2021
DOI: 10.1007/s11128-021-03339-y
|View full text |Cite
|
Sign up to set email alerts
|

Quantum anonymous notification for network-based applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Each participant outputs a private bit that indicates whether or not they have been notified at least once. The value of the bit is correctly calculated with a probability exponentially close to 1 [ 14 , 32 , 33 ].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Each participant outputs a private bit that indicates whether or not they have been notified at least once. The value of the bit is correctly calculated with a probability exponentially close to 1 [ 14 , 32 , 33 ].…”
Section: Methodsmentioning
confidence: 99%
“…Hence, a W-state-based quantum anonymous transmission protocol that outperformed the GHZ state-based and entanglement relay-based protocols in the presence of noise was proposed [ 9 ]. To date, various anonymous quantum communication protocols have been proposed based on single particles, Bell states, GHZ states, and W states [ 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. In order to employ these protocols in practical network scenarios, they must be able to provide the desired communication task under the presence of adversaries and a noisy environment.…”
Section: Introductionmentioning
confidence: 99%
“…This change in the global state can be detected either by a global measurement or local measurements with partial announcement of results. This concept has been used to provide anonymity in several networking tasks including anonymous transmission of classical bits [119], qubits [120], [121], anonymous ranking [122], anonymous notification [123], anonymous collision detection [124], and anonymous private information retrieval [125]. One prominent feature of these protocols is the guarantee of anonymity even when all network messages are moni- tored by an adversary and/or a malicious agent controls a major part of the network.…”
Section: ) Beyond-qkd Applicationsmentioning
confidence: 99%
“…This change in the global state can be detected either by a global measurement or local measurements with partial announcement of results. This concept has been used to provide anonymity in several networking tasks including anonymous transmission of classical bits [44], qubits [45], [46], anonymous ranking [47], anonymous notification [48], anonymous collision detection [49], and anonymous private information retrieval [50]. One prominent feature of these protocols is the guarantee of anonymity even when all network messages are monitored by an adversary and/or a malicious agent controls a major part of the network.…”
Section: Beyond-qkd Applicationsmentioning
confidence: 99%