tfpauly / privacy-proxy

Specifications for Privacy Proxy Implementations
Other
29 stars 11 forks source link

NIZK security properties #101

Closed chris-wood closed 2 years ago

chris-wood commented 2 years ago

The rationale for the NIZK proof could be made more clear. We should add this somewhere to the protocol overview, with details in the security considerations. We should also extract the "mapping" computation to a separate section so it can be reviewed independently of the rest of the protocol details.