Write, autoreview, editor, reviewer
3,129
edits
Line 5: | Line 5: | ||
==Assumptions== | ==Assumptions== | ||
* There exists authenticated classical channels between seller and buyer, and, seller and verifier. | * There exists authenticated classical channels between seller and buyer, and, seller and verifier. | ||
* Receiver and verifier share a | * Receiver and verifier share a MDI-QKD link, used to transmit classical messages in full secrecy. | ||
* Adversary is allowed to perform coherent attacks, which is the most general class of attacks [[Quantum Key Distribution|QKD]] protocols are vulnerable to, due to experimental realisation. | * Adversary is allowed to perform coherent attacks, which is the most general class of attacks [[Quantum Key Distribution|QKD]] protocols are vulnerable to, due to experimental realisation. | ||