I found their paper really helpful: arxiv.org/abs/2402.01445
I found their paper really helpful: arxiv.org/abs/2402.01445
Our proof is done in a more abstract framework, which is intended to show how much information the protocol leaks to the environment under any circumstances.
Our proof is done in a more abstract framework, which is intended to show how much information the protocol leaks to the environment under any circumstances.