commit e6fe2cdbf0f841125ff44c7bd542a56ab46c081f
parent 1032a32e9d9eabde4ddd4e37c4eadc8f09df5ed4
Author: Tanja Lange <tanja@hyperelliptic.org>
Date: Wed, 22 Jan 2025 21:01:12 +0100
this is too chatty for the definition environment and it was the only definiion, put citations with the thing they are being cited for
Diffstat:
2 files changed, 4 insertions(+), 8 deletions(-)
diff --git a/doc/usenix-security-2025/paper/donau-paper.tex b/doc/usenix-security-2025/paper/donau-paper.tex
@@ -141,7 +141,7 @@ constructive discussion on the subject.
\bibliographystyle{plainurl}
-\bibliography{donau-paper,bibliography}
+\bibliography{donau-paper,bibliography,tanja}
% Maybe for camera-ready?
\appendix
diff --git a/doc/usenix-security-2025/paper/technicaldesign.tex b/doc/usenix-security-2025/paper/technicaldesign.tex
@@ -29,17 +29,16 @@ top of this core protocol design.
% here you're only linkable across donations to the same
% charity, which is probably OK.
-This section provides a technical overview of the Donau protocol, starting with
+This section provides a technical overview of our Donau protocol, starting with
some cryptographic background followed by the setup and usage.
% The first section introduces some notation and definitions used later on in the protocol description.
% Concepts from cryptography are also explained when necessary.
%
\subsection{Background \& Terminology}\label{notation_and_definitions}
- Digital cash makes use of \textbf{blind signatures} to issue tokens~\cite{Chaum89}. Our
+ Digital cash makes use of \textbf{blind signatures}~\cite{Chaum89} to issue tokens. Our
design uses the same mechansim to unlink the donation process from the issued
- donation receipts, thus preserving the anonymity properties of the digital
- cash used to make a donation. This section introduces the definition and
+ donation receipts. This section introduces the definition and
security properties of blind signatures.
% \paragraph{Cryptographic Hash Function}
@@ -93,8 +92,6 @@ some cryptographic background followed by the setup and usage.
never be able to link previously issued blind signatures with their
unblinded counterparts.
- \begin{definition}{Blind Signature}
-
\textrm{Slightly more formally, we define blind signatures as a quadruple of algorithms:}
\begin{itemize}
\item $KeyGen(1^\lambda)$: Generates a verification/signing key pair $(K^{\pub}, K^{\priv})$.
@@ -102,7 +99,6 @@ some cryptographic background followed by the setup and usage.
\item $BlindSign(K^{\priv}, \overline{m})$: Takes secret signing key $K^{\priv}$ and blinded message $\overline{m}$ and computes the blind signature $\overline{\sigma}$.
\item $Unblind(\overline{\sigma}, b, K^{\pub})$: Takes blind signature $\overline{\sigma}$, blinding factor $b$ and verification key $K^{\pub}$ of the signer, and returns the unblinded signature $\sigma$ on message $m$ (or $\bot$).
\end{itemize}
- \end{definition}
\subsection{Key generation and initial setup}\label{key_generation_and_initial_setup}