Write, autoreview, editor, reviewer
3,129
edits
m (→Properties) |
m (→Assumptions) |
||
Line 25: | Line 25: | ||
---- | ---- | ||
*All setup assumptions taken into account for this protocol should be mentioned here. </br> For e.g. classical or quantum authenticated channel | *All setup assumptions taken into account for this protocol should be mentioned here. </br> For e.g. classical or quantum authenticated channel | ||
* | *Assumptions on adversary. A link to the [[security definitions|security definitions]] section on the supplementary information page should be provided. | ||
===Outline=== | ===Outline=== |