Quantum Identity Authentication: Difference between revisions

no edit summary
No edit summary
No edit summary
 
Line 3: Line 3:
==Properties==
==Properties==
*The security of the protocol requires that no sensitive information is exchanged during its execution can leak to the eavesdropper.
*The security of the protocol requires that no sensitive information is exchanged during its execution can leak to the eavesdropper.
==Knowledge Graph==
{{graph}}
==References==
==References==
#[https://www.sciencedirect.com/science/article/pii/0022000081900337 Wegman and Carter (1981)]
#[https://www.sciencedirect.com/science/article/pii/0022000081900337 Wegman and Carter (1981)]
299

edits