Skip to content

Clarify the adversary model #200

@dbosk

Description

@dbosk

For the adversarial model, what is the function f and d exactly?

In the same section (4.3), is “The adversary only learns the
protocol data …” also information leakage to the adversary other
than the identity of protester and/or witness?

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions