Write, autoreview, editor, reviewer
3,129
edits
m (→Structure) |
|||
Line 13: | Line 13: | ||
Bridges the gap between users and protocol designers. | Bridges the gap between users and protocol designers. | ||
*'''Requirements'''</br> | *'''Requirements'''</br> | ||
#Network Stage: | #Network Stage: | ||
Line 21: | Line 18: | ||
---- | ---- | ||
*'''Example:''' link to the example paper to be discussed below is provided here | *'''Example:''' link to the example paper to be discussed below is provided here | ||
---- | |||
*'''Outline'''</br> | |||
A non-mathematical detailed outline which provides a rough idea of the method described. A figure is accommodated for most protocols. | |||
#'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | #'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | ||
#'''Pseudo Code''' Mathematical step-wise protocol algorithm | #'''Pseudo Code''' Mathematical step-wise protocol algorithm |