add thoughts
Raphael
Fri, 03 Jul 2020 12:53:30 +0200
1 files changed,
10 insertions(+),
0 deletions(-)
jump to
M
Readme.md
→
Readme.md
@@ -10,3 +10,13 @@
## What's the use? Please refer to above paper to get an overview of what anonymous authentication is. + +## Additional thoughts + +* The list of public keys has to be public and accepted by all participants. Otherwise, the server could guess who is +about to authenticate, only encrypt with the victim's public key and send rubbish otherwise. If the victim sends back a +successful w, the server knows for sure it comes from the victim that he thought would try to authenticate. + +* The paper suggests verifying the coins in step 4. In my opinion, the server could send all coins together with the +cypher text in step 2. In that way, once the client decrypted w, the client can verify the challenge right away, and +only on successful verification send back w to the server without risking being de-anonymized in step 3.