diff --git a/ACNS/keyexchange.tex b/ACNS/keyexchange.tex index 4ddf8e93b586690fbf87ec0c1765d230b6a6f4e9..20c6c7bf44428f77ac3a55120cecfedb3c7eb6a2 100644 --- a/ACNS/keyexchange.tex +++ b/ACNS/keyexchange.tex @@ -21,7 +21,7 @@ We fix the following publically known parameters. We give our key exchange mechanism in the context of Shamir's secret sharing scheme and elaborate possible extensions to other, more general secret sharing schemes in \secref{sec.generalsss}. \ifsubsection -\subsection{Key Generation} +\subsection{Key Generation}\label{subsec.keygen} \else \noindent\textbf{\\Key Generation.} \fi @@ -211,8 +211,12 @@ We resolve the conflicts by amending \cite{DBLP:conf/pqcrypto/BeullensDPV21}'s P The verifying protocol in turn has the prover's and the verifier's indices \(i\) and \(j\), respectively, a set \(S^\ast\in\Gamma^+\), a statement piece \(x_j\) and a proof piece \(\left(\pi,\pi_j\right)\) as input, where \(x_j = \left(R,R'\right)\in\mathcal E^2\) if \(j=0\) and \(x_j\in\Z_p\) otherwise. The verifying protocol is given in \algoref{fig.tpvpv}. \fi -It is here, that the two-level sharing we introduced in \secref{sec.keygen} in the key generation protocol comes into play. We will have each shareholder \(P_i\) engaged in an execution of \(\decaps\) provide a PVP with respect to its share \(s_i\) of the secret key \(\sk\), that is then verified by each other participating shareholder with its respective share of \(s_i\). -\todo{fix this line} +\ifsubsection +It is here, that the two-level sharing we introduced in \secref{subsec.keygen} comes into play. We will have each shareholder \(P_i\) engaged in an execution of \(\decaps\) provide a PVP with respect to its share \(s_i\) of the secret key \(\sk\), that is then verified by each other participating shareholder with its respective share of \(s_i\). +\else +It is here, that the two-level sharing we introduced in the key generation protocol comes into play. We will have each shareholder \(P_i\) engaged in an execution of \(\decaps\) provide a PVP with respect to its share \(s_i\) of the secret key \(\sk\), that is then verified by each other participating shareholder with its respective share of \(s_i\). +\fi +%\todo{fix this line} The definitions of soundness and zero-knowledge for a threshold PVP scheme carry over from the non-threshold setting in \secref{sec.prelim} intuitively, yet we restate the completeness definition for the threshold setting. \begin{definition}[Completeness in the threshold setting]