gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-www] branch master updated: add CS news


From: gnunet
Subject: [taler-www] branch master updated: add CS news
Date: Sat, 12 Feb 2022 23:38:19 +0100

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository www.

The following commit(s) were added to refs/heads/master by this push:
     new da70100  add CS news
da70100 is described below

commit da701004f849e35066b955cfc3029bbc68f1c8c8
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Sat Feb 12 23:38:12 2022 +0100

    add CS news
---
 template/news/2022-02.html.j2 | 48 +++++++++++++++++++++++++++++++++++++++++++
 www.yml                       |  3 +++
 2 files changed, 51 insertions(+)

diff --git a/template/news/2022-02.html.j2 b/template/news/2022-02.html.j2
new file mode 100644
index 0000000..68c532c
--- /dev/null
+++ b/template/news/2022-02.html.j2
@@ -0,0 +1,48 @@
+{% extends "common/news.j2" %}
+{% block body_content %}
+<h1>2022-2: Adding Schnorr's Blind Signatures to Taler</h1>
+<p>
+Gian Demarmels and Lucien Heuzeveldt have finished their
+<a href="/papers/cs-thesis.pdf">Bachelor's thesis</a>
+which adds a second blind signature scheme to GNU Taler.
+</p>
+<p>
+  <video id="video" poster="/images/logo-2020.jpg" autobuffer="" height="360" 
width="640" controls="controls">
+    <source src="/videos/cs-movie.mp4" type="video/mp4" \>
+  </video>
+</p>
+<p>
+The goal of this thesis is to improve Taler’s performance and provide cipher 
agility by
+adding support for Schnorr’s blind signatures. To achieve this goal, the 
current state in
+research for Schnorr signatures needs to be analyzed. After choosing a 
signature scheme,
+it has to be integrated into the Taler protocols. Besides implementing the 
redesigned pro-
+tocols in Taler, an implementation of the cryptographic routines is needed.
+The paper ”Blind Schnorr Signatures and Signed ElGamal Encryption in the 
Algebraic Group
+Model” from 2019 (updated in 2021) introducing Clause Blind Schnorr Signatures
+is used as theoretical basis for our improvements. The paper explains why 
simple Blind
+Schnorr Signatures are broken and how the Clause Schnorr Blind Signature 
scheme is se-
+cured against this attack.
+</p>
+<p>
+Compared to the currently used RSA Blind Signatures, the new scheme has an 
additional
+request, two blinding factors instead of one and many calculations are done 
twice to pre-
+vent attacks.
+</p>
+<p>
+The Taler protocols were redesigned to support the Clause Blind Schnorr 
Signature scheme,
+including slight alterations to ensure abort-idempotency, and then further 
specified. Be-
+fore starting with the implementation of the redesigned protocols, the 
cryptographic rou-
+tines for Clause Blind Schnorr Signatures were implemented as part of the 
thesis.
+All of the implemented code is tested and benchmarks are added for the 
cryptographic
+routines.
+</p>
+<p>
+Multiple results were achieved during this thesis: The redesigned protocols 
Taler proto-
+cols with support for Clause Blind Schnorr Signatures, the implementation of 
the crypto-
+graphic routines, the implementation of Talers core protocols and a detailed 
comparison
+between RSA Blind Signatures and Clause Blind Schnorr Signatures. Overall, the 
Clause
+Blind Schnorr Signatures are significantly faster, require less disk space, 
and bandwidth
+and provide cipher agility for Taler.
+</p>
+
+{% endblock body_content %}
diff --git a/www.yml b/www.yml
index 2c6f146..f80d2a4 100644
--- a/www.yml
+++ b/www.yml
@@ -28,6 +28,9 @@ langs_full:
   tr: Türk
 meetingnotes:
 newsposts:
+  - page: 2022-02.html
+    date: 2022-02-20
+    title: Adding Schnorr's Blind Signatures to Taler
   - page: 2022-01.html
     date: 2022-02-05
     title: Come una banca centrale dovrebbe emettere una moneta digitale

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]