diff options
author | Jeffrey Burdges <burdges@gnunet.org> | 2017-08-21 17:23:20 +0200 |
---|---|---|
committer | Jeffrey Burdges <burdges@gnunet.org> | 2017-08-21 17:23:20 +0200 |
commit | d6de554abbe6737c0b56b824ee795f6f5f89fa78 (patch) | |
tree | 5383cff98ff717dd79416d2d7e84b014015afb4f /comparison | |
parent | f3ec5a77510b5f74d97e7b36f41ec1dd36a10adb (diff) | |
download | papers-d6de554abbe6737c0b56b824ee795f6f5f89fa78.tar.gz papers-d6de554abbe6737c0b56b824ee795f6f5f89fa78.tar.bz2 papers-d6de554abbe6737c0b56b824ee795f6f5f89fa78.zip |
spelling
Diffstat (limited to 'comparison')
-rw-r--r-- | comparison/comparison.tex | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/comparison/comparison.tex b/comparison/comparison.tex index e1e650e..0c6b4f9 100644 --- a/comparison/comparison.tex +++ b/comparison/comparison.tex @@ -155,13 +155,13 @@ Taler % TODO: Expand definition and cite the successor papers to Zerocash/BOLT % that handle regulation? \item \textbf{Trustless anonymity.} - At present, divisible ecash schemes entrust anonymity properties + At present, divisible e-cash schemes entrust anonymity properties to a trusted setup phase. Users cannot easily participate in this trusted setup, so they must entrust some party with their anonymity, and instantiating such schemes becomes difficult. By comparison, blind signatures normally provide information theoretic security. \item \textbf{Realistic exchange storage requirements.} - Both compact and divisible ecash schemes require the exchange store + Both compact and divisible e-cash schemes require the exchange store coins only as the smallest denomination to prevent double spending. In practice, these schemes should be adjusted to store larger denominations or else the exchange's storage requirements would @@ -171,7 +171,7 @@ Taler many coins with one single withdrawal, reducing overall bandwidth for fixed denomination values, but not computation. %% VERIFY Divisible e-cash schemes batch both withdrawal and deposit operations, - providing greater bandwith reduction, and possibly computation + providing greater bandwidth reduction, and possibly computation reduction. These savings are limited however by the exchange's storage requirements, and divisible schemes depend upon trusted setup for their anonymity properties. |