Write
262
edits
Line 6: | Line 6: | ||
* '''Network:''' we assume the existence of an authenticated public classical channel between Alice and Bob. | * '''Network:''' we assume the existence of an authenticated public classical channel between Alice and Bob. | ||
* '''Timing:''' we assume that the network is synchronous. | * '''Timing:''' we assume that the network is synchronous. | ||
* '''Adversarial model:''' [[coherent attacks]] | * '''Adversarial model:''' [[coherent attacks]]. | ||
==Outline== | ==Outline== |