dbosk / crocus

Securely and privately verifiable protests
Other
0 stars 0 forks source link

State assumption already in introduction #49

Closed dbosk closed 6 years ago

dbosk commented 6 years ago

E.g. that by Alice we mean Alice's cryptographic key (or at least her device).

sbuc commented 6 years ago

done

sbuc commented 6 years ago

ah, maybe not done. I included other assumptions on devices, network, credentials, distance bounding.

sbuc commented 6 years ago

actually, it doesn't make sense in the intro, closing this now.