diff options
author | Jeffrey Burdges <burdges@gnunet.org> | 2017-08-11 01:03:17 +0200 |
---|---|---|
committer | Jeffrey Burdges <burdges@gnunet.org> | 2017-08-11 01:03:17 +0200 |
commit | 1aaa8462a29649c3c3c08037293413763407adb1 (patch) | |
tree | cb47609a54527383ce6d5cd810a476560138d267 | |
parent | f403c1139f4e1696c7a7178fbb301df67ba301f2 (diff) | |
download | papers-1aaa8462a29649c3c3c08037293413763407adb1.tar.gz papers-1aaa8462a29649c3c3c08037293413763407adb1.tar.bz2 papers-1aaa8462a29649c3c3c08037293413763407adb1.zip |
Christian's suggestions
-rw-r--r-- | comparison/comparison.tex | 37 |
1 files changed, 20 insertions, 17 deletions
diff --git a/comparison/comparison.tex b/comparison/comparison.tex index 0b8fbcf..a7e79b4 100644 --- a/comparison/comparison.tex +++ b/comparison/comparison.tex @@ -34,9 +34,9 @@ \begin{tabular}{r|ccccccccccccc} & -\rot{Offline spending} & +\rot{Instant enforcement} & \rot{Robust anonymity} & -\rot{Key Expiration} & +\rot{Key expiration} & % \rot{Traceability} & \rot{Transferability} & @@ -46,48 +46,51 @@ \rot{Deposit cost} & \rot{Change} & % -\rot{Robustness} & +\rot{Robust anonymity} & \rot{Receipts} & \rot{Endorsed} & \rot{Refunds} \\ \hline Taler -& \N & \Y & \Y +& \Y & \Y & \Y & \N & S & \Y & $\log n$ & $\log n$ & ON -& \Y & \Y & \Y & \Y +& \Y & \Y & \Y & Anon \\ % TODO: Just omit this straw-man online Chaum in favor on HINDE Chaum Online -& \N & ? & \Y? +& \Y & ? & \Y? & \N & S & \N & $\log n$ & $\log n$ & ON -& \Y? & \N & \N & \N +& \Y? & \N & \N & ? \\ HINDE -& \N & \Y & \Y? -& \N & S & \N? +& \Y? & \Y & \Y? +& \N & S & \N & $\log n$ & $\log n$ & ON -& \Y? & \N? & \N? & \N +& \Y? & \N? & \N? & ? \\ Chaum Offline -& \Y & ? & \Y? +& \N & ? & \Y? & \N & S & \N? & $\log n$ & $\log n$ & ON -& \Y? & \N? & \N? & \N? +& \Y? & \N? & \N? & ? \\ \hline \end{tabular} \section{Criteria} \begin{itemize} - \item \textbf{Key Expiration.} + \item \textbf{Key expiration.} How/when do keys expire. How do users exchange old coins for new coins? - \item \textbf{Offline spending.} - Important historical property from when transactions were commonly - processed offline, possibly still useful in some situations. - Inherently makes anonymity brittle, so no longer a wise goal. + \item \textbf{Instant enforcement.} + In the past, payment schemes needed to function even when neither + party had connectivity, which makes double spending unavoidable. + To address this, anonymous payment schemes were designed to + deanonymize the customer who double spent, but this approach makes + anonymity extremely brittle and requires expensive debt collection + operations. \item \textbf{Robust anonymity.} Anonymity is not trivially compromised by wallet spending errors, including restoring from backups and certain targeted attacks. |