Quantum Coin: Difference between revisions

Jump to navigation Jump to search
2 bytes added ,  29 April 2019
Line 25: Line 25:
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin.
**Secure against an adversary who uses adaptive “attempted verifications” in order to collect information about a coin.


== Protocol ==
== Pseudocode ==
'''Stage 1: Quantum coin generation'''<br>
'''Stage 1: Quantum coin generation'''<br>
''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br>
''Input'': A secret record consists of <math>k</math> entries <math>x_1, . . . , x_k</math>,<math> x_i\in \{0,1\}^4</math><br>
Write
262

edits

Navigation menu