Submissions: Difference between revisions

Jump to navigation Jump to search
Line 25: Line 25:
----
----
*All setup assumptions taken into account for this protocol should be mentioned here. </br> For e.g. classical or quantum authenticated channel
*All setup assumptions taken into account for this protocol should be mentioned here. </br> For e.g. classical or quantum authenticated channel
*Assumption on the adversary
*Assumptions on adversary. A link to the [[security definitions|security definitions]] section on the supplementary information page should be provided.


===Outline===
===Outline===