1See handout 15 for further results on the security of BBS.