Skip to content
Snippets Groups Projects
Commit fd4403ff authored by Philipp Muth's avatar Philipp Muth
Browse files

changed active security and simulatability to subsubsections, minor

parent 908fe645
No related branches found
No related tags found
No related merge requests found
...@@ -2,6 +2,6 @@ ...@@ -2,6 +2,6 @@
\author{Fabio Campos \and Philipp Muth} \author{Fabio Campos \and Philipp Muth}
\index{Campos, Fabio} \index{Campos, Fabio}
\index{Muth, Philipp} \index{Muth, Philipp}
\nbpages{22} \nbpages{26}
\contact{campos@sopmac.de, philipp.muth@tu-darmstadt.de} \contact{campos@sopmac.de, philipp.muth@tu-darmstadt.de}
...@@ -201,7 +201,7 @@ We resolve the conflicts by amending \cite{DBLP:conf/pqcrypto/BeullensDPV21}'s P ...@@ -201,7 +201,7 @@ We resolve the conflicts by amending \cite{DBLP:conf/pqcrypto/BeullensDPV21}'s P
%\[\paren*{\left(R,R'\right),\left( L_{i,S^\ast} s_{ij}\right)_{P_j \in S^\ast}},\] %\[\paren*{\left(R,R'\right),\left( L_{i,S^\ast} s_{ij}\right)_{P_j \in S^\ast}},\]
\ifshamir \ifshamir
\[\paren*{\left(R,R'\right),\left(f_i\paren j\right)_{P_j \in S^\ast}},\] \[\paren*{\left(R,R'\right),\left(f_i\paren j\right)_{P_j \in S^\ast}},\]
for a superauthorised set \(S^\ast\), where \(R\sample\mathcal E\), \(R' = \left[L_{i,S^\ast} f_i\paren 0\right] R = \left[L_{i,S^\ast} s_i\right] R\). to a superauthorised set \(S^\ast\), where \(R\sample\mathcal E\), \(R' = \left[L_{i,S^\ast} f_i\paren 0\right] R = \left[L_{i,S^\ast} s_i\right] R\).
The inputs of our amended proving protocol are the proving shareholder's index \(i\), the witness polynomial \(f_i\), the superauthorised set \(S^\ast \in\Gamma^+\) and the statement \(\left(\left(R,R'\right), \left( f_i\paren j\right)_{P_j\in S^\ast}\right)\). The protocol can be found in \algoref{fig.tpvpp}, in which \(\mathcal C\) denotes a commitment scheme. The inputs of our amended proving protocol are the proving shareholder's index \(i\), the witness polynomial \(f_i\), the superauthorised set \(S^\ast \in\Gamma^+\) and the statement \(\left(\left(R,R'\right), \left( f_i\paren j\right)_{P_j\in S^\ast}\right)\). The protocol can be found in \algoref{fig.tpvpp}, in which \(\mathcal C\) denotes a commitment scheme.
The verifying protocol in turn has the prover's and the verifier's indices \(i\) and \(j\), respectively, a set \(S^\ast\in\Gamma^+\), a statement piece \(x_j\) and a proof piece \(\left(\pi,\pi_j\right)\) as input, where \(x_j = \left(R,R'\right)\in\mathcal E^2\) if \(j=0\) and \(x_j\in\Z_p\) otherwise. The verifying protocol is given in \algoref{fig.tpvpv}. The verifying protocol in turn has the prover's and the verifier's indices \(i\) and \(j\), respectively, a set \(S^\ast\in\Gamma^+\), a statement piece \(x_j\) and a proof piece \(\left(\pi,\pi_j\right)\) as input, where \(x_j = \left(R,R'\right)\in\mathcal E^2\) if \(j=0\) and \(x_j\in\Z_p\) otherwise. The verifying protocol is given in \algoref{fig.tpvpv}.
\else \else
...@@ -467,7 +467,7 @@ There are two aspects of security to consider: ...@@ -467,7 +467,7 @@ There are two aspects of security to consider:
\end{itemize} \end{itemize}
\ \
\ifsubsection \ifsubsection
\subsection{Active security} \subsubsection{Active security}
\else \else
\noindent\textbf{\\Active security.} \noindent\textbf{\\Active security.}
\fi \fi
...@@ -516,7 +516,7 @@ There are two aspects of security to consider: ...@@ -516,7 +516,7 @@ There are two aspects of security to consider:
\fi \fi
\end{proof} \end{proof}
\ifsubsection \ifsubsection
\subsection{Simulatability} \subsubsection{Simulatability}
\else \else
\noindent\textbf{Simulatability.} \noindent\textbf{Simulatability.}
\fi \fi
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment