Write, autoreview, editor, reviewer
3,129
edits
Line 49: | Line 49: | ||
* Privacy: this scheme is private if its ciphertexts are indistinguishable under chosen plaintext attack. | * Privacy: this scheme is private if its ciphertexts are indistinguishable under chosen plaintext attack. | ||
* Computational logs are generally classical in nature. | * Computational logs are generally classical in nature. | ||
* The chosen message authentication code MAC = (Tag, Ver) is existentially unforgeable under adaptive chosen message attacks (EUF-CMA [16]) from a quantum adversary | |||
==Notation== | ==Notation== |