Write
14
edits
No edit summary |
No edit summary |
||
Line 51: | Line 51: | ||
* This protocol still works in the presence of photon losses. | * This protocol still works in the presence of photon losses. | ||
* This protocol is secure against any coalition of dishonest parties, including the source. | * This protocol is secure for one round against any coalition of dishonest parties, including the source. | ||
* This protocol is composably secure against a dishonest or noisy source | |||
==Pseudo Code== | ==Pseudo Code== |