You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We will design a protocol that meets the requirement, possibly with algorithmic improvements over the published literature for the designed use case. Based on the survey of previous literature (activity 2.3) and the constraints imposed by our threat model (activity 2.1), we are going to lay out a theoretical protocol design that will meet these requirements. In order to do so, we will employ provable security techniques and develop informal proofs of security guaranteeing that the security of the system can be related to standard, computationally-hard problems.
This activity will be led by the cryptographer with substantial input from the CTO, and some input from the research engineer.
Output: a technical overview document with a sketch of a proof of security.
The text was updated successfully, but these errors were encountered:
We will design a protocol that meets the requirement, possibly with algorithmic improvements over the published literature for the designed use case. Based on the survey of previous literature (activity 2.3) and the constraints imposed by our threat model (activity 2.1), we are going to lay out a theoretical protocol design that will meet these requirements. In order to do so, we will employ provable security techniques and develop informal proofs of security guaranteeing that the security of the system can be related to standard, computationally-hard problems.
This activity will be led by the cryptographer with substantial input from the CTO, and some input from the research engineer.
Output: a technical overview document with a sketch of a proof of security.
The text was updated successfully, but these errors were encountered: