This pull request moves mathematical details from the protocol section to the building block section. This provides a better abstracted description of the protocol and allows for better abstraction in the security analysis too (reductions to Anon-Pass etc.).
@sbuc Open the attached PDF and check out Section V.C and VII.{A,B}. What do you think? This way we could put all the figures in the appendix (not done in this version).
This pull request moves mathematical details from the protocol section to the building block section. This provides a better abstracted description of the protocol and allows for better abstraction in the security analysis too (reductions to Anon-Pass etc.).
This fixes #78. PDF: paper.pdf