Submissions: Difference between revisions

124 bytes added ,  14 November 2018
m
Line 25: Line 25:
----
----
*All setup assumptions taken into account for this protocol should be mentioned here. </br> For e.g. classical or quantum authenticated channel
*All setup assumptions taken into account for this protocol should be mentioned here. </br> For e.g. classical or quantum authenticated channel
*Assumption on the adversary
*Assumptions on adversary. A link to the [[security definitions|security definitions]] section on the supplementary information page should be provided.


===Outline===
===Outline===
Write, autoreview, editor, reviewer
3,129

edits