Write, autoreview, editor, reviewer
3,129
edits
Line 30: | Line 30: | ||
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server. | *''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server. | ||
== Notation == | == Notation == | ||
*<math>m</math>: | *<math>m</math>: classical data of client's required quantum input states | ||
*<math>\lambda</math>: security parameter | *<math>\lambda</math>: security parameter | ||
* <math>k</math>: security parameter | * <math>k</math>: security parameter |