Write, autoreview, editor, reviewer
3,129
edits
m (→Structure) |
m (→Structure) |
||
Line 13: | Line 13: | ||
*'''Use Case'''</br> | *'''Use Case'''</br> | ||
Bridges the gap between users and protocol designers. | Bridges the gap between users and protocol designers. | ||
#Technological Readiness: | |||
---- | ---- | ||
*'''Requirements'''</br> | *'''Requirements'''</br> | ||
---- | |||
#Network Stage: | #Network Stage: | ||
*'''Example:''' | *'''Example:''' | ||
---- | ---- | ||
Line 24: | Line 24: | ||
#'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | #'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | ||
#'''Pseudo Code''' Mathematical step-wise protocol algorithm | #'''Pseudo Code''' Mathematical step-wise protocol algorithm | ||
*'''Relevant papers'''</br> | |||
---- | ---- | ||
Protocols easy to interpret after reading the concerned formal description, listed in chronological order. | Protocols easy to interpret after reading the concerned formal description, listed in chronological order. | ||