Subsequently, weexamineavarietyofchallengedemonstrationscenarios that illustratethepotentialtechnologies that can berealizedthrough the technologicaladvances that we project.
While such systems might work for transmissions between trusted parties (such as between spies serving the same nation) who both examine the materials in private locations and subsequently want the materials to be destroyed, they do not work for sharing with untrusted parties or parties who may view the materials in public.