fix ref
This commit is contained in:
parent
51c04bd7d6
commit
eab6bf0f07
@ -477,7 +477,7 @@ key is only known to the owner of the coin. A coin derives its
|
|||||||
financial value from an RSA signature over a the full domain hash
|
financial value from an RSA signature over a the full domain hash
|
||||||
(FDH) of the coin's public key. An FDH is used so that ``one-more
|
(FDH) of the coin's public key. An FDH is used so that ``one-more
|
||||||
forgery'' is provably hard assuming the RSA known-target inversion
|
forgery'' is provably hard assuming the RSA known-target inversion
|
||||||
problem is hard~cite[Theorem 12]{RSA-HDF-KTIvCTI}. The exchange has
|
problem is hard~\cite[Theorem 12]{RSA-HDF-KTIvCTI}. The exchange has
|
||||||
multiple RSA {\em denomination key} pairs available for blind-signing
|
multiple RSA {\em denomination key} pairs available for blind-signing
|
||||||
coins of different value.
|
coins of different value.
|
||||||
|
|
||||||
@ -1099,7 +1099,7 @@ actually facilitates voluntary cooperation between the exchange and
|
|||||||
criminals~\cite{sander1999escrow} and where the state could
|
criminals~\cite{sander1999escrow} and where the state could
|
||||||
deanonymize citizens.
|
deanonymize citizens.
|
||||||
|
|
||||||
\subsection{Offline Payments}
|
%\subsection{Offline Payments}
|
||||||
|
|
||||||
Chaum's original proposals for anonymous digital cash avoided the need
|
Chaum's original proposals for anonymous digital cash avoided the need
|
||||||
for online interactions with the exchange to detect double spending by
|
for online interactions with the exchange to detect double spending by
|
||||||
@ -1122,7 +1122,7 @@ coin after restoring from backup.
|
|||||||
%subjected to financial penalties by the state in relation to the
|
%subjected to financial penalties by the state in relation to the
|
||||||
%amount transferred by the traditional currency transfer.
|
%amount transferred by the traditional currency transfer.
|
||||||
|
|
||||||
\subsection{Cryptographic proof vs. evidence}
|
% \subsection{Cryptographic proof vs. evidence}
|
||||||
|
|
||||||
In this paper we have use the term ``proof'' in many places as the
|
In this paper we have use the term ``proof'' in many places as the
|
||||||
protocol provides cryptographic proofs of which parties behave
|
protocol provides cryptographic proofs of which parties behave
|
||||||
|
Loading…
Reference in New Issue
Block a user