implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|\\\psi \\\rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{\\\text{guess}}[S|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[S=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
$$P_{\\\text{guess}}[R|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[R=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
where $\\\mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ t \\\leq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|\\\psi \\\rangle$.
No content has been added to this section, yet!
| Description | Link |
|---|---|
| Implementation of GHZ-based Quantum Anonymous Transmission using Netsquid. | Link |
implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|\\\psi \\\rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{\\\text{guess}}[S|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[S=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
$$P_{\\\text{guess}}[R|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[R=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
where $\\\mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ t \\\leq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|\\\psi \\\rangle$.
No content has been added to this section, yet!
| Description | Link |
|---|---|
| Implementation of GHZ-based Quantum Anonymous Transmission using Netsquid. | Link |
implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|psi rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{\\\text{guess}}[S|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[S=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
$$P_{\\\text{guess}}[R|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[R=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
where $\\\mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ t \\\leq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|\\\psi \\\rangle$.
No content has been added to this section, yet!
| Description | Link |
|---|---|
| Implementation of GHZ-based Quantum Anonymous Transmission using Netsquid. | Link |
implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|psi rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{\\\text{guess}}[S|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[S=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
$$P_{\\\text{guess}}[R|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[R=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
where $\\\mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ t \\\leq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|\\\psi \\\rangle$.
No content has been added to this section, yet!
| Description | Link |
|---|---|
| Implementation of GHZ-based Quantum Anonymous Transmission using Netsquid. | Link |
need to add
implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|psi rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{\\\text{guess}}[S|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[S=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
$$P_{\\\text{guess}}[R|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[R=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
where $\\\mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ t \\\leq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|\\\psi \\\rangle$.
No content has been added to this section, yet!
| Description | Link |
|---|---|
| Implementation of GHZ-based Quantum Anonymous Transmission using Netsquid. | Link |
need to add
implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|psi rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{\\\text{guess}}[S|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[S=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
$$P_{\\\text{guess}}[R|C,S\\\notin {\\\mathcal {A}}]\\\leq \\\max _{i \\\in [n]}P[R=i|S\\\notin {\\\mathcal {A}}]={\\\frac {1}{n-t}},$$
where $\\\mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ t \\\leq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|\\\psi \\\rangle$.
No content has been added to this section, yet!
implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|psi rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{text{guess}}[S|C,Snotin {mathcal {A}}]leq max _{iin [n]}P[S=i|Snotin {mathcal {A}}]={frac {1}{n-t}},$$
$$P_{text{guess}}[R|C,Snotin {mathcal {A}}]leq max _{iin [n]}P[R=i|Snotin {mathcal {A}}]={frac {1}{n-t}},$$
where $mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ tleq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|psirangle$.
No content has been added to this section, yet!
implements Anonymous Transmission
This protocol implements the task of Anonymous Transmission in a multiple node quantum network. The protocol uses $n$-partite GHZ state to enable two nodes, sender and receiver, to establish a link which they use to transmit a quantum message. Importantly, the quantum message is transmitted in a way that the identity of the sender is unknown to every other node, and the identity of the receiver is known only to the sender.
The presented GHZ-based quantum anonymous transmission protocol is based on the work of [6]. The goal of the protocol is to transmit a quantum state $|psi rangle$ from the sender $S$ to the receiver $R$, while keeping the identities of $S$ and $R$ anonymous. We assume that there is exactly one receiver which is determined before the start of the protocol. The protocol consists of the following steps:
See Quantum Anonymous Transmission for the precise security definition. Pseudocode given below implements secure anonymous transmission, i.e. it hides the identities of the sender and the receiver from other nodes in the network. That is, the maximum probability that adversaries guess the identity of $S$ or $R$ given all the classical and quantum information they have available at the end of the protocol is no larger than the uncertainty the adversaries have about the identities of $S$ and $R$ before the protocol begins. More formally, the anonymous transmission protocol with the GHZ state is sender- and receiver-secure:
$$ P_{text{guess}}[S|C,Snotin {mathcal {A}}]leq max _{iin [n]}P[S=i|Snotin {mathcal {A}}]={frac {1}{n-t}},$$
$$P_{text{guess}}[R|C,Snotin {mathcal {A}}]leq max _{iin [n]}P[R=i|Snotin {mathcal {A}}]={frac {1}{n-t}},$$
where $mathcal {A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries. Note that this implies that the protocol is also trace-less, since even if the adversary hijacks any $ tleq n-2$ players and gains access to all of their classical and quantum information after the end of the protocol, she cannot learn the identities of $S$ and $R$. For a formal argument see [6].
Receiver $R$ is determined before the start of the protocol. $S$ holds a message qubit $|psirangle$.
No content has been added to this section, yet!