Protocol Library: Difference between revisions
Jump to navigation
Jump to search
m (Added link to Copy Protection for Compute and Compare Programs) |
(Add a protocol page to the Entanglement Routing Functionality) |
||
Line 10: | Line 10: | ||
|rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]] | |rowspan="1"|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]] | ||
|- | |- | ||
|rowspan=" | |rowspan="5"|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]] | ||
|- | |||
|[[Polynomial Code based Quantum Authentication]] | |||
|- | |||
|[[Clifford Code for Quantum Authentication]] | |||
|- | |||
|[[Trap Code for Quantum Authentication]] | |||
|- | |||
|[[Naive approach using Quantum Teleportation]] | |||
|- | |- | ||
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]] | ||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]] | ||
Line 134: | Line 142: | ||
||-||[[Weak String Erasure]] | ||-||[[Weak String Erasure]] | ||
|- | |- | ||
|rowspan=" | |rowspan="2"|[[Entanglement Routing]]||[[Routing Entanglement in the Quantum Internet]] | ||
|- | |||
|[[Distributing Graph States Over Arbitrary Quantum Networks]] |