Research Article

Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros

Algorithm 2

CE Decoder .
Input:, , , threshold value , the weight of and and the weight of .
Output: if the algorithm succeeds, otherwise.
(1), ,
(2)while [ or ] and do
(3) sum
(4) temp
(5)fordo
(6)  if sum then
(7)   temp [i]  = temp 1
(8)  end if
(9)end for
(10)temp
(11)
(12)end while
(13)ifthen
(14) Outputs
(15)else
(16) Outputs
(17)end if