Response to Crypto 2014 Paper
نویسنده
چکیده
However, GPR fails to note that a very similar result giving lqǫ-security was proved earlier in our paper “Another look at HMAC.” GPR acknowledges our main theorem, which gives lǫ-security under a stronger PRF-assumption, but omits any mention of our Corollary 10.3, where we proved that lqǫ-security under the weaker assumption follows from the theorem. GPR can correctly claim that their result is a new contribution, because it is “more finegrained” (in the authors’ words) than the general lqǫ-security property that we proved in Corollary 10.3. However, failure to adequately acknowledge prior work is a serious lapse.
منابع مشابه
Crypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems
In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age. To locate the issue in a historical perspective and in line with this strand of thought, we consid...
متن کاملOpening discussion on banking sector risk exposures and vulnerabilities from virtual currencies: An operational risk perspective
We develop the first basic Operational Risk perspective on key risk management issues associated with the development of new forms of electronic currency in the real economy. In particular, we focus on understanding the development of new risks types and the evolution of current risk types as new components of financial institutions arise to cater for an increasing demand for electronic money, ...
متن کاملOn The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies
In this paper we revisit some major orthodoxies which lie at the heart of the bitcoin crypto currency and its numerous clones. In particular we look at The Longest Chain Rule, the monetary supply policies and the exact mechanisms which implement them. We claim that these built-in properties are not as brilliant as they are sometimes claimed. A closer examination reveals that they are closer to ...
متن کاملA novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective
Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...
متن کاملTezos: A Self-Amending Crypto-Ledger Position Paper
The popularization of Bitcoin, a decentralized crypto-currency has inspired the production of several alternative, or “alt”, currencies. Ethereum, CryptoNote, and Zerocash all represent unique contributions to the cryptocurrency space. Although most alt currencies harbor their own source of innovation, they have no means of adopting the innovations of other currencies which may succeed them. We...
متن کاملCompositional Properties of Crypto-Based Components
This paper presents an Isabelle/HOL [1] set of theories which allows to specify crypto-based components and to verify their composition properties wrt. cryptographic aspects. We introduce a formalisation of the security property of data secrecy, the corresponding definitions and proofs. A part of these definitions is based on [3]. Please note that here we import the Isabelle/HOL theory ListExtr...
متن کامل