summaryrefslogtreecommitdiff
path: root/comments.txt
blob: bb9cc5bcdbc49d0f28452a6960fd684d7a0464fd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
- Fix overfull hboxes
- Check notation for numbers
- consistency of list capitalization
- include auditor tables in 4.3 (Space usage by database table)
- auditor db diagrams?
- Proof-read references (capitalization in titles)
- transition to chapter 5?
- connection of BSC to Taler (at end of Chapter?)


Table 4.4:
You talk about the response sizes being relevant here for the RTT. Would
be great if we could have them in the table as well (ideally request +
response sizes!). Right now, I do not see bandwidth utilization
_anywhere_ in the thesis!


----------------

Comments about comments:

Table 4.2:
why would a client ever call "rsa private key get public"? Clients
shouldn't even have RSA private keys!??
=> this is called as part of the testbed / setup

-----------------------

Comments I don't understand or can't fix:

p. 15, I appreciated the short and rather harsh critique of blockchains. How do you
explain their meteoric rise (if you see it that way) despite these facts? An nonspecialist
article that adequately explained this “paradox” would be cool, maybe targeted for The
Atlantic.

p. 155-157. The Conclusion, and similar idea from the Introduction, are quite powerful.
I would repeat the suggestion we could really use a nonspecialist article, in a venue like
The Atlantic, on approaches for payment and their is socio-political implications.

p. 43, paragraph 3. I would not regard the use of oracles in game-based definitions as an
extension of Turing machines. However you might formalize the adversary’s computation
(in a RAM model, as a program in some programming language, whatever), we can no
doubt embellish that model by adding oracles. Turing machines are perhaps the most
awkward way of doing it!

p. 43, paragraph beginning “While oracles”. I would, similarly, regard oracles as even
less related to interactive protocols. At least the way that I use this term, interactive
protocols are stylized two-party interactions used for defining the complexity class IP.
They were originally defined, rather informally, with interactive Turing Machines. Better
expositions eliminated that language.

p. 48–57. I think it would be a Herculian job to truly verify this syntax and these games,
and I won’t really try to do so. Maybe you can tell me how these evolved and were
debugged.

p. 84–85, tipping is normally by a customer to a merchant, not the other way around ;-)


44. pp. 123–154. I liked this chapter, but it did feel somewhat out of place compared to the
rest of the thesis. It still carried some vestiges of being a paper (for example, the chapter
speaks a couple of time of its being a paper, rather than a chapter ), and read like one.
The writing seemed to assume more of the user, and it was a bit disorganized compared
to the rest of the presentation. Now I have never felt that a dissertation needed to be all
that unified to be good (theses that amalgamate vaguely related papers are fine by me),
so this this isn’t a big deal. But it might help to switch the order of Chapters 5 and 6,
as it did feel jarring to go back to go back to GNU Taler with the BSC stuff intervening.
And a little bit more of a transition to the current Chapter 5 would be good.


Fixed citations:
(I've left the old papers in there as well)

20. p. 41 and later. The wrong papers ([Poi05], [Sho04], [Cor00]) are being credited for
4provable security, the notion of which is usually credited go [GM82/GM85] (although
credit should arguably be shared more broadly with Blum and Yao, for example). Only
one of the papers you’re siting here is even a survey.



23. p. 42. [Lin17] is not an appropriate reference of the idea of simulation-based definitions.
The idea might be credited to GMR85/89 (zero-knowledge).