Skip to main content

Table 2 Comparison of the security of the proposed protocols with the existing schemes. The asterisk in the column for the correctness corresponds to probabilistic nature of the scheme

From: Quantum anonymous veto: a set of new protocols

Protocol

Eligibility

Privacy

Binding

Verifiability

Correctness

Robustness

RGQAV

×

×

×

×

WQAV

\(\checkmark^{*}\)

×

QAV-1

\(\checkmark^{*}\)

QAV-2

\(\checkmark^{*}\)

QAV-3

\(\checkmark^{*}\)

QAV-4

\(\checkmark^{*}\)

QAV-5

×

\(\checkmark^{*}\)

QAV-6

×

QAV-7