Write, autoreview, editor, reviewer
3,129
edits
Line 32: | Line 32: | ||
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin. | **Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin. | ||
== | ==Protocol Description== | ||
'''Stage 1: Quantum coin generation'''<br> | '''Stage 1: Quantum coin generation'''<br> | ||
''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br> | ''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br> |