donau

Donation authority for GNU Taler (experimental)
Log | Files | Refs | Submodules | README | LICENSE

commit e6fe2cdbf0f841125ff44c7bd542a56ab46c081f
parent 1032a32e9d9eabde4ddd4e37c4eadc8f09df5ed4
Author: Tanja Lange <tanja@hyperelliptic.org>
Date:   Wed, 22 Jan 2025 21:01:12 +0100

this is too chatty for the definition environment and it was the only definiion, put citations with the thing they are being cited for

Diffstat:
Mdoc/usenix-security-2025/paper/donau-paper.tex | 2+-
Mdoc/usenix-security-2025/paper/technicaldesign.tex | 10+++-------
2 files changed, 4 insertions(+), 8 deletions(-)

diff --git a/doc/usenix-security-2025/paper/donau-paper.tex b/doc/usenix-security-2025/paper/donau-paper.tex @@ -141,7 +141,7 @@ constructive discussion on the subject. \bibliographystyle{plainurl} -\bibliography{donau-paper,bibliography} +\bibliography{donau-paper,bibliography,tanja} % Maybe for camera-ready? \appendix diff --git a/doc/usenix-security-2025/paper/technicaldesign.tex b/doc/usenix-security-2025/paper/technicaldesign.tex @@ -29,17 +29,16 @@ top of this core protocol design. % here you're only linkable across donations to the same % charity, which is probably OK. -This section provides a technical overview of the Donau protocol, starting with +This section provides a technical overview of our Donau protocol, starting with some cryptographic background followed by the setup and usage. % The first section introduces some notation and definitions used later on in the protocol description. % Concepts from cryptography are also explained when necessary. % \subsection{Background \& Terminology}\label{notation_and_definitions} - Digital cash makes use of \textbf{blind signatures} to issue tokens~\cite{Chaum89}. Our + Digital cash makes use of \textbf{blind signatures}~\cite{Chaum89} to issue tokens. Our design uses the same mechansim to unlink the donation process from the issued - donation receipts, thus preserving the anonymity properties of the digital - cash used to make a donation. This section introduces the definition and + donation receipts. This section introduces the definition and security properties of blind signatures. % \paragraph{Cryptographic Hash Function} @@ -93,8 +92,6 @@ some cryptographic background followed by the setup and usage. never be able to link previously issued blind signatures with their unblinded counterparts. - \begin{definition}{Blind Signature} - \textrm{Slightly more formally, we define blind signatures as a quadruple of algorithms:} \begin{itemize} \item $KeyGen(1^\lambda)$: Generates a verification/signing key pair $(K^{\pub}, K^{\priv})$. @@ -102,7 +99,6 @@ some cryptographic background followed by the setup and usage. \item $BlindSign(K^{\priv}, \overline{m})$: Takes secret signing key $K^{\priv}$ and blinded message $\overline{m}$ and computes the blind signature $\overline{\sigma}$. \item $Unblind(\overline{\sigma}, b, K^{\pub})$: Takes blind signature $\overline{\sigma}$, blinding factor $b$ and verification key $K^{\pub}$ of the signer, and returns the unblinded signature $\sigma$ on message $m$ (or $\bot$). \end{itemize} - \end{definition} \subsection{Key generation and initial setup}\label{key_generation_and_initial_setup}