inline FC reviews/responses in main paper

This commit is contained in:
Christian Grothoff 2017-05-18 15:05:28 +02:00
parent 998858bc8f
commit 57fef70492
No known key found for this signature in database
GPG Key ID: 939E6BE1E29FC3CC
2 changed files with 13 additions and 2 deletions

View File

@ -58,7 +58,8 @@
\usetikzlibrary{calc}
\usepackage{eurosym}
\usepackage[T1]{fontenc}
\usepackage{verbatim}
\usepackage[utf8]{inputenc}
% Copyright
%\setcopyright{none}
@ -1868,6 +1869,16 @@ data being persisted are represented in between $\langle\rangle$.
\item[$\overline{C^{(i)}_p}$]{Public coin keys computed from $\overline{c_s^{(i)}}$ by the verifier}
\end{description}
\newpage
\onecolumn
\section{Supplemental: Reviews and Responses from Financial Cryptography}
\subsection{FC 2016}
\verbatiminput{taler_FC2016.txt}
\subsection{FC 2017}
\verbatiminput{taler_FC2017.txt}
\end{document}

View File

@ -21,7 +21,7 @@ be insecure.
> We added a section with proofs
I find two (possible) attacks against the refresh protocol. As the
exchange does not check the validity of the public key Cp , the attacker can
exchange does not check the validity of the public key Cp', the attacker can
send an arbitrary public key to the exchange that will accept, and obtain a
fresh coin. The attacker can spend partially a coin multiple times via
refreshing the coin and obtaining a fresh coin in turn, as the refresh protocol