diff --git a/ACNS/data.txt b/ACNS/data.txt index 57bb4a7c947c2df97e3501d4617675b8580127d3..97821aa4c7cf39cd7c71d1590df03a790672bdec 100644 --- a/ACNS/data.txt +++ b/ACNS/data.txt @@ -2,6 +2,6 @@ \author{Fabio Campos \and Philipp Muth} \index{Campos, Fabio} \index{Muth, Philipp} -\nbpages{22} +\nbpages{26} \contact{campos@sopmac.de, philipp.muth@tu-darmstadt.de} diff --git a/ACNS/keyexchange.tex b/ACNS/keyexchange.tex index 752e09a6c1a21f064e02195292e8a90188ed2c73..f0d14f2cb2e3b83a86cf28077c8b9c29090c153d 100644 --- a/ACNS/keyexchange.tex +++ b/ACNS/keyexchange.tex @@ -201,7 +201,7 @@ We resolve the conflicts by amending \cite{DBLP:conf/pqcrypto/BeullensDPV21}'s P %\[\paren*{\left(R,R'\right),\left( L_{i,S^\ast} s_{ij}\right)_{P_j \in S^\ast}},\] \ifshamir \[\paren*{\left(R,R'\right),\left(f_i\paren j\right)_{P_j \in S^\ast}},\] - for a superauthorised set \(S^\ast\), where \(R\sample\mathcal E\), \(R' = \left[L_{i,S^\ast} f_i\paren 0\right] R = \left[L_{i,S^\ast} s_i\right] R\). + to a superauthorised set \(S^\ast\), where \(R\sample\mathcal E\), \(R' = \left[L_{i,S^\ast} f_i\paren 0\right] R = \left[L_{i,S^\ast} s_i\right] R\). The inputs of our amended proving protocol are the proving shareholder's index \(i\), the witness polynomial \(f_i\), the superauthorised set \(S^\ast \in\Gamma^+\) and the statement \(\left(\left(R,R'\right), \left( f_i\paren j\right)_{P_j\in S^\ast}\right)\). The protocol can be found in \algoref{fig.tpvpp}, in which \(\mathcal C\) denotes a commitment scheme. The verifying protocol in turn has the prover's and the verifier's indices \(i\) and \(j\), respectively, a set \(S^\ast\in\Gamma^+\), a statement piece \(x_j\) and a proof piece \(\left(\pi,\pi_j\right)\) as input, where \(x_j = \left(R,R'\right)\in\mathcal E^2\) if \(j=0\) and \(x_j\in\Z_p\) otherwise. The verifying protocol is given in \algoref{fig.tpvpv}. \else @@ -467,7 +467,7 @@ There are two aspects of security to consider: \end{itemize} \ \ifsubsection -\subsection{Active security} +\subsubsection{Active security} \else \noindent\textbf{\\Active security.} \fi @@ -516,7 +516,7 @@ There are two aspects of security to consider: \fi \end{proof} \ifsubsection -\subsection{Simulatability} +\subsubsection{Simulatability} \else \noindent\textbf{Simulatability.} \fi