Editing Quantum Identity Authentication
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
==Properties== | ==Properties== | ||
*The security of the protocol requires that no sensitive information is exchanged during its execution can leak to the eavesdropper. | *The security of the protocol requires that no sensitive information is exchanged during its execution can leak to the eavesdropper. | ||
==References== | ==References== | ||
#[https://www.sciencedirect.com/science/article/pii/0022000081900337 Wegman and Carter (1981)] | #[https://www.sciencedirect.com/science/article/pii/0022000081900337 Wegman and Carter (1981)] |