Quantum Coin: Difference between revisions

Jump to navigation Jump to search
8 bytes added ,  12 July 2019
Line 32: Line 32:
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin.
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin.


== Pseudocode ==
==Protocol Description==
'''Stage 1: Quantum coin generation'''<br>
'''Stage 1: Quantum coin generation'''<br>
''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br>
''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br>
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu