gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] [taler-exchange] branch master updated: typos


From: gnunet
Subject: [GNUnet-SVN] [taler-exchange] branch master updated: typos
Date: Tue, 16 May 2017 11:26:22 +0200

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository exchange.

The following commit(s) were added to refs/heads/master by this push:
     new 917a2de  typos
917a2de is described below

commit 917a2dee0f4af66722f2a83d20e016b26af972bd
Author: Christian Grothoff <address@hidden>
AuthorDate: Tue May 16 11:26:22 2017 +0200

    typos
---
 doc/paper/taler.tex | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/doc/paper/taler.tex b/doc/paper/taler.tex
index 9d787be..c32adc1 100644
--- a/doc/paper/taler.tex
+++ b/doc/paper/taler.tex
@@ -1455,7 +1455,7 @@ if given coin creation transcripts and possibly fewer
 coin deposit transcripts for coins from the creation transcripts,
 then produce a corresponding creation and deposit transcript.
 
-We say a probabilistic polynomial time (PPT) adversary $A$
+We say a probabilistic polynomial time (PPT) adversary
 {\em links} coins if it has a non-negligible advantage in
 solving the linking problem, when given the private keys
 of the exchange.
@@ -1483,7 +1483,7 @@ adversary can recognize blinding factors then they link 
coins after
 first computing $b_{i,j} = b_i m_i^d / m_j^d \mod n$ for all $i,j$.
 \end{proof}
 
-We now know the following because Taler used SHA512 adopted to be
+We now know the following because Taler uses SHA512 adopted to be
  a FDH to be the blinding factor.
 
 \begin{corollary}
@@ -1535,7 +1535,7 @@ We may now conclude that Taler remains unlinkable even 
with the refresh protocol
 \begin{theorem}
 In the random oracle model, any PPT adversary with an advantage
 in linking Taler coins has an advantage in breaking elliptic curve
-Diffie-Hellman key exchange on curve25519.
+Diffie-Hellman key exchange on Curve25519.
 \end{theorem}
 
 We do not distinguish between information known by the exchange and

-- 
To stop receiving notification emails like this one, please contact
address@hidden



reply via email to

[Prev in Thread] Current Thread [Next in Thread]