Write, autoreview, editor, reviewer
3,129
edits
Line 22: | Line 22: | ||
---- | ---- | ||
*'''Example:''' link to the example paper to be discussed below is provided here | *'''Example:''' link to the example paper to be discussed below is provided here | ||
#'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions), setup assumptions, etc.. | #'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | ||
#'''Pseudo Code''' Mathematical step-wise protocol algorithm | #'''Pseudo Code''' Mathematical step-wise protocol algorithm | ||
---- | ---- |