Write
262
edits
Line 25: | Line 25: | ||
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin. | **Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin. | ||
== | == Pseudocode == | ||
'''Stage 1: Quantum coin generation'''<br> | '''Stage 1: Quantum coin generation'''<br> | ||
''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br> | ''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br> |