summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJeffrey Burdges <burdges@gnunet.org>2017-08-11 01:03:17 +0200
committerJeffrey Burdges <burdges@gnunet.org>2017-08-11 01:03:17 +0200
commit1aaa8462a29649c3c3c08037293413763407adb1 (patch)
treecb47609a54527383ce6d5cd810a476560138d267
parentf403c1139f4e1696c7a7178fbb301df67ba301f2 (diff)
downloadpapers-1aaa8462a29649c3c3c08037293413763407adb1.tar.gz
papers-1aaa8462a29649c3c3c08037293413763407adb1.tar.bz2
papers-1aaa8462a29649c3c3c08037293413763407adb1.zip
Christian's suggestions
-rw-r--r--comparison/comparison.tex37
1 files changed, 20 insertions, 17 deletions
diff --git a/comparison/comparison.tex b/comparison/comparison.tex
index 0b8fbcf..a7e79b4 100644
--- a/comparison/comparison.tex
+++ b/comparison/comparison.tex
@@ -34,9 +34,9 @@
\begin{tabular}{r|ccccccccccccc}
&
-\rot{Offline spending} &
+\rot{Instant enforcement} &
\rot{Robust anonymity} &
-\rot{Key Expiration} &
+\rot{Key expiration} &
%
\rot{Traceability} &
\rot{Transferability} &
@@ -46,48 +46,51 @@
\rot{Deposit cost} &
\rot{Change} &
%
-\rot{Robustness} &
+\rot{Robust anonymity} &
\rot{Receipts} &
\rot{Endorsed} &
\rot{Refunds}
\\ \hline
Taler
-& \N & \Y & \Y
+& \Y & \Y & \Y
& \N & S & \Y
& $\log n$ & $\log n$ & ON
-& \Y & \Y & \Y & \Y
+& \Y & \Y & \Y & Anon
\\
% TODO: Just omit this straw-man online Chaum in favor on HINDE
Chaum Online
-& \N & ? & \Y?
+& \Y & ? & \Y?
& \N & S & \N
& $\log n$ & $\log n$ & ON
-& \Y? & \N & \N & \N
+& \Y? & \N & \N & ?
\\
HINDE
-& \N & \Y & \Y?
-& \N & S & \N?
+& \Y? & \Y & \Y?
+& \N & S & \N
& $\log n$ & $\log n$ & ON
-& \Y? & \N? & \N? & \N
+& \Y? & \N? & \N? & ?
\\
Chaum Offline
-& \Y & ? & \Y?
+& \N & ? & \Y?
& \N & S & \N?
& $\log n$ & $\log n$ & ON
-& \Y? & \N? & \N? & \N?
+& \Y? & \N? & \N? & ?
\\ \hline
\end{tabular}
\section{Criteria}
\begin{itemize}
- \item \textbf{Key Expiration.}
+ \item \textbf{Key expiration.}
How/when do keys expire.
How do users exchange old coins for new coins?
- \item \textbf{Offline spending.}
- Important historical property from when transactions were commonly
- processed offline, possibly still useful in some situations.
- Inherently makes anonymity brittle, so no longer a wise goal.
+ \item \textbf{Instant enforcement.}
+ In the past, payment schemes needed to function even when neither
+ party had connectivity, which makes double spending unavoidable.
+ To address this, anonymous payment schemes were designed to
+ deanonymize the customer who double spent, but this approach makes
+ anonymity extremely brittle and requires expensive debt collection
+ operations.
\item \textbf{Robust anonymity.}
Anonymity is not trivially compromised by wallet spending errors,
including restoring from backups and certain targeted attacks.