Write
262
edits
No edit summary |
|||
Line 6: | Line 6: | ||
* We assume the existence of an authenticated public classical channel between the two parties | * We assume the existence of an authenticated public classical channel between the two parties | ||
* We assume synchronous network between parties | * We assume synchronous network between parties | ||
* | * Adversarial model: [[coherent attacks]] | ||
==Outline== | ==Outline== | ||
The protocol shares a classical between two parties, Alice and Bob. | The protocol shares a classical between two parties, Alice and Bob. |