Write
14
edits
Line 7: | Line 7: | ||
==Assumptions== | ==Assumptions== | ||
* '''Network:''' The network consists of n nodes that are fully identified and completely connected with pairwise authenticated classical channels. Additionally, there is a secure classical broadcast channel. | * '''Network:''' The network consists of n nodes that are fully identified and completely connected with pairwise authenticated classical channels. Additionally, there is a secure classical broadcast channel. | ||
* '''Adversarial model:''' | * '''Adversarial model:''' It suffices for one party to be honest. A dishonest party can be in control of the source. | ||
==Outline== | ==Outline== |