diff options
author | Jeffrey Burdges <burdges@gnunet.org> | 2018-01-26 14:06:09 +0100 |
---|---|---|
committer | Jeffrey Burdges <burdges@gnunet.org> | 2018-01-26 14:06:09 +0100 |
commit | 50cf5641427493e566a074faf600d151dc7e628a (patch) | |
tree | d2e4f4e866db404da1d5c8b98a1cedc72702b37e /games/games.tex | |
parent | ba95bd865de81c511d2d8c8b0ba994a542ee62df (diff) | |
download | papers-50cf5641427493e566a074faf600d151dc7e628a.tar.gz papers-50cf5641427493e566a074faf600d151dc7e628a.tar.bz2 papers-50cf5641427493e566a074faf600d151dc7e628a.zip |
definition comment
Diffstat (limited to 'games/games.tex')
-rw-r--r-- | games/games.tex | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/games/games.tex b/games/games.tex index 4e10f96..9bd889e 100644 --- a/games/games.tex +++ b/games/games.tex @@ -758,7 +758,7 @@ RSA-KTI cannot be hard by \cite[Theorem 12]{RSA-FDH-KTIvCTI}. \begin{definition} A {\em key exchange failure} consists of two key pairs $A = a G$ and $B = b G$ such that $b A \neq a B$. -\comment{Find this in literature? Is it related to contributory behavior?} +\comment{TODO: Find this in literature? Is it related to contributory behavior?} \end{definition} \begin{theorem} @@ -903,11 +903,12 @@ $H(m,i)$ and the proof that it lives in the Merkle tree. \section{Standard Definitions} \begin{definition}[One-more forgery] -For any integer $\ell$, an $(\ell, \ell + 1)$- -forgery comes from a probabilistic polynomial time Turing machine $\mathcal{A}$ that can +For any integer $\ell$, an $(\ell, \ell + 1)$-forgery comes from +a probabilistic polynomial time Turing machine $\mathcal{A}$ that can compute, after $\ell$ interactions with the signer $\Sigma$, $\ell + 1$ signatures with nonnegligible probability. The ``one-more forgery'' is an $(\ell, \ell + 1)$-forgery for some integer $\ell$. +\comment{TODO: Turing machine?!?} \end{definition} Taken from \cite{pointcheval1996provably}. This definition applies to blind signature schemes in general. |