Protocol Library: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(5 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
'''[https://scholar.googleusercontent.com/scholar.bib?q=info:1tFUyiAGSicJ:scholar.google.com/&output=citation&scisdr=ClH3gw_SEOypwjKNmnk:AFWwaeYAAAAAZaWLgnmyQj9Db57Zdp6fbpm8Gmc&scisig=AFWwaeYAAAAAZaWLgnf5EfmL2FMU4hgCdbiauQw&scisf=4&ct=citation&cd=-1&hl=en| Cite Us]''' | |||
{| class="wikitable" | {| class="wikitable" | ||
!width="40%"|Functionality | !width="40%"|Functionality | ||
Line 10: | Line 11: | ||
|rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]] | |rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]] | ||
|- | |- | ||
|rowspan=" | |rowspan="7"|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]] | ||
|- | |- | ||
|[[Polynomial Code based Quantum Authentication]] | |[[Polynomial Code based Quantum Authentication]] | ||
Line 17: | Line 18: | ||
|- | |- | ||
|[[Trap Code for Quantum Authentication]] | |[[Trap Code for Quantum Authentication]] | ||
|- | |||
|[[Auth-QFT-Auth Scheme for Quantum Authentication]] | |||
|- | |||
|[[Unitary Design Scheme for Quantum Authentication]] | |||
|- | |- | ||
|[[Naive approach using Quantum Teleportation]] | |[[Naive approach using Quantum Teleportation]] | ||
Line 70: | Line 75: | ||
|[[Wiesner Quantum Money]] | |[[Wiesner Quantum Money]] | ||
|- | |- | ||
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]] | |rowspan="2"|[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]] | ||
|- | |||
|[[Device-Independent Oblivious Transfer]] | |||
|- | |- | ||
|rowspan="10"| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]] | |rowspan="10"| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]] | ||
Line 132: | Line 139: | ||
|[[Classical Verification of Universal Quantum Computation]] | |[[Classical Verification of Universal Quantum Computation]] | ||
|- | |- | ||
|rowspan=" | |rowspan="5"|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]] | ||
|- | |- | ||
|[[Travelling Ballot Based Protocol]] | |[[Travelling Ballot Based Protocol]] | ||
Line 139: | Line 146: | ||
|- | |- | ||
|[[Quantum voting based on conjugate coding]] | |[[Quantum voting based on conjugate coding]] | ||
|- | |||
|[[Practical Quantum Electronic Voting]] | |||
|- | |- | ||
||-||[[Weak String Erasure]] | ||-||[[Weak String Erasure]] | ||
|- | |- | ||
|rowspan=" | |rowspan="3"|[[Entanglement Routing]]||[[Distributed Routing in a Quantum Internet]] | ||
|- | |||
|[[Routing Entanglement in the Quantum Internet]] | |||
|- | |- | ||
|[[Distributing Graph States Over Arbitrary Quantum Networks]] | |[[Distributing Graph States Over Arbitrary Quantum Networks]] | ||
|- | |||
|rowspan="1"|[[Quantum Conference Key Agreement]]||[[Anonymous Conference Key Agreement using GHZ states]] | |||
|- | |||
|rowspan="1"|[[Quantum Encryption with Certified Deletion]]||[[Prepare-and-Measure Certified Deletion]] | |||
|- |