Protocol Library: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(57 intermediate revisions by 12 users not shown) | |||
Line 1: | Line 1: | ||
'''[https://scholar.googleusercontent.com/scholar.bib?q=info:1tFUyiAGSicJ:scholar.google.com/&output=citation&scisdr=ClH3gw_SEOypwjKNmnk:AFWwaeYAAAAAZaWLgnmyQj9Db57Zdp6fbpm8Gmc&scisig=AFWwaeYAAAAAZaWLgnf5EfmL2FMU4hgCdbiauQw&scisf=4&ct=citation&cd=-1&hl=en| Cite Us]''' | |||
{| class="wikitable" | {| class="wikitable" | ||
!width="40%"|Functionality | !width="40%"|Functionality | ||
!width="60%"|Protocols | !width="60%"|Protocols | ||
|- | |- | ||
|rowspan="2"|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]] | |rowspan="2"|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]] | ||
|- | |- | ||
|[[Verifiable Quantum Anonymous Transmission]] | |[[Verifiable Quantum Anonymous Transmission]] | ||
|- | |||
|rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]] | |||
|- | |||
|rowspan="7"|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]] | |||
|- | |||
|[[Polynomial Code based Quantum Authentication]] | |||
|- | |||
|[[Clifford Code for Quantum Authentication]] | |||
|- | |||
|[[Trap Code for Quantum Authentication]] | |||
|- | |||
|[[Auth-QFT-Auth Scheme for Quantum Authentication]] | |||
|- | |||
|[[Unitary Design Scheme for Quantum Authentication]] | |||
|- | |||
|[[Naive approach using Quantum Teleportation]] | |||
|- | |||
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]] | |||
|- | |- | ||
||[[Bit Commitment]]||[[Quantum Bit Commitment]] | ||[[Bit Commitment]]||[[Quantum Bit Commitment]] | ||
|- | |- | ||
||[[Coin Flipping]]||[[Quantum Coin Flipping]] | |rowspan="2"|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]] | ||
|- | |||
|[[Quantum Weak Coin Flipping]] | |||
|- | |- | ||
|[[Copy Protection]]||[[Copy Protection of Compute and Compare Programs]] | |||
|- | |||
|rowspan="8"|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]] | |rowspan="8"|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]] | ||
|- | |- | ||
Line 29: | Line 50: | ||
|- | |- | ||
|[[Quantum Proxy Signature]] | |[[Quantum Proxy Signature]] | ||
|- | |||
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]] | |||
|- | |- | ||
||[[Fingerprinting]]||[[Quantum Fingerprinting]] | ||[[Fingerprinting]]||[[Quantum Fingerprinting]] | ||
|- | |||
|[[Quantum Identity Authentication]]||[[-]] | |||
|- | |- | ||
|rowspan="4"|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]] | |rowspan="4"|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]] | ||
Line 50: | Line 75: | ||
|[[Wiesner Quantum Money]] | |[[Wiesner Quantum Money]] | ||
|- | |- | ||
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]] | |rowspan="2"|[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]] | ||
|- | |||
|[[Device-Independent Oblivious Transfer]] | |||
|- | |||
|rowspan="10"| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]] | |||
|- | |||
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]] | |||
|- | |||
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]] | |||
|- | |||
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]] | |||
|- | |||
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]] | |||
|- | |||
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]] | |||
|- | |- | ||
|rowspan=" | |[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]] | ||
|- | |||
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]] | |||
|- | |||
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]] | |||
|- | |||
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]] | |||
|- | |||
|rowspan="2"| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]] | |||
|- | |||
|[[Verifiable Quantum Secret Sharing]] | |||
|- | |||
|rowspan="5"| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]] | |||
|- | |- | ||
|[[Measurement-Only Universal Blind Quantum Computation]] | |[[Measurement-Only Universal Blind Quantum Computation]] | ||
|- | |- | ||
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]] | | [[Prepare-and-Send Quantum Fully Homomorphic Encryption]] | ||
|- | |- | ||
|[[Prepare-and-Send Universal Blind Quantum Computation]] | |[[Prepare-and-Send Universal Blind Quantum Computation]] | ||
|- | |- | ||
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]] | |[[Pseudo-Secret Random Qubit Generator (PSQRG)]] | ||
|- | |- | ||
|rowspan=" | |rowspan="3"|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]] | ||
|- | |- | ||
|[[ | |[[Measurement-Only Verifiable Universal Blind Quantum Computation]] | ||
|- | |- | ||
|[[ | |[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]] | ||
|- | |- | ||
|rowspan="2"|[[Secure | |rowspan="2"|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]] | ||
|- | |- | ||
|[[Secure Multiparty Delegated Classical Computation]] | |[[Secure Multiparty Delegated Classical Computation]] | ||
|- | |- | ||
|[[Secure Multiparty Delegated Quantum Computation]] | |rowspan="2"|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]] | ||
|- | |||
|[[Secure Multiparty Delegated Classical Computation]] | |||
|- | |- | ||
|rowspan="2"|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]] | |rowspan="2"|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]] | ||
|- | |- | ||
|[[Gate Teleporation]] | |[[Gate Teleporation]] | ||
|- | |||
|rowspan="4"|[[Verification of Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]] | |||
|- | |||
|[[Verification of NP-complete problems]] | |||
|- | |||
|[[Verification of Sub-Universal Quantum Computation]] | |||
|- | |||
|[[Classical Verification of Universal Quantum Computation]] | |||
|- | |||
|rowspan="5"|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]] | |||
|- | |||
|[[Travelling Ballot Based Protocol]] | |||
|- | |||
|[[Distributed Ballot Based Protocol]] | |||
|- | |||
|[[Quantum voting based on conjugate coding]] | |||
|- | |||
|[[Practical Quantum Electronic Voting]] | |||
|- | |- | ||
||-||[[Weak String Erasure]] | ||-||[[Weak String Erasure]] | ||
|- | |- | ||
|rowspan="3"|[[Entanglement Routing]]||[[Distributed Routing in a Quantum Internet]] | |||
|- | |||
|[[Routing Entanglement in the Quantum Internet]] | |||
|- | |||
|[[Distributing Graph States Over Arbitrary Quantum Networks]] | |||
|- | |||
|rowspan="1"|[[Quantum Conference Key Agreement]]||[[Anonymous Conference Key Agreement using GHZ states]] | |||
|- | |- | ||
||[[Quantum | |rowspan="1"|[[Quantum Encryption with Certified Deletion]]||[[Prepare-and-Measure Certified Deletion]] | ||
|- | |- | ||