summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFlorian Dold <florian.dold@gmail.com>2018-09-25 16:07:51 +0200
committerFlorian Dold <florian.dold@gmail.com>2018-09-25 16:07:51 +0200
commit534bdbc8e54e678e799cdfb96cfb534fe52f8998 (patch)
tree3b89cfe233e7314fbc67915edc71402eacf53e1f
parent0e5c388866db068a9dec4f80c81a10ca427c078e (diff)
downloadpapers-534bdbc8e54e678e799cdfb96cfb534fe52f8998.tar.gz
papers-534bdbc8e54e678e799cdfb96cfb534fe52f8998.tar.bz2
papers-534bdbc8e54e678e799cdfb96cfb534fe52f8998.zip
save space
-rw-r--r--taler-fc19/paper.tex4
1 files changed, 1 insertions, 3 deletions
diff --git a/taler-fc19/paper.tex b/taler-fc19/paper.tex
index 7d34165..947f3e1 100644
--- a/taler-fc19/paper.tex
+++ b/taler-fc19/paper.tex
@@ -809,9 +809,7 @@ We require the following security properties to hold for $\textsc{CoinSignKx}$:
honestly generated key pair
$(\V{sk}_B, \V{pk}_B) \leftarrow \algo{KeyGen}_{CSK}(1^\lambda)$
the key exchange fails, that is
- \begin{equation*}
- \algo{Kex}_{CSK}(\V{sk}_A, \V{pk}_B) \neq \algo{Kex}_{CSK}(\V{sk}_B, \V{pk}_A),
- \end{equation*}
+ $\algo{Kex}_{CSK}(\V{sk}_A, \V{pk}_B) \neq \algo{Kex}_{CSK}(\V{sk}_B, \V{pk}_A)$,
while the adversary can still produce a pair $(m, \sigma)$ such that $\algo{Verify}_{BS}(\V{pk}_A, m, \sigma) = 1$.
\item \emph{key exchange security}: The output of $\algo{Kx}_{CSK}$ must be computationally