Main Page: Difference between revisions

Jump to navigation Jump to search
4 bytes removed ,  8 November 2018
m
Line 13: Line 13:
*'''Use Case'''</br>
*'''Use Case'''</br>
Bridges the gap between users and protocol designers.
Bridges the gap between users and protocol designers.
#Technological Readiness:
----
----
*'''Requirements'''</br>
*'''Requirements'''</br>
----
#Network Stage:
#Network Stage:
#Technological Readiness:
----
*'''Example:'''  
*'''Example:'''  
----
----
Line 24: Line 24:
#'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc..
#'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc..
#'''Pseudo Code''' Mathematical step-wise protocol algorithm
#'''Pseudo Code''' Mathematical step-wise protocol algorithm
*'''Relevant papers'''</br>
----
----
*'''Relevant papers'''</br>
Protocols easy to interpret after reading the concerned formal description, listed in chronological order.
Protocols easy to interpret after reading the concerned formal description, listed in chronological order.
----
 




Write, autoreview, editor, reviewer
3,125

edits

Navigation menu