Write, autoreview, editor, reviewer
3,129
edits
Line 45: | Line 45: | ||
===Adversarial Assumption=== | ===Adversarial Assumption=== | ||
* This protocol is secure against | * This protocol is secure against malicious adversary setting | ||
* One cannot decrypt the ciphertext without performing the Evaluation step | * One cannot decrypt the ciphertext without performing the Evaluation step | ||