sent by the server.&lt;br /&gt;
*** The client compares the output of the trap qubit with the expected output. If it is equal, computation is verified. Otherwise, it is rejected. If the computation is accepted, the client accepts the other output measurement results as the computation result.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
* &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;: Total number of input qubits. Also total number of output qubits in quantum outputs.&lt;br /&gt;
* &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;: Total number of qubits in the graph state.&lt;br /&gt;
* &amp;lt;math&amp;gt;|I\rangle&amp;lt;/math&amp;gt;: &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubit input state.&lt;br /&gt;
* &amp;lt;math&amp;gt;|e\rangle&amp;lt;/math&amp;gt;: Encoded &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; qubit input state.&lt;br /&gt;
* &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt;: Set of random bits used in encoding &amp;lt;math&amp;gt;|I\rangle&amp;lt;/math&amp;gt; via quantum one time pad.&lt;br /&gt;
* &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;: Trap qubit position vertex in the graph state.&lt;br /&gt;
* &amp;lt;math&amp;gt;D&amp;lt;/math&amp;gt;: Set of all position vertices in the tape of the cylinder brickwork state.&lt;br /&gt;
* &amp;lt;math&amp;gt;\theta_i&amp;lt;/math&amp;gt;: Random local phase angles for qubit &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;|+\rangle_{\theta_i}&amp;lt;/math&amp;gt;:  &amp;lt;math&amp;gt;\frac{1}{\sqrt{2}} (|0\rangle +e^{i\theta_i}|1\rangle)&amp;lt;/math&amp;gt;&lt;br /&gt;
* &amp;lt;math&amp;gt;\phi_i&amp;lt;/math&amp;gt;: True measurement angle for qubit &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;. This is assigned corresponding to the graph state.&lt;br /&gt;
* &amp;lt;math&amp;gt;r \in \{ 0, 1\}&amp;lt;/math&amp;gt;: randomly chosen parameter for &amp;lt;math&amp;gt;\pi&amp;lt;/math&amp;gt; rotation in order to hide classical output.&lt;br /&gt;
* &amp;lt;math&amp;gt;N_g(k)&amp;lt;/math&amp;gt;: Denotes neighborhood of vertex k in graph state&lt;br /&gt;
* &amp;lt;math&amp;gt;f&amp;lt;/math&amp;gt;: Function which defines flow from measured qubits to noninput qubits, &amp;lt;math&amp;gt;f:&amp;lt;/math&amp;gt; output vertices &amp;lt;math&amp;gt;\xrightarrow{}&amp;lt;/math&amp;gt; input vertices&lt;br /&gt;
* &amp;lt;math&amp;gt;\theta^{&#039;}_i&amp;lt;/math&amp;gt;: Updated version of Random local phase angle for qubit &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\delta_i&amp;lt;/math&amp;gt;: Final measurement angle for qubit &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;b_i&amp;lt;/math&amp;gt;: Measurement output by the server.&lt;br /&gt;
* &amp;lt;math&amp;gt;s&amp;lt;/math&amp;gt;: Sequence of length m describing the result of the nonoutput measurements. &amp;lt;math&amp;gt;s_i \in \{0, 1\}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Quantum computation resources for the server.&lt;br /&gt;
* A quantum channel from the client to the server to transfer initial quantum states.&lt;br /&gt;
* Classical channel from the client to the server to transfer measurement angles and outputs.&lt;br /&gt;
* Measurement devices for the server.&lt;br /&gt;
* Measurement devices for the client in case of quantum outputs.&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* The client is partially quantum and should be able to prepare the given initial quantum states.&lt;br /&gt;
* Security: This protocol is secure against malicious adversary setting and also detects a cheating server.&lt;br /&gt;
* Universality: This protocol is universal in nature. The universality of the cylinder brickwork state guarantees that the server’s knowledge about the graph does not reveal anything about the underlying computation.&lt;br /&gt;
* Correctness If Client and Server follow the protocol as described above, the outcome will be correct.&lt;br /&gt;
* Blindness: This protocol is blind in nature, only revealing &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;.&lt;br /&gt;
* This protocol requires no quantum memory for the client.&lt;br /&gt;
* This protocol is &amp;lt;math&amp;gt;1-\frac{1}{2m}&amp;lt;/math&amp;gt; verifiable in quantum output case.&lt;br /&gt;
* This protocol is &amp;lt;math&amp;gt;1-\frac{1}{m}&amp;lt;/math&amp;gt; verifiable in classical output case.&lt;br /&gt;
* The trap qubit in the tape format of the cylinder brickwork state remains disentangled from the rest of the graph.&lt;br /&gt;
* Every qubit of the underlying graph could potentially be an isolated trap qubit.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Protocol for quantum output case&#039;&#039;&#039;: &amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Stage 1: &#039;&#039;&#039;Client&#039;s preparation:&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;: Cylindrical brickwork state, &amp;lt;math&amp;gt;|I\rangle&amp;lt;/math&amp;gt;.&lt;br /&gt;
&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;: Server: &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; qubits sequentially. &lt;br /&gt;
&lt;br /&gt;
* The client prepares &amp;lt;math&amp;gt;|e\rangle = X^{x1}_1 Z_1(\theta_1) \otimes ... \otimes X^{xn}_n Z_n(\theta_n)|I\rangle&amp;lt;/math&amp;gt; using QOTP.&lt;br /&gt;
* Client randomly chooses &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;t \in D&amp;lt;/math&amp;gt;.&lt;br /&gt;
* For &amp;lt;math&amp;gt;i = n+1, n+2, ....m&amp;lt;/math&amp;gt; (non-input qubits):&lt;br /&gt;
** if &amp;lt;math&amp;gt;i \in D&amp;lt;/math&amp;gt;:&lt;br /&gt;
*** if &amp;lt;math&amp;gt;i  != t&amp;lt;/math&amp;gt; then state &amp;lt;math&amp;gt;|0\rangle&amp;lt;/math&amp;gt; or &amp;lt;math&amp;gt;|1\rangle&amp;lt;/math&amp;gt; is prepared&lt;br /&gt;
*** if &amp;lt;math&amp;gt;i == t&amp;lt;/math&amp;gt; then &amp;lt;math&amp;gt;|+\rangle_{\theta_i}&amp;lt;/math&amp;gt; is prepared&lt;br /&gt;
** else &amp;lt;math&amp;gt;|+\rangle_{\theta_i}&amp;lt;/math&amp;gt; is prepared&lt;br /&gt;
* &amp;lt;math&amp;gt;\forall l\epsilon\{1,..,n\}&amp;lt;/math&amp;gt;, Client sends all qubits to server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stage 2: &#039;&#039;&#039;Server&#039;s preparation:&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;: &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; qubits sequentially.&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;: entangled graph state with a disentangled trap qubit.&lt;br /&gt;
* Server creates an entangled state from all received qubits using CZ operations according to their indices and creates the cylinder brickwork state.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stage 3: &#039;&#039;&#039;Interaction and Measurement:&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;: &amp;lt;math&amp;gt;\delta_i&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;: &amp;lt;math&amp;gt;s_i&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* For &amp;lt;math&amp;gt;i = 1, 2, ... m-n&amp;lt;/math&amp;gt; (received qubits): &lt;br /&gt;
** Client computes &amp;lt;math&amp;gt;\phi_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
*** if &amp;lt;math&amp;gt;i == t&amp;lt;/math&amp;gt;, then &amp;lt;math&amp;gt;\phi_i = 0&amp;lt;/math&amp;gt;&lt;br /&gt;
** Client randomly selects &amp;lt;math&amp;gt;r_i&amp;lt;/math&amp;gt; and generates &amp;lt;math&amp;gt;\theta&#039;_i = \theta_i + r_i&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Client then computes the angle &amp;lt;math&amp;gt;\delta_i = (-1)^{x_i + s_{f^{-1}(i)}}\phi_i + \sum_{j:i \in N_g(f(j)}\theta&#039;_i + s_i\pi&amp;lt;/math&amp;gt; and sends &amp;lt;math&amp;gt;\delta_i&amp;lt;/math&amp;gt; to server.&lt;br /&gt;
** Server measures &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt; and sends &amp;lt;math&amp;gt;b_i&amp;lt;/math&amp;gt; to client.&lt;br /&gt;
** Client sets the value &amp;lt;math&amp;gt;s_i = b_i \oplus r_i&amp;lt;/math&amp;gt; in &amp;lt;math&amp;gt;s&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Stage 4: &#039;&#039;&#039;Verification:&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;: Output qubits &amp;lt;math&amp;gt;m-n+1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;: Verification result&lt;br /&gt;
* For &amp;lt;math&amp;gt;i = m-n+1, ... m&amp;lt;/math&amp;gt; (output qubits): &lt;br /&gt;
** Server sends &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt; to client.&lt;br /&gt;
* Client measures the output trap qubit &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt; (which was disentangled) with angle &amp;lt;math&amp;gt;\delta_t = \phi_t + r_t\pi&amp;lt;/math&amp;gt;. &lt;br /&gt;
** Client obtains the result &amp;lt;math&amp;gt;b_t&amp;lt;/math&amp;gt;.&lt;br /&gt;
*** If &amp;lt;math&amp;gt;b_t == r_t&amp;lt;/math&amp;gt;, then computation is accepted.&lt;br /&gt;
*** else, computation is rejected.&lt;br /&gt;
&lt;br /&gt;
==Simulation and benchmark==&lt;br /&gt;
A simulation code for benchmarking the Quantum Token Protocol is available [https://github.com/LiaoChinTe/netsquid-simulation/tree/main/VBQC here].&lt;br /&gt;
Hardware parameter analysis can be found in the following [https://cloud.veriqloud.fr/index.php/s/iiw1SxU4D22FyQ7 preprint]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Rhea Parekh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Teleportation&amp;diff=4383</id>
		<title>Quantum Teleportation</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Teleportation&amp;diff=4383"/>
		<updated>2021-11-12T06:02:26Z</updated>

		<summary type="html">&lt;p&gt;Harold: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This [https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.70.1895 example protocol] performs the task of [[(Quantum) Teleportation]] by which a quantum state (or information stored in a quantum state) can be transmitted physically from one location (or one party) to another. This protocol requires sharing an [[entangled state]] like an [[EPR pair]] between two parties and also allowing the parties to communicate classically (sending bits of information). Quantum teleportation can be treated as a send/receive scheme for qubits. Quantum teleportation provides a mechanism of sending an unknown qubit from one location to another, without physically moving the particle. This task can be done due to the existence of long-range correlations between entangled pairs. The quantum teleportation is used widely as a basic protocol in many other quantum communication and quantum cryptography protocols.&lt;br /&gt;
&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Building Blocks|Building Blocks]], teleportation, quantum communication, sending quantum information, send/receive in the quantum network, [[:Category: Quantum Functionality|Quantum Functionality]], [[:Category: Specific Task|Specific Task]]&lt;br /&gt;
[[Category: Quantum Functionality]] [[Category: Building Blocks]] [[Category: Specific Task]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* The protocol is deterministic i.e. the entangled state and the measurements and gates are assumed perfect, the protocol will always succeed.&lt;br /&gt;
* During the protocol, value of &amp;lt;math&amp;gt;\alpha&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\beta&amp;lt;/math&amp;gt; will remain unknown to both the parties (and any adversary as well).&lt;br /&gt;
* A public classical channel is assumed between the two parties.&lt;br /&gt;
* There is no transfer of matter or energy involved. Sender&#039;s particle has not been physically moved to receiver; only the particle&#039;s state has been transferred.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&lt;br /&gt;
The quantum teleportation protocol begins with a quantum state or qubit, in the possession of the first party (the sender). We need this quantum state to be transferred to the second party (the receiver). This state is unknown to both parties meaning that the sender does not know the representation of the qubit on any basis. Before starting the protocol the two parties must share an entangled state (for example an [[EPR pair]]). The entangled state here is a two-qubit state where each party has one share of these qubits which have a special [[quantum correlation]]. After sharing the entangled state, the parties can take an arbitrary distance (In theory, without any noise and by assuming that the entanglement can be held for an arbitrary distance which is not the case in the real experiments). After this preparation stage, the two parties will perform the protocol as follows:&amp;lt;/br&amp;gt;&lt;br /&gt;
* At sender&#039;s location, a Bell measurement of the EPR pair qubit and the qubit to be teleported is performed, yielding one of four measurement outcomes, which can be encoded in two classical bits of information. Both qubits at the sender&#039;s location are then discarded.&lt;br /&gt;
* Using the classical channel, the two bits are sent from the sender to the receiver.&lt;br /&gt;
* As a result of the measurement performed at the sender&#039;s location, the EPR pair qubit at the receiver&#039;s location is in one of four possible states. Of these four possible states, one is identical to the original quantum state, and the other three are closely related. Which of these four possibilities actually obtained, is encoded in the two classical bits. Knowing this, the EPR pair qubit at the receiver&#039;s location is modified by local unitary operations that the receiver performs on his state. And the result will be the original qubit.&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;math&amp;gt;|\psi\rangle_O:&amp;lt;/math&amp;gt; The unknown original state to be teleported from the sender to the receiver.&lt;br /&gt;
* &amp;lt;math&amp;gt;|\Phi^+\rangle_{AB}:&amp;lt;/math&amp;gt; The EPR pair (or Bell state) shared between two parties.&lt;br /&gt;
* Bell States(&amp;lt;math&amp;gt;|\Phi^+\rangle&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;|\Phi^-\rangle&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;|\Psi^+\rangle&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|\Psi^-\rangle&amp;lt;/math&amp;gt;): Set of orthonormal two-qubit states having the maximum amount of entanglement. These states can be used as a basis for a two-qubit quantum system.&lt;br /&gt;
* &amp;lt;math&amp;gt;I:&amp;lt;/math&amp;gt; The identity operator.&lt;br /&gt;
*&amp;lt;math&amp;gt;X,Y,Z:&amp;lt;/math&amp;gt; The [[Pauli Operators]].&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* This protocol uses a public classical channel to transfer two bits of classical information.&lt;br /&gt;
* The teleportation protocol uses entanglement (or entangled EPR states) as a resource.&lt;br /&gt;
* The teleportation protocol is secure against cloning attacks, as a result of [[no-cloning theorem]] in quantum mechanics i.e. any of the involved states in the protocol cannot perfectly be copied. Also, any other interference will affect the shared state between the two parties and the attack will be discovered.&lt;br /&gt;
* The teleportation protocol is secure against entanglement attacks because of the [[monogamy of entanglement]] in quantum mechanics. It means that if an adversary tries to entangle her state with the shared EPR pair, the amount of the entanglement of the shared state between two parties will change and the attacker will be discovered.&lt;br /&gt;
* The size of the classical information sent by the sender to the receiver is infinitely smaller than the information required to give a classical description of the teleported quantum state.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/quantumprotocolzoo/protocols/tree/master/QuantumStateTeleportation &amp;lt;u&amp;gt;click here for Python code&amp;lt;/u&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/apassenger/CQC-Python/tree/master/examples/pythonLib/teleport/Quantum%20State%20Teleportation &amp;lt;u&amp;gt;click here for SimulaQron code&amp;lt;/u&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Input:&#039;&#039;&#039; The qubit &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt; is the to-be-sent state which the first party (the sender) wants to transfer to the second party (the receiver). The quantum state can be written generally in standard basis as:&lt;br /&gt;
&amp;lt;math&amp;gt;|\psi\rangle = \alpha |0\rangle_{O} + \beta |1\rangle_{O}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\alpha&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\beta&amp;lt;/math&amp;gt; coefficients are unknown to the sender.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;u&amp;gt;Stage 1&amp;lt;/u&amp;gt;&#039;&#039;&#039; Share entangled qubits (EPR pair)&amp;lt;/br&amp;gt;&lt;br /&gt;
#  Generate an EPR pair (or a maximally-entangled two-qubit sate) and give one qubit to the sender (A) and one to the receiver (B). The shared EPR state between the two parties is described as:&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;math&amp;gt;|\Phi^+\rangle_{AB} = \frac{1}{\sqrt{2}} (|0\rangle_A|0\rangle_B + |1\rangle_A|1\rangle_B)&amp;lt;/math&amp;gt;&lt;br /&gt;
#This step is a pre-preparation step which should be run before the protocol starts. The state of all the three particles are as follows:&lt;br /&gt;
&amp;lt;math&amp;gt;|\psi\rangle_O \otimes |\Phi^+\rangle_{AB} = (\alpha|0\rangle_O + \beta|1\rangle_O) \otimes \frac{1}{\sqrt{2}} (|0\rangle_A|0\rangle_B + |1\rangle_A|1\rangle_B)&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
In order to make the next step more clear, the above three-qubit states can be written in [[Bell basis]] (spaned by four two-qubit Bell states &amp;lt;math&amp;gt;|\Phi^+\rangle&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;|\Phi^-\rangle&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;|\Psi^+\rangle&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|\Psi^-\rangle&amp;lt;/math&amp;gt;)&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;math&amp;gt;|\psi\rangle_O \otimes |\Phi^+\rangle_{AB} = \frac{1}{2} [|\Phi^+\rangle_{AO} \otimes (\alpha |0\rangle + \beta |1\rangle)_B + |\Phi^-\rangle_{AO} \otimes (\alpha |0\rangle - \beta |1\rangle)_B + |\Psi^+\rangle_{AO} \otimes (\beta |0\rangle + \alpha |1\rangle)_B + |\Psi^-\rangle_{AO} \otimes (\beta |0\rangle - \alpha |1\rangle)_B]&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;u&amp;gt;Stage 2&amp;lt;/u&amp;gt;&#039;&#039;&#039; Local Measurement by the sender(A)&lt;br /&gt;
* &#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;|\psi\rangle_O \otimes |\Phi^+\rangle_{AB}&amp;lt;/math&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Output:&#039;&#039;&#039; The output of the sender&#039;s measurement in Bell basis&lt;br /&gt;
&lt;br /&gt;
# The sender(A) performs a local measurement on two qubits that she has (the original state and her share of the EPR pair) in the Bell basis.&lt;br /&gt;
#  The output of this measurement will be one of the four Bell states: &amp;lt;math&amp;gt;|\Phi^+\rangle&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;|\Phi^-\rangle&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;|\Psi^+\rangle&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;|\Psi^-\rangle&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;u&amp;gt;Stage 3&amp;lt;/u&amp;gt;&#039;&#039;&#039; Send classical information&lt;br /&gt;
# According to the result of the measurement on the previous step, the sender A sends two bits of classical information to B indicating the result of her measurement:&lt;br /&gt;
##  &#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Phi^+\rangle \rightarrow&amp;lt;/math&amp;gt; send &amp;lt;math&amp;gt;00&amp;lt;/math&amp;gt;&lt;br /&gt;
##&#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Phi^-\rangle \rightarrow&amp;lt;/math&amp;gt; send &amp;lt;math&amp;gt;01&amp;lt;/math&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Psi^+\rangle \rightarrow&amp;lt;/math&amp;gt; send &amp;lt;math&amp;gt;10&amp;lt;/math&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Psi^-\rangle \rightarrow&amp;lt;/math&amp;gt; send &amp;lt;math&amp;gt;11&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;u&amp;gt;Stage 4&amp;lt;/u&amp;gt;&#039;&#039;&#039; Local Operation by the receiver(B)&lt;br /&gt;
*&#039;&#039;&#039;Input:&#039;&#039;&#039; two classical bits: c &amp;lt;math&amp;gt;\in \{00, 01, 10, 11\}&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Output:&#039;&#039;&#039; Teleported state &amp;lt;math&amp;gt;|\psi\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
# The receiver performs a local unitary operation on his qubit. Before this step and after that the two-qubit measurement is performed by the sender, The state of the receiver will change to the following states according to the sender&#039;s measurement results: &lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Phi^+\rangle \rightarrow&amp;lt;/math&amp;gt;, receiver&#039;s state will be: &amp;lt;math&amp;gt;\alpha |0\rangle + \beta |1\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Phi^-\rangle \rightarrow&amp;lt;/math&amp;gt;, receiver&#039;s state will be: &amp;lt;math&amp;gt;\alpha |0\rangle - \beta |1\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Psi^+\rangle \rightarrow&amp;lt;/math&amp;gt;, receiver&#039;s state will be: &amp;lt;math&amp;gt;\beta |0\rangle + \alpha |1\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039; the result is &amp;lt;math&amp;gt;|\Psi^-\rangle \rightarrow&amp;lt;/math&amp;gt;, receiver&#039;s state will be: &amp;lt;math&amp;gt;\beta |0\rangle - \alpha |1\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
*  The receiver will perform following operators on the above states:&lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039;  he receives &amp;lt;math&amp;gt;00 \rightarrow&amp;lt;/math&amp;gt;, he performs &amp;lt;math&amp;gt;I&amp;lt;/math&amp;gt; (does nothing)&lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039;  he receives &amp;lt;math&amp;gt;01 \rightarrow&amp;lt;/math&amp;gt;, he performs &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt; ([[Pauli Z]])&lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039;  he receives &amp;lt;math&amp;gt;10 \rightarrow&amp;lt;/math&amp;gt;, he performs &amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt; ([[Pauli X]])&lt;br /&gt;
# &#039;&#039;&#039;if&#039;&#039;&#039;  he receives &amp;lt;math&amp;gt;11 \rightarrow&amp;lt;/math&amp;gt;, he performs &amp;lt;math&amp;gt;ZX&amp;lt;/math&amp;gt; (Pauli X then a Pauli Z)&lt;br /&gt;
*As a result, the state of the receiver will be: &amp;lt;math&amp;gt;|\psi\rangle_B = \alpha|0\rangle + \beta |1\rangle&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Simulation and benchmark==&lt;br /&gt;
A simulation code for benchmarking the Quantum Teleportation Protocol is available [[fn:5] https://github.com/LiaoChinTe/netsquid-simulation/tree/main/QuantumTeleportation here].&lt;br /&gt;
Hardware parameter analysis can be found in the following [https://cloud.veriqloud.fr/index.php/s/iiw1SxU4D22FyQ7 preprint]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Mina Doosti&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=4382</id>
		<title>Quantum Token</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Quantum_Token&amp;diff=4382"/>
		<updated>2021-11-12T05:58:20Z</updated>

		<summary type="html">&lt;p&gt;Harold: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Money is issued by one party (bank) to a prover (client) such that when he presents it to a verifier&lt;br /&gt;
(merchant), he/she is satisfied that the money presented by client comes from the bank. It comes&lt;br /&gt;
with the property of [[unforgeability]] and [[transferability]]. Unforgeability means that there should exist&lt;br /&gt;
no method to produce an identical copy by anyone but the bank, and transferability allows that this&lt;br /&gt;
money can be used by the verifier as a client himself in the next round.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category: Multi Party Protocols|Multi Party Protocols]], non local games, [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]] &lt;br /&gt;
[[Category: Prepare and Measure Network Stage]]&lt;br /&gt;
[[Category: Specific Tasks]]&lt;br /&gt;
[[Category: Quantum Enhanced Classical Functionality]]&lt;br /&gt;
[[Category: Multi Party Protocols]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Money is physically transferred to the holders&lt;br /&gt;
* If &amp;lt;math&amp;gt;F^{cv}_{tol} &amp;gt; (1+1/\sqrt{2})/2&amp;lt;/math&amp;gt;, a dishonest user is exponentially unlikely to be authenticated by two independent verifiers (success in cheating to use the same ticket for two independent verifiers by measuring in intermediate basis between the two bases, asked by the verifiers individually).&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol can be divided into three parts&lt;br /&gt;
* &#039;&#039;&#039;Preparation&#039;&#039;&#039; Bank prepares few rows of qubit-pairs chosen from two different non-orthogonal sets of basis. Each pair has at least one state from both bases, such that the qubit pair states are non-orthogonal. It associates each such chosen set with a serial number and shares the classical information about the choices for respective serial number with trusted merchants.&lt;br /&gt;
* &#039;&#039;&#039;Interaction&#039;&#039;&#039; This step involves challenge questions by the verifier to prove that he has a valid token, by playing a part of a [[non-local game]]. In this game, the merchant asks the client to measure in one of the two bases in from which the qubit pairs were chosen. As each qubit pair contains at least one state from each basis chosen, after the measurement one of the qubits (encoded in the basis chosen by the merchant) would give the correct result. &lt;br /&gt;
* &#039;&#039;&#039;Transaction&#039;&#039;&#039; The merchant compares this qubit outcome whose encoding basis matches with merchant&#039;s basis for the game. The merchant accepts the ticket if the ratio of the number of valid outcomes to the total number of qubits measured is more than or equal to a certain threshold fidelity value.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;N=n*r*2&amp;lt;/math&amp;gt;, total number of qubits&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}:&amp;lt;/math&amp;gt; is the tolerance fidelity set by the verifiers&lt;br /&gt;
*&amp;lt;math&amp;gt;F^{cv}_{tol}(r*2) &amp;lt; F^{exp}:&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt; F^{exp}&amp;lt;/math&amp;gt; is the average experimental fidelity&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*Network stage: [[:Category: Quantum Memory Network Stage|quantum memory network]][[Category:Quantum Memory Network Stage]].&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* Challenge questions reveal no information about the token&lt;br /&gt;
* No quantum communication is needed&lt;br /&gt;
* Tokens are remotely verifiable/ classically verifiable&lt;br /&gt;
* A dishonest user is exponentially unlikely to succeed with probability at most, &amp;lt;math&amp;gt;p_d = e^{ND}(2F^{cv}_{tol}-1||2/3)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;(2F^{cv}_{tol}-1)&amp;lt;/math&amp;gt; is the fraction of qubits to be copied in order to forge a ticket and 2/3 is the average fidelity of copies produced by optimal cloning map, D being relative entropy.&lt;br /&gt;
* An honest user is exponentially likely to succeed with probability at least, &amp;lt;math&amp;gt;p^{cv}_h = e^{ND}(F^{exp}||F^{cv}_{tol})&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; Bank (&amp;lt;math&amp;gt;\text{n*r}&amp;lt;/math&amp;gt; qubit pairs), where, qubit-pairs &amp;lt;math&amp;gt;\epsilon_R\{(0,+),(0,-),(1,+),(1,-),(+,0),(-,0),(+,1),(-,1)\}&amp;lt;/math&amp;gt; &amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; (Merchant) accept or reject&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 1&#039;&#039;&#039;&amp;lt;/u&amp;gt; Preparation &amp;lt;/br&amp;gt;&lt;br /&gt;
# Bank prepares Token&amp;lt;math&amp;gt;_S&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;n*r&amp;lt;/math&amp;gt; qubit pairs&lt;br /&gt;
# Bank distributes tickets to clients&lt;br /&gt;
# Bank distributes the classical record of states corresponding to S to trusted verifiers (merchants).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 2&#039;&#039;&#039;&amp;lt;/u&amp;gt; Interaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant asks client to measure a few qubit-pairs(say, a row) in a randomly chosen basis M &amp;lt;math&amp;gt; \epsilon_R \{X,Z\}&amp;lt;/math&amp;gt;&lt;br /&gt;
# Client returns measurement outcome (m) for all qubit pairs asked to measure&lt;br /&gt;
&amp;lt;u&amp;gt;&#039;&#039;&#039;Stage 3&#039;&#039;&#039;&amp;lt;/u&amp;gt; Transaction &amp;lt;/br&amp;gt;&lt;br /&gt;
# Merchant compares the number of qubit pairs with the valid outcome for the qubit which was generated in M basis as k.&lt;br /&gt;
# Merchant accepts if &amp;lt;math&amp;gt;k/(r*2)&amp;gt;F^{cv}_{tol}&amp;lt;/math&amp;gt; else he rejects&lt;br /&gt;
&lt;br /&gt;
==Simulation and benchmark==&lt;br /&gt;
A simulation code for benchmarking the Quantum Token Protocol is available [https://github.com/LiaoChinTe/netsquid-simulation/tree/main/QToken here].&lt;br /&gt;
Hardware parameter analysis can be found in the following [https://cloud.veriqloud.fr/index.php/s/iiw1SxU4D22FyQ7 preprint]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&lt;br /&gt;
# [https://arxiv.org/abs/1705.01428 BOTZKD-QMoney (2018)] replaces qubits with [[coherent states]] and it implements the quantum money on the fly (i.e. without quantum memory). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Shraddha Singh&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=BB84_Quantum_Key_Distribution&amp;diff=4381</id>
		<title>BB84 Quantum Key Distribution</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=BB84_Quantum_Key_Distribution&amp;diff=4381"/>
		<updated>2021-11-12T05:57:12Z</updated>

		<summary type="html">&lt;p&gt;Harold: /* Simulation and benchmark */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
This [https://core.ac.uk/download/pdf/82447194.pdf example protocol] implements the task of [[Quantum Key Distribution]] (QKD). The protocol enables two parties to establish a classical secret key by preparing and measuring qubits. The output of the protocol is a classical secret key which is completely unknown to any third party, namely an eavesdropper. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; [[:Category:Two Party Protocols|Two Party]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]],[[Quantum Key Distribution]], [[Device Independent Quantum Key Distribution|Device Independent QKD]], [[Category:Multi Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]][[Category:Prepare and Measure Network Stage]]&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* &#039;&#039;&#039;Network:&#039;&#039;&#039; we assume the existence of an authenticated public classical channel between Alice and Bob.&lt;br /&gt;
* &#039;&#039;&#039;Timing:&#039;&#039;&#039; we assume that the network is synchronous.&lt;br /&gt;
* &#039;&#039;&#039;Adversarial model:&#039;&#039;&#039; [[coherent attacks]].&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol shares a classical key between two parties, Alice and Bob.&lt;br /&gt;
The BB84 quantum key distribution protocol consists of the following steps:&lt;br /&gt;
*&#039;&#039;&#039;Distribution:&#039;&#039;&#039; This step involves preparation, exchange and measurement of quantum states. For each round of the distribution phase, Alice randomly chooses a basis (a pair of orthogonal states) out of two available bases (X and Z). She then randomly chooses one of the two states and prepares the corresponding quantum state in the chosen basis. She sends the prepared state to Bob. Upon receiving the state, Bob announces that he received the state and randomly chooses to measure in the either of the two available bases (X or Z). The outcomes of the measurements give Bob a string of classical bits. The two parties repeat the above procedure &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; times so that at the end of the distribution phase each of them holds an &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;-bit string.&lt;br /&gt;
*&#039;&#039;&#039;Sifting:&#039;&#039;&#039; Alice and Bob publicly announce their choices of basis and compare them. They discard the rounds in which Bob measured in a different basis than the one prepared by Alice.&lt;br /&gt;
*&#039;&#039;&#039;Parameter estimation:&#039;&#039;&#039;  Alice and Bob use a fraction of the remaining rounds (in which both measured in the same basis) in order to estimate the [[quantum bit error rate]] (QBER).&lt;br /&gt;
*&#039;&#039;&#039;Error correction:&#039;&#039;&#039; Alice and Bob choose a classical error correcting code and publicly communicate in order to correct their string of bits. At the end of this phase Alice and Bob hold the same bit-string.&lt;br /&gt;
*&#039;&#039;&#039;Privacy amplification:&#039;&#039;&#039; Alice and Bob use an [[extractor]] on the previously established string to generate a smaller but completely secret string of bits, which is the final key.&lt;br /&gt;
&lt;br /&gt;
==Requirements ==&lt;br /&gt;
*&#039;&#039;&#039;Network Stage:&#039;&#039;&#039; [[:Category:Prepare and Measure Network Stage|Prepare and Measure]]&lt;br /&gt;
*&#039;&#039;&#039;Relevant Network Parameters:&#039;&#039;&#039; transmission error &amp;lt;math&amp;gt;\epsilon_T&amp;lt;/math&amp;gt;, measurement error &amp;lt;math&amp;gt;\epsilon_M&amp;lt;/math&amp;gt; (see [[:Category:Prepare and Measure Network Stage|Prepare and Measure]])&lt;br /&gt;
*&#039;&#039;&#039;Benchmark values:&#039;&#039;&#039;&lt;br /&gt;
**Minimum number of rounds ranging from &amp;lt;math&amp;gt;\mathcal{O}(10^2)&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;\mathcal{O}(10^5)&amp;lt;/math&amp;gt; depending on the network parameters &amp;lt;math&amp;gt;\epsilon_T,\epsilon_M&amp;lt;/math&amp;gt;, for commonly used security parameters.&lt;br /&gt;
**&amp;lt;math&amp;gt;QBER \leq 0.11&amp;lt;/math&amp;gt;, taking a depolarizing model as benchmark. Parameters satisfying &amp;lt;math&amp;gt; \epsilon_T+\epsilon_M\leq 0.11&amp;lt;/math&amp;gt; are sufficient to asymptotically get positive secret key rate.&lt;br /&gt;
*requires [[random number generator]].&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
*&amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; number of total rounds of the protocol.&lt;br /&gt;
*&amp;lt;math&amp;gt;\ell&amp;lt;/math&amp;gt; size of the secret key.&lt;br /&gt;
*&amp;lt;math&amp;gt;X_i, Y_i&amp;lt;/math&amp;gt; bits of input of Alice and Bob, respectively, that define the measurement basis.&lt;br /&gt;
*&amp;lt;math&amp;gt;A_i,B_i&amp;lt;/math&amp;gt; bits of output of Alice and Bob, respectively.&lt;br /&gt;
*&amp;lt;math&amp;gt;Z_1^n&amp;lt;/math&amp;gt; is a shorthand notation for the string &amp;lt;math&amp;gt;Z_1,\ldots, Z_n&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&amp;lt;math&amp;gt;K_A,K_B&amp;lt;/math&amp;gt; final key of Alice and Bob, respectively.&lt;br /&gt;
*&amp;lt;math&amp;gt;Q_X&amp;lt;/math&amp;gt; is the quantum bit error rate QBER in the &amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
*&amp;lt;math&amp;gt;Q_Z&amp;lt;/math&amp;gt; is the quantum bit error rate QBER in the &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt; basis estimated prior to the protocol.&lt;br /&gt;
*&amp;lt;math&amp;gt;H&amp;lt;/math&amp;gt; is the Hadamard gate. &amp;lt;math&amp;gt;H^{0} = I, H^{1} = H&amp;lt;/math&amp;gt;.&lt;br /&gt;
*&amp;lt;math&amp;gt;\gamma&amp;lt;/math&amp;gt; is the probability that Alice (Bob) prepares (measures) a qubit in the &amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt; basis.&lt;br /&gt;
*&amp;lt;math&amp;gt;\epsilon_{\rm EC}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\epsilon&#039;_{\rm EC}&amp;lt;/math&amp;gt; are the error probabilities of the error correction protocol.&lt;br /&gt;
*&amp;lt;math&amp;gt;\epsilon_{\rm PA}&amp;lt;/math&amp;gt; is the error probability of the privacy amplification protocol.&lt;br /&gt;
*&amp;lt;math&amp;gt;\epsilon_{\rm PE}&amp;lt;/math&amp;gt; is the error probability of the parameter estimation.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
The protocol implements &amp;lt;math&amp;gt;(n,\epsilon_{\rm corr},\epsilon_{\rm sec},\ell)&amp;lt;/math&amp;gt;-QKD, which means that it generates an &amp;lt;math&amp;gt;\epsilon_{\rm corr}&amp;lt;/math&amp;gt;-correct, &amp;lt;math&amp;gt;\epsilon_{\rm sec}&amp;lt;/math&amp;gt;-secret key of length &amp;lt;math&amp;gt;\ell&amp;lt;/math&amp;gt; in &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt; rounds. The security parameters of this protocol are given by&lt;br /&gt;
&amp;lt;math&amp;gt;\epsilon_{\rm corr}=\epsilon_{\rm EC},\ &lt;br /&gt;
\epsilon_{\rm sec}= \epsilon_{\rm PA}+\epsilon_{\rm PE},&amp;lt;/math&amp;gt;&lt;br /&gt;
and the amount of key &amp;lt;math&amp;gt;\ell&amp;lt;/math&amp;gt; that is generated is given by&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;math&amp;gt;  \begin{align}&lt;br /&gt;
\ell \geq &amp;amp; (1-\gamma)^2n (1-h(Q_X+\nu) -h(Q_Z)) \\ &amp;amp;-\sqrt{(1-\gamma)^2n}\big(4\log(2\sqrt{2}+1)(\sqrt{\log\frac{2}{\epsilon_{\rm PE}^2}}+ \sqrt{\log \frac{8}{{\epsilon&#039;}_{\rm EC}^2}})) \\&amp;amp; -\log(\frac{8}{{\epsilon&#039;}_{\rm EC}^2}+\frac{2}{2-\epsilon&#039;_{\rm EC}})-\log (\frac{1}{\epsilon_{\rm EC}})- 2\log(\frac{1}{2\epsilon_{\rm PA}}) &lt;br /&gt;
\end{align}&lt;br /&gt;
&amp;lt;/math&amp;gt; &lt;br /&gt;
&amp;lt;/br&amp;gt;where &amp;lt;math&amp;gt;\nu = \sqrt{ \frac{(1+\gamma^2n)((1-\gamma)^2+\gamma^2)}{(1-\gamma)^2\gamma^4n^2}\log(\frac{1}{\epsilon_{\rm PE}}})&amp;lt;/math&amp;gt;&lt;br /&gt;
and &amp;lt;math&amp;gt;h(\cdot)&amp;lt;/math&amp;gt; is the [[binary entropy function]]. &lt;br /&gt;
&lt;br /&gt;
In the above equation for key length, the parameters &amp;lt;math&amp;gt;\epsilon_{\rm EC}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\epsilon&#039;_{\rm EC}&amp;lt;/math&amp;gt; are error probabilities of the classical error correction subroutine. At the end of the error correction step, if the protocol does not abort, then Alice and Bob share equal strings of bits with probability at least &amp;lt;math&amp;gt;1-\epsilon_{\rm EC}&amp;lt;/math&amp;gt;. The parameter &amp;lt;math&amp;gt;\epsilon&#039;_{\rm EC}&amp;lt;/math&amp;gt; is related with the completeness of the error correction subroutine, namely that for an honest implementation, the error correction protocol aborts with probability at most &amp;lt;math&amp;gt;\epsilon&#039;_{\rm EC}+\epsilon_{\rm EC}&amp;lt;/math&amp;gt;. &lt;br /&gt;
The parameter &amp;lt;math&amp;gt;\epsilon_{\rm PA}&amp;lt;/math&amp;gt; is the error probability of the privacy amplification subroutine and &amp;lt;math&amp;gt;\epsilon_{\rm PE}&amp;lt;/math&amp;gt; is the error probability of the parameter estimation subroutine used to estimate &amp;lt;math&amp;gt;Q_X&amp;lt;/math&amp;gt; &lt;br /&gt;
(see [[Quantum Key Distribution]] for the precise security definition).&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
*&#039;&#039;&#039;Input:&#039;&#039;&#039;&amp;lt;math&amp;gt;n, \gamma, \epsilon_{\rm PA},\epsilon_{\rm PE},\epsilon_{\rm EC},\epsilon&#039;_{\rm EC},Q_Z&amp;lt;/math&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Output:&#039;&#039;&#039;&amp;lt;math&amp;gt;K_A, K_B&amp;lt;/math&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;1.&#039;&#039;&#039; Distribution and measurement&lt;br /&gt;
#For  &amp;lt;math&amp;gt;i=1,...,n&amp;lt;/math&amp;gt;&lt;br /&gt;
##  Alice chooses random bits &amp;lt;math&amp;gt;X_i\in\{0,1\}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;A_i\in_R\{0,1\}&amp;lt;/math&amp;gt; such that &amp;lt;math&amp;gt;P(X_i=1)=\gamma&amp;lt;/math&amp;gt;&lt;br /&gt;
##  Alice prepares &amp;lt;math&amp;gt;H^{X_i}|A_i\rangle&amp;lt;/math&amp;gt; and sends it to Bob&lt;br /&gt;
##  Bob announces receiving a state&lt;br /&gt;
##  Bob chooses bit &amp;lt;math&amp;gt;Y_i\in_R\{0,1\}&amp;lt;/math&amp;gt; such that &amp;lt;math&amp;gt;P(Y_i=1)=\gamma&amp;lt;/math&amp;gt;&lt;br /&gt;
##  Bob measures &amp;lt;math&amp;gt;H^{X_i}|A_i\rangle&amp;lt;/math&amp;gt; in basis &amp;lt;math&amp;gt;\{H^{Y_i}|0\rangle, H^{Y_i}|1\rangle\}&amp;lt;/math&amp;gt; with outcome &amp;lt;math&amp;gt;B_i&amp;lt;/math&amp;gt;&lt;br /&gt;
&#039;&#039;At this stage Alice holds strings &amp;lt;math&amp;gt;X_1^n, A_1^n&amp;lt;/math&amp;gt; and Bob &amp;lt;math&amp;gt;Y_1^n, B_1^n&amp;lt;/math&amp;gt;, all of length &amp;lt;math&amp;gt;n&amp;lt;/math&amp;gt;.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2.&#039;&#039;&#039; Sifting  &lt;br /&gt;
#Alice and Bob publicly announce &amp;lt;math&amp;gt;X_1^n, Y_1^n&amp;lt;/math&amp;gt;&lt;br /&gt;
#For  &amp;lt;math&amp;gt;i=1,...,n&amp;lt;/math&amp;gt;&lt;br /&gt;
##	If &amp;lt;math&amp;gt;X_i=Y_i&amp;lt;/math&amp;gt;&lt;br /&gt;
###	&amp;lt;math&amp;gt;A_1^{n&#039;} = A_1^{n&#039;}.&amp;lt;/math&amp;gt;append&amp;lt;math&amp;gt;(A_i)&amp;lt;/math&amp;gt;&lt;br /&gt;
###	&amp;lt;math&amp;gt;B_1^{n&#039;} = B_1^{n&#039;}.&amp;lt;/math&amp;gt;append&amp;lt;math&amp;gt;(B_i)&amp;lt;/math&amp;gt;&lt;br /&gt;
###	&amp;lt;math&amp;gt;X_1^{n&#039;} = X_1^{n&#039;}.&amp;lt;/math&amp;gt;append&amp;lt;math&amp;gt;(X_i)&amp;lt;/math&amp;gt;&lt;br /&gt;
###	&amp;lt;math&amp;gt;Y_1^{n&#039;} = Y_1^{n&#039;}.&amp;lt;/math&amp;gt;append&amp;lt;math&amp;gt;(Y_i)&amp;lt;/math&amp;gt;&lt;br /&gt;
&#039;&#039;Now Alice holds strings &amp;lt;math&amp;gt;X_1^{n&#039;}, A_1^{n&#039;}&amp;lt;/math&amp;gt; and Bob &amp;lt;math&amp;gt;Y_1^{n&#039;}, B_1^{n&#039;}&amp;lt;/math&amp;gt;, all of length &amp;lt;math&amp;gt;n&#039;\leq n&amp;lt;/math&amp;gt;.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3.&#039;&#039;&#039; Parameter estimation&lt;br /&gt;
# Set size&amp;lt;math&amp;gt;Q&amp;lt;/math&amp;gt; = 0&lt;br /&gt;
#For &amp;lt;math&amp;gt;i=1,...,n&#039;&amp;lt;/math&amp;gt;&lt;br /&gt;
##	If &amp;lt;math&amp;gt;X_i = Y_i = 1&amp;lt;/math&amp;gt;&lt;br /&gt;
###	Alice and Bob publicly announce &amp;lt;math&amp;gt;A_i, B_i&amp;lt;/math&amp;gt;&lt;br /&gt;
###	Alice and Bob compute &amp;lt;math&amp;gt;Q_i = 1 - \delta_{A_iB_i}&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\delta_{A_iB_i}&amp;lt;/math&amp;gt; is the Kronecker delta&lt;br /&gt;
##	size&amp;lt;math&amp;gt;Q&amp;lt;/math&amp;gt; += 1;&lt;br /&gt;
#Both Alice and Bob, each, compute &amp;lt;math&amp;gt;Q_X = \frac{1}{\text{size}Q} \sum_{i=1}^{n&#039;}Q_i&amp;lt;/math&amp;gt;&amp;lt;/br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;4.&#039;&#039;&#039; Error correction&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;lt;math&amp;gt;C(\cdot,\cdot)&amp;lt;/math&amp;gt; is an error correction subroutine (see [[BB84 Quantum Key Distribution #References| [9]]]) determined by the previously estimated value of &amp;lt;math&amp;gt;Q_Z&amp;lt;/math&amp;gt; and with error parameters  &amp;lt;math&amp;gt;\epsilon&#039;_{\rm EC}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\epsilon_{\rm EC}&amp;lt;/math&amp;gt;&lt;br /&gt;
#Both Alice and Bob run &amp;lt;math&amp;gt;C(A_1^{n&#039;},B_1^{n&#039;})&amp;lt;/math&amp;gt;&#039;&#039;. &lt;br /&gt;
#Bob obtains &amp;lt;math&amp;gt;\tilde{B}_1^{n&#039;}&amp;lt;/math&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;5.&#039;&#039;&#039; Privacy amplification&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;lt;math&amp;gt;PA(\cdot,\cdot)&amp;lt;/math&amp;gt; is a privacy amplification subroutine (see [[BB84 Quantum Key Distribution #References| [10]]]) determined by the size &amp;lt;math&amp;gt;\ell&amp;lt;/math&amp;gt;, computed from equation for key length &amp;lt;math&amp;gt;\ell&amp;lt;/math&amp;gt; (see [[Quantum Key Distribution#Properties|Properties]]), and  with secrecy parameter &amp;lt;math&amp;gt;\epsilon_{\rm PA}&amp;lt;/math&amp;gt;&#039;&#039;&lt;br /&gt;
#Alice and Bob run &amp;lt;math&amp;gt;PA(A_1^{n&#039;},\tilde{B}_1^{n&#039;})&amp;lt;/math&amp;gt; and obtain secret keys &amp;lt;math&amp;gt;K_A, K_B&amp;lt;/math&amp;gt;;&lt;br /&gt;
&lt;br /&gt;
==Simulation and benchmark==&lt;br /&gt;
A simulation code for benchmarking the QKD protocol is available [https://github.com/LiaoChinTe/netsquid-simulation/tree/main/QKD/E91 here].&lt;br /&gt;
Hardware parameter analysis can be found in the following [https://cloud.veriqloud.fr/index.php/s/iiw1SxU4D22FyQ7 preprint]&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
# [https://core.ac.uk/download/pdf/82447194.pdf BB(1984)] introduces the BB84 protocol, as the name says, by Charles Bennett and Gilles Brassard.&lt;br /&gt;
# [https://quantum-journal.org/papers/q-2017-07-14-14/ TL(2017)] The derivation of the key length in [[BB84 Quantum Key Distribution#Properties|Properties]], combines the techniques developed in this article and minimum leakage error correcting codes.&lt;br /&gt;
# [https://tspace.library.utoronto.ca/bitstream/1807/10010/1/Lo_6438_2610.pdf GL03] gives an extended analysis of the BB84 in the finite regime.&lt;br /&gt;
# Sifting: the BB84 protocol can also be described in a symmetric way. This means that the inputs &amp;lt;math&amp;gt;0&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt; are chosen with the same probability. In that case only &amp;lt;math&amp;gt;1/2&amp;lt;/math&amp;gt; of the generated bits are discarded during the sifting process. Indeed, in the symmetric protocol, Alice and Bob measure in the same basis in about half of the rounds. &lt;br /&gt;
# [https://dl.acm.org/citation.cfm?id=1058094 LCA05] the asymmetric protocol was introduced to make this more efficient protocol presented in this article.&lt;br /&gt;
# A post-processing of the key using 2-way classical communication, denoted [[Advantage distillation]], can increase the QBER tolerance  up to &amp;lt;math&amp;gt;18.9\%&amp;lt;/math&amp;gt; (3).&lt;br /&gt;
# We remark that in [[BB84 Quantum Key Distribution#Pseudo Code|Pseudo Code]], the QBER in the &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt; basis is not estimated during the protocol. Instead Alice and Bob make use of a previous estimate for the value of &amp;lt;math&amp;gt;Q_Z&amp;lt;/math&amp;gt; and the error correction step, Step 4 in the pseudo-code, will make sure that this estimation is correct. Indeed, if the real QBER is higher than the estimated value &amp;lt;math&amp;gt;Q_Z&amp;lt;/math&amp;gt;, [[BB84 Quantum Key Distribution#Pseudo Code|Pseudo Code]] will abort in the Step 4 with very high probability.&lt;br /&gt;
# The BB84 can be equivalently implemented by distributing [[EPR pairs]] and Alice and Bob making measurements in the &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;X&amp;lt;/math&amp;gt; basis, however this required a [[entanglement distribution]] network stage.&lt;br /&gt;
#[https://doi.org/10.1007/3-540-48285-7_35 Secret-Key Reconciliation by Public Discussion]&lt;br /&gt;
#[https://arxiv.org/abs/quant-ph/0512258 Security of Quantum Key Distribution]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Bas Dirke, Victoria Lipinska, Gláucia Murta and Jérémy Ribeiro&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=User:Harold&amp;diff=4138</id>
		<title>User:Harold</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=User:Harold&amp;diff=4138"/>
		<updated>2019-11-10T21:26:54Z</updated>

		<summary type="html">&lt;p&gt;Harold: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Harold Ollivier&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=User:Harold&amp;diff=4137</id>
		<title>User:Harold</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=User:Harold&amp;diff=4137"/>
		<updated>2019-11-10T21:26:20Z</updated>

		<summary type="html">&lt;p&gt;Harold: Created page with &amp;quot;Harold can be contacted at harold.ollivier@mines.org&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Harold can be contacted at harold.ollivier@mines.org&lt;/div&gt;</summary>
		<author><name>Harold</name></author>
	</entry>
</feed>