Write, autoreview, editor, reviewer
3,129
edits
Line 45: | Line 45: | ||
===Adversarial Assumption=== | ===Adversarial Assumption=== | ||
* This protocol is secure against | * This protocol is secure against malicious adversary setting | ||
===Setup Assumptions=== | ===Setup Assumptions=== | ||
* Protocols 1a-1c need Client to be able to prepare given initial quantum states | * Protocols 1a-1c need Client to be able to prepare given initial quantum states |