Main Page: Difference between revisions

Jump to navigation Jump to search
Line 42: Line 42:
*Setup Assumptions<br/>lists all the assumptions in bullet points.
*Setup Assumptions<br/>lists all the assumptions in bullet points.
*Security Claim<br/>gives all the security definitions. Any specific property particular to the concerned protocol should be already defined in the functionality description. E.g. in case of Blind Quantum Computation, blindness is claimed. This property should be already mentioned in a well-defined manner in the functionality description.<br/>
*Security Claim<br/>gives all the security definitions. Any specific property particular to the concerned protocol should be already defined in the functionality description. E.g. in case of Blind Quantum Computation, blindness is claimed. This property should be already mentioned in a well-defined manner in the functionality description.<br/>
One could also include definitions like soundness, verifiability and correctness, etc.. if the protocol mentions it. As mentioned earlier, the structure is flexible for this section
One could also include definitions like soundness, verifiability and correctness, etc.. if the protocol mentions it. As mentioned earlier, the structure is flexible for this section.


===Pseudo Code===
===Pseudo Code===
Write, autoreview, editor, reviewer
3,125

edits

Navigation menu