Open dbosk opened 4 years ago
For the adversarial model, what is the function f and d exactly? In the same section (4.3), is “The adversary only learns the protocol data …” also information leakage to the adversary other than the identity of protester and/or witness?
For the adversarial model, what is the function f and d exactly?
In the same section (4.3), is “The adversary only learns the protocol data …” also information leakage to the adversary other than the identity of protester and/or witness?