Write, autoreview, editor, reviewer
3,129
edits
Line 42: | Line 42: | ||
===Properties=== | ===Properties=== | ||
---- | ---- | ||
*This protocol requires no quantum memory. | |||
*The protocol assumes maximum number of participating parties are honest. In the present case at least two parties are honest. | *The protocol assumes maximum number of participating parties are honest. In the present case at least two parties are honest. | ||
*The protocol provides security against repudiation, i.e. the probability that seller succeeds in making buyer and seller disagree on the validity of her sent quantum signature decays exponentially with L, as stated by the formula <math>P(rep)\le e^{-(s_v-s_a)^2L}</math>. | *The protocol provides security against repudiation, i.e. the probability that seller succeeds in making buyer and seller disagree on the validity of her sent quantum signature decays exponentially with L, as stated by the formula <math>P(rep)\le e^{-(s_v-s_a)^2L}</math>. |